Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Jan. 25, 2024, 8:51 a.m. | Jan. 25, 2024, 8:58 a.m. |
-
-
schtasks.exe schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
2672 -
schtasks.exe schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
2756 -
xHLWqppYh13Be9jJk15F.exe "C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\xHLWqppYh13Be9jJk15F.exe"
2960-
-
iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:3012 CREDAT:145409
604
-
-
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" https://www.youtube.com
2856-
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=65.0.3325.181 --initial-client-data=0x88,0x8c,0x90,0x84,0x94,0x7fef3e9f1e8,0x7fef3e9f1f8,0x7fef3e9f208
884 -
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=1608 --on-initialized-event-handle=316 --parent-handle=320 /prefetch:6
3188
-
-
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" https://www.facebook.com/login
1308-
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=65.0.3325.181 --initial-client-data=0x88,0x8c,0x90,0x84,0x94,0x7fef3e9f1e8,0x7fef3e9f1f8,0x7fef3e9f208
2932 -
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2000 --on-initialized-event-handle=316 --parent-handle=320 /prefetch:6
3116
-
-
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" https://accounts.google.com
1156-
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=65.0.3325.181 --initial-client-data=0x88,0x8c,0x90,0x84,0x94,0x7fef3e9f1e8,0x7fef3e9f1f8,0x7fef3e9f208
2568 -
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2444 --on-initialized-event-handle=316 --parent-handle=320 /prefetch:6
3124
-
-
-
-
crashreporter.exe "C:\Program Files\Mozilla Firefox\crashreporter.exe" "C:\Users\test22\AppData\Local\Temp\\ae114d14-d6af-4b01-bdc9-950de0d5db9c.dmp"
3928-
minidump-analyzer.exe "C:\Program Files\Mozilla Firefox\minidump-analyzer.exe" "C:\Users\test22\AppData\Local\Temp\\ae114d14-d6af-4b01-bdc9-950de0d5db9c.dmp"
3676
-
-
-
-
-
-
crashreporter.exe "C:\Program Files\Mozilla Firefox\crashreporter.exe" "C:\Users\test22\AppData\Local\Temp\\f6938b53-4e70-4b9a-9dfb-6214ea4714d7.dmp"
3808-
minidump-analyzer.exe "C:\Program Files\Mozilla Firefox\minidump-analyzer.exe" "C:\Users\test22\AppData\Local\Temp\\f6938b53-4e70-4b9a-9dfb-6214ea4714d7.dmp"
4076
-
-
-
-
-
-
crashreporter.exe "C:\Program Files\Mozilla Firefox\crashreporter.exe" "C:\Users\test22\AppData\Roaming\Mozilla\Firefox\Profiles\qxo5wa6x.default-release\minidumps\d88e0bf0-a961-4b49-a93d-a8743489b9d8.dmp"
3168-
minidump-analyzer.exe "C:\Program Files\Mozilla Firefox\minidump-analyzer.exe" "C:\Users\test22\AppData\Roaming\Mozilla\Firefox\Profiles\qxo5wa6x.default-release\minidumps\d88e0bf0-a961-4b49-a93d-a8743489b9d8.dmp"
944
-
-
-
-
-
vhaNZRtsx6oDxE2wLedH.exe "C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\vhaNZRtsx6oDxE2wLedH.exe"
2488-
-
schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explorhe.exe /TR "C:\Users\test22\AppData\Local\Temp\d887ceb89d\explorhe.exe" /F
2752 -
stan.exe "C:\Users\test22\AppData\Local\Temp\1000574001\stan.exe"
1316 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
3376 -
moto.exe "C:\Users\test22\AppData\Local\Temp\1000582001\moto.exe"
3560 -
-
MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
4192
-
-
TrueCrypt_NKwtUN.exe "C:\Users\test22\AppData\Local\Temp\1000586001\TrueCrypt_NKwtUN.exe"
3716 -
kskskfsf.exe "C:\Users\test22\AppData\Local\Temp\1000589001\kskskfsf.exe"
1772 -
-
-
-
-
chcp.com chcp 1251
4928 -
schtasks.exe schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\test22\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
4900
-
-
-
-
toolspub1.exe "C:\Users\test22\AppData\Local\Temp\toolspub1.exe"
4196 -
31839b57a4f11171d6abc8bbc4451ee4.exe "C:\Users\test22\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
4304 -
rty25.exe "C:\Users\test22\AppData\Local\Temp\rty25.exe"
4424 -
FirstZ.exe "C:\Users\test22\AppData\Local\Temp\FirstZ.exe"
4552
-
-
gold1234.exe "C:\Users\test22\AppData\Local\Temp\1000591001\gold1234.exe"
4508 -
crypted.exe "C:\Users\test22\AppData\Local\Temp\1000592001\crypted.exe"
4724 -
-
RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
5088
-
-
alex.exe "C:\Users\test22\AppData\Local\Temp\1000597001\alex.exe"
5112 -
leg221.exe "C:\Users\test22\AppData\Local\Temp\1000600001\leg221.exe"
4116 -
Awwnbpxqsf.exe "C:\Users\test22\AppData\Local\Temp\1000601001\Awwnbpxqsf.exe"
