General Info

URL

https://www.dropbox.com/s/323sjwg7ntfga6i/Comparendo%20Electronico.001?dl=1

Full analysis
https://app.any.run/tasks/f0226679-16df-45f2-9213-3dac283ccc7e
Verdict
Malicious activity
Analysis date
11/8/2019, 16:26:22
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:

trojan

Indicators:

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
180 seconds
Additional time used
120 seconds
Fakenet option
off
Heavy Evaision option
off
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
on

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (75.0.3770.100)
  • Google Update Helper (1.3.34.7)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.7.2 (4.7.03062)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access MUI (French) 2010 (14.0.4763.1000)
  • Microsoft Office Access MUI (German) 2010 (14.0.4763.1000)
  • Microsoft Office Access MUI (Italian) 2010 (14.0.4763.1000)
  • Microsoft Office Access MUI (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office Access MUI (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office Access MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
  • Microsoft Office Access MUI (Russian) 2010 (14.0.4763.1000)
  • Microsoft Office Access MUI (Spanish) 2010 (14.0.4763.1000)
  • Microsoft Office Access MUI (Turkish) 2010 (14.0.4763.1013)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (French) 2010 (14.0.4763.1000)
  • Microsoft Office Excel MUI (German) 2010 (14.0.4763.1000)
  • Microsoft Office Excel MUI (Italian) 2010 (14.0.4763.1000)
  • Microsoft Office Excel MUI (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office Excel MUI (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office Excel MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
  • Microsoft Office Excel MUI (Russian) 2010 (14.0.4763.1000)
  • Microsoft Office Excel MUI (Spanish) 2010 (14.0.4763.1000)
  • Microsoft Office Excel MUI (Turkish) 2010 (14.0.4763.1013)
  • Microsoft Office Groove MUI (French) 2010 (14.0.4763.1000)
  • Microsoft Office Groove MUI (German) 2010 (14.0.4763.1000)
  • Microsoft Office Groove MUI (Italian) 2010 (14.0.4763.1000)
  • Microsoft Office Groove MUI (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office Groove MUI (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office Groove MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
  • Microsoft Office Groove MUI (Russian) 2010 (14.0.4763.1000)
  • Microsoft Office Groove MUI (Spanish) 2010 (14.0.4763.1000)
  • Microsoft Office Groove MUI (Turkish) 2010 (14.0.4763.1013)
  • Microsoft Office IME (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office IME (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office InfoPath MUI (French) 2010 (14.0.4763.1000)
  • Microsoft Office InfoPath MUI (German) 2010 (14.0.4763.1000)
  • Microsoft Office InfoPath MUI (Italian) 2010 (14.0.4763.1000)
  • Microsoft Office InfoPath MUI (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office InfoPath MUI (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office InfoPath MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
  • Microsoft Office InfoPath MUI (Russian) 2010 (14.0.4763.1000)
  • Microsoft Office InfoPath MUI (Spanish) 2010 (14.0.4763.1000)
  • Microsoft Office InfoPath MUI (Turkish) 2010 (14.0.4763.1013)
  • Microsoft Office Language Pack 2010 - French/Français (14.0.4763.1000)
  • Microsoft Office Language Pack 2010 - German/Deutsch (14.0.4763.1000)
  • Microsoft Office Language Pack 2010 - Italian/Italiano (14.0.4763.1000)
  • Microsoft Office Language Pack 2010 - Japanese/日本語 (14.0.4763.1000)
  • Microsoft Office Language Pack 2010 - Korean/한국어 (14.0.4763.1000)
  • Microsoft Office Language Pack 2010 - Portuguese/Português (Brasil) (14.0.4763.1000)
  • Microsoft Office Language Pack 2010 - Russian/русский (14.0.4763.1000)
  • Microsoft Office Language Pack 2010 - Spanish/Español (14.0.4763.1000)
  • Microsoft Office Language Pack 2010 - Turkish/Türkçe (14.0.4763.1013)
  • Microsoft Office O MUI (French) 2010 (14.0.4763.1000)
  • Microsoft Office O MUI (German) 2010 (14.0.4763.1000)
  • Microsoft Office O MUI (Italian) 2010 (14.0.4763.1000)
  • Microsoft Office O MUI (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office O MUI (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office O MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
  • Microsoft Office O MUI (Russian) 2010 (14.0.4763.1000)
  • Microsoft Office O MUI (Spanish) 2010 (14.0.4763.1000)
  • Microsoft Office O MUI (Turkish) 2010 (14.0.4763.1013)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (French) 2010 (14.0.4763.1000)
  • Microsoft Office OneNote MUI (German) 2010 (14.0.4763.1000)
  • Microsoft Office OneNote MUI (Italian) 2010 (14.0.4763.1000)
  • Microsoft Office OneNote MUI (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office OneNote MUI (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office OneNote MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
  • Microsoft Office OneNote MUI (Russian) 2010 (14.0.4763.1000)
  • Microsoft Office OneNote MUI (Spanish) 2010 (14.0.4763.1000)
  • Microsoft Office OneNote MUI (Turkish) 2010 (14.0.4763.1013)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (French) 2010 (14.0.4763.1000)
  • Microsoft Office Outlook MUI (German) 2010 (14.0.4763.1000)
  • Microsoft Office Outlook MUI (Italian) 2010 (14.0.4763.1000)
  • Microsoft Office Outlook MUI (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office Outlook MUI (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office Outlook MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
  • Microsoft Office Outlook MUI (Russian) 2010 (14.0.4763.1000)
  • Microsoft Office Outlook MUI (Spanish) 2010 (14.0.4763.1000)
  • Microsoft Office Outlook MUI (Turkish) 2010 (14.0.4763.1013)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (French) 2010 (14.0.4763.1000)
  • Microsoft Office PowerPoint MUI (German) 2010 (14.0.4763.1000)
  • Microsoft Office PowerPoint MUI (Italian) 2010 (14.0.4763.1000)
