Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1088bc7b6a62...00.exe
windows7-x64
788bc7b6a62...00.exe
windows10-2004-x64
788cdf3a075...59.exe
windows7-x64
1088cdf3a075...59.exe
windows10-2004-x64
1089000a0d00...5b.exe
windows7-x64
1089000a0d00...5b.exe
windows10-2004-x64
1089270d6b49...b4.exe
windows7-x64
189270d6b49...b4.exe
windows10-2004-x64
1892ac0ac36...51.exe
windows7-x64
8892ac0ac36...51.exe
windows10-2004-x64
8894b900bb7...92.exe
windows7-x64
8894b900bb7...92.exe
windows10-2004-x64
8896493118e...17.exe
windows7-x64
10896493118e...17.exe
windows10-2004-x64
1089652cefa9...84.exe
windows7-x64
389652cefa9...84.exe
windows10-2004-x64
10897255af35...03.exe
windows7-x64
10897255af35...03.exe
windows10-2004-x64
10897b60be56...d4.exe
windows7-x64
6897b60be56...d4.exe
windows10-2004-x64
689a1a21003...9d.exe
windows7-x64
389a1a21003...9d.exe
windows10-2004-x64
389ed231ad6...9a.exe
windows7-x64
1089ed231ad6...9a.exe
windows10-2004-x64
108a4e1b5c29...83.exe
windows7-x64
108a4e1b5c29...83.exe
windows10-2004-x64
108a7ce080bb...ba.exe
windows7-x64
108a7ce080bb...ba.exe
windows10-2004-x64
108aa071d8cc...3d.exe
windows7-x64
78aa071d8cc...3d.exe
windows10-2004-x64
78acb86332d...4c.exe
windows7-x64
108acb86332d...4c.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:13 UTC
Behavioral task
behavioral1
Sample
88bc7b6a627017c4f048d13e756f27b0adc94dc25d0b53c42a2cbdac36177600.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
88bc7b6a627017c4f048d13e756f27b0adc94dc25d0b53c42a2cbdac36177600.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
88cdf3a075a9f38022db50379cd5771e1992a58af68f516812b40c8320dabc59.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
88cdf3a075a9f38022db50379cd5771e1992a58af68f516812b40c8320dabc59.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
89000a0d0047c48b96288186968f343d17f06f470b2985cfdd4ebcf56f9efe5b.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
89000a0d0047c48b96288186968f343d17f06f470b2985cfdd4ebcf56f9efe5b.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral7
Sample
89270d6b49877a5303ff4416c74830b4.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
89270d6b49877a5303ff4416c74830b4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
892ac0ac36d3e692e581bde711ae2651.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
892ac0ac36d3e692e581bde711ae2651.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
894b900bb7817bc5ddd0e3ad48eb9c6fbe4ad9ad7741358d311bafe03b988a92.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
894b900bb7817bc5ddd0e3ad48eb9c6fbe4ad9ad7741358d311bafe03b988a92.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe
Resource
win7-20250207-en
Behavioral task
behavioral14
Sample
896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
89652cefa9366ca2d97d0e0b49525984.exe
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
89652cefa9366ca2d97d0e0b49525984.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
897255af3577597d102569ae36e4a05af7c024eaaaf4b26d4515002d2b257303.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
897255af3577597d102569ae36e4a05af7c024eaaaf4b26d4515002d2b257303.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
897b60be5611091a83c5ceb48f7d2bd4.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
897b60be5611091a83c5ceb48f7d2bd4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
89a1a21003baf78498607da9565222de2ca042713740ff1005123e24f6b2449d.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
89a1a21003baf78498607da9565222de2ca042713740ff1005123e24f6b2449d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
89ed231ad61a9e5a7fd0ab9f2bd75b9a.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
89ed231ad61a9e5a7fd0ab9f2bd75b9a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
8a4e1b5c2998360f622e0279dee68fb7e7130c4a0fa23749b404f70c10dfcd83.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
8a4e1b5c2998360f622e0279dee68fb7e7130c4a0fa23749b404f70c10dfcd83.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