4180 -
2024.exe "C:\Users\test22\AppData\Local\Temp\1000603001\2024.exe"
1924
-
-
-
6IaVlI6Bnvzzy7JvUjLd.exe "C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\6IaVlI6Bnvzzy7JvUjLd.exe"
2800 -
XB6HWAvSS60oS8YtMo1a.exe "C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\XB6HWAvSS60oS8YtMo1a.exe"
2884 -
y0cb10l651CUsg6eGw3C.exe "C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\y0cb10l651CUsg6eGw3C.exe"
2944
-
-
explorer.exe C:\Windows\Explorer.EXE
1452
Name | Response | Post-Analysis Lookup |
---|---|---|
accounts.google.com | 64.233.188.84 | |
apps.identrust.com |
CNAME
a1952.dscq.akamai.net
CNAME
identrust.edgesuite.net
|
23.67.53.27 |
i.alie3ksgaa.com | 154.92.15.189 | |
ipinfo.io | 34.117.186.192 | |
www.google.com | 172.217.161.228 | |
ssl.gstatic.com | 142.250.76.131 | |
db-ip.com | 104.26.4.15 |
IP Address | Status | Action |
---|---|---|
104.26.4.15 | Active | Moloch |
109.107.182.3 | Active | Moloch |
117.18.232.200 | Active | Moloch |
141.95.211.148 | Active | Moloch |
142.250.204.36 | Active | Moloch |
142.251.220.35 | Active | Moloch |
154.92.15.189 | Active | Moloch |
164.124.101.2 | Active | Moloch |
185.172.128.19 | Active | Moloch |
185.172.128.90 | Active | Moloch |
185.215.113.68 | Active | Moloch |
193.233.132.62 | Active | Moloch |
195.20.16.103 | Active | Moloch |
34.117.186.192 | Active | Moloch |
5.42.64.33 | Active | Moloch |
61.111.58.35 | Active | Moloch |
64.233.188.84 | Active | Moloch |
80.79.4.61 | Active | Moloch |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49168 104.26.4.15:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 03:f8:79:dd:26:16:32:12:a4:33:99:34:af:f7:33:32:d5:e0:aa:e5 |
TLSv1 192.168.56.101:49184 64.233.188.84:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=accounts.google.com | e9:00:f4:02:db:2e:43:07:4d:00:d0:33:77:6d:2b:38:28:c5:a2:b6 |
TLSv1 192.168.56.101:49186 142.251.220.35:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.gstatic.com | 4c:e1:1e:e3:63:49:81:bb:f5:53:ce:44:91:07:8a:14:84:70:7f:66 |
TLSv1 192.168.56.101:49191 142.250.204.36:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=www.google.com | 3a:23:7a:7e:16:ae:ac:26:15:62:07:69:2e:e7:ad:8f:9d:b5:90:b7 |
TLSv1 192.168.56.101:49183 64.233.188.84:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=accounts.google.com | e9:00:f4:02:db:2e:43:07:4d:00:d0:33:77:6d:2b:38:28:c5:a2:b6 |
TLSv1 192.168.56.101:49192 142.250.204.36:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=www.google.com | 3a:23:7a:7e:16:ae:ac:26:15:62:07:69:2e:e7:ad:8f:9d:b5:90:b7 |
TLSv1 192.168.56.101:49185 142.251.220.35:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.gstatic.com | 4c:e1:1e:e3:63:49:81:bb:f5:53:ce:44:91:07:8a:14:84:70:7f:66 |
TLSv1 192.168.56.101:49212 104.26.4.15:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 03:f8:79:dd:26:16:32:12:a4:33:99:34:af:f7:33:32:d5:e0:aa:e5 |
TLSv1 192.168.56.101:49209 104.26.4.15:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 03:f8:79:dd:26:16:32:12:a4:33:99:34:af:f7:33:32:d5:e0:aa:e5 |
TLSv1 192.168.56.101:49298 154.92.15.189:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=i.alie3ksgaa.com | e3:88:72:04:24:5c:12:17:a4:e2:c1:d9:33:f0:d9:60:91:71:d3:dc |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
file | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
file | C:\Program Files\Mozilla Firefox\api-ms-win-core-file-l2-1-0.dll |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe\PATH |
registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\firefox.exe |
section |
suspicious_features | Connection to IP address | suspicious_request | HEAD http://109.107.182.3/cost/go.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://109.107.182.3/cost/go.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://185.215.113.68/mine/amer.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://185.215.113.68/mine/amer.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://109.107.182.3/cost/nika.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://109.107.182.3/cost/nika.exe | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://185.215.113.68/theme/index.php | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://109.107.182.3/cost/vimu.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://109.107.182.3/cost/vimu.