Analysis

  • max time kernel
    710s
  • max time network
    443s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06-12-2024 10:34

General

  • Target

    Trojan.zip

  • Size

    34.8MB

  • MD5

    bab38d1cdbf56464fc4fec495bae112a

  • SHA1

    551f0bea4ed32eeaf4e468c72435d847647b5010

  • SHA256

    a33b596a570e3ec4cf29dddb37e72adf57499e294c9c873c76429d18b1bc4427

  • SHA512

    05fa5518f1bd0e6f94401df715969a5720a86dff76d3fc7e1763d512ff1978759baf977c4e81703c3d80192f74f5f537d5d29d918f4ed558de5b16841fc06ef8

  • SSDEEP

    786432:HEtAHLbN8/liJBf07nED1doAsM9iUtDLBUkTgt5OGSXXjmeWt3kLli/N:ktXsunERdoq9iquuSRkhiV

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 6 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables cmd.exe use via registry modification 1 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible privilege escalation attempt 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 7 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 12 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 31 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Trojan.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3328
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2748
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\Trojan\L0Lz.bat" "
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:5108
      • C:\Windows\system32\net.exe
        net session
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 session
          3⤵
            PID:3572
        • C:\Windows\system32\net.exe
          net stop "SDRSVC"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2176
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop "SDRSVC"
            3⤵
              PID:4052
          • C:\Windows\system32\net.exe
            net stop "WinDefend"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3036
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 stop "WinDefend"
              3⤵
                PID:1944
            • C:\Windows\system32\taskkill.exe
              taskkill /f /t /im "MSASCui.exe"
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2420
            • C:\Windows\system32\net.exe
              net stop "security center"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1288
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 stop "security center"
                3⤵
                  PID:4376
              • C:\Windows\system32\net.exe
                net stop sharedaccess
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2888
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 stop sharedaccess
                  3⤵
                    PID:1756
                • C:\Windows\system32\netsh.exe
                  netsh firewall set opmode mode-disable
                  2⤵
                  • Modifies Windows Firewall
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:3212
                • C:\Windows\system32\net.exe
                  net stop "wuauserv"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1868
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 stop "wuauserv"
                    3⤵
                      PID:3312
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo tasklist "
                    2⤵
                      PID:1700
                    • C:\Windows\system32\find.exe
                      find /I "L0Lz"
                      2⤵
                        PID:2924
                      • C:\Windows\system32\xcopy.exe
                        XCOPY "BitcoinMiner.bat" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"
                        2⤵
                        • Drops startup file
                        PID:1124
                      • C:\Windows\system32\xcopy.exe
                        XCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"
                        2⤵
                          PID:4660
                        • C:\Windows\system32\xcopy.exe
                          XCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"
                          2⤵
                            PID:1728
                          • C:\Windows\system32\xcopy.exe
                            XCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"
                            2⤵
                              PID:1064
                            • C:\Windows\system32\xcopy.exe
                              XCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"
                              2⤵
                                PID:4848
                              • C:\Windows\system32\xcopy.exe
                                XCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"
                                2⤵
                                  PID:2336
                                • C:\Windows\system32\xcopy.exe
                                  XCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"
                                  2⤵
                                    PID:448
                                  • C:\Windows\system32\xcopy.exe
                                    XCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"
                                    2⤵
                                      PID:2616
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\Trojan\BitcoinMiner.bat" "
                                    1⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:4716
                                    • C:\Windows\system32\reg.exe
                                      Reg Add "" /v "BSOD" /t "REG_SZ" /d "C:\Users\Admin\Desktop\Trojan\L0Lz.bat" /f
                                      2⤵
                                        PID:1916
                                    • C:\Windows\system32\NOTEPAD.EXE
                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Trojan\BonziKill.txt
                                      1⤵
                                      • Opens file in notepad (likely ransom note)
                                      PID:4584
                                    • C:\Windows\System32\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\Trojan\Carewmr.vbs"
                                      1⤵
                                      • NTFS ADS
                                      • Suspicious use of WriteProcessMemory
                                      PID:3636
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.avp.ru/
                                        2⤵
                                        • Enumerates system info in registry
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of WriteProcessMemory
                                        PID:3564
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7fffbc3446f8,0x7fffbc344708,0x7fffbc344718
                                          3⤵
                                            PID:2132
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,9589623027147080014,16802953130239941577,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
                                            3⤵
                                              PID:4476
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,9589623027147080014,16802953130239941577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:3
                                              3⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4016
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,9589623027147080014,16802953130239941577,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:8
                                              3⤵
                                                PID:1652
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9589623027147080014,16802953130239941577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3624 /prefetch:1
                                                3⤵
                                                  PID:1544
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9589623027147080014,16802953130239941577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:1
                                                  3⤵
                                                    PID:4392
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9589623027147080014,16802953130239941577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4436 /prefetch:1
                                                    3⤵
                                                      PID:3364
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9589623027147080014,16802953130239941577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2664 /prefetch:1
                                                      3⤵
                                                        PID:324
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,9589623027147080014,16802953130239941577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 /prefetch:8
