Overview
overview
10Static
static
10672dd0c0b8...8b.exe
windows7-x64
10672dd0c0b8...8b.exe
windows10-2004-x64
10$PLUGINSDIR/Ping.dll
windows7-x64
3$PLUGINSDIR/Ping.dll
windows10-2004-x64
3$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3Installer.exe
windows7-x64
8Installer.exe
windows10-2004-x64
8Analysis
-
max time kernel
119s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 21:30
Behavioral task
behavioral1
Sample
672dd0c0b851ef59e073ba4aa2a5211c9546679b22788d1d117339b28b8d528b.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
672dd0c0b851ef59e073ba4aa2a5211c9546679b22788d1d117339b28b8d528b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Ping.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Ping.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Registry.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Registry.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Installer.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Installer.exe
Resource
win10v2004-20241007-en
General
-
Target
672dd0c0b851ef59e073ba4aa2a5211c9546679b22788d1d117339b28b8d528b.exe
-
Size
8.8MB
-
MD5
823389e6b696377bca1922f6eff200ad
-
SHA1
e292a7ecb3156e12dcacde7afb810b84afff6007
-
SHA256
672dd0c0b851ef59e073ba4aa2a5211c9546679b22788d1d117339b28b8d528b
-
SHA512
f5c4e9f09faa18e5bef6d3d0dc19ad6ceaaf47f842f3f52399c796153da1695ff94e69d5d54d6e18b1fda54a72b740c6e48e29148fc523f6a978b53c1529d30b
-
SSDEEP
196608:T1oRCm5gjvpKv1gJzwgs/vvZNijq97g00QCOsNjz0uHFtdMaKDk:T1oRCIg1Kvozwl/73vYrWaKI
Malware Config
Signatures
-
Panda Stealer payload 1 IoCs
resource yara_rule behavioral2/files/0x000d000000023ba0-6.dat family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Pandastealer family
-
Blocklisted process makes network request 12 IoCs
flow pid Process 18 3448 msiexec.exe 20 3448 msiexec.exe 22 3448 msiexec.exe 24 3448 msiexec.exe 27 3448 msiexec.exe 34 4836 rundll32.exe 35 4836 rundll32.exe 55 4836 rundll32.exe 58 4836 rundll32.exe 60 4836 rundll32.exe 119 4836 rundll32.exe 123 4836 rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Installer.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation rundll32.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 2 IoCs
pid Process 3472 Installer.exe 3104 Smartbar.exe -
Loads dropped DLL 64 IoCs
pid Process 2108 672dd0c0b851ef59e073ba4aa2a5211c9546679b22788d1d117339b28b8d528b.exe 3472 Installer.exe 3472 Installer.exe 3472 Installer.exe 3472 Installer.exe 4832 MsiExec.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 3676 rundll32.exe 4832 MsiExec.exe 2372 rundll32.exe 2372 rundll32.exe 2372 rundll32.exe 2372 rundll32.exe 2372 rundll32.exe 2372 rundll32.exe 2372 rundll32.exe 2372 rundll32.exe 2372 rundll32.exe 2372 rundll32.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Browser Infrastructure Helper = "C:\\Users\\Admin\\AppData\\Local\\Smartbar\\Application\\Smartbar.exe startup" msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini Smartbar.exe File opened for modification C:\Windows\assembly\Desktop.ini Smartbar.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: Smartbar.exe File opened (read-only) \??\I: Smartbar.exe File opened (read-only) \??\M: Smartbar.exe File opened (read-only) \??\R: Smartbar.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: Smartbar.exe File opened (read-only) \??\J: Smartbar.exe File opened (read-only) \??\Q: Smartbar.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Y: Smartbar.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: Smartbar.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: Smartbar.exe File opened (read-only) \??\N: Smartbar.exe File opened (read-only) \??\X: Smartbar.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: Smartbar.exe File opened (read-only) \??\S: Smartbar.exe File opened (read-only) \??\V: Smartbar.exe File opened (read-only) \??\W: Smartbar.exe File opened (read-only) \??\K: Smartbar.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: Smartbar.exe File opened (read-only) \??\G: Smartbar.exe File opened (read-only) \??\P: Smartbar.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Z: Smartbar.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: Smartbar.exe File opened (read-only) \??\U: Smartbar.exe File opened (read-only) \??\G: msiexec.exe -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31ad400d-1b06-4e33-a59a-90c2c140cba0}\NoExplorer = "1" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31ad400d-1b06-4e33-a59a-90c2c140cba0} RegAsm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31ad400d-1b06-4e33-a59a-90c2c140cba0}\NoExplorer = "1" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31ad400d-1b06-4e33-a59a-90c2c140cba0} RegAsm.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIB565.tmp-\siem.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\spbe.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\srsl.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\srbhu.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\srns.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\sipb.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\Smartbar.Resources.LanguageSettings.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\srpdm.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\Smartbar.Resources.HistoryAndStatsWrapper.XmlSerializers.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\sppsm.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\spsm.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\spbl.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\Smartbar.Resources.HistoryAndStatsWrapper.XmlSerializers.dll rundll32.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new rundll32.exe File opened for modification C:\Windows\assembly\Desktop.ini Smartbar.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\Microsoft.Practices.EnterpriseLibrary.ExceptionHandling.Logging.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\Smartbar.Resources.LanguageSettings.resources.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSIC2F3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\sismlp.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\RegAsm.exe rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\Newtonsoft.Json.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\Smartbar.Resources.SocialNetsSharer.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\Smartbar.Resources.SocialNetsSharer.XmlSerializers.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\Smartbar.Resources.LanguageSettings.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\RegAsm.exe rundll32.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\srpdm.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\srns.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\Smartbar.GUI.Docking.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\spbe.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\spbl.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\srbhu.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\Microsoft.Practices.EnterpriseLibrary.ExceptionHandling.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\Newtonsoft.Json.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\srsl.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\Microsoft.Practices.EnterpriseLibrary.Common.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\siem.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\Microsoft.Practices.ObjectBuilder.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\Smartbar.GUI.Controls.dll rundll32.exe File opened for modification C:\Windows\assembly Smartbar.exe File opened for modification C:\Windows\Installer\MSIB565.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\srbs.dll rundll32.