8a7ce080bb43fc3edf2ddf3b300355ba.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
8a7ce080bb43fc3edf2ddf3b300355ba.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
8aa071d8cc2dd74176f041bba8762b3d.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
8aa071d8cc2dd74176f041bba8762b3d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
8acb86332d3165ca0750e27ecd4b4948ab35ade98d43820de667e14ff849c64c.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
8acb86332d3165ca0750e27ecd4b4948ab35ade98d43820de667e14ff849c64c.exe
Resource
win10v2004-20250314-en
General
-
Target
896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe
-
Size
1.9MB
-
MD5
9f30385fab69f24df7f2e9403fb5465e
-
SHA1
1f9027f32b0ad3b0783679096649f9941bc7e802
-
SHA256
896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17
-
SHA512
3be52680b247764f555ea23382d05b1e08f955aa2e89378fcb6e41dfdede63af8e0510e2adc848ba0cb7e9eae362996421fba880110f3167ade8400beedabadc
-
SSDEEP
24576:0z4T3bMX0/0ZqSEaa3OVFu8VQTo8Ia29MSVyAXmFPf87ptY60/YYhdbh7JRj:0OMX0/08SVYTcxMXPxthD
Malware Config
Signatures
-
Process spawned unexpected child process 27 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4640 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4732 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4808 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4828 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3580 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1452 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4048 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2084 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5876 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4976 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4840 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5012 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4876 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4868 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4996 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5036 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5988 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4848 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4132 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4616 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2580 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4708 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4888 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4908 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4900 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4800 5328 schtasks.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4656 5328 schtasks.exe 87 -
UAC bypass 3 TTPs 21 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2472 powershell.exe 3756 powershell.exe 1656 powershell.exe 5896 powershell.exe 5972 powershell.exe 5160 powershell.exe 4760 powershell.exe 4420 powershell.exe 4308 powershell.exe 1592 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation dllhost.exe -
Executes dropped EXE 6 IoCs
pid Process 5584 dllhost.exe 6116 dllhost.exe 5652 dllhost.exe 3300 dllhost.exe 2524 dllhost.exe 1460 dllhost.exe -
Checks whether UAC is enabled 1 TTPs 14 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\RCX7D47.tmp 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe File opened for modification C:\Windows\Tasks\dllhost.exe 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe File created C:\Windows\Fonts\9e8d7a4ca61bd9 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe File opened for modification C:\Windows\ModemLogs\System.exe 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe File created C:\Windows\Tasks\5940a34987c991 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe File created C:\Windows\ModemLogs\27d1bcfc3c54e0 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe File opened for modification C:\Windows\Tasks\RCX7D46.tmp 