                                                        3⤵
                                                          PID:1860
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                                                          3⤵
                                                            PID:3212
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff604c75460,0x7ff604c75470,0x7ff604c75480
                                                              4⤵
                                                                PID:4508
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,9589623027147080014,16802953130239941577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 /prefetch:8
                                                              3⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:4320
                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                          1⤵
                                                            PID:2680
                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                            1⤵
                                                              PID:2144
                                                            • C:\Windows\System32\WScript.exe
                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\Trojan\Bolbi.vbs"
                                                              1⤵
                                                              • Checks computer location settings
                                                              PID:4084
                                                              • C:\Windows\System32\wscript.exe
                                                                "C:\Windows\System32\wscript.exe" "C:\Users\Admin\Desktop\Trojan\Bolbi.vbs" /elevated
                                                                2⤵
                                                                • UAC bypass
                                                                • Blocklisted process makes network request
                                                                • Disables cmd.exe use via registry modification
                                                                • Event Triggered Execution: Image File Execution Options Injection
                                                                • Checks computer location settings
                                                                • Adds Run key to start application
                                                                • Checks whether UAC is enabled
                                                                • Sets desktop wallpaper using registry
                                                                • Drops file in Program Files directory
                                                                • Drops file in Windows directory
                                                                • Modifies Control Panel
                                                                • System policy modification
                                                                PID:2712
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /c C:\Users\Public\Ghostroot\KillDora.bat
                                                                  3⤵
                                                                  • Modifies registry class
                                                                  PID:2724
                                                                  • C:\Windows\System32\rundll32.exe
                                                                    C:\Windows\System32\RUNDLL32.EXE user32.dll, UpdatePerUserSystemParameters
                                                                    4⤵
                                                                      PID:2784
                                                                    • C:\Windows\system32\reg.exe
                                                                      reg delete "HKLM\System\CurrentControlSet\Control\SafeBoot\Minimal" /f
                                                                      4⤵
                                                                      • Impair Defenses: Safe Mode Boot
                                                                      PID:2720
                                                                    • C:\Windows\system32\reg.exe
                                                                      reg delete "HKLM\System\CurrentControlSet\Control\SafeBoot\Network" /f
                                                                      4⤵
                                                                        PID:1156
                                                                      • C:\Windows\system32\taskkill.exe
                                                                        taskkill /f /im explorer.exe
                                                                        4⤵
                                                                        • Kills process with taskkill
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:1504
                                                                      • C:\Windows\explorer.exe
                                                                        explorer.exe
                                                                        4⤵
                                                                        • Boot or Logon Autostart Execution: Active Setup
                                                                        • Enumerates connected drives
                                                                        • Checks SCSI registry key(s)
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:3532
                                                                      • C:\Windows\system32\takeown.exe
                                                                        takeown /f C:\Windows\System32\
                                                                        4⤵
                                                                        • Possible privilege escalation attempt
                                                                        • Modifies file permissions
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2976
                                                                      • C:\Windows\system32\icacls.exe
                                                                        icacls C:\Windows\System32 /Grant Users:F
                                                                        4⤵
                                                                        • Possible privilege escalation attempt
                                                                        • Modifies file permissions
                                                                        PID:3596
                                                                      • C:\Windows\system32\takeown.exe
                                                                        takeown /f C:\Windows\
                                                                        4⤵
                                                                        • Possible privilege escalation attempt
                                                                        • Modifies file permissions
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:4420
                                                                      • C:\Windows\system32\icacls.exe
                                                                        icacls C:\Windows\ /Grant Users:F
                                                                        4⤵
                                                                        • Possible privilege escalation attempt
                                                                        • Modifies file permissions
                                                                        PID:3220
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\Trojan\Guard.bat" "
                                                                  1⤵
                                                                    PID:2332
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\Trojan\Guard.bat" "
                                                                    1⤵
                                                                      PID:4792
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\Trojan\Guard.bat" "
                                                                      1⤵