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new rundll32.exe File created C:\Windows\Installer\SourceHash{9726F9E3-EE13-4601-B2AF-81B1413BD8AF} msiexec.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\Smartbar.Resources.Translations.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\Smartbar.Resources.HistoryAndStatsWrapper.dll rundll32.exe File created C:\Windows\assembly\Desktop.ini Smartbar.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\srsbs.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\Smartbar.Resources.LanguageSettings.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\Smartbar.GUI.Docking.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\Smartbar.Resources.SocialNetsSharer.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\srsbs.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\Smartbar.Resources.SocialNetsSharer.XmlSerializers.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\Microsoft.Practices.EnterpriseLibrary.Logging.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\MACTrackBarLib.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\Smartbar.Resources.SocialNetsSharer.XmlSerializers.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\srpu.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIC313.tmp-\Newtonsoft.Json.dll rundll32.exe File opened for modification C:\Windows\Installer\MSID4A8.tmp-\spsm.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\Smartbar.GUI.Docking.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB565.tmp-\Smartbar.Resources.HistoryAndStatsWrapper.XmlSerializers.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Smartbar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 672dd0c0b851ef59e073ba4aa2a5211c9546679b22788d1d117339b28b8d528b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4036 msiexec.exe 684 iexplore.exe 4572 IEXPLORE.EXE 3472 Installer.exe -
Kills process with taskkill 1 IoCs
pid Process 4940 taskkill.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\SearchScopes\{006ee092-9658-4fd6-bd8e-a21a348e59f5}\DisplayName = "Web Search" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31147064" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Search\Default_Search_URL = "http://feed.snapdo.com/?publisher=ShoppingHelper&dpid=ShoppingHelper&co=GB&userid=5f91d3d2-c1ee-ded0-9d50-3d4a869ecfb4&searchtype=ds&q={searchTerms}&installDate={installDate}" Installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://feed.snapdo.com/?publisher=ShoppingHelper&dpid=ShoppingHelper&co=TJ&userid=5f91d3d2-c1ee-ded0-9d50-3d4a869ecfb4&searchtype=ds&q={searchTerms}&installDate=01/12/2024" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{006ee092-9658-4fd6-bd8e-a21a348e59f5}\URL = "http://feed.snapdo.com/?publisher=ShoppingHelper&dpid=ShoppingHelper&co=TJ&userid=5f91d3d2-c1ee-ded0-9d50-3d4a869ecfb4&searchtype=ds&q={searchTerms}&installDate=01/12/2024" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\SearchScopes\{006ee092-9658-4fd6-bd8e-a21a348e59f5} rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1732595495" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1735876919" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\SearchScopes\{006ee092-9658-4fd6-bd8e-a21a348e59f5} Installer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\SearchUrl Installer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\ShowTabsWelcome = "0" Installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31147064" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Use Search Asst = "yes" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\SearchUrl\Default = "http://feed.snapdo.com/?publisher=ShoppingHelper&dpid=ShoppingHelper&co=TJ&userid=5f91d3d2-c1ee-ded0-9d50-3d4a869ecfb4&searchtype=ds&q={searchTerms}&installDate=01/12/2024" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\SearchUrl\Default = "http://feed.snapdo.com/?publisher=ShoppingHelper&dpid=ShoppingHelper&co=TJ&userid=5f91d3d2-c1ee-ded0-9d50-3d4a869ecfb4&searchtype=ds&q={searchTerms}&installDate=01/12/2024" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\SearchScopes\{006ee092-9658-4fd6-bd8e-a21a348e59f5}\SuggestionsURL_JSON = "http://suggestqueries.google.com/complete/search?output=firefox&client=firefox&qu={searchTerms}" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\User Preferences\3DB9590C4C4C26C4CCBDD94ECAD790359708C3267B = 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 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439853642" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Search Installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{ae07101b-46d4-4a98-af68-0333ea26e113} = "Smartbar" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{006ee092-9658-4fd6-bd8e-a21a348e59f5}" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\SearchScopes\{006ee092-9658-4fd6-bd8e-a21a348e59f5}\URL = "http://feed.snapdo.com/?publisher=ShoppingHelper&dpid=ShoppingHelper&co=TJ&userid=5f91d3d2-c1ee-ded0-9d50-3d4a869ecfb4&searchtype=ds&q={searchTerms}&installDate=01/12/2024" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Search\Default_Search_URL = "http://feed.snapdo.com/?publisher=ShoppingHelper&dpid=ShoppingHelper&co=TJ&userid=5f91d3d2-c1ee-ded0-9d50-3d4a869ecfb4&searchtype=ds&q={searchTerms}&installDate=01/12/2024" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\SearchScopes\{006ee092-9658-4fd6-bd8e-a21a348e59f5}\SuggestionsURLFallback = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IE8SSC&market={language}" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Search\SearchAssistant = "http://feed.snapdo.com/?publisher=ShoppingHelper&dpid=ShoppingHelper&co=GB&userid=5f91d3d2-c1ee-ded0-9d50-3d4a869ecfb4&searchtype=ds&q={searchTerms}&installDate={installDate}" Installer.exe Key deleted \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\USER PREFERENCES Installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{006ee092-9658-4fd6-bd8e-a21a348e59f5}\SuggestionsURL_JSON = "http://suggestqueries.google.com/complete/search?output=firefox&client=firefox&qu={searchTerms}" Installer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing Installer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1732595495" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{92C8B1BE-B02B-11EF-AEE2-DA67B56E6C1B} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key deleted \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{006ee092-9658-4fd6-bd8e-a21a348e59f5}\DisplayName = "Web Search" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPageShow = "1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{006ee092-9658-4fd6-bd8e-a21a348e59f5}" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000086445aa8a430244a91c2b800ab210a51000000000200000000001066000000010000200000007c2b5e0a943c26932f3893726c4d711f57a400be6864867aad1222f69c520377000000000e80000000020000200000000de0cb7252925b7afe07ff06b143cd1ddd1e0cef1bc66f8e90e969c917d97cf620000000b3515b6b530145cf96e787aa4624023367fbc7e555b2864fb827289d407e5505400000004777f9d59063e86f1e79704559ac06ae272cdbf34c668f4566531810d3262e670bcf86205a8d46a8a5a27649845df832b2764763e01b7530ea12f3303c739285 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d0506a3844db01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Bar = "http://feed.snapdo.com/?publisher=ShoppingHelper&dpid=ShoppingHelper&co=GB&userid=5f91d3d2-c1ee-ded0-9d50-3d4a869ecfb4&searchtype=ds&q={searchTerms}&installDate={installDate}" Installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{ae07101b-46d4-4a98-af68-0333ea26e113} = "Smartbar" RegAsm.