  • Microsoft Office PowerPoint MUI (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office PowerPoint MUI (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office PowerPoint MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
  • Microsoft Office PowerPoint MUI (Russian) 2010 (14.0.4763.1000)
  • Microsoft Office PowerPoint MUI (Spanish) 2010 (14.0.4763.1000)
  • Microsoft Office PowerPoint MUI (Turkish) 2010 (14.0.4763.1013)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Arabic) 2010 (14.0.4763.1000)
  • Microsoft Office Proof (Basque) 2010 (14.0.4763.1000)
  • Microsoft Office Proof (Catalan) 2010 (14.0.4763.1000)
  • Microsoft Office Proof (Dutch) 2010 (14.0.4763.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Galician) 2010 (14.0.4763.1000)
  • Microsoft Office Proof (German) 2010 (14.0.4763.1000)
  • Microsoft Office Proof (Italian) 2010 (14.0.4763.1000)
  • Microsoft Office Proof (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office Proof (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office Proof (Portuguese (Brazil)) 2010 (14.0.4763.1000)
  • Microsoft Office Proof (Russian) 2010 (14.0.4763.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Turkish) 2010 (14.0.4763.1013)
  • Microsoft Office Proof (Ukrainian) 2010 (14.0.4763.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (French) 2010 (14.0.4763.1000)
  • Microsoft Office Proofing (German) 2010 (14.0.4763.1000)
  • Microsoft Office Proofing (Italian) 2010 (14.0.4763.1000)
  • Microsoft Office Proofing (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office Proofing (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office Proofing (Portuguese (Brazil)) 2010 (14.0.4763.1000)
  • Microsoft Office Proofing (Russian) 2010 (14.0.4763.1000)
  • Microsoft Office Proofing (Spanish) 2010 (14.0.4763.1000)
  • Microsoft Office Proofing (Turkish) 2010 (14.0.4763.1013)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (French) 2010 (14.0.4763.1000)
  • Microsoft Office Publisher MUI (German) 2010 (14.0.4763.1000)
  • Microsoft Office Publisher MUI (Italian) 2010 (14.0.4763.1000)
  • Microsoft Office Publisher MUI (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office Publisher MUI (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office Publisher MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
  • Microsoft Office Publisher MUI (Russian) 2010 (14.0.4763.1000)
  • Microsoft Office Publisher MUI (Spanish) 2010 (14.0.4763.1000)
  • Microsoft Office Publisher MUI (Turkish) 2010 (14.0.4763.1013)
  • Microsoft Office SharePoint Designer MUI (French) 2010 (14.0.4763.1000)
  • Microsoft Office SharePoint Designer MUI (German) 2010 (14.0.4763.1000)
  • Microsoft Office SharePoint Designer MUI (Italian) 2010 (14.0.4763.1000)
  • Microsoft Office SharePoint Designer MUI (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office SharePoint Designer MUI (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office SharePoint Designer MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
  • Microsoft Office SharePoint Designer MUI (Russian) 2010 (14.0.4763.1000)
  • Microsoft Office SharePoint Designer MUI (Spanish) 2010 (14.0.4763.1000)
  • Microsoft Office SharePoint Designer MUI (Turkish) 2010 (14.0.4763.1013)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (French) 2010 (14.0.4763.1000)
  • Microsoft Office Shared MUI (German) 2010 (14.0.4763.1000)
  • Microsoft Office Shared MUI (Italian) 2010 (14.0.4763.1000)
  • Microsoft Office Shared MUI (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office Shared MUI (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office Shared MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
  • Microsoft Office Shared MUI (Russian) 2010 (14.0.4763.1000)
  • Microsoft Office Shared MUI (Spanish) 2010 (14.0.4763.1000)
  • Microsoft Office Shared MUI (Turkish) 2010 (14.0.4763.1013)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (French) 2010 (14.0.4763.1000)
  • Microsoft Office Word MUI (German) 2010 (14.0.4763.1000)
  • Microsoft Office Word MUI (Italian) 2010 (14.0.4763.1000)
  • Microsoft Office Word MUI (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office Word MUI (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office Word MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
  • Microsoft Office Word MUI (Russian) 2010 (14.0.4763.1000)
  • Microsoft Office Word MUI (Spanish) 2010 (14.0.4763.1000)
  • Microsoft Office Word MUI (Turkish) 2010 (14.0.4763.1013)
  • Microsoft Office X MUI (French) 2010 (14.0.4763.1000)
  • Microsoft Office X MUI (German) 2010 (14.0.4763.1000)
  • Microsoft Office X MUI (Italian) 2010 (14.0.4763.1000)
  • Microsoft Office X MUI (Japanese) 2010 (14.0.4763.1000)
  • Microsoft Office X MUI (Korean) 2010 (14.0.4763.1000)
  • Microsoft Office X MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000)
  • Microsoft Office X MUI (Russian) 2010 (14.0.4763.1000)
  • Microsoft Office X MUI (Spanish) 2010 (14.0.4763.1000)
  • Microsoft Office X MUI (Turkish) 2010 (14.0.4763.1013)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2015-2019 Redistributable (x86) - 14.21.27702 (14.21.27702.2)
  • Microsoft Visual C++ 2019 X86 Additional Runtime - 14.21.27702 (14.21.27702)
  • Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.21.27702 (14.21.27702)
  • Mozilla Firefox 68.0.1 (x86 en-US) (68.0.1)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • Update for Microsoft .NET Framework 4.7.2 (KB4087364) (1)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB4019990
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO
Writes to a start menu file
  • WScript.exe (PID: 2748)
  • wscript.exe (PID: 1724)
Changes the autorun value in the registry
  • WScript.exe (PID: 2748)
  • wscript.exe (PID: 1724)
Connects to CnC server
  • wscript.exe (PID: 1724)
Executes scripts
  • WScript.exe (PID: 2748)
  • WinRAR.exe (PID: 1792)
Creates files in the user directory
  • WScript.exe (PID: 2748)
Application launched itself
  • WScript.exe (PID: 2748)
Reads Internet Cache Settings
  • chrome.exe (PID: 392)
Application launched itself
  • chrome.exe (PID: 392)
Reads the hosts file
  • chrome.exe (PID: 392)
  • chrome.exe (PID: 792)