                                                                        PID:3040
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\Trojan\Guard.bat"
                                                                        1⤵
                                                                          PID:1412
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                          1⤵
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1008
                                                                        • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                          "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                          1⤵
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1176
                                                                        • C:\Windows\explorer.exe
                                                                          explorer.exe
                                                                          1⤵
                                                                          • Boot or Logon Autostart Execution: Active Setup
                                                                          • Enumerates connected drives
                                                                          • Checks SCSI registry key(s)
                                                                          • Modifies registry class
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:2216
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                          1⤵
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:2156
                                                                        • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                          "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                          1⤵
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:3912
                                                                        • C:\Windows\explorer.exe
                                                                          explorer.exe
                                                                          1⤵
                                                                          • Boot or Logon Autostart Execution: Active Setup
                                                                          • Enumerates connected drives
                                                                          • Checks SCSI registry key(s)
                                                                          • Modifies registry class
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:1288
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                          1⤵
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1896
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                          1⤵
                                                                          • Modifies Internet Explorer settings
                                                                          • Modifies registry class
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1236
                                                                        • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                          "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                          1⤵
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:3572
                                                                        • C:\Windows\explorer.exe
                                                                          explorer.exe
                                                                          1⤵
                                                                          • Boot or Logon Autostart Execution: Active Setup
                                                                          • Enumerates connected drives
                                                                          • Checks SCSI registry key(s)
                                                                          • Modifies registry class
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:4940
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                          1⤵
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:4644
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                          1⤵
                                                                          • Modifies Internet Explorer settings
                                                                          • Modifies registry class
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:3612
                                                                        • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                          "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                          1⤵
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1008
                                                                        • C:\Windows\explorer.exe
                                                                          explorer.exe
                                                                          1⤵
                                                                          • Boot or Logon Autostart Execution: Active Setup
                                                                          • Enumerates connected drives
                                                                          • Checks SCSI registry key(s)
                                                                          • Modifies registry class
                                                                          PID:1584
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                          1⤵
                                                                          • Modifies registry class
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:2996
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                          1⤵
                                                                          • Modifies Internet Explorer settings
                                                                          • Modifies registry class
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1088
                                                                        • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                          "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                          1⤵
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:2788
                                                                        • C:\Windows\explorer.exe
                                                                          explorer.exe
                                                                          1⤵
                                                                          • Boot or Logon Autostart Execution: Active Setup
                                                                          • Enumerates connected drives
                                                                          • Checks SCSI registry key(s)
                                                                          • Modifies registry class
                                                                          PID:4644
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                          1⤵
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1952
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                          1⤵
                                                                          • Modifies Internet Explorer settings
                                                                          • Modifies registry class
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1372
                                                                        • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                          "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                          1⤵
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:4896
                                                                        • C:\Windows\system32\wscript.exe
                                                                          wscript.exe C:\Users\Public\ghostroot\Message.vbs explorer.exe
                                                                          1⤵
                                                                            PID:4100
                                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                            1⤵
                                                                              PID:2812