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\ShowTabsWelcome = "0" rundll32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\SearchUrl rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Use Search Asst = "yes" Installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar RegAsm.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\MAO Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\AddonLoadTimeThreshold = "10000" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31147064" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://feed.snapdo.com/?publisher=ShoppingHelper&dpid=ShoppingHelper&co=GB&userid=5f91d3d2-c1ee-ded0-9d50-3d4a869ecfb4&searchtype=hp&installDate={installDate}" Installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://feed.snapdo.com/?publisher=ShoppingHelper&dpid=ShoppingHelper&co=TJ&userid=5f91d3d2-c1ee-ded0-9d50-3d4a869ecfb4&searchtype=hp&installDate=01/12/2024" rundll32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{FB2E65F4-5687-33EF-9BBF-4E3C9C98D3B9} RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AE07101B-46D4-4A98-AF68-0333EA26E113}\ProgId RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AE07101B-46D4-4A98-AF68-0333EA26E113}\HelpText = "Shopping Helper Smartbar" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F245-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\RuntimeVersion = "v1.0.3705" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F268-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\Class = "mshtml.HTMLUnknownElementClass" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{41CE25A3-364F-363C-B344-545C1A43472D} RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{425E7597-03A2-338D-B72A-0E51FFE77A7E} RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F312-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{E683717D-A679-364D-BFFC-FD1EB7F22DBB}\7.0.3300.0\Class = "mshtml.__MIDL___MIDL_itf_mshtml_0250_0008" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F2BE-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\Class = "mshtml.HTMLOptionButtonElementClass" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{8BE8AA32-4245-3E8A-91E9-CF037C41FC74}\7.0.3300.0\RuntimeVersion = "v1.0.3705" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3050F269-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\RuntimeVersion = "v1.0.3705" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F284-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\Class = "mshtml.HTMLTitleElementClass" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{F284FEA5-89F7-3A68-ABCA-110332EE3633} RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3050F3FF-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{2009AF2F-5786-3067-8799-B97F7832FDD6}\1.0.0.0\Assembly = "SmartbarInternetExplorerExtension, Version=1.0.0.0, Culture=neutral, PublicKeyToken=64637c62d0471340" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{8BE8AA32-4245-3E8A-91E9-CF037C41FC74}\7.0.3300.0\Class = "mshtml._styleTableLayout" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{ED785CBD-B02D-3BFC-8FBF-4CDC702AF748}\7.0.3300.0\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F2E4-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F314-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3050F38D-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{80A7F279-4C73-3BED-B5BD-0AF6F30E0639}\7.0.3300.0\Class = "mshtml._styleFontVariant" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F270-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\Class = "mshtml.HTMLOListElementClass" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F284-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\Class = "mshtml.HTMLTitleElementClass" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3050F3DC-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{34A226E0-DF30-11CF-89A9-00A0C9054129}\1.1.0.0\Assembly = "Interop.SHDocVw, Version=1.1.0.0, Culture=neutral, PublicKeyToken=84542ff99aed6a4d" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CCB08265-B35D-30B2-A6AF-6986CA957358} RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{09A8905B-CC7D-3853-93DB-56A686FD72FD} RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{9CA2452F-D24B-374F-A6AB-9334BE066F08}\7.0.3300.0\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{2A7855AF-528E-3692-8F4E-E6AD67AF1BF2}\7.0.3300.0\RuntimeVersion = "v1.0.3705" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F5F5-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F3F5-98B4-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\Class = "mshtml.HTMLSpanElementClass" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{48530DAB-FB60-3959-8AA4-2110A2344EED}\7.0.3300.0\RuntimeVersion = "v1.0.3705" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3050F630-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\RuntimeVersion = "v1.0.3705" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{A8317D46-03CB-4975-AE94-85E9F2E1D020}\1.1.0.0\RuntimeVersion = "v2.0.50727" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{31AD400D-1B06-4E33-A59A-90C2C140CBA0}\InprocServer32\ = "mscoree.dll" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{F70614F4-B26B-3812-8E29-C822C4810B14}\7.0.3300.0 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3050F272-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\Class = "mshtml.HTMLListElementClass" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{425E7597-03A2-338D-B72A-0E51FFE77A7E}\1.0.0.0\Class = "IESmartBar.POINT" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{2A7855AF-528E-3692-8F4E-E6AD67AF1BF2}\7.0.3300.0\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{1A831E80-8858-3805-84C7-C9D0C3D12E92}\7.0.3300.0\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F6AA-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\RuntimeVersion = "v1.0.3705" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F491-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{9CBDDE76-4C5D-3B59-A31F-45B59186510A}\7.0.3300.0\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3050F270-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{85C95AA9-39F2-311E-86C0-D2610A00A85B}\7.0.3300.0 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F5DD-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F4CA-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{84559181-4149-3992-B3AB-31C84AB30373}\7.0.3300.0 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F5EB-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\Class = "mshtml.ThreadDialogProcParamClass" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{4330C207-19C5-3435-80A3-11D4E9322285}\7.0.3300.0 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{64AB4BB7-111E-11d1-8F79-00C04FC2FBE1} RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3050F275-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\RuntimeVersion = "v1.0.3705" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{C8872B56-D98C-3C12-B8A9-9F81495D11D3}\7.0.3300.0\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{B105EDC3-7FEE-32E9-BCB5-B7D3314D03E0}\7.0.3300.0 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F285-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\Class = "mshtml.HTMLStyleClass" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F6BC-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\Class = "mshtml.HTMLNamespaceClass" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3050F5F5-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\Class = "mshtml.HTCAttachBehaviorClass" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3050F245-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\Assembly = "Microsoft.mshtml, Version=7.0.3300.