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe File opened for modification C:\Windows\Fonts\RuntimeBroker.exe 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe File created C:\Windows\Fonts\RuntimeBroker.exe 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe File opened for modification C:\Windows\ModemLogs\RCX86D4.tmp 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe File opened for modification C:\Windows\ModemLogs\RCX86E4.tmp 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe File opened for modification C:\Windows\Fonts\RCX8966.tmp 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe File opened for modification C:\Windows\Fonts\RCX8986.tmp 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe File created C:\Windows\Tasks\dllhost.exe 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe File created C:\Windows\ModemLogs\System.exe 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings dllhost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 27 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4616 schtasks.exe 4808 schtasks.exe 5876 schtasks.exe 4868 schtasks.exe 4708 schtasks.exe 4908 schtasks.exe 4828 schtasks.exe 4048 schtasks.exe 2084 schtasks.exe 4996 schtasks.exe 4132 schtasks.exe 2580 schtasks.exe 4900 schtasks.exe 4976 schtasks.exe 5012 schtasks.exe 4876 schtasks.exe 4848 schtasks.exe 4888 schtasks.exe 4800 schtasks.exe 4656 schtasks.exe 4640 schtasks.exe 4732 schtasks.exe 3580 schtasks.exe 1452 schtasks.exe 4840 schtasks.exe 5036 schtasks.exe 5988 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 5972 powershell.exe 5972 powershell.exe 1656 powershell.exe 1656 powershell.exe 5896 powershell.exe 5896 powershell.exe 3756 powershell.exe 3756 powershell.exe 4420 powershell.exe 4420 powershell.exe 1592 powershell.exe 1592 powershell.exe 2472 powershell.exe 2472 powershell.exe 4760 powershell.exe 4760 powershell.exe 4308 powershell.exe 4308 powershell.exe 5160 powershell.exe 5160 powershell.exe 4760 powershell.exe 1592 powershell.exe 1656 powershell.exe 5972 powershell.exe 5896 powershell.exe 3756 powershell.exe 2472 powershell.exe 4420 powershell.exe 4308 powershell.exe 5160 powershell.exe 5584 dllhost.exe 5652 dllhost.exe 3300 dllhost.exe 2524 dllhost.exe 1460 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe Token: SeDebugPrivilege 5972 powershell.exe Token: SeDebugPrivilege 1656 powershell.exe Token: SeDebugPrivilege 3756 powershell.exe Token: SeDebugPrivilege 5896 powershell.exe Token: SeDebugPrivilege 4420 powershell.exe Token: SeDebugPrivilege 1592 powershell.exe Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 4760 powershell.exe Token: SeDebugPrivilege 4308 powershell.exe Token: SeDebugPrivilege 5160 powershell.exe Token: SeDebugPrivilege 5584 dllhost.exe Token: SeDebugPrivilege 5652 dllhost.exe Token: SeDebugPrivilege 3300 dllhost.exe Token: SeDebugPrivilege 2524 dllhost.exe Token: SeDebugPrivilege 1460 dllhost.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 232 wrote to memory of 3756 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 120 PID 232 wrote to memory of 3756 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 120 PID 232 wrote to memory of 5896 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 121 PID 232 wrote to memory of 5896 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 121 PID 232 wrote to memory of 1656 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 122 PID 232 wrote to memory of 1656 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 122 PID 232 wrote to memory of 4760 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 124 PID 232 wrote to memory of 4760 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 124 PID 232 wrote to memory of 5972 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 125 PID 232 wrote to memory of 5972 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 125 PID 232 wrote to memory of 4420 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 126 PID 232 wrote to memory of 4420 