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://185.215.113.68/mine/stan.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://109.107.182.3/cost/networ.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://109.107.182.3/cost/networ.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://109.107.182.3/lego/moto.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://185.215.113.68/theme/Plugins/cred64.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://185.215.113.68/theme/Plugins/clip64.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://109.107.182.3/lego/store.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://109.107.182.3/lego/TrueCrypt_NKwtUN.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://109.107.182.3/lego/kskskfsf.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://185.172.128.19/latestrocki.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://109.107.182.3/lego/gold1234.exe | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://185.172.128.90/cpa/ping.php?substr=seven&s=ab | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://109.107.182.3/lego/crypted.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://109.107.182.3/lego/rdx1122.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://109.107.182.3/lego/alex.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://109.107.182.3/lego/leg221.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://109.107.182.3/lego/Awwnbpxqsf.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://109.107.182.3/lego/2024.exe |
request | HEAD http://109.107.182.3/cost/go.exe |
request | GET http://109.107.182.3/cost/go.exe |
request | HEAD http://185.215.113.68/mine/amer.exe |
request | GET http://185.215.113.68/mine/amer.exe |
request | HEAD http://109.107.182.3/cost/nika.exe |
request | GET http://109.107.182.3/cost/nika.exe |
request | POST http://185.215.113.68/theme/index.php |
request | HEAD http://109.107.182.3/cost/vimu.exe |
request | GET http://109.107.182.3/cost/vimu.exe |
request | GET http://185.215.113.68/mine/stan.exe |
request | HEAD http://109.107.182.3/cost/networ.exe |
request | GET http://109.107.182.3/cost/networ.exe |
request | GET http://109.107.182.3/lego/moto.exe |
request | GET http://185.215.113.68/theme/Plugins/cred64.dll |
request | GET http://185.215.113.68/theme/Plugins/clip64.dll |
request | GET http://109.107.182.3/lego/store.exe |
request | GET http://109.107.182.3/lego/TrueCrypt_NKwtUN.exe |
request | GET http://ie9cvlist.ie.microsoft.com/IE9CompatViewList.xml |
request | GET http://109.107.182.3/lego/kskskfsf.exe |
request | GET http://185.172.128.19/latestrocki.exe |
request | GET http://109.107.182.3/lego/gold1234.exe |
request | GET http://185.172.128.90/cpa/ping.php?substr=seven&s=ab |
request | GET http://109.107.182.3/lego/crypted.exe |
request | GET http://109.107.182.3/lego/rdx1122.exe |
request | GET http://109.107.182.3/lego/alex.exe |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
request | GET http://109.107.182.3/lego/leg221.exe |
request | GET http://109.107.182.3/lego/Awwnbpxqsf.exe |
request | GET http://109.107.182.3/lego/2024.exe |
request | GET https://db-ip.com/demo/home.php?s=175.208.134.152 |
request | GET https://accounts.google.com/ |
request | GET https://accounts.google.com/ServiceLogin?passive=1209600&continue=https%3A%2F%2Faccounts.google.com%2F&followup=https%3A%2F%2Faccounts.google.com%2F |
request | GET https://accounts.google.com/InteractiveLogin?continue=https://accounts.google.com/&followup=https://accounts.google.com/&passive=1209600&ifkv=ASKXGp3437MpdLqeJXXmnjo86ElWj-h7hAFZEOqRy5ULnXiPzkWs5AxnDO0Ovl-mxK_rlOLCFHwf |
request | GET https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Faccounts.google.com%2F&followup=https%3A%2F%2Faccounts.google.com%2F&ifkv=ASKXGp3vDgA9dYQaukba9RXlX2wDMY1M-AxrCojfMZ91Il_gwrJz-Ee78hH-C5Y4mLG_WvowvhkPKQ&passive=1209600&flowName=WebLiteSignIn&flowEntry=ServiceLogin&dsh=S1963367809%3A1706140574270777 |
request | GET https://accounts.google.com/_/bscframe |
request | GET https://ssl.gstatic.com/images/branding/googlelogo/2x/googlelogo_color_74x24dp.png |
request | GET https://accounts.google.com/favicon.ico |
request | GET https://www.google.com/favicon.ico |
request | GET https://accounts.google.com/generate_204?QWfFag |
request | POST http://185.215.113.68/theme/index.php |