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Screenshots

Processes

Total processes
49
Monitored processes
14
Malicious processes
4
Suspicious processes
0

Behavior graph

+
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs winrar.exe no specs wscript.exe wscript.exe chrome.exe no specs chrome.exe no specs
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
392
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.dropbox.com/s/323sjwg7ntfga6i/Comparendo%20Electronico.001?dl=1"
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Version:
Company
Google LLC
Description
Google Chrome
Version
75.0.3770.100
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\netapi32.dll
c:\windows\system32\netutils.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\wkscli.dll
c:\windows\system32\samcli.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\uiautomationcore.dll
c:\windows\system32\psapi.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\hid.dll
c:\windows\system32\propsys.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\d3d11.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\credui.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\winusb.dll
c:\windows\system32\msi.dll
c:\windows\system32\wevtapi.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\mscms.dll
c:\windows\system32\winsta.dll
c:\windows\system32\wbem\wbemprox.dll
c:\windows\system32\wbemcomn.dll
c:\windows\system32\mmdevapi.dll
c:\windows\system32\wlanapi.dll
c:\windows\system32\wlanutil.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\wpc.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\samlib.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\wbem\wbemsvc.dll
c:\windows\system32\wbem\fastprox.dll
c:\windows\system32\ntdsapi.dll
c:\windows\system32\wbem\wmiutils.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\firewallapi.dll
c:\windows\system32\kbdus.dll
c:\windows\system32\explorerframe.dll
c:\windows\system32\duser.dll
c:\windows\system32\dui70.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\windowscodecs.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\linkinfo.dll
c:\windows\system32\wship6.dll
c:\windows\system32\ehstorshell.dll
c:\windows\system32\cscui.dll
c:\windows\system32\cscdll.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\slc.dll
c:\windows\system32\imageres.dll
c:\windows\system32\wbem\wmiperfinst.dll
c:\windows\system32\pdh.dll
c:\windows\system32\audioses.dll
c:\program files\winrar\winrar.exe
c:\windows\system32\mssprxy.dll
c:\windows\system32\msisip.dll
c:\windows\system32\wshext.dll
c:\windows\system32\windowspowershell\v1.0\pwrshsip.dll
c:\windows\system32\shdocvw.dll
c:\windows\system32\winshfhc.dll
c:\windows\system32\wdscore.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\sfc.dll
c:\windows\system32\sfc_os.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\mpr.dll

PID
532
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6ed2a9d0,0x6ed2a9e0,0x6ed2a9ec
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Google LLC
Description
Google Chrome
Version
75.0.3770.100
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll

PID
1552
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=1608 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Google LLC
Description
Google Chrome
Version
75.0.3770.100
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ole32.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_watcher.dll

PID
3764
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1016,17744392455102136858,12666847066767148071,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=12582519134854713924 --mojo-platform-channel-handle=968 --ignored=" --type=renderer " /prefetch:2
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
LOW
Version:
Company
Google LLC
Description
Google Chrome
Version
75.0.3770.100
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_child.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\uiautomationcore.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\mf.dll
c:\windows\system32\atl.dll
c:\windows\system32\mfplat.dll
c:\windows\system32\avrt.dll
c:\windows\system32\ksuser.dll
c:\windows\system32\msmpeg2vdec.dll
c:\windows\system32\evr.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\slc.dll
c:\windows\system32\sqmapi.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\dxva2.dll
c:\windows\system32\d3dcompiler_47.dll
c:\windows\system32\ddraw.dll
c:\windows\system32\dciman32.dll
c:\program files\google\chrome\application\75.0.3770.100\swiftshader\libglesv2.dll
c:\program files\google\chrome\application\75.0.3770.100\swiftshader\libegl.dll

PID
792
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1016,17744392455102136858,12666847066767148071,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=2819883647704301678 --mojo-platform-channel-handle=1568 /prefetch:8
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
Parent process
chrome.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Google LLC
Description
Google Chrome
Version
75.0.3770.100
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_child.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\uiautomationcore.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\wship6.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\p2pcollab.dll
c:\windows\system32\qagentrt.dll
c:\windows\system32\fveui.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\cryptnet.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\credssp.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\devobj.dll
c:\windows\system32\cabinet.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\ntmarta.dll

PID
272
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1016,17744392455102136858,12666847066767148071,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=2138871158375752936 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2228 /prefetch:1
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
LOW
Version:
Company
Google LLC
Description
Google Chrome
Version
75.0.3770.100
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_child.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\uiautomationcore.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll

PID
2128
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1016,17744392455102136858,12666847066767148071,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=10433032763224249232 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2200 /prefetch:1
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
LOW
Version:
Company
Google LLC
Description
Google Chrome
Version
75.0.3770.100
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_child.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\uiautomationcore.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll

PID
2932
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1016,17744392455102136858,12666847066767148071,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=13569727469718242969 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2460 /prefetch:1
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
LOW
Exit code
0
Version:
Company
Google LLC
Description
Google Chrome
Version
75.0.3770.100
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_child.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\uiautomationcore.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll

PID
1544
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1016,17744392455102136858,12666847066767148071,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=12253073012249432669 --mojo-platform-channel-handle=3360 /prefetch:2
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Google LLC
Description
Google Chrome
Version
75.0.3770.100
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_child.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\uiautomationcore.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\mf.dll
c:\windows\system32\atl.dll
c:\windows\system32\mfplat.dll
c:\windows\system32\avrt.dll
c:\windows\system32\ksuser.dll
c:\windows\system32\msmpeg2vdec.dll
c:\windows\system32\evr.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\slc.dll
c:\windows\system32\sqmapi.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\dxva2.dll

PID
1792
CMD
"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\Comparendo Electronico.001"
Path
C:\Program Files\WinRAR\WinRAR.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Alexander Roshal
Description
WinRAR archiver
Version
5.60.0
Modules
Image
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\shlwapi.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\shell32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\uxtheme.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\riched20.dll
c:\program files\common files\microsoft shared\ink\tiptsf.dll
c:\windows\system32\windowscodecs.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ehstorshell.dll
c:\windows\system32\cscui.dll
c:\windows\system32\cscdll.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\slc.dll
c:\windows\system32\imageres.dll
c:\windows\system32\mpr.dll
c:\windows\system32\drprov.dll
c:\windows\system32\winsta.dll
c:\windows\system32\ntlanman.dll
c:\windows\system32\davclnt.dll
c:\windows\system32\davhlpr.dll
c:\windows\system32\wkscli.dll
c:\windows\system32\netutils.dll
c:\windows\system32\wpdshext.dll
c:\windows\system32\winmm.dll
c:\windows\system32\portabledeviceapi.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\audiodev.dll
c:\windows\system32\wmvcore.dll
c:\windows\system32\wmasf.dll
c:\windows\system32\ehstorapi.dll
c:\windows\system32\shdocvw.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\samcli.dll
c:\windows\system32\samlib.dll
c:\windows\system32\profapi.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\wshext.dll
c:\windows\system32\wscript.exe
c:\windows\system32\explorerframe.dll
c:\windows\system32\duser.dll
c:\windows\system32\dui70.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll

PID
2748
CMD
"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIa1792.33945\Foto Multa.vbs"
Path
C:\Windows\System32\WScript.exe
Indicators
Parent process
WinRAR.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Microsoft Corporation
Description
Microsoft ® Windows Based Script Host
Version
5.8.7600.16385
Modules
Image
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\version.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\sxs.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\vbscript.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\msisip.dll
c:\windows\system32\wshext.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\scrobj.dll
c:\windows\system32\mlang.dll
c:\windows\system32\wshom.ocx
c:\windows\system32\mpr.dll
c:\windows\system32\scrrun.dll
c:\windows\system32\msxml3.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\profapi.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\sspicli.dll

PID
1724
CMD
"C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Local\Temp\Foto Multa.vbs"
Path
C:\Windows\System32\wscript.exe
Indicators
Parent process
WScript.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Microsoft Corporation
Description
Microsoft ® Windows Based Script Host
Version
5.8.7600.16385
Modules
Image
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\version.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\sxs.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\vbscript.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\msisip.dll
c:\windows\system32\wshext.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\scrobj.dll
c:\windows\system32\mlang.dll
c:\windows\system32\wshom.ocx
c:\windows\system32\mpr.dll
c:\windows\system32\scrrun.dll
c:\windows\system32\msxml3.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\profapi.dll
c:\windows\system32\wbem\wbemdisp.dll
c:\windows\system32\wbemcomn.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\wbem\wbemprox.dll
c:\windows\system32\wbem\wmiutils.dll
c:\windows\system32\wbem\wbemsvc.dll
c:\windows\system32\wbem\fastprox.dll
c:\windows\system32\ntdsapi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\napinsp.dll
c:\windows\system32\pnrpnsp.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\winrnr.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\wship6.dll

PID
1328
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1016,17744392455102136858,12666847066767148071,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=7665328842479812689 --mojo-platform-channel-handle=932 /prefetch:8
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Google LLC
Description
Google Chrome
Version
75.0.3770.100
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_child.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\uiautomationcore.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\comdlg32.dll
c:\windows\system32\dbghelp.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\linkinfo.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shdocvw.dll
c:\windows\system32\twext.dll
c:\windows\system32\cscui.dll
c:\windows\system32\cscdll.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\sendmail.dll
c:\windows\system32\zipfldr.dll
c:\windows\system32\fxsresm.dll
c:\program files\winrar\rarext.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\windowscodecs.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\slc.dll
c:\windows\system32\syncui.dll
c:\windows\system32\synceng.dll
c:\program files\notepad++\nppshell_06.dll
c:\windows\system32\acppage.dll
c:\windows\system32\sfc.dll
c:\windows\system32\sfc_os.dll
c:\windows\system32\msi.dll
c:\windows\system32\wer.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\netutils.dll

PID
184
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1016,17744392455102136858,12666847066767148071,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=17211870277742970979 --mojo-platform-channel-handle=2872 --ignored=" --type=renderer " /prefetch:8
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
LOW
Exit code
0
Version:
Company
Google LLC
Description
Google Chrome
Version
75.0.3770.100
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_child.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\uiautomationcore.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll

Registry activity

Total events
1975
Read events
1524
Write events
450
Delete events
1

Modification events

PID
Process
Operation
Key
Name
Value
392
chrome.exe
delete key
HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
failed_count
0
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
2
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
01000000
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
1
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
dr
1
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome
UsageStatsInSample
0
392
chrome.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
usagestats
0
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
metricsid
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
metricsid_installdate
0
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
metricsid_enableddate
0
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
0
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
lastrun
13217700400306125
392
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
LanguageList
en-US
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
1C00000001000000E3070B00050008000F001B000900D50200000000
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
1C00000001000000E3070B00050008000F001B000900DA0200000000
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Common\Rlz\PTimes
C
444BC7204996D501
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Common\Rlz\RLZs
C1
1C1GCEA_enUA812UA812
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Common\Rlz\RLZs
C2
1C2GCEA_enUA812
392
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Common\Rlz\RLZs
C7
1C7GCEA_enUA812
1552
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
392-13217700398524875
259
792
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
LanguageList
en-US
792
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
@%SystemRoot%\system32\p2pcollab.dll,-8042
Peer to Peer Trust
792
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
@%SystemRoot%\system32\qagentrt.dll,-10
System Health Authentication
792
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
Domain Name System (DNS) Server Trust
792
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
BitLocker Drive Encryption
792
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
BitLocker Data Recovery Agent
1792
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
ShellExtBMP
1792
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
ShellExtIcon
1792
WinRAR.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
LanguageList
en-US
1792
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
0
C:\Users\admin\Downloads\Comparendo Electronico.001
1792
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
name
120
1792
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
size
80
1792
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
type
120
1792
WinRAR.exe
write
HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
mtime
100
1792
WinRAR.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
@C:\Windows\System32\wshext.dll,-4802
VBScript Script File
1792
WinRAR.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
1792
WinRAR.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
2748
WScript.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Foto Multa
false - 11/8/2019
2748
WScript.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Foto Multa
wscript.exe //B "C:\Users\admin\AppData\Local\Temp\Foto Multa.vbs"
2748
WScript.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Foto Multa
wscript.exe //B "C:\Users\admin\AppData\Local\Temp\Foto Multa.vbs"
2748
WScript.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
2748
WScript.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
1724
wscript.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Foto Multa
wscript.exe //B "C:\Users\admin\AppData\Local\Temp\Foto Multa.vbs"
1724
wscript.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Foto Multa
wscript.exe //B "C:\Users\admin\AppData\Local\Temp\Foto Multa.vbs"
1724
wscript.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32
EnableFileTracing
0
1724
wscript.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32
EnableConsoleTracing
0
1724
wscript.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32
FileTracingMask
4294901760
1724
wscript.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32
ConsoleTracingMask
4294901760
1724
wscript.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32
MaxFileSize
1048576
1724
wscript.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32
FileDirectory
%windir%\tracing
1724
wscript.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASMANCS
EnableFileTracing
0
1724
wscript.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASMANCS
EnableConsoleTracing
0
1724
wscript.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASMANCS
FileTracingMask
4294901760
1724
wscript.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASMANCS
ConsoleTracingMask
4294901760
1724
wscript.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASMANCS
MaxFileSize
1048576
1724
wscript.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASMANCS
FileDirectory
%windir%\tracing
1724
wscript.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
1724
wscript.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
1724
wscript.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
1724
wscript.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
1328
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
LanguageList
en-US
1328
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
@sendmail.dll,-21
Desktop (create shortcut)
1328
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
@zipfldr.dll,-10148
Compressed (zipped) folder
1328
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
@sendmail.dll,-4
Mail recipient
1328
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
@C:\Windows\system32\FXSRESM.dll,-120
Fax recipient