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              843402bd30bd238629acedf42a0dcb51

                                                                              SHA1

                                                                              050e6aa6f2c5b862c224e5852cdfb84db9a79bbc

                                                                              SHA256

                                                                              692f41363d887f712ab0862a8c317e4b62ba6a0294b238ea8c1ad4ac0fbcda7a

                                                                              SHA512

                                                                              977ec0f2943ad3adb9cff7e964d73f3dadc53283329248994f8c6246dfafbf2af3b25818c54f94cc73cd99f01888e84254d5435e28961db40bccbbf24e966167

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              557df060b24d910f788843324c70707a

                                                                              SHA1

                                                                              e5d15be40f23484b3d9b77c19658adcb6e1da45c

                                                                              SHA256

                                                                              83cb7d7b4f4a9b084202fef8723df5c5b78f2af1a60e5a4c25a8ed407b5bf53b

                                                                              SHA512

                                                                              78df1a48eed7d2d297aa87b41540d64a94f5aa356b9fc5c97b32ab4d58a8bc3ba02ce829aed27d693f7ab01d31d5f2052c3ebf0129f27dd164416ea65edc911c

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_1

                                                                              Filesize

                                                                              264KB

                                                                              MD5

                                                                              1663ee1068e7e47c308515c2a4ce7ec6

                                                                              SHA1

                                                                              9e80b44de6eb13de893e983e10c06e6b66c3d731

                                                                              SHA256

                                                                              68d0994088f0357205da5c29e160c296c8828e5bc039f8c11fd032eab07ec413

                                                                              SHA512

                                                                              eee1e6cc531cf20251147ca46ce5354be0d419640d7e86f86f1bbcee95f363ffa1226089531ac586769da7bd34c8b7da080fec12fc2e4dc860b3e84f015d47b1

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_2

                                                                              Filesize

                                                                              8KB

                                                                              MD5

                                                                              0962291d6d367570bee5454721c17e11

                                                                              SHA1

                                                                              59d10a893ef321a706a9255176761366115bedcb

                                                                              SHA256

                                                                              ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                                              SHA512

                                                                              f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_3

                                                                              Filesize

                                                                              8KB

                                                                              MD5

                                                                              41876349cb12d6db992f1309f22df3f0

                                                                              SHA1

                                                                              5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                                              SHA256

                                                                              e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                                              SHA512

                                                                              e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                              Filesize

                                                                              70KB

                                                                              MD5

                                                                              e5e3377341056643b0494b6842c0b544

                                                                              SHA1

                                                                              d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                                                              SHA256

                                                                              e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                                                              SHA512

                                                                              83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                              Filesize

                                                                              111B

                                                                              MD5

                                                                              285252a2f6327d41eab203dc2f402c67

                                                                              SHA1

                                                                              acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                              SHA256

                                                                              5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                              SHA512

                                                                              11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              4KB

                                                                              MD5

                                                                              73129f439e654b6dcaa3f6bfa1c4f51b

                                                                              SHA1

                                                                              1f293433a93f9c6ffba27b054ea7086fd3f24068

                                                                              SHA256

                                                                              e20335d72bde5fc2d3dc61661e0ad138277bfee4f08c3076a4650a6a61c0a56b

                                                                              SHA512

                                                                              c56a62a0aeba8a872e1fba166b7f50fd47483aaad9c66c0a831fe69ce7718dda813721ebbbefa512d159b4da7516704309af88d416e9e1b5917eb1a368bf7912

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              5KB

                                                                              MD5

                                                                              0a17c6ff558c9447000d313e53d87a0e

                                                                              SHA1

                                                                              9533cd27d31906e7a7c8fb1d6dcccb221efd90fe

                                                                              SHA256

                                                                              36012591fbddd96420983d79bb285d19ea7505b67faff0b6e4e27d6be8a89d38

                                                                              SHA512

                                                                              eecb9972287c20b1485cd8f565e00324a7ea29ea3ee4b974bede2920f79195f0aa2f25b9bc7e0eda96639ca7d122580ea3b10114bc46fe840040157f80fa2cf3

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                              Filesize

                                                                              24KB

                                                                              MD5

                                                                              7ec974d6450b1d66b1603b4d8ab6f311

                                                                              SHA1

                                                                              a69718ede5e64505d611081ce519c13bf1874c71

                                                                              SHA256

                                                                              c8f35daf396d3857417f59817d58bd0d546a726b6d8a00a8a1c2d158623a721c

                                                                              SHA512

                                                                              9a524e266bc6b297d510d791445a6c014684c7d583037e2e40c8ad5e886e49f843662afc3c39cc9c82ae9d165e0a9ef3345dc800eb0655ca70b0769bf207bd2b

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                              Filesize

                                                                              24KB

                                                                              MD5

                                                                              952a6e3cbc50f011cf2f04c9470080ff

                                                                              SHA1

                                                                              a0d6a2509af73e523c970f6e4351861bde63d6db

                                                                              SHA256

                                                                              faa79ba7dfd140106187ab50f14aa7cca13650f94f796419bc0a44d7a2b79d5f

                                                                              SHA512

                                                                              7955092a6086f05268e4b0f88648d9275020b6cad83f81c90eac5a7cd994cc243b8dfab579d4335db62f3577fd2d8a7fbefcad6cc615e2bcf1d014115056cde4