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IESmartBar.IESmartBarBandObject\ = "IESmartBar.IESmartBarBandObject" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A717364F-69F3-3A24-ADD5-3901A57F880E}\Implemented Categories RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3050F31A-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3050F26A-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\RuntimeVersion = "v1.0.3705" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3050F2DF-98B5-11CF-BB82-00AA00BDCE0B}\InprocServer32\7.0.3300.0\Class = "mshtml.HTMLRichtextElementClass" RegAsm.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 040000000100000010000000cb17e431673ee209fe455793f30afa1c0f0000000100000014000000e91e1e972b8f467ab4e0598fa92285387dee94c953000000010000006300000030613021060b6086480186f8450107170630123010060a2b0601040182373c0101030200c0301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c07f000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030109000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b060105050703016200000001000000200000009acfab7e43c8d880d06b262a94deeee4b4659989c3d0caf19baf6405e41ab7df1400000001000000140000007fd365a7c2ddecbbf03009f34339fa02af3331330b000000010000001200000056006500720069005300690067006e0000001d0000000100000010000000c6cbcafa17955c4cfd41eca0c654c3617e000000010000000800000000c0032f2df8d6016800000001000000000000000300000001000000140000004eb6d578499b1ccf5f581ead56be3d9b6744a5e5190000000100000010000000d8b5fb368468620275d142ffd2aade372000000001000000d7040000308204d3308203bba003020102021018dad19e267de8bb4a2158cdcc6b3b4a300d06092a864886f70d01010505003081ca310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e311f301d060355040b1316566572695369676e205472757374204e6574776f726b313a3038060355040b1331286329203230303620566572695369676e2c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79314530430603550403133c566572695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d204735301e170d3036313130383030303030305a170d3336303731363233353935395a3081ca310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e311f301d060355040b1316566572695369676e205472757374204e6574776f726b313a3038060355040b1331286329203230303620566572695369676e2c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79314530430603550403133c566572695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d20473530820122300d06092a864886f70d01010105000382010f003082010a0282010100af240808297a359e600caae74b3b4edc7cbc3c451cbb2be0fe2902f95708a364851527f5f1adc831895d22e82aaaa642b38ff8b955b7b1b74bb3fe8f7e0757ecef43db66621561cf600da4d8def8e0c362083d5413eb49ca59548526e52b8f1b9febf5a191c23349d843636a524bd28fe870514dd189697bc770f6b3dc1274db7b5d4b56d396bf1577a1b0f4a225f2af1c926718e5f40604ef90b9e400e4dd3ab519ff02baf43ceee08beb378becf4d7acf2f6f03dafdd759133191d1c40cb7424192193d914feac2a52c78fd50449e48d6347883c6983cbfe47bd2b7e4fc595ae0e9dd4d143c06773e314087ee53f9f73b8330acf5d3f3487968aee53e825150203010001a381b23081af300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106306d06082b0601050507010c0461305fa15da05b3059305730551609696d6167652f6769663021301f300706052b0e03021a04148fe5d31a86ac8d8e6bc3cf806ad448182c7b192e30251623687474703a2f2f6c6f676f2e766572697369676e2e636f6d2f76736c6f676f2e676966301d0603551d0e041604147fd365a7c2ddecbbf03009f34339fa02af333133300d06092a864886f70d0101050500038201010093244a305f62cfd81a982f3deadc992dbd77f6a5792238ecc4a7a07812ad620e457064c5e797662d98097e5fafd6cc2865f201aa081a47def9f97c925a0869200dd93e6d6e3c0d6ed8e606914018b9f8c1eddfdb41aae09620c9cd64153881c994eea284290b136f8edb0cdd2502dba48b1944d2417a05694a584f60ca7e826a0b02aa251739b5db7fe784652a958abd86de5e8116832d10ccdefda8822a6d281f0d0bc4e5e71a2619e1f4116f10b595fce7420532dbce9d515e28b69e85d35befa57d4540728eb70e6b0e06fb33354871b89d278bc4655f0d86769c447af6955cf65d320833a454b6183f685cf2424a853854835fd1e82cf2ac11d6a8ed636a rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 5c000000010000000400000000080000190000000100000010000000d8b5fb368468620275d142ffd2aade370300000001000000140000004eb6d578499b1ccf5f581ead56be3d9b6744a5e56800000001000000000000007e000000010000000800000000c0032f2df8d6011d0000000100000010000000c6cbcafa17955c4cfd41eca0c654c3610b000000010000001200000056006500720069005300690067006e0000001400000001000000140000007fd365a7c2ddecbbf03009f34339fa02af3331336200000001000000200000009acfab7e43c8d880d06b262a94deeee4b4659989c3d0caf19baf6405e41ab7df09000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b060105050703017f000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030153000000010000006300000030613021060b6086480186f8450107170630123010060a2b0601040182373c0101030200c0301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f0000000100000014000000e91e1e972b8f467ab4e0598fa92285387dee94c9040000000100000010000000cb17e431673ee209fe455793f30afa1c2000000001000000d7040000308204d3308203bba003020102021018dad19e267de8bb4a2158cdcc6b3b4a300d06092a864886f70d01010505003081ca310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e311f301d060355040b1316566572695369676e205472757374204e6574776f726b313a3038060355040b1331286329203230303620566572695369676e2c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79314530430603550403133c566572695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d204735301e170d3036313130383030303030305a170d3336303731363233353935395a3081ca310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e311f301d060355040b1316566572695369676e205472757374204e6574776f726b313a3038060355040b1331286329203230303620566572695369676e2c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79314530430603550403133c566572695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d20473530820122300d06092a864886f70d01010105000382010f003082010a0282010100af240808297a359e600caae74b3b4edc7cbc3c451cbb2be0fe2902f95708a364851527f5f1adc831895d22e82aaaa642b38ff8b955b7b1b74bb3fe8f7e0757ecef43db66621561cf600da4d8def8e0c362083d5413eb49ca59548526e52b8f1b9febf5a191c23349d843636a524bd28fe870514dd189697bc770f6b3dc1274db7b5d4b56d396bf1577a1b0f4a225f2af1c926718e5f40604ef90b9e400e4dd3ab519ff02baf43ceee08beb378becf4d7acf2f6f03dafdd759133191d1c40cb7424192193d914feac2a52c78fd50449e48d6347883c6983cbfe47bd2b7e4fc595ae0e9dd4d143c06773e314087ee53f9f73b8330acf5d3f3487968aee53e825150203010001a381b23081af300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106306d06082b0601050507010c0461305fa15da05b3059305730551609696d6167652f6769663021301f300706052b0e03021a04148fe5d31a86ac8d8e6bc3cf806ad448182c7b192e30251623687474703a2f2f6c6f676f2e766572697369676e2e636f6d2f76736c6f676f2e676966301d0603551d0e041604147fd365a7c2ddecbbf03009f34339fa02af333133300d06092a864886f70d0101050500038201010093244a305f62cfd81a982f3deadc992dbd77f6a5792238ecc4a7a07812ad620e457064c5e797662d98097e5fafd6cc2865f201aa081a47def9f97c925a0869200dd93e6d6e3c0d6ed8e606914018b9f8c1eddfdb41aae09620c9cd64153881c994eea284290b136f8edb0cdd2502dba48b1944d2417a05694a584f60ca7e826a0b02aa251739b5db7fe784652a958abd86de5e8116832d10ccdefda8822a6d281f0d0bc4e5e71a2619e1f4116f10b595fce7420532dbce9d515e28b69e85d35befa57d4540728eb70e6b0e06fb33354871b89d278bc4655f0d86769c447af6955cf65d320833a454b6183f685cf2424a853854835fd1e82cf2ac11d6a8ed636a rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3472 Installer.exe 3472 Installer.exe 3472 Installer.exe 3472 Installer.exe 3472 Installer.exe 3472 Installer.exe 3448 msiexec.exe 3448 msiexec.exe 2372 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 3104 Smartbar.exe 3104 Smartbar.exe 4836 rundll32.exe 4836 rundll32.exe 3104 Smartbar.exe 3104 Smartbar.exe 3104 Smartbar.exe 3104 Smartbar.exe 3104 Smartbar.exe 3104 Smartbar.exe 3104 Smartbar.exe 3104 Smartbar.exe 3104 Smartbar.exe 3104 Smartbar.exe 3104 Smartbar.exe 3104 Smartbar.exe 3104 Smartbar.exe 3104 Smartbar.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3104 Smartbar.