Files activity

Executable files
0
Suspicious files
14
Text files
74
Unknown types
2

Dropped files

PID
Process
Filename
Type
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State~RF3afc57.TMP
text
MD5: 3151f4ff681d57fc95a4baa9d33cf21a
SHA256: 4b07b0323198c5fca2d15aaf2d931f80e4415cc84176a0434e78b14fe375a17a
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\feb3b510-24b2-4c5c-a965-c5704b30bc1d.tmp
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\da38a28b-4534-4e06-8505-0226778a55cd.tmp
––
MD5:  ––
SHA256:  ––
792
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Network Persistent State
text
MD5: 81b04021476057ab4b62a5d282472f13
SHA256: e9fd083d3b5efc52adb23f21f82e31fa97dd220ca60d5e385b9daeaef69da1f8
792
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Network Persistent State~RF3ace81.TMP
text
MD5: 81b04021476057ab4b62a5d282472f13
SHA256: e9fd083d3b5efc52adb23f21f82e31fa97dd220ca60d5e385b9daeaef69da1f8
792
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\f637d061-98ce-472b-859e-fde5d8516bee.tmp
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State
text
MD5: 3151f4ff681d57fc95a4baa9d33cf21a
SHA256: 4b07b0323198c5fca2d15aaf2d931f80e4415cc84176a0434e78b14fe375a17a
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State~RF3abdf6.TMP
text
MD5: 3151f4ff681d57fc95a4baa9d33cf21a
SHA256: 4b07b0323198c5fca2d15aaf2d931f80e4415cc84176a0434e78b14fe375a17a
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\f8ab07e8-d4af-4579-ac6d-13805b833796.tmp
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
text
MD5: 9cd98d73a8af62fd6fee9cbc47edc97c
SHA256: 82289eac89c53a5d55391d74d055820b2192ea6ff3cc048aa54db3672bf1f2bb
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences~RF3abbb4.TMP
text
MD5: 9cd98d73a8af62fd6fee9cbc47edc97c
SHA256: 82289eac89c53a5d55391d74d055820b2192ea6ff3cc048aa54db3672bf1f2bb
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\6cdde5c5-af5d-456d-87dc-86803d651267.tmp
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State~RF3a6d94.TMP
text
MD5: d5647210f3f11050fd01784fcf500dfd
SHA256: 12378189c0023b74621b7b9180bd2e29974010d6821424e4cd27b060bb905a46
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State
text
MD5: d5647210f3f11050fd01784fcf500dfd
SHA256: 12378189c0023b74621b7b9180bd2e29974010d6821424e4cd27b060bb905a46
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\50702125-becb-4477-ad45-e625f9709c5b.tmp
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
text
MD5: 66408e3761267d0433aef03b29484618
SHA256: f284228ed21a0846579f8aef17d369d625442a401910fa6cf235249aa17c91c3
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences~RF3a4626.TMP
text
MD5: 66408e3761267d0433aef03b29484618
SHA256: f284228ed21a0846579f8aef17d369d625442a401910fa6cf235249aa17c91c3
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\18d05288-1d99-4842-beb1-b0ae86fd3461.tmp
––
MD5:  ––
SHA256:  ––
1724
wscript.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Foto Multa.vbs
text
MD5: ac115b8c928026178739bf4473f979ff
SHA256: b31f277ec2fada7eb0533237e9b21eabfbc0f0f134c6ed87b5e3084767da3b05
2748
WScript.exe
C:\Users\admin\AppData\Local\Temp\Foto Multa.vbs
text
MD5: ac115b8c928026178739bf4473f979ff
SHA256: b31f277ec2fada7eb0533237e9b21eabfbc0f0f134c6ed87b5e3084767da3b05
2748
WScript.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Foto Multa.vbs
text
MD5: ac115b8c928026178739bf4473f979ff
SHA256: b31f277ec2fada7eb0533237e9b21eabfbc0f0f134c6ed87b5e3084767da3b05
1792
WinRAR.exe
C:\Users\admin\AppData\Local\Temp\Rar$DIa1792.33945\Foto Multa.vbs
text
MD5: ac115b8c928026178739bf4473f979ff
SHA256: b31f277ec2fada7eb0533237e9b21eabfbc0f0f134c6ed87b5e3084767da3b05
792
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\TransportSecurity
text
MD5: 8e678c98bf95b0561783509d9ec1c397
SHA256: 88cd0c207e8388cffaac81cf1a378f28c2ae5e28c11e9865f58b5768576122ff
792
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\TransportSecurity~RF3a3260.TMP
text
MD5: 8e678c98bf95b0561783509d9ec1c397
SHA256: 88cd0c207e8388cffaac81cf1a378f28c2ae5e28c11e9865f58b5768576122ff
792
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\da97ef41-4958-4f76-a9e9-f69523af5a21.tmp
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\DownloadMetadata
binary
MD5: 264637486094bcc3d413597e90eb4dd9
SHA256: 9a9f8dffe9cd79b9c6797ecb535f3ddf604825af9d318a5ae276a471f483e1e5
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\5be73dc7-b28f-4548-917d-51034daad34e.tmp
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\Downloads\Comparendo Electronico.001:Zone.Identifier
text
MD5: fbccf14d504b7b2dbcb5a5bda75bd93b
SHA256: eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
392
chrome.exe
C:\Users\admin\Downloads\Comparendo Electronico.001
compressed
MD5: 6d66fca22c2fbf30a558445d6c17a64d
SHA256: 28d5a3c5b3b62365774e7370df7362107b7deec73ac81a472dd319321d0d7c71
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State
text
MD5: fd2eef08273af58e6d9bf724e137e922
SHA256: 7335118e643e333b595a30b1ee952f2192f5f9cf801fb93240d31668e9c52cd5
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State~RF3a0ecb.TMP
text
MD5: fd2eef08273af58e6d9bf724e137e922
SHA256: 7335118e643e333b595a30b1ee952f2192f5f9cf801fb93240d31668e9c52cd5
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\9a443b58-6d30-4c69-a7ad-8f878901c04c.tmp
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\Downloads\Unconfirmed 650181.crdownload
compressed
MD5: 6d66fca22c2fbf30a558445d6c17a64d
SHA256: 28d5a3c5b3b62365774e7370df7362107b7deec73ac81a472dd319321d0d7c71
392
chrome.exe
C:\Users\admin\Downloads\42a1e5dc-b320-4cdf-9be8-d8d272f4edb3.tmp
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\CURRENT
text
MD5: 206702161f94c5cd39fadd03f4014d98
SHA256: 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\CURRENT~RF3a0015.TMP
text
MD5: 206702161f94c5cd39fadd03f4014d98
SHA256: 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\000002.dbtmp
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\000001.dbtmp
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\MANIFEST-000001
––
MD5:  ––
SHA256:  ––
792
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\TransportSecurity
text
MD5: 558e825b71c58b2119fa3883347b3b26
SHA256: 67e350df72c74a1736fef76162c3e4a5d1e58056ee8c87d8c69e46fb8070958c
792
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\TransportSecurity~RF39d4b0.TMP
text
MD5: 558e825b71c58b2119fa3883347b3b26
SHA256: 67e350df72c74a1736fef76162c3e4a5d1e58056ee8c87d8c69e46fb8070958c
792
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\a7b0a379-a21c-47a0-9b96-9a74b22220c4.tmp
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
text
MD5: c376c642365549c3e51c00f9cd0d1327
SHA256: d9cafbc2d8ba2054663d34349ef26b7bbdd36f1dfcdae8fbfb6148702a281fbb
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences~RF39d0b8.TMP
text
MD5: c376c642365549c3e51c00f9cd0d1327
SHA256: d9cafbc2d8ba2054663d34349ef26b7bbdd36f1dfcdae8fbfb6148702a281fbb
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics-spare.pma
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State~RF39cfae.TMP
text