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                              Filesize

                                                                              16B

                                                                              MD5

                                                                              206702161f94c5cd39fadd03f4014d98

                                                                              SHA1

                                                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                              SHA256

                                                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                              SHA512

                                                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001

                                                                              Filesize

                                                                              41B

                                                                              MD5

                                                                              5af87dfd673ba2115e2fcf5cfdb727ab

                                                                              SHA1

                                                                              d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                              SHA256

                                                                              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                              SHA512

                                                                              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT

                                                                              Filesize

                                                                              16B

                                                                              MD5

                                                                              46295cac801e5d4857d09837238a6394

                                                                              SHA1

                                                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                              SHA256

                                                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                              SHA512

                                                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                              Filesize

                                                                              8KB

                                                                              MD5

                                                                              0acab086b0a3d63992c047b9befe0b43

                                                                              SHA1

                                                                              74d8ac45c555cbd09a0a326a65e1e914910f6fae

                                                                              SHA256

                                                                              9ef3bf96b1b0fbf10ae0c5cf8f8a84cb5f63f4879cc3588d52f5899ca4b47463

                                                                              SHA512

                                                                              4a29348f6eaf1826022e182cfe2748bc92a35bb8395df5fe9a3922e4fb927f98e4dadab8729dc9fc74872678553bdc61268fa75d1e3be6bd03a2164ca9fac520

                                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{2F519BF2-C697-59F8-8F6A-1E19509CE66B}

                                                                              Filesize

                                                                              36KB

                                                                              MD5

                                                                              8aaad0f4eb7d3c65f81c6e6b496ba889

                                                                              SHA1

                                                                              231237a501b9433c292991e4ec200b25c1589050

                                                                              SHA256

                                                                              813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1

                                                                              SHA512

                                                                              1a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62

                                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_charmap_exe

                                                                              Filesize

                                                                              36KB

                                                                              MD5

                                                                              406347732c383e23c3b1af590a47bccd

                                                                              SHA1

                                                                              fae764f62a396f2503dd81eefd3c7f06a5fb8e5f

                                                                              SHA256

                                                                              e0a9f5c75706dc79a44d0c890c841b2b0b25af4ee60d0a16a7356b067210038e

                                                                              SHA512

                                                                              18905eaad8184bb3a7b0fe21ff37ed2ee72a3bd24bb90cbfcad222cf09e2fa74e886d5c687b21d81cd3aec1e6c05891c24f67a8f82bafd2aceb0e0dcb7672ce7

                                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TNTKJ110\microsoft.windows[1].xml

                                                                              Filesize

                                                                              96B

                                                                              MD5

                                                                              b7084d1c53d35ac7e41dbbd2fb8f898c

                                                                              SHA1

                                                                              b3c82ebe7f299420af195f29bf01e67ae6db8198

                                                                              SHA256

                                                                              dabe00cd843717872c76251c9677a251f5bb9f183d14cec71c684afce03d8267

                                                                              SHA512

                                                                              28ccc4512b3f5bf68d7159f64213b980b2404c8282fd19ae4f08d992fe4d5769a2f2e8d2266a83bea5a15ecce4ed36c7990ab793cc3355fe39ee63f1328f3716

                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                              Filesize

                                                                              3KB

                                                                              MD5

                                                                              ef59fe894ea3dce28244a409b159f4c5

                                                                              SHA1

                                                                              d573854bf5e9cafe513e667c7a31f11fceefb655

                                                                              SHA256

                                                                              0e8f542a8d5345838749a48aa6f040db4724cf8619ee0b292bb877416e0f3e42

                                                                              SHA512

                                                                              1b86da0c38898a0a309f511caa76a92beca624ae53f02f28365318a78d020e0fd42a346e92c599c245eefde1e6dd66faac185db22d40ebaa460d7f16f1237fc2

                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                              Filesize

                                                                              3KB

                                                                              MD5

                                                                              a758674e89a7ed4f2fb4d1f5627b8a6f

                                                                              SHA1

                                                                              e0fac614bad37dbd50b687d13d94019360d07dd1

                                                                              SHA256

                                                                              e884e4945a5b9016e1da9da1fb41226388687504b3b81ee317ef99926c95e094

                                                                              SHA512

                                                                              2df799b2b8ff782d3435862285d7b2bdc8e4126a1c29dc6f2fc40b1cef485945834d99a8a5155d0889f4f0ae405c8b15b44d93fcef86795fef1f8fb26c13daf0