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 126 PID 232 wrote to memory of 4308 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 127 PID 232 wrote to memory of 4308 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 127 PID 232 wrote to memory of 2472 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 128 PID 232 wrote to memory of 2472 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 128 PID 232 wrote to memory of 5160 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 130 PID 232 wrote to memory of 5160 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 130 PID 232 wrote to memory of 1592 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 131 PID 232 wrote to memory of 1592 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 131 PID 232 wrote to memory of 5128 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 140 PID 232 wrote to memory of 5128 232 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe 140 PID 5128 wrote to memory of 3364 5128 cmd.exe 142 PID 5128 wrote to memory of 3364 5128 cmd.exe 142 PID 5128 wrote to memory of 5584 5128 cmd.exe 144 PID 5128 wrote to memory of 5584 5128 cmd.exe 144 PID 5584 wrote to memory of 6108 5584 dllhost.exe 146 PID 5584 wrote to memory of 6108 5584 dllhost.exe 146 PID 5584 wrote to memory of 4552 5584 dllhost.exe 147 PID 5584 wrote to memory of 4552 5584 dllhost.exe 147 PID 6108 wrote to memory of 6116 6108 WScript.exe 150 PID 6108 wrote to memory of 6116 6108 WScript.exe 150 PID 1704 wrote to memory of 5652 1704 WScript.exe 159 PID 1704 wrote to memory of 5652 1704 WScript.exe 159 PID 5652 wrote to memory of 4980 5652 dllhost.exe 160 PID 5652 wrote to memory of 4980 5652 dllhost.exe 160 PID 5652 wrote to memory of 1112 5652 dllhost.exe 161 PID 5652 wrote to memory of 1112 5652 dllhost.exe 161 PID 4980 wrote to memory of 3300 4980 WScript.exe 163 PID 4980 wrote to memory of 3300 4980 WScript.exe 163 PID 3300 wrote to memory of 4448 3300 dllhost.exe 164 PID 3300 wrote to memory of 4448 3300 dllhost.exe 164 PID 3300 wrote to memory of 536 3300 dllhost.exe 165 PID 3300 wrote to memory of 536 3300 dllhost.exe 165 PID 4448 wrote to memory of 2524 4448 WScript.exe 166 PID 4448 wrote to memory of 2524 4448 WScript.exe 166 PID 2524 wrote to memory of 5184 2524 dllhost.exe 167 PID 2524 wrote to memory of 5184 2524 dllhost.exe 167 PID 2524 wrote to memory of 4672 2524 dllhost.exe 168 PID 2524 wrote to memory of 4672 2524 dllhost.exe 168 PID 5184 wrote to memory of 1460 5184 WScript.exe 169 PID 5184 wrote to memory of 1460 5184 WScript.exe 169 PID 1460 wrote to memory of 3152 1460 dllhost.exe 170 PID 1460 wrote to memory of 3152 1460 dllhost.exe 170 PID 1460 wrote to memory of 4732 1460 dllhost.exe 171 PID 1460 wrote to memory of 4732 1460 dllhost.exe 171 -
System policy modification 1 TTPs 21 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe"C:\Users\Admin\AppData\Local\Temp\896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe"1⤵
- UAC bypass
- Drops file in Drivers directory
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:232 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\60739cf6f660743813\RuntimeBroker.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5896
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\900323d723f1dd1206\sppsvc.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\60739cf6f660743813\896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Tasks\dllhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\900323d723f1dd1206\System.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Desktop\dllhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Videos\sihost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ModemLogs\System.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5160
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Fonts\RuntimeBroker.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\pWeIzPTbmL.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:5128 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:3364