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4940 taskkill.exe Token: SeShutdownPrivilege 4036 msiexec.exe Token: SeIncreaseQuotaPrivilege 4036 msiexec.exe Token: SeSecurityPrivilege 3448 msiexec.exe Token: SeCreateTokenPrivilege 4036 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4036 msiexec.exe Token: SeLockMemoryPrivilege 4036 msiexec.exe Token: SeIncreaseQuotaPrivilege 4036 msiexec.exe Token: SeMachineAccountPrivilege 4036 msiexec.exe Token: SeTcbPrivilege 4036 msiexec.exe Token: SeSecurityPrivilege 4036 msiexec.exe Token: SeTakeOwnershipPrivilege 4036 msiexec.exe Token: SeLoadDriverPrivilege 4036 msiexec.exe Token: SeSystemProfilePrivilege 4036 msiexec.exe Token: SeSystemtimePrivilege 4036 msiexec.exe Token: SeProfSingleProcessPrivilege 4036 msiexec.exe Token: SeIncBasePriorityPrivilege 4036 msiexec.exe Token: SeCreatePagefilePrivilege 4036 msiexec.exe Token: SeCreatePermanentPrivilege 4036 msiexec.exe Token: SeBackupPrivilege 4036 msiexec.exe Token: SeRestorePrivilege 4036 msiexec.exe Token: SeShutdownPrivilege 4036 msiexec.exe Token: SeDebugPrivilege 4036 msiexec.exe Token: SeAuditPrivilege 4036 msiexec.exe Token: SeSystemEnvironmentPrivilege 4036 msiexec.exe Token: SeChangeNotifyPrivilege 4036 msiexec.exe Token: SeRemoteShutdownPrivilege 4036 msiexec.exe Token: SeUndockPrivilege 4036 msiexec.exe Token: SeSyncAgentPrivilege 4036 msiexec.exe Token: SeEnableDelegationPrivilege 4036 msiexec.exe Token: SeManageVolumePrivilege 4036 msiexec.exe Token: SeImpersonatePrivilege 4036 msiexec.exe Token: SeCreateGlobalPrivilege 4036 msiexec.exe Token: SeRestorePrivilege 3448 msiexec.exe Token: SeTakeOwnershipPrivilege 3448 msiexec.exe Token: SeRestorePrivilege 3448 msiexec.exe Token: SeTakeOwnershipPrivilege 3448 msiexec.exe Token: SeRestorePrivilege 3448 msiexec.exe Token: SeTakeOwnershipPrivilege 3448 msiexec.exe Token: SeRestorePrivilege 3448 msiexec.exe Token: SeTakeOwnershipPrivilege 3448 msiexec.exe Token: SeDebugPrivilege 2372 rundll32.exe Token: SeRestorePrivilege 3448 msiexec.exe Token: SeTakeOwnershipPrivilege 3448 msiexec.exe Token: SeRestorePrivilege 3448 msiexec.exe Token: SeTakeOwnershipPrivilege 3448 msiexec.exe Token: SeRestorePrivilege 3448 msiexec.exe Token: SeTakeOwnershipPrivilege 3448 msiexec.exe Token: SeRestorePrivilege 3448 msiexec.exe Token: SeTakeOwnershipPrivilege 3448 msiexec.exe Token: SeRestorePrivilege 3448 msiexec.exe Token: SeTakeOwnershipPrivilege 3448 msiexec.exe Token: SeRestorePrivilege 3448 msiexec.exe Token: SeTakeOwnershipPrivilege 3448 msiexec.exe Token: SeRestorePrivilege 3448 msiexec.exe Token: SeTakeOwnershipPrivilege 3448 msiexec.exe Token: SeRestorePrivilege 3448 msiexec.exe Token: SeTakeOwnershipPrivilege 3448 msiexec.exe Token: SeRestorePrivilege 3448 msiexec.exe Token: SeTakeOwnershipPrivilege 3448 msiexec.exe Token: SeRestorePrivilege 3448 msiexec.exe Token: SeTakeOwnershipPrivilege 3448 msiexec.exe Token: SeRestorePrivilege 3448 msiexec.exe Token: SeTakeOwnershipPrivilege 3448 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4572 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4572 IEXPLORE.EXE 4572 IEXPLORE.EXE 4388 IEXPLORE.EXE 4388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 3472 2108 672dd0c0b851ef59e073ba4aa2a5211c9546679b22788d1d117339b28b8d528b.exe 83 PID 2108 wrote to memory of 3472 2108 672dd0c0b851ef59e073ba4aa2a5211c9546679b22788d1d117339b28b8d528b.exe 83 PID 2108 wrote to memory of 3472 2108 672dd0c0b851ef59e073ba4aa2a5211c9546679b22788d1d117339b28b8d528b.exe 83 PID 3472 wrote to memory of 4940 3472 Installer.exe 84 PID 3472 wrote to memory of 4940 3472 Installer.exe 84 PID 3472 wrote to memory of 4940 3472 Installer.exe 84 PID 3472 wrote to memory of 4036 3472 Installer.exe 88 PID 3472 wrote to memory of 4036 3472 Installer.exe 88 PID 3472 wrote to memory of 4036 3472 Installer.exe 88 PID 3448 wrote to memory of 4832 3448 msiexec.exe 94 PID 3448 wrote to memory of 4832 3448 msiexec.exe 94 PID 3448 wrote to memory of 4832 3448 msiexec.exe 94 PID 4832 wrote to memory of 3676 4832 MsiExec.exe 95 PID 4832 wrote to memory of 3676 4832 MsiExec.exe 95 PID 4832 wrote to memory of 3676 4832 MsiExec.exe 95 PID 3676 wrote to memory of 1340 3676 rundll32.exe 97 PID 3676 wrote to memory of 1340 3676 rundll32.exe 97 PID 3676 wrote to memory of 1340 3676 rundll32.exe 97 PID 1340 wrote to memory of 3096 1340 csc.exe 99 PID 1340 wrote to memory of 3096 1340 csc.exe 99 PID 1340 wrote to memory of 3096 1340 csc.exe 99 PID 3676 wrote to memory of 3740 3676 rundll32.exe 101 PID 3676 wrote to memory of 3740 3676 rundll32.exe 101 PID 3676 wrote to memory of 3740 3676 rundll32.exe 101 PID 3740 wrote to memory of 1452 3740 csc.exe 103 PID 3740 wrote to memory of 1452 3740 csc.exe 103 PID 3740 wrote to memory of 1452 3740 csc.exe 103 PID 4832 wrote to memory of 2372 4832 MsiExec.exe 104 PID 4832 wrote to memory of 2372 4832 MsiExec.exe 104 PID 4832 wrote to memory of 2372 4832 MsiExec.exe 104 PID 4832 wrote to memory of 4836 4832 MsiExec.exe 109 PID 4832 wrote to memory of 4836 4832 MsiExec.exe 109 PID 4832 wrote to memory of 4836 4832 MsiExec.exe 109 PID 4836 wrote to memory of 1188 4836 rundll32.exe 110 PID 4836 wrote to memory of 1188 4836 rundll32.exe 110 PID 4836 wrote to memory of 1188 4836 rundll32.exe 110 PID 1188 wrote to memory of 3500 1188 csc.exe 112 PID 1188 wrote to memory of 3500 1188 csc.exe 112 PID 1188 wrote to memory of 3500 1188 csc.exe 112 PID 4836 wrote to memory of 552 4836 rundll32.exe 113 PID 4836 wrote to memory of 552 4836 rundll32.exe 113 PID 4836 wrote to memory of 552 4836 rundll32.exe 113 PID 552 wrote to memory of 4064 552 csc.exe 115 PID 552 wrote to memory of 4064 552 csc.exe 115 PID 552 wrote to memory of 4064 552 csc.exe 115 PID 4836 wrote to memory of 3928 4836 rundll32.exe 117 PID 4836 wrote to memory of 3928 4836 rundll32.exe 117 PID 4836 wrote to memory of 3928 4836 rundll32.exe 117 PID 4836 wrote to memory of 4724 4836 rundll32.exe 121 PID 4836 wrote to memory of 4724 4836 rundll32.exe 121 PID 4836 wrote to memory of 1840 4836 rundll32.exe 124 PID 4836 wrote to memory of 1840 4836 rundll32.exe 124 PID 4836 wrote to memory of 1840 4836 rundll32.exe 124 PID 4836 wrote to memory of 5052 4836 rundll32.exe 130 PID 4836 wrote to memory of 5052 4836 rundll32.exe 130 PID 4836 wrote to memory of 3616 4836 rundll32.exe 133 PID 4836 wrote to memory of 3616 4836 rundll32.exe 133 PID 4836 wrote to memory of 3616 4836 rundll32.exe 133 PID 4836 wrote to memory of 1436 4836 rundll32.exe 135 PID 4836 wrote to memory of 1436 4836 rundll32.exe 135 PID 4836 wrote to memory of 2268 4836 rundll32.exe 137 PID 4836 wrote to memory of 2268 4836 rundll32.exe 137 PID 4836 wrote to memory of 2268 4836 rundll32.exe 137 PID 4836 wrote to memory of 1312 4836 rundll32.exe 140
Processes
-
C:\Users\Admin\AppData\Local\Temp\672dd0c0b851ef59e073ba4aa2a5211c9546679b22788d1d117339b28b8d528b.exe"C:\Users\Admin\AppData\Local\Temp\672dd0c0b851ef59e073ba4aa2a5211c9546679b22788d1d117339b28b8d528b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\Installer.exeC:\Users\Admin\AppData\Local\Temp\Installer.exe /quiet ARGS=HP:1;DS:1;NT:1;DOWNLOADPROVIDER:ShoppingHelper;PUBLISHER:ShoppingHelper;ROT:ALL;ROSP:1;CSH:1;SHOW_UNINSTALL:1;VISIBLE_IN:FF,IE2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msiexec.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\smartbar\Installer.msi /quiet /quiet ARGS=HP:1;DS:1;NT:1;DOWNLOADPROVIDER:ShoppingHelper;PUBLISHER:ShoppingHelper;ROT:ALL;ROSP:1;CSH:1;SHOW_UNINSTALL:1;VISIBLE_IN:FF,IE;INSTALLATION_ID:5f91d3d2-c1ee-ded0-9d50-3d4a869ecfb43⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 73E6E02004F7B9E1082366A99F56D70C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIB565.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240629359 2 Smartbar.Installer.CustomActions!Linkury.Installer.CustomActions.CustomActions.InstallationStart3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vbkklkzk.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB9FA.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB9F9.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:3096