description | explorhe.exe tried to sleep 308 seconds, actually delayed analysis time by 308 seconds |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash\Sync Extension Settings\kncchdigobghenbbaddojjnnaogfppfj\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials\Local Extension Settings\lpilbniiabackdjcionkobglmddfbcjo\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\Sync Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\Sync Extension Settings\mgffkfbidihjpoaomajlbgchddlicgpn\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateRevocation\Sync Extension Settings\lpilbniiabackdjcionkobglmddfbcjo\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials\Sync Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateRevocation\Sync Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\WidevineCdm\Sync Extension Settings\jnkelfanjkeadonecabehalmbgpfodjm\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\Sync Extension Settings\jnkelfanjkeadonecabehalmbgpfodjm\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\Local Extension Settings\gjagmgiddbbciopjhllkdnddhcglnemk\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\Sync Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Sync Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateRevocation\Sync Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl\Sync Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SwReporter\Sync Extension Settings\cjmkndjhnagcfbpiemnkdpomccnjblmj\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\Sync Extension Settings\jnkelfanjkeadonecabehalmbgpfodjm\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Subresource Filter\Sync Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\WidevineCdm\Sync Extension Settings\flpiciilemghbmfalicajoolhkkenfel\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SwReporter\Local Extension Settings\aijcbedoijmgnlmjeegjaglmepbmpkpi\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.ldb |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\Sync Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials\Sync Extension Settings\fhilaheimglignddkjgofkcbgekhenbh\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\Local Extension Settings\gojhcdgcpbpfigcaejpfhfegekdgiblk\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\Sync Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl\Sync Extension Settings\blnieiiffboillknjnepogjhkgnoapac\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\kkpllkodjeloidieedojogacfhpaihoh\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\Sync Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\Sync Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Subresource Filter\Sync Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Sync Extension Settings\kkpllkodjeloidieedojogacfhpaihoh\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\WidevineCdm\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local Extension Settings\kmhcihpebfmpgmihbkipmjlmmioameka\CURRENT |
domain | ipinfo.io |
file | C:\Users\test22\AppData\Local\Temp\Protect544cd51a.dll |
file | C:\Users\test22\AppData\Local\Temp\1000574001\stan.exe |
file | C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\XB6HWAvSS60oS8YtMo1a.exe |
file | C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\6IaVlI6Bnvzzy7JvUjLd.exe |
file | C:\Users\test22\AppData\Local\Temp\1000592001\crypted.exe |
file | C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\xHLWqppYh13Be9jJk15F.exe |
file | C:\Users\test22\AppData\Roaming\006700e5a2ab05\cred64.dll |
file | C:\Users\test22\AppData\Local\Temp\BroomSetup.exe |
file | C:\Users\test22\AppData\Local\Temp\toolspub1.exe |
file | C:\Users\test22\AppData\Local\Temp\1000601001\Awwnbpxqsf.exe |
file | C:\Users\test22\AppData\Local\Temp\nspACB2.tmp\INetC.dll |
file | C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\vhaNZRtsx6oDxE2wLedH.exe |
file | C:\Users\test22\AppData\Local\Temp\1000595001\rdx1122.exe |
file | C:\Users\test22\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe |
file | C:\Users\test22\AppData\Roaming\006700e5a2ab05\clip64.dll |
file | C:\Users\test22\AppData\Local\Temp\1000603001\2024.exe |
file | C:\Users\test22\AppData\Local\Temp\rty25.exe |
file | C:\Users\test22\AppData\Local\Temp\1000597001\alex.exe |
file | C:\Users\test22\AppData\Local\Temp\1000583001\store.exe |