-
-
C:\Windows\Tasks\dllhost.exe"C:\Windows\Tasks\dllhost.exe"3⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5584 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\46563a00-cd34-4061-a4b0-1fa20f7d20ce.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:6108 -
C:\Windows\Tasks\dllhost.exeC:\Windows\Tasks\dllhost.exe5⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- System policy modification
PID:6116 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bac3daec-57db-4991-9608-bd1bc236b4f9.vbs"6⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\Tasks\dllhost.exeC:\Windows\Tasks\dllhost.exe7⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5652 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7466eddc-71d3-4805-8e5d-289433d3a929.vbs"8⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\Tasks\dllhost.exeC:\Windows\Tasks\dllhost.exe9⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3300 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6ebfa81e-aec7-432d-ae35-9ee637f87a12.vbs"10⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\Tasks\dllhost.exeC:\Windows\Tasks\dllhost.exe11⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2524 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1b304b7d-6209-42d0-83b0-96d6be79c261.vbs"12⤵
- Suspicious use of WriteProcessMemory
PID:5184 -
C:\Windows\Tasks\dllhost.exeC:\Windows\Tasks\dllhost.exe13⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1460 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d8767651-aeb1-4a17-aa61-b58dec782bb2.vbs"14⤵PID:3152
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e0a499d9-ad0b-431b-815e-cb30c4cbdbee.vbs"14⤵PID:4732
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\346dcbc8-85a8-4190-8ff2-a6e4f8ae7e71.vbs"12⤵PID:4672
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6b9efc5e-f3a6-4cce-aa08-470d1678479d.vbs"10⤵PID:536
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6d6aa4ac-1bb9-42f0-add5-1492afd5e967.vbs"8⤵PID:1112
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\59a7a50f-cbff-4ff2-a1f6-6af94f0c5bbf.vbs"6⤵PID:4764
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\899a4f92-867f-45a3-8820-591bfc72fbeb.vbs"4⤵PID:4552
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\60739cf6f660743813\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\60739cf6f660743813\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\60739cf6f660743813\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\900323d723f1dd1206\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\900323d723f1dd1206\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\900323d723f1dd1206\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b178" /sc MINUTE /mo 6 /tr "'C:\60739cf6f660743813\896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17" /sc ONLOGON /tr "'C:\60739cf6f660743813\896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b178" /sc MINUTE /mo 8 /tr "'C:\60739cf6f660743813\896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\Tasks\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Tasks\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Windows\Tasks\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\900323d723f1dd1206\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\900323d723f1dd1206\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\900323d723f1dd1206\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Desktop\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Public\Desktop\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Desktop\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Videos\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\Public\Videos\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Videos\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Windows\ModemLogs\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\ModemLogs\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Windows\ModemLogs\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Windows\Fonts\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\Fonts\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Windows\Fonts\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4876