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\x3u9v7r5.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBCAA.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCBCA9.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:1452
-
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIC313.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240632609 6 Smartbar.Installer.CustomActions!Linkury.Installer.CustomActions.CustomActions.InstallationRemoveFiles3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSID4A8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240637156 73 Smartbar.Installer.CustomActions!Linkury.Installer.CustomActions.CustomActions.InstallationComplete3⤵
- Blocklisted process makes network request
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\m83l2zay.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD756.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD755.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:3500
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yuvqhqva.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD821.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD820.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:4064
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" /codebase "C:\Users\Admin\AppData\Local\Smartbar\Application\SmartbarInternetExplorerExtension.dll"4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:3928
-
-
C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe"C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe" /codebase "C:\Users\Admin\AppData\Local\Smartbar\Application\SmartbarInternetExplorerExtension.dll"4⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:4724
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" /codebase "C:\Users\Admin\AppData\Local\Smartbar\Application\SmartbarInternetExplorerBHO.dll"4⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
PID:1840
-
-
C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe"C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe" /codebase "C:\Users\Admin\AppData\Local\Smartbar\Application\SmartbarInternetExplorerBHO.dll"4⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:5052
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "C:\Users\Admin\AppData\Local\Smartbar\Application\Microsoft.mshtml.dll"4⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3616
-
-
C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe"C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe" "C:\Users\Admin\AppData\Local\Smartbar\Application\Microsoft.mshtml.dll"4⤵
- Modifies registry class
PID:1436
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "C:\Users\Admin\AppData\Local\Smartbar\Application\Interop.SHDocVw.dll"4⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2268
-
-
C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe"C:\windows\microsoft.net\Framework64\v2.0.50727\RegAsm.exe" "C:\Users\Admin\AppData\Local\Smartbar\Application\Interop.SHDocVw.dll"4⤵
- Modifies registry class
PID:1312
-
-
C:\Users\Admin\AppData\Local\Smartbar\Application\Smartbar.exe"C:\Users\Admin\AppData\Local\Smartbar\Application\Smartbar.exe"4⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:3104 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hxax0dti.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES914.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC913.tmp"6⤵
- System Location Discovery: System Language Discovery
PID:4144
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kepcaij1.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:1120 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9DF.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9DE.tmp"6⤵
- System Location Discovery: System Language Discovery
PID:1012
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2qch2g3_.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA8B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA8A.tmp"6⤵
- System Location Discovery: System Language Discovery
PID:4536
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mgi-0b2m.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:3928 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB76.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB75.tmp"6⤵
- System Location Discovery: System Language Discovery
PID:952
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hm15y3e6.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:3908 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDE7.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCDD6.tmp"6⤵
- System Location Discovery: System Language Discovery
PID:4576
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mfn22udf.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF1F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF1E.tmp"6⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\b-jyyiog.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:3584 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFCB.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCFCA.tmp"6⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\crioyg3l.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:2192 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1103.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC1102.tmp"6⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\gy4xzo6q.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1317.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC1316.tmp"6⤵
- System Location Discovery: System Language Discovery
PID:1816
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vdot2ee0.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:4496 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1597.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC1596.tmp"6⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\f13zo1ca.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:3200 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1847.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC1846.tmp"6⤵
- System Location Discovery: System Language Discovery
PID:3440
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ltc9fojn.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:4888 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1B16.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC1B15.tmp"6⤵
- System Location Discovery: System Language Discovery
PID:2220
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://feed.snapdo.com/?publisher=ShoppingHelper&dpid=ShoppingHelper&co=TJ&userid=5f91d3d2-c1ee-ded0-9d50-3d4a869ecfb4&searchtype=sc&installDate=01/12/20244⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:684 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://feed.snapdo.com/?publisher=ShoppingHelper&dpid=ShoppingHelper&co=TJ&userid=5f91d3d2-c1ee-ded0-9d50-3d4a869ecfb4&searchtype=sc&installDate=01/12/20245⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4572 CREDAT:17410 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4388
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cp3lwybo.cmdline"4⤵
- System Location Discovery: System Language Discovery
PID:1212 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB66.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB65.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:4540