file | C:\Users\test22\AppData\Local\Temp\1000589001\kskskfsf.exe |
file | C:\Users\test22\AppData\Roaming\Temp\Task.bat |
file | C:\Users\test22\AppData\Local\Temp\1000590001\latestrocki.exe |
file | C:\Users\test22\AppData\Local\Temp\InstallSetup7.exe |
file | C:\Users\test22\AppData\Local\Temp\1000586001\TrueCrypt_NKwtUN.exe |
file | C:\Users\test22\AppData\Local\Temp\1000591001\gold1234.exe |
file | C:\Users\test22\AppData\Local\Temp\FirstZ.exe |
file | C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\y0cb10l651CUsg6eGw3C.exe |
file | C:\Users\test22\AppData\Local\Temp\1000600001\leg221.exe |
file | C:\Users\test22\AppData\Local\Temp\1000582001\moto.exe |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN explorhe.exe /TR "C:\Users\test22\AppData\Local\Temp\d887ceb89d\explorhe.exe" /F |
cmdline | schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\test22\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F |
cmdline | schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explorhe.exe /TR "C:\Users\test22\AppData\Local\Temp\d887ceb89d\explorhe.exe" /F |
cmdline | schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST |
file | C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\xHLWqppYh13Be9jJk15F.exe |
file | C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\6IaVlI6Bnvzzy7JvUjLd.exe |
file | C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\XB6HWAvSS60oS8YtMo1a.exe |
file | C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\y0cb10l651CUsg6eGw3C.exe |
file | C:\Users\test22\AppData\Local\Temp\d887ceb89d\explorhe.exe |
file | C:\Users\test22\AppData\Local\Temp\1000574001\stan.exe |
file | C:\Users\test22\AppData\Local\Temp\1000582001\moto.exe |
file | C:\Users\test22\AppData\Local\Temp\1000583001\store.exe |
file | C:\Users\test22\AppData\Local\Temp\1000586001\TrueCrypt_NKwtUN.exe |
file | C:\Users\test22\AppData\Local\Temp\1000589001\kskskfsf.exe |
file | C:\Users\test22\AppData\Local\Temp\1000590001\latestrocki.exe |
file | C:\Users\test22\AppData\Local\Temp\1000591001\gold1234.exe |
file | C:\Users\test22\AppData\Local\Temp\1000592001\crypted.exe |
file | C:\Users\test22\AppData\Local\Temp\1000595001\rdx1122.exe |
file | C:\Users\test22\AppData\Local\Temp\1000597001\alex.exe |
file | C:\Users\test22\AppData\Local\Temp\1000600001\leg221.exe |
file | C:\Users\test22\AppData\Local\Temp\1000601001\Awwnbpxqsf.exe |
file | C:\Users\test22\AppData\Local\Temp\1000603001\2024.exe |
file | C:\Users\test22\AppData\Local\Temp\InstallSetup7.exe |
file | C:\Users\test22\AppData\Local\Temp\toolspub1.exe |
file | C:\Users\test22\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe |
file | C:\Users\test22\AppData\Local\Temp\rty25.exe |
file | C:\Users\test22\AppData\Local\Temp\FirstZ.exe |
file | C:\Users\test22\AppData\Local\Temp\1000597001\alex.exe |
file | C:\Users\test22\AppData\Local\Temp\1000590001\latestrocki.exe |
file | C:\Users\test22\AppData\Local\Temp\nspACB2.tmp\INetC.dll |
file | C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\xHLWqppYh13Be9jJk15F.exe |
file | C:\Users\test22\AppData\Local\Temp\toolspub1.exe |
file | C:\Users\test22\AppData\Local\Temp\InstallSetup7.exe |
file | C:\Users\test22\AppData\Local\Temp\1000583001\store.exe |
file | C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\XB6HWAvSS60oS8YtMo1a.exe |
file | C:\Users\test22\AppData\Local\Temp\1000603001\2024.exe |
file | C:\Users\test22\AppData\Roaming\006700e5a2ab05\clip64.dll |
file | C:\Users\test22\AppData\Local\Temp\d887ceb89d\explorhe.exe |
file | C:\Users\test22\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe |
file | C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\y0cb10l651CUsg6eGw3C.exe |
file | C:\Users\test22\AppData\Local\Temp\Protect544cd51a.dll |
file | C:\Users\test22\AppData\Local\Temp\1000595001\rdx1122.exe |
file | C:\Users\test22\AppData\Local\Temp\1000600001\leg221.exe |
file | C:\Users\test22\AppData\Local\Temp\1000592001\crypted.exe |
file | C:\Users\test22\AppData\Local\Temp\1000589001\kskskfsf.exe |
file | C:\Users\test22\AppData\Local\Temp\BroomSetup.exe |
file | C:\Users\test22\AppData\Local\Temp\1000574001\stan.exe |
file | C:\Users\test22\AppData\Local\Temp\jobA4Qh0McSylYafz9\6IaVlI6Bnvzzy7JvUjLd.exe |
file | C:\Users\test22\AppData\Local\Temp\1000601001\Awwnbpxqsf.exe |
file | C:\Users\test22\AppData\Local\Temp\1000591001\gold1234.exe |