Network
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.ax-0001.ax-msedge.netg-bing-com.ax-0001.ax-msedge.netIN CNAMEax-0001.ax-msedge.netax-0001.ax-msedge.netIN A150.171.27.10ax-0001.ax-msedge.netIN A150.171.28.10
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c5e51c093acb48e98c1c76bb34600ff8&localId=w:21C1CCEE-160B-F796-E0D9-10C0675E4A84&deviceId=6896216935942425&anid=Remote address:150.171.27.10:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c5e51c093acb48e98c1c76bb34600ff8&localId=w:21C1CCEE-160B-F796-E0D9-10C0675E4A84&deviceId=6896216935942425&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=1806F366AD9D622F1071E6D1ACBA63E9; domain=.bing.com; expires=Thu, 16-Apr-2026 06:18:02 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 3769F3AEBCB34CAABDA1F2C7434556AE Ref B: LON04EDGE0607 Ref C: 2025-03-22T06:18:02Z
date: Sat, 22 Mar 2025 06:18:01 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=c5e51c093acb48e98c1c76bb34600ff8&localId=w:21C1CCEE-160B-F796-E0D9-10C0675E4A84&deviceId=6896216935942425&anid=Remote address:150.171.27.10:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=c5e51c093acb48e98c1c76bb34600ff8&localId=w:21C1CCEE-160B-F796-E0D9-10C0675E4A84&deviceId=6896216935942425&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=1806F366AD9D622F1071E6D1ACBA63E9
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=uRadCDkAFtzDa3xvTYDevr_YABOUwFy3AbPPk1rfvl0; domain=.bing.com; expires=Thu, 16-Apr-2026 06:18:02 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: DDABCD5755274DA4804826077F18D801 Ref B: LON04EDGE0607 Ref C: 2025-03-22T06:18:02Z
date: Sat, 22 Mar 2025 06:18:02 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c5e51c093acb48e98c1c76bb34600ff8&localId=w:21C1CCEE-160B-F796-E0D9-10C0675E4A84&deviceId=6896216935942425&anid=Remote address:150.171.27.10:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c5e51c093acb48e98c1c76bb34600ff8&localId=w:21C1CCEE-160B-F796-E0D9-10C0675E4A84&deviceId=6896216935942425&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=1806F366AD9D622F1071E6D1ACBA63E9; MSPTC=uRadCDkAFtzDa3xvTYDevr_YABOUwFy3AbPPk1rfvl0
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 062BCBBD23584691873565629517E338 Ref B: LON04EDGE0607 Ref C: 2025-03-22T06:18:02Z
date: Sat, 22 Mar 2025 06:18:02 GMT
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEax-0001.ax-msedge.netax-0001.ax-msedge.netIN A150.171.28.10ax-0001.ax-msedge.netIN A150.171.27.10
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360608910_1R4TEUG1LRQY39K7S&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239360608910_1R4TEUG1LRQY39K7S&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 663065
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 1EE7E68E0BF043D9A38A422DA8A39CD3 Ref B: LON04EDGE1008 Ref C: 2025-03-22T06:18:42Z
date: Sat, 22 Mar 2025 06:18:42 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360608909_1XWUMGMD2M0J0LDVR&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239360608909_1XWUMGMD2M0J0LDVR&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 594481
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 5756064D187941439FA19A0B9196DD96 Ref B: LON04EDGE1008 Ref C: 2025-03-22T06:18:42Z
date: Sat, 22 Mar 2025 06:18:42 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301222_1FJU5PIOORZE0KYBN&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239317301222_1FJU5PIOORZE0KYBN&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 606760
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 7D2F9A8D8FD14E5498BA2B6446D6452D Ref B: LON04EDGE1008 Ref C: 2025-03-22T06:18:45Z