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5a3c4f7721e3c92b697ad263068871292
SHA181bc224c7cfdd9e17113e86d72d25d01e1419789
SHA2566904d6e4c0364d4e4a94784be7d27d2595c1ae35ecbd6180c07e1e7c399abadb
SHA512edc00a6e1345406ffb16c6eb0e817622c3a12158e9d1647f3c4d446c2133ead92e1afd3db13c0f482e94f9cd3acf9f84079270122c8937bd3529b35105b70a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5457A8CE4B2A7499F8299A013B6E1C7C_D734EC3DD00546F46D368325396086B0
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5457A8CE4B2A7499F8299A013B6E1C7C_D734EC3DD00546F46D368325396086B0
Filesize398B
MD51d3a09e5afeeb520728e7102f1fa5320
SHA1d47dbee68eda8c7ca94f0784ef1805cec4d96c16
SHA256d406cc5d234547938ccf915393842210c913fe0ba30d9ae0ae60cbc99cbb8429
SHA512878286eb62b1add66668dd61ca48b73a6c0c7af76156b888b4cc8de1bf8ff2f0f8d12e2de8aef559de3fe794cd4f0231f65104dc3f13a45f1b6a5f5bcb4b2539
-
Filesize
114KB
MD52ba42ee03f1c6909ca8a6575bd08257a
SHA188b18450a4d9cc88e5f27c8d11c0323f475d1ae6
SHA256a14fb57193e6930fa9e410d9c55dfe98e3ae5e69b22356e621edc73683a581bd
SHA512a1f32c22f0d78cba95c04c432e2a58ea47fb34942e70bfdceffcc2ac1e91b87a3da2cd9f93793427ee09a623c7da700e1c16977d41a44286317e8fc20502f035
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
12KB
MD5ec3f05ac2148162ddb052f23299b8ecb
SHA16ce68e94fb7df83ae34094a85abfefce8a3b8d79
SHA256449ab9dae5f16f9dc9e70e37930aeb4c78e057debbb8fe25fb5460a9666ec016
SHA512d166cb06e095281a4a26bdb78e7752d8f9d0e408aa3048eea2294222aa0b7e901364ba377cfc353ada392693b15736c96267697dcabc745f2e4b3d539599b70a
-
Filesize
4KB
MD55719ee7f6521ae142f0557f0706cded1
SHA1a1d5694197827967aea5b3ccc88e2f91d465c283
SHA2560a2ae8f3e9aa552748cfeadaec055778487602e7f6d4a6c2a221fe1fd496bfaf
SHA512cde76dada9e798a746d7ae23ee189940a6b7660805267a9221501c5c911a89b298005f111622fae7c886e810e23f83b77d47fa75793d19441246eb775a2f2bf6
-
Filesize
4KB
MD52768222689e3585d609b5a2afc1ba52c
SHA1ee522df6b2e365857bf6be58ac7150cbc71cfc9c
SHA25621ee471e79b0a646735e132bc1f0c48f464677127b105426e00b160a554de6b0
SHA51256527749dca471af92eb4166b2bb6f1ca4cbf07c8d7e1a201378467f1d08efe5fd913715bb995d35c7d511b2cbdc9469d79baae7ee4bab619e4e11753c3505e4
-
Filesize
4KB
MD5e6ab030a2d47b1306ad071cb3e011c1d
SHA1ed5f9a6503c39832e8b1339d5b16464c5d5a3f03
SHA256054e94c94e34cef7c2fad7a0f3129c4666d07f439bfec39523dca7441a49bd7c
SHA5124cbb002cc2d593bafd2e804cb6f1379187a9cae7d6cc45068fda6d178746420cc90bcd72ba40fc5b8b744170e64df2b296f2a45c8640819aa8b3c775e6120163
-
Filesize
3KB
MD51af25bd4eca4d2b89f9f670548534f8d
SHA1821b200de53207c723d40943ab426e2facd6c812
SHA256920f316807182172f3200057fbc933d9896a85a71d17586f6f6a160af1cdbd14
SHA512e18859fe37e189ebb7ec0108857be9f501b1af6caf3e22aad6a7f6779a090437dffe42fcd9e498259541730f50e03d1493cde23737599b2a6cdfffe831b6406a
-
Filesize
3KB
MD5afa968029549ac47b14fa98b83245f64
SHA1965f0ff140852f6fc51d79036af96d0fe222c4cf
SHA2561194a6e34532de3659fc92e0badb87000362073efe95473efb0c60fb066bdd64
SHA5124ee98d275a9ee4da3c188521997fd07c5d2e43947535655d6d0d408e3a77a92f2acaa0372c023fe0b707d23a8060a748b5fb3e6556220f40682ab982294d2612
-
Filesize
3KB
MD59d7039357a9e8a8cae1cb2cb641228a3
SHA142e3497b93ebc5fd5a5d129f4313dd038e351e32
SHA25690e027f942edecbf36fd8213bb3b7239babade85f5c0b3711d128413af059d96
SHA51251c362c55be01cd8fb26814faae414a7602e7f32bbd7ff3ab1246eef00d25374c33b011d050e3e70a051882528730d7bdcadd9dfba961f85a7601a0352a8b5ea
-
Filesize
3KB
MD571d676d78d56ccf902648fe35ac8812a
SHA1bed07aa9ef6b8ca9148154b2129b4e52edd34526
SHA2564f39c591477308791f5e5ec2933290b7bb3ea4434177983a38f9b783fee21e1b
SHA5126f785b7db14657f8d9b149d7699e022b9254cef8af66c5de0021ada59d5cd81c9367fabc3b78989f7c955602599f84e8c9498c459d1acb569799c52519df8877
-
C:\Users\Admin\AppData\Local\Smartbar\Smartbar.exe_StrongName_vuedtbpoockmp1sq45awfxuouevabx0i\1.153.63.12705\gnh4gpjl.newcfg
Filesize535B
MD5e187e9c2522ffaa68d4a7eb7aadc2932
SHA17df9ecf518ff31918936e154df67633a42f4de60
SHA2568a9053399b418fa91c21a42777a52bd344961f79ee75ea6a7ad1b7edd7e214b3
SHA512b29a6080237477366c176f1516a2471a50c058fa1525d5bb33576a06f92d5177bf8f04846b5de45112d6090c4d59222287480f0255c3f1609b7416564a5d5129
-
C:\Users\Admin\AppData\Local\Smartbar\Smartbar.exe_StrongName_vuedtbpoockmp1sq45awfxuouevabx0i\1.153.63.12705\iiowqqm4.newcfg
Filesize600B
MD5c10e6db7760dc1d917c9212e6ad21aef
SHA160cf5a0e3dedd343a07160920fd3d3d92b6429b4
SHA2567db2698ee8eae380b4e1fe518d94218a986c8f2c0f60ea32267503d5d7f0e723
SHA512dbd82d8357a40547bcb2d5a49bde797e98746497c9f8ba8ec728698d1ede896929e72602d0c49f0c50c8d6c0c0c75467a97cef4d60774b265e3054446450f5e7
-
C:\Users\Admin\AppData\Local\Smartbar\Smartbar.exe_StrongName_vuedtbpoockmp1sq45awfxuouevabx0i\1.153.63.12705\user.config
Filesize471B
MD537a136c3a857169dd68c9173177cadbc
SHA19aa71d6c034eb9080af3a372db0bfa6ebc226d25
SHA256e345c334be1fd3491acd03cd8c734b87cba038714cf83af3d801acc5df13bb4c
SHA5129c39e8a1b0939b3e46b5ad9a0968d2676f9d5be0e569e4bc0829fd258f812062c0ee8a9214c73435b2b4065a9bade3f81da72fd62c34bb71d56867bb60f67ed4
-
Filesize
10.2MB
MD5564e47a3604ced3b7c18e43250226cd7
SHA1a3eef8fac3617d048fb9fce2201937297e3920f1
SHA25612ae00fe728b441221acd10483eeb1197884738e9bd6eb715ceadeea058c6c83
SHA512e925e2a5b60c7257ac6b57b3fc12675d2cc490070c456a8e794f54c6732cc34981c0d88a5acfb2214fd316194f24eae83e8151cfab101daa2f1b59f2d621cdbf
-
Filesize
1KB
MD5cab474d7b2544769233d7ff71db51d3d
SHA1d3ac16e9d47f2e9e93e0242d089edc4f7a7fb44a
SHA2560e6bb6ab546b2a4303fb381b9e1538ec7553cdec612c13fa6e93feef964329a6
SHA5128bdaa3edde3645e45715ca821bfcd3aab6f977face1de046ae25692bcd852ebfcefc84d3302607f446837ce1c0941eacc3d5ea8429986a9c979aea2c025f7394
-
Filesize
64KB
MD5b0e9ba9dab60cb7a9fd886dcf440cac3
SHA1c416f6e9ba379feb9008c775d8456514444b66da
SHA25652d52e5a1e1cec3e2db08555a8b2651f636cf76c6a24e32aa446595365cf193f
SHA51290de38a7c57f59e8deb17c2473a215e2f052aee909a47ef37a88fefcfaeb5e6b54d462a39bcac4d0f1aa88d1806ba9e1237d0eeba98f7a0479bd6825e841f043
-
Filesize
24KB
MD52b7007ed0262ca02ef69d8990815cbeb
SHA12eabe4f755213666dbbbde024a5235ddde02b47f
SHA2560b25b20f26de5d5bd795f934c70447112b4981343fcb2dfab3374a4018d28c2d
SHA512aa75ee59ca0b8530eb7298b74e5f334ae9d14129f603b285a3170b82103cfdcc175af8185317e6207142517769e69a24b34fcdf0f58ed50a4960cbe8c22a0aca
-
Filesize
7KB
MD54876414d51fe01bd8525df2f8acd35d6
SHA1f9435c39e3029276e71a971e48f68d3f0298fe11
SHA2564bda5a964065b918ce70a27914056b17a95e3f8002028b394ecf8ff2d7cebf3d
SHA512d18afa3d806fd056836beb5a0822156402afe3455567d41f9b27d578980d5ae341273cadf5dff3175a799e791822e07eede03e3c0c143604f980f7876cd2fc0a
-
Filesize
383KB
MD53cf46bae7e872a661721b0894bc076e2
SHA1eaaa0a35e284908dd21cf245a38efe9d2e4c7532
SHA2567ca73cfb8d0502b14b657216b8735394cbd08aa8e4266fb9e86ad84ae159b043
SHA51247065a1cb81b41cab7c98488609470b308c708ba73c0e11c3f06901fde008b280f3b75ee825c12e4681aefbd8a43840e0319b43bbab7fe68b24c30926d0ce9f2
-
Filesize
9.1MB
MD5e5314db579a141f6a5204f70e7073de0
SHA13d2e28be7594fd754213e3ea19b4f900f6634c91
SHA25684263b76687ff69f306579fb3f05f3a0528db029cf0f2f60eddc22549545408d
SHA512f18c446d8e388759c12527ca970dea3c24af954d199c39027eae4ad8c97df7c902f24845ab0ee0ffd9ad9ee6768c43169b11fec47bd3246cd2e9c7e8da44993a
-
Filesize
72KB
MD53b29bc3478b5e453cb292f23c7eaaee3
SHA1c4860b3270124c6db77f1f1232e8da768ef6adbc
SHA25620d9a238fd65d5584f699882f38af447438e95bca95b1972042508c7a3ec6d13
SHA512b1d16404018e825ca54a6c4201d6c89d82f8520d2352aa740658faa66c20958a299ce81474e519e321e383690951563aec937adc75fdf2e56ebd91d5849f49fe
-
Filesize
2KB
MD57987cd786f2ba1ec8a09b2ce8ae694c9
SHA1c1b9dbb86c8e9c55374a130d8dbe7bb9cd119f96
SHA256eb6583b8007410a1a162d2140c5c27a9d066d80b27b72d0e11c410d517c18d83
SHA5123941b73f09e2fe5f0e6401bc23822577c8d86266ec0089032fe2fd2555616e8be7a3985308bbd64049b8a73737d9f12e3c9d4482a961b8f964de1fff417d32cb
-