MD5: 76d66aa26b59109fd01432474cefe90d
SHA256: eed40f2dbcba63c0be7d417b0bceba1759240dd39c9298e22be29b7ccdf72a3f
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State
text
MD5: 76d66aa26b59109fd01432474cefe90d
SHA256: eed40f2dbcba63c0be7d417b0bceba1759240dd39c9298e22be29b7ccdf72a3f
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\0c46d88b-1a88-476d-a2ed-f34c436e34a9.tmp
––
MD5:  ––
SHA256:  ––
792
chrome.exe
C:\Users\admin\AppData\Local\Temp\TarBCE3.tmp
––
MD5:  ––
SHA256:  ––
792
chrome.exe
C:\Users\admin\AppData\Local\Temp\CabBCE2.tmp
––
MD5:  ––
SHA256:  ––
792
chrome.exe
C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5887976EDAA817EEF5159B09F6FCD000_412A4FF40FF4AD12304C9961A39A02BE
binary
MD5: 03608c27215d7633d87d3d86a976aad5
SHA256: 50f5bd669f44dadf3ba24ebcb5060e3a2111af73301812fd5e6a29bf754f44b1
792
chrome.exe
C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5887976EDAA817EEF5159B09F6FCD000_412A4FF40FF4AD12304C9961A39A02BE
der
MD5: 5dd737dd230e244e5531db1391e19f1c
SHA256: 004f9562132e03d95149a9840a5d1656469f0a2d3035c88d6e28c170745814e1
792
chrome.exe
C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
binary
MD5: 196eb80b6511703e226ce7be02edecbc
SHA256: b5fc1239f27fa8c67b46d897f3030533ede7f29b036f9529708617dbb3ae7bdd
792
chrome.exe
C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
der
MD5: 719c4f0e234d9792bcff85dad1c82e7e
SHA256: 775810fa77d106fd78f3b01b71401824af9fd63f64cf0f95d1453f06723f969e
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG.old
text
MD5: 97aa7678fb9d338d08c371711b54a104
SHA256: 4657635b66fa68ae1550b7bff4e54016f8874b4df43a004c9a7244c8465c6ca8
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Last Session
binary
MD5: 92eb31d830454841999ecdb4a714d301
SHA256: 63f01870e03b0329f3ae859435ef5610661a45085390af36275ae7d6808c8ffb
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\pkedcjkdefgpdelpbcmbmeomcjbeemfm\LOG.old
text
MD5: 1276f7de036cb69ffbc104fa79f1d060
SHA256: 3044aa641bd2fed097ee25a5ad052d276eea8ec75a807a244102d75af9ac94f1
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\pkedcjkdefgpdelpbcmbmeomcjbeemfm\LOG.old~RF39b10b.TMP
text
MD5: 1276f7de036cb69ffbc104fa79f1d060
SHA256: 3044aa641bd2fed097ee25a5ad052d276eea8ec75a807a244102d75af9ac94f1
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old
text
MD5: 370df9c4af340d044e2946d87d515fd8
SHA256: f4761a6412fee517fddf04004ddcb13b935994fba8550318534705c979a29343
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old~RF39b0ad.TMP
text
MD5: 370df9c4af340d044e2946d87d515fd8
SHA256: f4761a6412fee517fddf04004ddcb13b935994fba8550318534705c979a29343
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1
binary
MD5: f50f89a0a91564d0b8a211f8921aa7de
SHA256: b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1
binary
MD5: f50f89a0a91564d0b8a211f8921aa7de
SHA256: b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG
text
MD5: d5f278a600df1d36bdd599a8206bb782
SHA256: e5117f5116d03d3a7d27931b25774a025cee6700cef12691c54ff66a1e96ebdd
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\000003.log
binary
MD5: 891a884b9fa2bff4519f5f56d2a25d62
SHA256: e2610960c3757d1757f206c7b84378efa22d86dcf161a98096a5f0e56e1a367e
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG.old
text
MD5: 722d616be0caaf9ed585c9aea7f3742c
SHA256: f86c514fa380332be463670b3b334c8feedc2f6cb9b4118ea367729b056de0fb
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\LOG.old
text
MD5: 911b244e4a362b56f2478647d2d61a40
SHA256: 3a5aec1ea537d8841e604d0aa4cd5f9241c805a3d4eb4e372cfb7eeb3678a361
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.old
text
MD5: 0acecca4cf9ade756da7cc9dcdf02d50
SHA256: 18f910775132b4fee014ea0fab836d857f367e76232fab4ae6a86a92e4c3ebee
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT~RF39ab00.TMP
text
MD5: a874f3e3462932a0c15ed8f780124fc5
SHA256: 01bd196d6a114691ec642082ebf6591765c0168d4098a0cd834869bd11c8b87d
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old
text
MD5: 454106ccf080f3e3795c229fc73350d4
SHA256: 9974dc611be9e20bdfa7b8d939cb913ad23859dea5f52ebb8d10cead9ab5b4fa
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT
text
MD5: a874f3e3462932a0c15ed8f780124fc5
SHA256: 01bd196d6a114691ec642082ebf6591765c0168d4098a0cd834869bd11c8b87d
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old~RF39ab00.TMP
text
MD5: 454106ccf080f3e3795c229fc73350d4
SHA256: 9974dc611be9e20bdfa7b8d939cb913ad23859dea5f52ebb8d10cead9ab5b4fa
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000020.dbtmp
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old
text
MD5: 3d551b6e929cf62f7aa66091e718704b
SHA256: 1698a1b1bc3e86676392fb8bd4c712438302a5a2220503c08f290ed4b1790404
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old~RF39aac1.TMP
text
MD5: 3d551b6e929cf62f7aa66091e718704b
SHA256: 1698a1b1bc3e86676392fb8bd4c712438302a5a2220503c08f290ed4b1790404
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\84c5227a-baba-45b6-9007-9378181cf8cc.tmp
––
MD5:  ––
SHA256:  ––
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Last Tabs
binary
MD5: 0686d6159557e1162d04c44240103333
SHA256: 3303d5eed881951b0bb52cf1c6bfa758770034d0120c197f9f7a3520b92a86fb
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old
text
MD5: a519780ed0a2f4336db4f5651d79c369
SHA256: da5b71bd0075b55757bf757bf5f4d4a1dcbcf0762cda5b31b28680963e068c75
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old~RF39aaa2.TMP
text
MD5: a519780ed0a2f4336db4f5651d79c369
SHA256: da5b71bd0075b55757bf757bf5f4d4a1dcbcf0762cda5b31b28680963e068c75
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old
text
MD5: 213ae3da120d7862d60b5763b6c9d466
SHA256: 5736534d6ee654c1bf1a8e79e73330af58f622e8657285330d2c7189a55604f4
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF39aa44.TMP
text
MD5: 213ae3da120d7862d60b5763b6c9d466
SHA256: 5736534d6ee654c1bf1a8e79e73330af58f622e8657285330d2c7189a55604f4
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old
text
MD5: c4d6cbb269c626168a5d6d0d8cce6c30
SHA256: b62cdbb758278a0c2e50593357390119441d8de09428eb29027f3dfd1332e348
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF39a9f6.TMP
text
MD5: dc32343f45b01764b6267ad36548102a
SHA256: a250f5ad57d4bd58aae92810d50278e3be2dbf869f126a3a3519691bcdfc2075
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF39a9f6.TMP
text
MD5: c4d6cbb269c626168a5d6d0d8cce6c30
SHA256: b62cdbb758278a0c2e50593357390119441d8de09428eb29027f3dfd1332e348
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old
text
MD5: dc32343f45b01764b6267ad36548102a
SHA256: a250f5ad57d4bd58aae92810d50278e3be2dbf869f126a3a3519691bcdfc2075
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Version
text
MD5: 1a89a1bebe6c843c4ff582e7ed33ca1f
SHA256: 65099ca087b66aa8ca420ab121daad713e1db5a61c5a574d9b1c0df24f012520
532
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma
binary
MD5: b59113c2dcd2d346f31a64f231162ada
SHA256: 1d97c69aea85d3b06787458ea47576b192ce5c5db9940e5eaa514ff977ce2dc2
392
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
binary
MD5: 9c016064a1f864c8140915d77cf3389a
SHA256: 0e7265d4a8c16223538edd8cd620b8820611c74538e420a88e333be7f62ac787