date: Sat, 22 Mar 2025 06:18:45 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301631_1JS0AMCX251CLJ5OX&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239317301631_1JS0AMCX251CLJ5OX&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 640791
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 768DACF5AF3F4147B62523105AF0664E Ref B: LON04EDGE1008 Ref C: 2025-03-22T06:18:45Z
date: Sat, 22 Mar 2025 06:18:45 GMT
-
Remote address:8.8.8.8:53Requestc.pki.googIN AResponsec.pki.googIN CNAMEpki-goog.l.google.compki-goog.l.google.comIN A142.250.180.3
-
Remote address:142.250.180.3:80RequestGET /r/r1.crl HTTP/1.1
Cache-Control: max-age = 3000
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMT
User-Agent: Microsoft-CryptoAPI/10.0
Host: c.pki.goog
ResponseHTTP/1.1 304 Not Modified
Expires: Sat, 22 Mar 2025 06:49:32 GMT
Age: 1171
Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
Cache-Control: public, max-age=3000
Vary: Accept-Encoding
-
150.171.27.10:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c5e51c093acb48e98c1c76bb34600ff8&localId=w:21C1CCEE-160B-F796-E0D9-10C0675E4A84&deviceId=6896216935942425&anid=tls, http22.0kB 9.4kB 21 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c5e51c093acb48e98c1c76bb34600ff8&localId=w:21C1CCEE-160B-F796-E0D9-10C0675E4A84&deviceId=6896216935942425&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=c5e51c093acb48e98c1c76bb34600ff8&localId=w:21C1CCEE-160B-F796-E0D9-10C0675E4A84&deviceId=6896216935942425&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c5e51c093acb48e98c1c76bb34600ff8&localId=w:21C1CCEE-160B-F796-E0D9-10C0675E4A84&deviceId=6896216935942425&anid=HTTP Response
204 -
260 B 200 B 5 5
-
260 B 160 B 5 4
-
1.7kB 7.8kB 18 14
-
2.0kB 7.8kB 19 13
-
150.171.28.10:443https://tse1.mm.bing.net/th?id=OADD2.10239317301631_1JS0AMCX251CLJ5OX&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90tls, http292.4kB 2.6MB 1890 1880
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360608910_1R4TEUG1LRQY39K7S&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360608909_1XWUMGMD2M0J0LDVR&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301222_1FJU5PIOORZE0KYBN&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301631_1JS0AMCX251CLJ5OX&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200HTTP Response
200 -
2.0kB 7.8kB 19 13
-
260 B 120 B 5 3
-
260 B 160 B 5 4
-
522 B 395 B 7 4
HTTP Request
GET http://c.pki.goog/r/r1.crlHTTP Response
304 -
260 B 160 B 5 4
-
260 B 80 B 5 2
-
260 B 120 B 5 3
-
260 B 200 B 5 5
-
260 B 160 B 5 4
-
260 B 160 B 5 4
-
260 B 160 B 5 4
-
260 B 120 B 5 3
-
56 B 148 B 1 1
DNS Request
g.bing.com
DNS Response
150.171.27.10150.171.28.10
-
62 B 170 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
150.171.28.10150.171.27.10
-
56 B 107 B 1 1
DNS Request
c.pki.goog
DNS Response
142.250.180.3
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD56d3fc346713e89ca4b5245ca6464d320
SHA14ca2a82156e560a64bc1139d393c1ccee3382380
SHA2566bf89b318cc2d02abe252e155e68ceb9377d84a72f110438b0c14afb0c7717d9
SHA51265e0fed0cebf94cc03179e13221cfd1f0f3f46cf39ea763bc6b45260f0c429f4751f36df0eba72b1ca19889bae56bd7e8f335299b7152aceed9e50be25a19ce9
-
Filesize
1.9MB
MD59f30385fab69f24df7f2e9403fb5465e
SHA11f9027f32b0ad3b0783679096649f9941bc7e802
SHA256896493118eef774a76d4ea1ef6ead5a805b0d99452a2c423da8c617c459f5b17
SHA5123be52680b247764f555ea23382d05b1e08f955aa2e89378fcb6e41dfdede63af8e0510e2adc848ba0cb7e9eae362996421fba880110f3167ade8400beedabadc
-
Filesize
1KB
MD5364147c1feef3565925ea5b4ac701a01
SHA19a46393ac3ffad3bb3c8f0e074b65d68d75e21ef
SHA25638cf1ab1146ad24e88763fc0508c2a99478d8428b453ba8c8b830d2883a4562b
SHA512bfec1d3f22abd5668def189259deb4d919ceb4d51ac965d0baf9b6cf8bea0db680d49a2b8d0b75524cc04c7803cdfd91e484b31dc8ddc3ff47d1e5c59a9e35cf
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD50c56ba5098c530bbd1cdb28d50090d39
SHA1ff63178ea722ec2db118c81051bf85544fb6b316
SHA2560299d374c4b984cb0475284b966dfbe8bb08e45b93dabdf327f96a60b05273d1
SHA512cbbf27ac30e55f4df35ae5aae50d1a2f9475dc2ac0eecf9ce0ab19adef606fff08c26d0eef5686012d36566551179afe09b15c1da1840415b1696f76324a03f2