                                                                            • C:\Users\Admin\Desktop\Trojan\BitcoinMiner.bat

                                                                              Filesize

                                                                              267B

                                                                              MD5

                                                                              b002112e4771b6c307d597b92718faa1

                                                                              SHA1

                                                                              ebd2dc4eec46a6fdc3c40c098cca0fe98082726f

                                                                              SHA256

                                                                              117acf9a7a7a3165272e58a2695039b07e974c1980256417f8db141191a1a986

                                                                              SHA512

                                                                              337dbca48f24c2c03d43861ae033b91feaf2a65c8ab5787ea024a03c97f74d8dd6be1373f7e4a36af7cb49db7307076daa80ac66cf9605f5e2722c5ad37305e0

                                                                            • C:\Users\Admin\Desktop\Trojan\Bolbi.vbs

                                                                              Filesize

                                                                              45KB

                                                                              MD5

                                                                              87b6ba186f30106ea2764c562dd83490

                                                                              SHA1

                                                                              20baaeb5fd4750125f89eb34794f70e3f7fe8857

                                                                              SHA256

                                                                              4ae645a52ba5daa6ea305ce0831292a70ad7ec8c12d458f7198bba697b099919

                                                                              SHA512

                                                                              07402f02fd51a22a4ec86c6d7063b82d02a721a401aecfbcca5300f13857d0857bdf47490eed709f8d28c264752771bf81df3ce3f5fc476b6a002c953e2c1ec0

                                                                            • C:\Users\Admin\Desktop\Trojan\BonziKill.txt

                                                                              Filesize

                                                                              198B

                                                                              MD5

                                                                              d5d9094b24ee344ca83e342175df4750

                                                                              SHA1

                                                                              e12568dadb918e941df1a41104e67832f9011c1b

                                                                              SHA256

                                                                              c207b0a91f8c340ea9b08f334dcfaaeb5307eecb1bfb01d68cc7b9ad994a037c

                                                                              SHA512

                                                                              56375b35df448874cb2f8622de19d2b30cab63aec90a84a746ff6633ed37c30b9575c159306c60b78c32a0f12a92684b1f2bdba95f75e9bcd109b89c2336135d

                                                                            • C:\Users\Admin\Desktop\Trojan\Carewmr.vbs

                                                                              Filesize

                                                                              3KB

                                                                              MD5

                                                                              b8ee793a9ab33e0d24ca757b384f6072

                                                                              SHA1

                                                                              a9a179c3e5ceb4c5b6208a97afcf1e4c9b5a8eab

                                                                              SHA256

                                                                              beccd7b2170bf034cce85c4e857107de8ba2e540ea5079fb3f3e7a8fedfc86dd

                                                                              SHA512

                                                                              2494a026e268971dd6e8f74d6835f8a8190a47b23d2473b29031982cccb56551fa41c9486401fa030ce762fb7863a61c9def69eb5fb17467bbc09d263b4b28b8

                                                                            • C:\Users\Admin\Desktop\Trojan\Guard.bat

                                                                              Filesize

                                                                              138B

                                                                              MD5

                                                                              c1730dfbb075b75a1e6fef67a65cddc0

                                                                              SHA1

                                                                              5cb5f91c1cbc047838d632986a61ff2ecf265724

                                                                              SHA256

                                                                              037fec8b633a9e3df27772d7b483d389974a845a86fbe51c964b3732ecadb106

                                                                              SHA512

                                                                              05a189c816d4e62679dac27a0c19924cb2fb7e5c372d4bebd6f1d535b8518c7e3806542faef3a2438b04f6ecbd01bf41cf75ecfc01dfd7c904aaf9aed3857989

                                                                            • C:\Users\Admin\Desktop\Trojan\L0Lz.bat

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              74f8a282848b8a26ceafe1f438e358e0