Find more information of the staic content and download it at the full report

Network activity

HTTP(S) requests
177
TCP/UDP connections
190
DNS requests
12
Threats
175

HTTP requests

PID Process Method HTTP Code IP URL CN Type Size Reputation
792 chrome.exe GET 200 93.184.220.29:80 http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D US
der
whitelisted
792 chrome.exe GET 200 93.184.220.29:80 http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRJ9L2KGL92BpjF3kAtaDtxauTmhgQUPdNQpdagre7zSmAKZdMh1Pj41g8CEAU5fm3dSuY9dJCdoTinHgw%3D US
der
whitelisted
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious
1724 wscript.exe POST –– 192.169.69.25:9080 http://corporacionwindo8.duckdns.org:9080/is-ready US
text
––
––
malicious

Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID Process IP ASN CN Reputation
792 chrome.exe 172.217.18.99:443 Google Inc. US whitelisted
792 chrome.exe 162.125.66.1:443 Dropbox, Inc. DE shared
792 chrome.exe 216.58.207.77:443 Google Inc. US whitelisted
792 chrome.exe 93.184.220.29:80 MCI Communications Services, Inc. d/b/a Verizon Business US whitelisted
792 chrome.exe 172.217.18.100:443 Google Inc. US whitelisted
792 chrome.exe 162.125.66.6:443 Dropbox, Inc. DE shared
792 chrome.exe 172.217.16.131:443 Google Inc. US whitelisted
792 chrome.exe 216.58.207.46:443 Google Inc. US whitelisted
1724 wscript.exe 192.169.69.25:9080 Wowrack.com US malicious
–– –– 192.169.69.25:9080 Wowrack.com US malicious
792 chrome.exe 216.58.207.35:443 Google Inc. US whitelisted
792 chrome.exe 216.58.210.14:443 Google Inc. US whitelisted

DNS requests

Domain IP Reputation
www.dropbox.com 162.125.66.1
shared
clientservices.googleapis.com 172.217.18.99
whitelisted
accounts.google.com 216.58.207.77
shared
ocsp.digicert.com 93.184.220.29
whitelisted
www.google.com 172.217.18.100
whitelisted
ucd73628be16ca31b4832d0791a1.dl.dropboxusercontent.com 162.125.66.6
unknown
ssl.gstatic.com 172.217.16.131
whitelisted
sb-ssl.google.com 216.58.207.46
whitelisted
corporacionwindo8.duckdns.org 192.169.69.25
malicious
www.gstatic.com 216.58.207.35
whitelisted
clients1.google.com 216.58.210.14
whitelisted

Threats

PID Process Class Message
–– –– Misc activity ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin
1724 wscript.exe A Network Trojan was detected ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin 1
1724 wscript.exe A Network Trojan was detected AV TROJAN Worm Dunihi CnC Checkin

Debug output strings

No debug info.