-
Filesize
944B
MD577c3c3e6edde95327e5255c97f03f1aa
SHA1bf90bbebcadd07d730c5793a512ed30c4db1d776
SHA256a80450170e547a9d4d050e3237edfcc561a6c936d180f6d0867a22a6487afa99
SHA5128c3fbc3312def0c2ba51036a30ac23d5c50bcdf2a273ee4802fe05c73c0d94cb8b115291e0ed91a23f150ff9f69b2046276cc062a9ba6c7be92bcd975e850077
-
Filesize
944B
MD5e452a0569a88103800ef1fdb9d028088
SHA1b73c91d1a9b444033dd5824543c4b9e9538e379f
SHA256c0f2157095cd92cebe6ea87b14b366ff5ff71ef681785ac8363b1ca59b0ca242
SHA5125141bd6ceaaefae93e4663b8235ecb1ff87017c2ed1c5a1cfa249bb5d9b646d6d0493e1f85aebe4ae9bddfd2ff7210ada1217bb32d52a1ac582a2f6d636e08a7
-
Filesize
944B
MD53c7942d5130e519e28d6051f8513f7c4
SHA1e768daf9cbd6a718a8a60c08c893ce1797cd86fb
SHA25683042c329ad8e497403069fdb4718252bd97c127d4e04fae1977349d767c90a1
SHA512c7456ee68bea337227d9ac5f20acdcce72abad524cc771f8d9e49e8ca8811a093d1972d88da72c612a865de9417c6dec258148ff94e739a50097b62415566bc5
-
Filesize
944B
MD5ac71252a5ec972a71c8da205ce8b70ca
SHA17aecda992f788df0af9d62bf872a0bbe24ce28c6
SHA256377b163bdf5d0c30ff2166c0d6ac4652acfbf9461339394b11ae9e5c855474a5
SHA51277a842a39d0e25ed3000fa6dc99e56bb39ec8f19ee649d6368699384c61a01ce9e4d136e2b3a67a56f924986bcc42a18e60d2875117ed419ec4ca133414c1360
-
Filesize
704B
MD52ce1e543d712539bc3c867cf4c316997
SHA19b1562106bd8d23ebe5fbfe692ab61dbd5f803e2
SHA256f91328f6198258552d88514aa97fb3c83af17203032e3312a7d8694c8a62b838
SHA51247ecb6f4f4aeb9cf513d2ef971d7078bcb1a97d55dabe11bc6a7599a7d7a8f1e064f1fb217c386ff2156855330b4cbe21b0b9fee0e1a3a9fa7231c08ca8aab1e
-
Filesize
704B
MD5df5ffad2773d3568f2b6018dbaaf6e5b
SHA1cb10592a8c9622620bc36c1df2d9ab72c1dcee11
SHA2561300b18dfeacd992b55a9f37f19a2502f52f72f0480b15a93689a0ebc1749684
SHA512b9c077ae8f1304b4cdbe376299b2a2a82fd596c82b538dbce10b6e35b1a7f8401403bc1bac56cc6859af1cfaa7ba6f5deb4242cd9d5ec533764ffa86394bb209
-
Filesize
704B
MD55b99886eb55cebe1b79714b953633ec2
SHA19ccdf5e08e7d5c88401aa1bc811d065fc9f22262
SHA256383a16a4c544fb04e11352fec9c7f9e6efd0c6411afc464027198c4fcf9a9caa
SHA51205bf6b8c3bf53cab1d8110154e52630834590b34f0b9e881aba3cb960f09b2ba6ac5f42bd633efe96ef863831ca15e89c939392f85f5d1012d302de5b0897b67
-
Filesize
704B
MD58d78d98bfed50c8822d64a4123727644
SHA1fd4c86f7da45093e5b3371c65045240598ea0f8a
SHA2564a98593d20c63e78b9aba09ed5b1249393d249389e8b21c2e5690199811b2cd8
SHA512aa6c6e592ca97626497824431cd2230bf8c2df89150cd5be81b3d336b2fe0a07cce52411a9d52a92565daecd4a5991e74de56dae5719faceb86d58a9623189c4
-
Filesize
480B
MD5876996b45669af5dcaf6651b1632f96f
SHA1e5d78c39baf94ddf2b996fee9c14386f62ffcd55
SHA256df3d1f8bbbe47cdac26e6a08e251404e936623c87485702b4f170858cbb25365
SHA512d4ee0208929f129387b8c41090a0b26157b59022c25e8085022f85fd0b0e208f33de96d325f05c5a6d5dad788535363e9a405d33fc9c6a09fee4019362c25aba
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
704B
MD5ce2fcbf6940139aa2f1ef6e2766f2c36
SHA1956c4266e3556110cb24124be44f8d0bc3286b02
SHA256ff0228a2ddbb038974d02f336de2a56d4122eb98559d9c615e2f8148ef524dc8
SHA512f21c46fda1b56fd0e81fef08fa5bf8b3f9b09d2ec4fdc738437229eb057e45549830a01b1ca953bba5e9daad156a0ebd9e9dd982e1922da6aa4643ff813b3d6e
-
Filesize
193B
MD5f33ec99929cd3d2b91e4f70829dae7e3
SHA1db2b16a1b58511dd1954b0b1f6f01f849cedab2a
SHA2564ded7e00e380bd21d5d4c4c7906a93d0d79883248c9c58a9849ba91d7cd4c424
SHA512789f61baa6ad9d7df87c2eb8f64da38f81bbbfd7014b7916cbef629e331bf8cdbc2197a67fc76bb03b611d1017a4674456356ca54bb529240a65b820c96bd738
-
Filesize
1.9MB
MD50d3dd83128c23a6c412751932b08494d
SHA14795c61babedebacbff327e1809eaaf2d2f3fd20
SHA256ade08bc1cc1df48c957d5c2eecf99960e0ff5ad82ec11a0e24cb0d160b8f6d68
SHA5129d2101d8b58e68684d239a623a7cc6f8e2c436e06f8d649761e180b12569bb8d3870a47603e44ebec9e8d00b4a4f9e2f5dccc4f2cd74961111e53f93725d479b
-
Filesize
1.9MB
MD55ed7126187c0d78ee16364b956d90bfe
SHA1da470f645853982a06835a03f9dd6c9d141155bb
SHA2562481d009255d1aee7c857ecafe7f180325607af84b15276033057bfa842a6e6c
SHA512333a1274700aaeb2b128a0468635631da2e79278b7c64fb4e47330756cf84fced5bdf7e5f8d844b993a10c33bed42a40c3ead56f660ce093ba2f74810d18e9d4