                                                                              SHA1

                                                                              007b350c49b71b47dfc8dff003980d5f8da32b3a

                                                                              SHA256

                                                                              fc94130b45112bdf7fe64713eb807f4958cdcdb758c25605ad9318cd5a8e17ae

                                                                              SHA512

                                                                              3f73c734432b7999116452e673d734aa3f5fe9005efa7285c76d28a98b4c5d2620e772f421e030401ad223abbb07c6d0e79b91aa97b7464cb21e3dc0b49c5a81

                                                                            • C:\Users\Public\Ghostroot\KillDora.bat

                                                                              Filesize

                                                                              482B

                                                                              MD5

                                                                              4f08159f1d70d41bf975e23230033a0f

                                                                              SHA1

                                                                              ea88d6fbdcf218e0e04a650d947250d8a3dfad40

                                                                              SHA256

                                                                              d6e7530e3879225bc21fc17859e5b5c71414375baac27bb361fd9162f4b49e0e

                                                                              SHA512

                                                                              958ac467e54d35c4ca5459853d661e49ea81efaa1ce3044114d577fcb757343a40ddb30b9f540cf9c100f05958a843bf312fa879c43bda7513643c824b318d6a

                                                                            • C:\Users\Public\ghostroot\Message.vbs

                                                                              Filesize

                                                                              55B

                                                                              MD5

                                                                              302e08c86880a39ca55f21cabfa7c5de

                                                                              SHA1

                                                                              58d56c0eb14fc0401cda7c48d6df9d23f6e9b7e3

                                                                              SHA256

                                                                              65cfb12baaa6f5891bcd7fda727933a4a12f6dbfa9a6717549eacc6dee9436c7

                                                                              SHA512

                                                                              9aac68a57cea3d00b956ff82ce443600a969dbc3e4eb2b7b12902f70e318c7dbbf7378b375dd28c0d3be0a0515c5c69d4dd5610d5778f22c4e33765d704f8ff7

                                                                            • memory/1088-615-0x0000025C52490000-0x0000025C52590000-memory.dmp

                                                                              Filesize

                                                                              1024KB

                                                                            • memory/1088-584-0x0000025C3E5E0000-0x0000025C3E600000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/1088-600-0x0000025C3F390000-0x0000025C3F3B0000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/1088-601-0x0000025C3F100000-0x0000025C3F120000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/1088-573-0x0000025C3DA00000-0x0000025C3DB00000-memory.dmp

                                                                              Filesize

                                                                              1024KB

                                                                            • memory/1236-374-0x0000025AC6DC0000-0x0000025AC6DE0000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/1236-410-0x0000025ADA850000-0x0000025ADA950000-memory.dmp

                                                                              Filesize

                                                                              1024KB

                                                                            • memory/1236-363-0x00000252C4E20000-0x00000252C4F20000-memory.dmp

                                                                              Filesize

                                                                              1024KB

                                                                            • memory/1236-395-0x0000025AC6DE0000-0x0000025AC6E00000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/1236-391-0x0000025AC7400000-0x0000025AC7420000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/1288-362-0x0000000003410000-0x0000000003411000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/1372-1777-0x000002546BE10000-0x000002546BE30000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/1372-1717-0x000002546A700000-0x000002546A800000-memory.dmp

                                                                              Filesize

                                                                              1024KB

                                                                            • memory/1372-1898-0x000002547F700000-0x000002547F800000-memory.dmp

                                                                              Filesize

                                                                              1024KB

                                                                            • memory/1372-1808-0x000002546C4E0000-0x000002546C500000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/1372-1813-0x000002546BE30000-0x000002546BE50000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/1584-565-0x0000000002B50000-0x0000000002B51000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/3612-476-0x0000019607590000-0x00000196075B0000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/3612-467-0x0000019605600000-0x0000019605700000-memory.dmp

                                                                              Filesize

                                                                              1024KB

                                                                            • memory/3612-468-0x0000019605600000-0x0000019605700000-memory.dmp

                                                                              Filesize

                                                                              1024KB

                                                                            • memory/3612-515-0x000001961B000000-0x000001961B100000-memory.dmp

                                                                              Filesize

                                                                              1024KB

                                                                            • memory/3612-500-0x00000196075D0000-0x00000196075F0000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/3612-501-0x00000196075B0000-0x00000196075D0000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/4644-1594-0x0000000004430000-0x0000000004431000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/4940-465-0x0000000002AE0000-0x0000000002AE1000-memory.dmp

                                                                              Filesize

                                                                              4KB