Filesize
1.5MB
MD544c66c7febaf067ac2f96e3bb643a5b3
SHA1bc83eb57ebb44206b467c4147a7f82d52662e9b5
SHA256641fae557b683029787befda2a2ed5251b19a4c11fc19e3dbf2cd97459e7e383
SHA51241ce527bd09ae6b3126947197c94169121dcffe79b9db624a17a3a45d4e25a2f53dde0a686b4329b9e2d5c33bbbc6d6b9cc840b97731eac38ae31254dfd3364b
-
Filesize
172KB
MD534d4a23cab5f23c300e965aa56ad3843
SHA168c62a2834f9d8c59ff395ec4ef405678d564ade
SHA25627cf8a37f749692ab4c7a834f14b52a6e0b92102e34b85ffcb2c4ee323df6b9c
SHA5127853f1bc1e40c67808da736e30011b3f8a5c19ddf4c6e29b3e0eb458bea2e056fe0b12023ceac7145c948a6635395e466e47bdd6f0cfa1bd7f6a840e31e4694c
-
Filesize
77KB
MD57868ed46c34a1b36bea10560f453598f
SHA172330dac6f8aed0b8fde9d7f58f04192a0303d6b
SHA2565c17864f1572acec1f93cf6355cfd362c1e96236dcba790234985a3f108d8176
SHA5120cc913337e3334ff0653bc1fad044d9df60a8728c233dcc2c7f6139f14608740b70b57c25a9d2d895cbc4d59508779f342a72406e623d30365ae89fb2a3607ba
-
Filesize
140KB
MD5562ac9921d990126990c2f0bdce7081a
SHA1f395458d8e328cf4809385fef3e225d01f8a8fc0
SHA256ef84e1ad9cf174a9ab0bba648b56f2ffd17f4cb4421902b61559b544d812e738
SHA512f52a9a62ca7d810804289ffe0300919eea529f2e0d4d07709309e101087809a5a004437184f3a3518fcd286db18947d78ce00bafbcbbe7b62a8aca4cf8295208
-
Filesize
162KB
MD52120dbb0481374885af660346f503b9b
SHA10dad9f77c93325cbe2499efac70ebbbfd8e1a4b3
SHA256ef0e1d3a5f58e797c47d1ca2999e6ab1e94520c3816a8264874920c26c9ae474
SHA51246966d2eec899fbd48b8aaf5e72555cec3b2f1bc2481c2eb014d98078aa6b6e825144718fbe2aa7b23d816462645186abbfc2ebdc7a4f331d5087999f21ca68a
-
Filesize
10KB
MD5347b0b5d32b1a85b5450b08cfb6d2e75
SHA17bfe1857974a6c6c3e882624d820311c1e3bf670
SHA25676a9f22039731c1fb3871876dd8c55d4ab75635367daa811ced5ed70eed950ac
SHA512d79edc2546249f71a19faa1ee4aebdfd2faa8b6b56615740c93023255c81716de6c4af484bde506f7dcd80b607d8804313589e58b05dd2448d5c1fca3cd39e92
-
Filesize
88KB
MD5adb53ee43f74f430368449b98b2f6f86
SHA1fb882d80da9ccf79c6817a492fbd686d4759bb41
SHA256b7837a68ede7781286057de0b59b7bb9c7c29ff9e9ded32c7175cafe9de3b5ff
SHA5128fc2cd5a585c8247274fbe8d53ac27faa1f2b0407d27e5e78d6917cfa94947ace2aa20ca670a5b87e3d7a939360691102ed9c7530ec997af1057064bcb9c085a
-
Filesize
102KB
MD55dc8a7062040e05ad36bd83246954b05
SHA1f6807be0413724076c8c384576ad9a5bc1413e8c
SHA256d00f229036a6ea19e05c9838f2827fdb22b3003af4c7c97b37abf2ea36236dfc
SHA51243cda9b7a57ae292b71df7a8f02c359b486a82162f92e2d8a7449f2b9c835a7ba44177477a7e0763a5698a4b2d9a025f8786c054950db3fab017edfdf4c17f12
-
Filesize
40KB
MD5787104ad9dea702d115883c489be54cb
SHA1b24680d170c610203df5e3d1d52b2b04f938dd56
SHA256934230fc9da4c6eac4b1f916baec075ac5faf1a70af14dcdb62d3d06ca878cd3
SHA512861147b8ed484a25a5ca9af8b7488896ee41dfd4eb57dafd4bb33455b03936c8fd930224fd9a1a0e8dcddf0fc33bc7adfc3ac48ca3ff430122f3ce18952fe312
-
Filesize
10KB
MD5e28c8d2fd64ba27d9b992fc325f26a9d
SHA1d9ed413265967b6ede8787aa8c5e5734a4ea1358
SHA25682d96714ac65e6e18e3da619cfd1367416bba5ed6d08db7bf312f8937f95f2ab
SHA512e2fcc5972c48fa1d26d2df0b2c5ed4e34d15d7f08eb35510989441b4083f30d19f6d5fc2652ac42d11a3877f333ad4408c0cb547ecf7b948e1f324f719cfc739
-
Filesize
7KB
MD5fcbe6dec3d2da2ac9fd2754cc9cf6ad9
SHA17954bdf16f99bf843c5c8053a078813d87c94254
SHA25671688a7955124b644cb05833d8285b876c7ff336eb4478ce01e1f80b07f7b76e
SHA5125975297ac6aaa7d85842079809f9be2ad57959da2687de4bb7aa0764bc16dd878c482a92d7c4a4ed484aa7683f60c90b870757165f79d7ae481b7f7897e94c39
-
Filesize
174KB
MD57ec601a05f97c73fc2180e8c57efc9af
SHA17c99dcdcec211459b1d9d429e2ada2839876f492
SHA256982d12314935e25a016da0bec644bc4c8bd02b0984eb70b76e081b3562a6adf8
SHA512119e216313540f0fac30c1a8e531909dbdc8022735a9fb73b80c8bbbb2ff0548cdf911e640cd19827acff703c95b1d8db0ddf3ed61d056e9e4d4f437b8c88e7b
-
Filesize
22KB
MD5feba43763a9b7fe1c94d681055d10167
SHA149d30dedf868accf07e6895e1699a4d751235fd0
SHA2560634fa964eba9baed92e2a935aef925fdaa921a35424b6ae9bfaaace932dc49d
SHA512680116cfe66472c4d6ae9c94d74cd3fe8cef1c9beade27c19e58369c2c6f238f9e63019d7ea2b8b35689b7c0e812f2ee49d26a56e6972d3e21dc5f7312cf81ef
-
Filesize
806B
MD5796621b6895449a5f70ca6b78e62f318
SHA12423c3e71fe5fa55fd71c00ae4e42063f4476bca
SHA25609be5df7a85545fd93d9fd3cd1d6c04c6bfe6e233c68da6f81c49e7a35fcbb84
SHA512081cf1dadb3a0e50f0a31ab03e2b08e80298c06070cd6f9b2806c08d400c07134623f7229a6c99910c6243dfa53c6e2c05d09a497aae1e701bc34b660cf9e4c9
-
Filesize
32KB
MD5a084b0c082ec6c9525336b131aeba39a
SHA145db1f5cc54a033e5df460b93edaa5d23a39ced9
SHA2567cba99a0f2a5b233e341f691c2aa6cb4ca10065425fc478b56fa468d6b0af54d
SHA512297ba29e1ee4300f1a11620d475e67a9747fd9affabeee5fb5151b07c931c8f5c5af12b956e2ab7bd7dc6ebb1dbc298f5d56fa419f5fe2e3646053c0e515e29b
-
Filesize
418KB
MD50e32f5229d5ee7d288b6b3969a51fcbc
SHA154c09f07930525786fcf08b9c7aca24185a68fc1
SHA256e1ca33208030c858254249b2c9aa6d8541c2e875343b2997f2b2f9e4993c96f8
SHA51264e8499e668ea44397ed5ea009e3692b623d2ac01bdd43e460624fe0282a3398025e4e53282e0f0905062b60400f4c16a64933ed7667de942f1588dd936aebcb
-
Filesize
56KB
MD5d8fa7df1f2cd92ad701bc23f86d89b54
SHA172160fd5ad639c5a9c44305b06c98eb637399d18
SHA256475a2c225258c571ae66c0178a83177bd5a59f4ce1be1f867e14e75614ad43e4
SHA512a4d11c7f66325199f5c3a41cc37f32cf6ee828d790add1a6b77b9127e65243bb17dcc10b1cb2cbaac4e543bc329bd30e64919ffc0af3fd6088a672e08e10e992
-
Filesize
21KB
MD56fc50184e3aad7f4df0231da697a9da8
SHA1fef8608d31e8e1c16ca7db402fa352ee7231585b
SHA25658e698c208cd6ad94d2da3511447a975605e2b49bbdb7b572863f318aaffe0cf
SHA512626b0a4031571ca906311937583f646aebdc7aacd5afb5ddf66c2d45dbc335e026d337d4f5803c38ddd022b9e64c79b4dd30d094d5d01a669e99d6c6829650b4
-
C:\Windows\assembly\GAC\Microsoft.VisualStudio.OLE.Interop\7.1.40304.0__b03f5f7f11d50a3a\Microsoft.VisualStudio.OLE.Interop.dll
Filesize116KB
MD5459ff9c6762b7fdd91c156ff3e096478
SHA17179debce9a271450b1241e7435a999aea1ddd05
SHA25693865c89e1507409fbbeb9433542a303cdd2fd5acda3d51fecd83e4a8fb8072c
SHA5128b95330d364413122427604af1c0e848694975eb8c541b911aeb0d50fbb5cd15a60863f68593f1088b26f83500f400f52292a2891511223f796be750c6a7583a
-
Filesize
143KB
MD5030a99f9594434ea83d27b33a95c4d5a
SHA1230882058a1d50e4e8f7fa4bb3144dec506c5967
SHA2560fdc72a06cc54771f1b07293d2e914cded985d84833ed4bf952a665eb107b5a3
SHA512529d14374df0b455db055027f42ccf731ddf4b7bef8fc27bffa2ff5a46463dc6b3cacf75fd6356e325f075d7fb70ad0f8abd85feb75d00befd1c86aec857d7ee
-
Filesize
889KB
MD5c2e38bfe933c5bce36910fe1fb1d5067
SHA1aac5ed2724e2f88c7af1a3bf56d73180ae709bb7
SHA25649a51063aaccc22a28590575417bdff40a67a06e6f2a67217b37af1b49fa6286
SHA512281225b5e7193270b27811224c70475fc9af47c5d05a7e98f6856ad6abccff084302d0ddb72868d6872eef2efaf2989645af5e596083bfb995f214182aa4184d
-
Filesize
652B
MD5aa029e74416c9d33c0a1ad742878ae8b
SHA1a91595e219c8cf7ba6d8db182749518ac9500425
SHA25638bc53d9e38ffd6b13155ab5b345fef2a84354ea7950587f3667657a977cb0e8
SHA51208d95cbb952a3b9cdf598d994b993b24e198933221b0a09915a596fb222031e2b34a81a79235f1d83d67e8ce156a97048a484fbc9592a650f55e284c5a8e146a
-
Filesize
150KB
MD56f8e0c3c3b1b9a297b8ee6bfbb9c2a2c
SHA11dbab29ad6fb169fad90e963dd0c5290f27272fc
SHA256e0514048fd6f4169c41896332a243cf014a719e5fe217c5743fc3c7149db578a
SHA512193fc4f01b6afb2a858f006eb7c5dfd6106d88b0b0e0f12b4c8c103a8bae270ff0d583886ec5af910ce4d50cb1ccfb54a14d27fd517b847a624d9ba79f688640
-
Filesize
396B
MD54731e3af14c6e8a4c005b5be60adb176
SHA1076d8242c2ff0312001b5f1a83c8e0b1991985b2
SHA256e1cccf209e7b89d6cfd7a4c5a449447721a4186975400b5a568d6b9ff08c9590
SHA51296b2d21608b08920691f3f1ad4c2499564dcc42731d984ee4a9232fe1c897489a53e2f48e31e0960dcc951498c2b239bd5c78432a65fb2c7e54f7cf26c421ad7
-
Filesize
614B
MD52285a0772a117aee2abde155b9bb6310
SHA15b0a1f16c01b3a43ecd7cf3f6119e49175694394
SHA25653e8da4458144dd4e0a7fc7386dd7a37105e45514f0ebdd3f935d0b2e47f4b7b
SHA51237cba6b2eca9efe70e1e32ddd533b19e54d55f09ea27e50733672d1c04fa51d2f92d3d37d7ecf892af1dc3b765cc312d939acec035aeecefbca6d9b04ca23627