Edit tour
Windows
Analysis Report
563299efce875400a8d9b44b96597c8e-sample (1).zip
Overview
General Information
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Submitted sample is a known malware sample
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Drops PE files with a suspicious file extension
Drops executables to the windows directory (C:\Windows) and starts them
Queries Google from non browser process on port 80
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses cmd line tools excessively to alter registry or file data
Writes many files with high entropy
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Launches processes in debugging mode, may be used to hinder debugging
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Potential browser exploit detected (process start blacklist hit)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Common Autorun Keys Modification
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sigma detected: Suspicious Screensaver Binary File Creation
Sigma detected: Use Short Name Path in Command Line
Sleep loop found (likely to delay execution)
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Too many similar processes found
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64_ra
- rundll32.exe (PID: 6652 cmdline:
C:\Windows \System32\ rundll32.e xe C:\Wind ows\System 32\shell32 .dll,SHCre ateLocalSe rverRunDll {9aa46009 -3ce0-458a -a354-7156 10a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
- 1a4e5ccd35a56d84281a143f831563be.exe (PID: 6472 cmdline:
"C:\Users\ user\Deskt op\1a4e5cc d35a56d842 81a143f831 563be.exe" MD5: 1A4E5CCD35A56D84281A143F831563BE)
- 1a4e5ccd35a56d84281a143f831563be.exe (PID: 7100 cmdline:
"C:\Users\ user\Deskt op\1a4e5cc d35a56d842 81a143f831 563be.exe" MD5: 1A4E5CCD35A56D84281A143F831563BE) - setuppicasa39-setup.exe (PID: 6028 cmdline:
setuppicas a39-setup. exe MD5: 3DF3D3C125D3BB1A5BD55E88F9E48920) - GPhotos.scr (PID: 5508 cmdline:
"C:\Window s\system32 \GPhotos.s cr" /c /in stallcheck MD5: 404C6C3C3A59784456DA52660F86C52B) - Picasa3.exe (PID: 3668 cmdline:
"C:\Progra m Files (x 86)\Google \Picasa3\P icasa3.exe " /registe r MD5: 6AD50A491F52B1CBECE23B603037FBDF) - listicka.exe (PID: 4416 cmdline:
listicka.e xe /S MD5: B29BFD8EE3A426894B4CA3753E5B62A8) - sznsetup-lt.exe (PID: 2412 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \sznsetup- lt.exe" -T "C:\Users \user\AppD ata\Roamin g\Seznam.c z" -R "$\i nstall" ht tp://downl oad.seznam .cz/update MD5: 9033DBEE427815F396F63928C3273862) - conhost.exe (PID: 2932 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sznsetup-lt.exe (PID: 7028 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \sznsetup- lt.exe" -T "C:\Users \user\AppD ata\Roamin g\Seznam.c z" -i cz.s eznam.soft ware.sznin stall MD5: 9033DBEE427815F396F63928C3273862) - conhost.exe (PID: 5744 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - UNZIP.EXE (PID: 6816 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~0069FB 97.00001B7 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A 18C4.00001 B74.sznpkg -o C:\Use rs\user\Ap pData\Loca l\Temp\~00 69FB97.000 01B74.sznp kg\downloa d\cz.sezna m.software .sznsetup- 1.2.7-win3 2.zip MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - cmd.exe (PID: 1108 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - UNZIP.EXE (PID: 5988 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~0069FB 97.00001B7 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A 1AF6.00001 B74.sznpkg -o C:\Use rs\user\Ap pData\Loca l\Temp\~00 69FB97.000 01B74.sznp kg\downloa d\cz.sezna m.software .szninstal l-1.1.15-w in32.zip MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - cmd.exe (PID: 6416 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - REG.EXE (PID: 2576 cmdline:
REG DELETE "HKCU\Sof tware\Micr osoft\Wind ows\Curren tVersion\U ninstall\S eznamInsta ll" /f /va MD5: F0C0D05727A4E1E91F4347C2270500AA) - REG.EXE (PID: 3224 cmdline:
REG ADD "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\Unin stall\Sezn amInstall" /f MD5: F0C0D05727A4E1E91F4347C2270500AA) - REG.EXE (PID: 4796 cmdline:
REG ADD "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\Unin stall\Sezn amInstall" /f /v "In stallLocat ion" /d C: \Users\use r\AppData\ Roaming\Se znam.cz MD5: F0C0D05727A4E1E91F4347C2270500AA) - REG.EXE (PID: 2980 cmdline:
REG ADD "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\Unin stall\Sezn amInstall" /f /v "Di splayName" /d "Sezna m Software " MD5: F0C0D05727A4E1E91F4347C2270500AA) - REG.EXE (PID: 5428 cmdline:
REG ADD "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\Unin stall\Sezn amInstall" /f /v "Di splayIcon" /d "C:\Us ers\user\A ppData\Roa ming\Sezna m.cz\sznin stall.exe, 0" MD5: F0C0D05727A4E1E91F4347C2270500AA) - REG.EXE (PID: 5920 cmdline:
REG ADD "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\Unin stall\Sezn amInstall" /f /v "Un installStr ing" /d "\ "C:\Users\ user\AppDa ta\Roaming \Seznam.cz \szninstal l.exe\" -X " MD5: F0C0D05727A4E1E91F4347C2270500AA) - REG.EXE (PID: 3688 cmdline:
REG ADD "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\Unin stall\Sezn amInstall" /f /v "Mo difyPath" /d "C:\Use rs\user\Ap pData\Roam ing\Seznam .cz\sznins tall.exe" MD5: F0C0D05727A4E1E91F4347C2270500AA) - REG.EXE (PID: 2604 cmdline:
REG ADD "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\Unin stall\Sezn amInstall" /f /v "Pu blisher" / d "Seznam. cz" MD5: F0C0D05727A4E1E91F4347C2270500AA) - REG.EXE (PID: 4372 cmdline:
REG ADD "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\Unin stall\Sezn amInstall" /f /v "UR LInfoAbout " /d "http ://softwar e.seznam.c z" MD5: F0C0D05727A4E1E91F4347C2270500AA) - REG.EXE (PID: 4796 cmdline:
REG ADD "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\Unin stall\Sezn amInstall" /f /v "He lpLink" /d "http://n apoveda.se znam.cz/cz /software. html" MD5: F0C0D05727A4E1E91F4347C2270500AA) - REG.EXE (PID: 3408 cmdline:
REG ADD "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\Unin stall\Sezn amInstall" /f /v "Co mments" /d "Vsechny aplikace s polecnosti Seznam.cz a.s." MD5: F0C0D05727A4E1E91F4347C2270500AA) - REG.EXE (PID: 6044 cmdline:
REG ADD "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\Unin stall\Sezn amInstall" /f /v "No Repair" /t REG_DWORD /d 1 MD5: F0C0D05727A4E1E91F4347C2270500AA) - REG.EXE (PID: 4112 cmdline:
REG ADD "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\Unin stall\Sezn amInstall" /f /v "No Modify" /t REG_DWORD /d 0 MD5: F0C0D05727A4E1E91F4347C2270500AA) - szninstall.exe (PID: 5736 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \szninstal l.exe" -s -u -i cz.s eznam.soft ware.autou pdate szn- software-l isticka MD5: C73E94B86ED9B6BDFF199BB7E8BF9D77) - sznsetup.exe (PID: 3940 cmdline:
C:\Users\u ser\AppDat a\Roaming\ Seznam.cz\ sznsetup.e xe -V MD5: D0F5D99C74D568EB9909C7582A775DC7) - conhost.exe (PID: 4132 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sznsetup.exe (PID: 3540 cmdline:
C:\Users\u ser\AppDat a\Roaming\ Seznam.cz\ sznsetup.e xe -T C:\U sers\user\ AppData\Ro aming\Sezn am.cz -i - u cz.sezna m.software .autoupdat e szn-soft ware-listi cka -p MD5: D0F5D99C74D568EB9909C7582A775DC7) - conhost.exe (PID: 5232 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - UNZIP.EXE (PID: 2332 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~006A2D E2.00000DD 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A 81A0.00000 DD4.sznpkg -o C:\Use rs\user\Ap pData\Roam ing\Seznam .cz\instal l\cz.sezna m.software .autoupdat e-1.0.8-wi n32.zip MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - conhost.exe (PID: 2084 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 4956 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2188 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - REG.EXE (PID: 7404 cmdline:
REG ADD "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\Run" /f /v "cz .seznam.so ftware.aut oupdate" / d "\"C:\Us ers\user\A ppData\Roa ming\Sezna m.cz\sznin stall.exe\ " -c" MD5: F0C0D05727A4E1E91F4347C2270500AA) - UNZIP.EXE (PID: 7348 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~006A2D E2.00000DD 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A 8374.00000 DD4.sznpkg -o C:\Use rs\user\Ap pData\Roam ing\Seznam .cz\instal l\szn-soft ware-base- 1.0.0-win3 2.zip MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - conhost.exe (PID: 7384 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7420 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7452 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - UNZIP.EXE (PID: 7180 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~006A2D E2.00000DD 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A 848E.00000 DD4.sznpkg -o C:\Use rs\user\Ap pData\Roam ing\Seznam .cz\instal l\com.micr osoft.msdn .msvcr110- 11.0.51106 .1-win32.z ip MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - conhost.exe (PID: 6464 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 932 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 304 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - CPY.EXE (PID: 4052 cmdline:
cpy msvcp1 10.dll "C: \Users\use r\AppData\ Roaming\Se znam.cz\bi n" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - CPY.EXE (PID: 7588 cmdline:
cpy msvcr1 10.dll "C: \Users\use r\AppData\ Roaming\Se znam.cz\bi n" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - UNZIP.EXE (PID: 72 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~006A2D E2.00000DD 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A 8960.00000 DD4.sznpkg -o C:\Use rs\user\Ap pData\Loca l\Temp\~00 6A2DE2.000 00DD4.sznp kg\downloa d\cz.sezna m.software .lightspee d-1210-12. 10.18-win3 2.zip MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - conhost.exe (PID: 4184 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6292 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3616 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - CPY.EXE (PID: 3908 cmdline:
cpy lights peed.dll " C:\Users\u ser\AppDat a\Roaming\ Seznam.cz\ bin" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - UNZIP.EXE (PID: 5476 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~006A2D E2.00000DD 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A 8B64.00000 DD4.sznpkg -o C:\Use rs\user\Ap pData\Loca l\Temp\~00 6A2DE2.000 00DD4.sznp kg\downloa d\cz.sezna m.software .libszndes ktop-2.1.3 5-win32.zi p MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - conhost.exe (PID: 3916 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 2136 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2080 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - CPY.EXE (PID: 7704 cmdline:
cpy "sznde sktop.exe" "C:\Users \user\AppD ata\Roamin g\Seznam.c z\bin" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - CPY.EXE (PID: 7700 cmdline:
cpy "sznde sktop.conf " "C:\User s\user\App Data\Roami ng\Seznam. cz\conf" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - CPY.EXE (PID: 7772 cmdline:
cpy "sznde sktop.webp ak" "C:\Us ers\user\A ppData\Roa ming\Sezna m.cz\data" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - CPY.EXE (PID: 7776 cmdline:
cpy "sznpp .exe" "C:\ Users\user \AppData\R oaming\Sez nam.cz\bin " MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - REG.EXE (PID: 7788 cmdline:
reg add "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\Unin stall\Sezn amInstall" /v Displa yVersion / t REG_SZ / d "2.1.35" /f MD5: F0C0D05727A4E1E91F4347C2270500AA) - UNZIP.EXE (PID: 7804 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~006A2D E2.00000DD 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A 9140.00000 DD4.sznpkg -o C:\Use rs\user\Ap pData\Loca l\Temp\~00 6A2DE2.000 00DD4.sznp kg\downloa d\cz.sezna m.software .szndeskto p-2.0.32-w in32.zip MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - conhost.exe (PID: 7844 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7856 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7872 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - CPY.EXE (PID: 704 cmdline:
cpy "wsznd esktop.exe " "C:\User s\user\App Data\Roami ng\Seznam. cz\bin" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - REG.EXE (PID: 6764 cmdline:
REG ADD "H KCU\Softwa re\Microso ft\Windows \CurrentVe rsion\Run" /f /v "cz .seznam.so ftware.szn desktop" / d "\"C:\Us ers\user\A ppData\Roa ming\Sezna m.cz\bin\w szndesktop .exe\" -q" MD5: F0C0D05727A4E1E91F4347C2270500AA) - UNZIP.EXE (PID: 4244 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~006A2D E2.00000DD 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A 93FF.00000 DD4.sznpkg -o C:\Use rs\user\Ap pData\Loca l\Temp\~00 6A2DE2.000 00DD4.sznp kg\downloa d\cz.sezna m.software .libfoxcub -3.3.8-win 32.zip MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - conhost.exe (PID: 4020 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 424 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6608 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - CPY.EXE (PID: 2416 cmdline:
cpy libfox cub.dll "C :\Users\us er\AppData \Roaming\S eznam.cz\b in" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - CPY.EXE (PID: 2476 cmdline:
cpy libfox cub-x64.dl l "C:\User s\user\App Data\Roami ng\Seznam. cz\bin" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - CPY.EXE (PID: 3852 cmdline:
cpy libfox cub.conf " C:\Users\u ser\AppDat a\Roaming\ Seznam.cz\ conf\sznde sktop.d" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - CPY.EXE (PID: 2960 cmdline:
cpy foxcub .conf "C:\ Users\user \AppData\R oaming\Sez nam.cz\con f\libfoxcu b" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - CPY.EXE (PID: 2816 cmdline:
cpy remote .conf "C:\ Users\user \AppData\R oaming\Sez nam.cz\con f\libfoxcu b" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - CPY.EXE (PID: 3456 cmdline:
cpy listic kaconfig.w ebpak "C:\ Users\user \AppData\R oaming\Sez nam.cz\dat a" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - CPY.EXE (PID: 5076 cmdline:
cpy listic kanastaven i.webpak " C:\Users\u ser\AppDat a\Roaming\ Seznam.cz\ data" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - CPY.EXE (PID: 1428 cmdline:
cpy speedd ial.webpak "C:\Users \user\AppD ata\Roamin g\Seznam.c z\data" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - rundll32.exe (PID: 2084 cmdline:
rundll32.e xe libfoxc ub.dll,Upg radeListic ka MD5: 889B99C52A60DD49227C5E485A016679) - REG.EXE (PID: 2876 cmdline:
REG QUERY "HKLM\SOFT WARE\Micro soft\Windo ws\Current Version\Un install\sz n-software -listicka" /v "Unins tallString " MD5: F0C0D05727A4E1E91F4347C2270500AA) - REG.EXE (PID: 6992 cmdline:
REG QUERY "HKCU\SOFT WARE\Micro soft\Windo ws\Current Version\Un install\sz n-software -listicka" /v "Unins tallString " MD5: F0C0D05727A4E1E91F4347C2270500AA) - REG.EXE (PID: 2188 cmdline:
REG DELETE "HKEY_CUR RENT_USER\ Software\M icrosoft\I nternet Ex plorer\Exp lorer Bars \{EA837F48 -5AD1-443E -AE34-FFE0 3CBF3099}" /F MD5: F0C0D05727A4E1E91F4347C2270500AA) - sznpp.exe (PID: 7340 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\sznpp .exe" -v r eport-ieli sticka-ins tall --sta tus=0 MD5: 62DF7B2F443CBB0284CB7959AD2228C1) - UNZIP.EXE (PID: 7328 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~006A2D E2.00000DD 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A A61F.00000 DD4.sznpkg -o C:\Use rs\user\Ap pData\Roam ing\Seznam .cz\instal l\cz.sezna m.software .libfoxloa der-3.2.7- win32.zip MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - conhost.exe (PID: 7324 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 1864 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7460 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - UNZIP.EXE (PID: 4584 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~006A2D E2.00000DD 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A A7B6.00000 DD4.sznpkg -o C:\Use rs\user\Ap pData\Loca l\Temp\~00 6A2DE2.000 00DD4.sznp kg\downloa d\cz.sezna m.software .libfoxcub 64-3.3.8-w in32.zip MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - conhost.exe (PID: 3640 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6496 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5488 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - CPY.EXE (PID: 6484 cmdline:
cpy libfox cub-x64.dl l "C:\User s\user\App Data\Roami ng\Seznam. cz\bin" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - CPY.EXE (PID: 5156 cmdline:
cpy listic ka-x64.exe "C:\Users \user\AppD ata\Roamin g\Seznam.c z\bin" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - szndesktop.exe (PID: 4888 cmdline:
szndesktop .exe defau lt restart MD5: DAC25BB758D6C17C5A8D64CF63702B4E) - szndesktop.exe (PID: 1000 cmdline:
szndesktop .exe defau lt restart MD5: DAC25BB758D6C17C5A8D64CF63702B4E) - listicka-x64.exe (PID: 5504 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\listi cka-x64.ex e" MD5: D893A7276D60FD252EAFFE6E91AAC434) - conhost.exe (PID: 5292 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sznpp.exe (PID: 7156 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\sznpp .exe" repo rt-startup MD5: 62DF7B2F443CBB0284CB7959AD2228C1) - UNZIP.EXE (PID: 7584 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~006A2D E2.00000DD 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A B17A.00000 DD4.sznpkg -o C:\Use rs\user\Ap pData\Loca l\Temp\~00 6A2DE2.000 00DD4.sznp kg\downloa d\cz.sezna m.software .ielistick a3-3.3.5-w in32.zip MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - conhost.exe (PID: 7180 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6712 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4184 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - UNZIP.EXE (PID: 7672 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~006A2D E2.00000DD 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A B2D1.00000 DD4.sznpkg -o C:\Use rs\user\Ap pData\Loca l\Temp\~00 6A2DE2.000 00DD4.sznp kg\downloa d\szn-soft ware-fflis ticka-4.0. 8-win32.zi p MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - conhost.exe (PID: 7628 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 5860 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2972 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sznpp.exe (PID: 6508 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\sznpp .exe" inst all_ff "C: \Users\use r\AppData\ Roaming\Se znam.cz\da ta\fflisti cka\seznam _doplnek_e mail-4.4.1 -fx.xpi" MD5: 62DF7B2F443CBB0284CB7959AD2228C1) - sznpp.exe (PID: 4692 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\sznpp .exe" inst all_ff "C: \Users\use r\AppData\ Roaming\Se znam.cz\da ta\fflisti cka\sko-ex tension@fi rma.seznam .cz.xpi" MD5: 62DF7B2F443CBB0284CB7959AD2228C1) - sznpp.exe (PID: 7720 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\sznpp .exe" inst all-firefo x-nm MD5: 62DF7B2F443CBB0284CB7959AD2228C1) - UNZIP.EXE (PID: 3984 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~006A2D E2.00000DD 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A C669.00000 DD4.sznpkg -o C:\Use rs\user\Ap pData\Roam ing\Seznam .cz\instal l\cz.sezna m.software .chromelis ticka-2.0. 4-win32.zi p MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - conhost.exe (PID: 7692 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7744 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7776 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sznpp.exe (PID: 7480 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\sznpp .exe" inst all-chrome all MD5: 62DF7B2F443CBB0284CB7959AD2228C1) - sznpp_64.exe (PID: 7824 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\sznpp .exe" inst all-chrome all MD5: B601F631582DD8D062C306CEB3B7500B) - sznpp.exe (PID: 6776 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\sznpp .exe" inst all-chrome -nm MD5: 62DF7B2F443CBB0284CB7959AD2228C1) - UNZIP.EXE (PID: 6544 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~006A2D E2.00000DD 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A D463.00000 DD4.sznpkg -o C:\Use rs\user\Ap pData\Roam ing\Seznam .cz\instal l\com.micr osoft.msdn .msvcr100- 10.0.40219 .325-win32 .zip MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - conhost.exe (PID: 1060 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 384 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7864 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - CPY.EXE (PID: 1408 cmdline:
cpy msvcp1 00.dll "C: \Users\use r\AppData\ Roaming\Se znam.cz\bi n" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - CPY.EXE (PID: 6040 cmdline:
cpy msvcr1 00.dll "C: \Users\use r\AppData\ Roaming\Se znam.cz\bi n" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - UNZIP.EXE (PID: 6152 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~006A2D E2.00000DD 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A D780.00000 DD4.sznpkg -o C:\Use rs\user\Ap pData\Roam ing\Seznam .cz\instal l\cz.sezna m.software .pp-1.0.2- win32.zip MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - conhost.exe (PID: 3176 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 3852 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3320 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - CPY.EXE (PID: 552 cmdline:
cpy unlock Instance.d ll "C:\Use rs\user\Ap pData\Roam ing\Seznam .cz\bin" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - CPY.EXE (PID: 3132 cmdline:
cpy unlock Instance.c onf "C:\Us ers\user\A ppData\Roa ming\Sezna m.cz\conf\ szndesktop .d" MD5: 68F44C9CCFF3A00B357BD2006F536AA1) - szndesktop.exe (PID: 2092 cmdline:
szndesktop .exe defau lt restart MD5: DAC25BB758D6C17C5A8D64CF63702B4E) - szndesktop.exe (PID: 3068 cmdline:
szndesktop .exe defau lt restart MD5: DAC25BB758D6C17C5A8D64CF63702B4E) - UNZIP.EXE (PID: 7408 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\~006A2D E2.00000DD 4.sznpkg\u nzip.exe - d C:\Users \user\AppD ata\Local\ Temp\~006A E03A.00000 DD4.sznpkg -o C:\Use rs\user\Ap pData\Roam ing\Seznam .cz\instal l\szn-soft ware-listi cka-3.0.0- win32.zip MD5: 3FC25896B5B2FB8E20F28FAB8C0E1143) - conhost.exe (PID: 7340 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 1944 cmdline:
cmd /S /C "install.b at C:\User s\user\App Data\Roami ng\Seznam. cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7332 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sznsetup.exe (PID: 3720 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \sznsetup. exe" -A 49 764 cd "C: \Users\use r\AppData\ Roaming\Se znam.cz" MD5: D0F5D99C74D568EB9909C7582A775DC7) - sznsetup.exe (PID: 612 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \sznsetup. exe" -A 49 764 "C:\Us ers\user\A ppData\Loc al\Temp\~0 06AE03A.00 000DD4.szn pkg\instal l.bat" ADM INPHASE . "C:\Progra m Files (x 86)\Seznam .cz\distri bution" MD5: D0F5D99C74D568EB9909C7582A775DC7) - REG.EXE (PID: 7780 cmdline:
REG ADD "H KEY_CURREN T_USER\SOF TWARE\Sezn am.cz\dist ribution" /f /v "lis ticka" /t REG_DWORD /d 1 MD5: F0C0D05727A4E1E91F4347C2270500AA) - cmd.exe (PID: 7764 cmdline:
cmd /S /C "C:\Users\ user\AppDa ta\Roaming \Seznam.cz \uninstall \cz_seznam _software_ libszndesk top_2_1_35 .reconfigu re.bat C:\ Users\user \AppData\R oaming\Sez nam.cz" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7876 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - szndesktop.exe (PID: 7776 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\sznde sktop.exe" default r estart MD5: DAC25BB758D6C17C5A8D64CF63702B4E) - szndesktop.exe (PID: 1060 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\sznde sktop.exe" default r estart MD5: DAC25BB758D6C17C5A8D64CF63702B4E) - sznpp.exe (PID: 5344 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\sznpp .exe" inst all-chrome retry MD5: 62DF7B2F443CBB0284CB7959AD2228C1) - conhost.exe (PID: 1416 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - listicka-x64.exe (PID: 5644 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\listi cka-x64.ex e" MD5: D893A7276D60FD252EAFFE6E91AAC434) - conhost.exe (PID: 3300 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sznpp.exe (PID: 2936 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\sznpp .exe" repo rt-startup MD5: 62DF7B2F443CBB0284CB7959AD2228C1) - szninstall.exe (PID: 5908 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \szninstal l.exe" -S 49764 MD5: C73E94B86ED9B6BDFF199BB7E8BF9D77) - cmd.exe (PID: 5744 cmdline:
C:\Windows \system32\ cmd.exe /c C:\Users\ user\AppDa ta\Local\T emp\~006AE 03A.00000D D4.sznpkg\ install.ba t ADMINPHA SE . "C:\P rogram Fil es (x86)\S eznam.cz\d istributio n" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2044 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sznsetup.exe (PID: 4692 cmdline:
".\sznsetu p.exe" -T "C:\Progra m Files (x 86)\Seznam .cz\distri bution" -R "C:\Progr am Files ( x86)\Sezna m.cz\distr ibution\in stall" MD5: D0F5D99C74D568EB9909C7582A775DC7) - xcopy.exe (PID: 7720 cmdline:
xcopy /S / Y /G /I ". \install\* .*" "C:\Pr ogram File s (x86)\Se znam.cz\di stribution \install" MD5: 7E9B7CE496D09F70C072930940F9F02C) - REG.EXE (PID: 7820 cmdline:
REG ADD "H KEY_LOCAL_ MACHINE\SO FTWARE\Mic rosoft\Win dows\Curre ntVersion\ Run" /f /v "seznam-l isticka-di stribuce" /d "\"C:\P rogram Fil es (x86)\S eznam.cz\d istributio n\szninsta ll.exe\" - s -d listi cka 1 szn- software-l isticka cz .seznam.so ftware.aut oupdate" MD5: F0C0D05727A4E1E91F4347C2270500AA) - sznsetup.exe (PID: 2180 cmdline:
C:\Users\u ser\AppDat a\Roaming\ Seznam.cz\ sznsetup.e xe -V MD5: D0F5D99C74D568EB9909C7582A775DC7) - conhost.exe (PID: 1172 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- Picasa3.exe (PID: 6516 cmdline:
"C:\Progra m Files (x 86)\Google \Picasa3\P icasa3.exe " MD5: 6AD50A491F52B1CBECE23B603037FBDF) - PicasaPhotoViewer.exe (PID: 3496 cmdline:
/config MD5: 69B20702DEBC005CD1DA0906B4A3C4F5) - iexplore.exe (PID: 3720 cmdline:
"C:\Progra m Files\In ternet Exp lorer\iexp lore.exe" -nohome "h ttp://pica sa.google. com/suppor t/bin/answ er.py?hl=e n&answer=9 3773" MD5: CFE2E6942AC1B72981B3105E22D3224E) - iexplore.exe (PID: 3184 cmdline:
"C:\Progra m Files (x 86)\Intern et Explore r\IEXPLORE .EXE" SCOD EF:3720 CR EDAT:9474 /prefetch: 2 MD5: 6F0F06D6AB125A99E43335427066A4A1) - ie_to_edge_stub.exe (PID: 2188 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \117.0.204 5.47\BHO\i e_to_edge_ stub.exe" --from-ie- to-edge=3 --ie-frame -hwnd=602e 8 MD5: 89CF8972D683795DAB6901BC9456675D) - ssvagent.exe (PID: 3068 cmdline:
"C:\PROGRA ~2\Java\jr e-1.8\bin\ ssvagent.e xe" -new MD5: F9A898A606E7F5A1CD7CFFA8079253A0) - sznpp.exe (PID: 3196 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\sznpp .exe" inst all-chrome retry MD5: 62DF7B2F443CBB0284CB7959AD2228C1) - conhost.exe (PID: 3920 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sznpp_64.exe (PID: 2272 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\sznpp .exe" inst all-chrome retry MD5: B601F631582DD8D062C306CEB3B7500B) - chrome.exe (PID: 7384 cmdline:
chrome.exe --no-defa ult-browse r-check -- new-window about:bla nk MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 7328 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2216 --fi eld-trial- handle=193 2,i,142731 2440908496 8856,41014 8509356078 3332,26214 4 /prefetc h:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 3828 cmdline:
chrome.exe --no-defa ult-browse r-check -- new-window about:bla nk MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - listicka-x64.exe (PID: 1940 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\listi cka-x64.ex e" MD5: D893A7276D60FD252EAFFE6E91AAC434) - conhost.exe (PID: 6164 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sznpp.exe (PID: 5768 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Seznam.cz \bin\sznpp .exe" repo rt-startup MD5: 62DF7B2F443CBB0284CB7959AD2228C1) - ie_to_edge_stub.exe (PID: 2280 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \117.0.204 5.47\BHO\i e_to_edge_ stub.exe" --from-ie- to-edge=3 --ie-frame -hwnd=602e 8 MD5: 89CF8972D683795DAB6901BC9456675D) - msedge.exe (PID: 2064 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --from- ie-to-edge =3 --ie-fr ame-hwnd=6 02e8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 4912 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=22 44 --field -trial-han dle=2004,i ,163901366 6010223883 ,150405582 0666452235 4,262144 / prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 2756 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -mojo-plat form-chann el-handle= 1724 --fie ld-trial-h andle=2004 ,i,1639013 6660102238 83,1504055 8206664522 354,262144 /prefetch :8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 6524 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=chr ome.mojom. ProfileImp ort --lang =en-GB --s ervice-san dbox-type= none --moj o-platform -channel-h andle=6596 --field-t rial-handl e=2004,i,1 6390136660 10223883,1 5040558206 664522354, 262144 /pr efetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - cookie_exporter.exe (PID: 3648 cmdline:
cookie_exp orter.exe --cookie-j son=1188 MD5: 3DD7152D6D33725EA5958D7DE2586B97) - msedge.exe (PID: 6532 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --onnx- enabled-fo r-ee --moj o-platform -channel-h andle=3720 --field-t rial-handl e=2004,i,1 6390136660 10223883,1 5040558206 664522354, 262144 /pr efetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8112 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=aud io.mojom.A udioServic e --lang=e n-GB --ser vice-sandb ox-type=au dio --mojo -platform- channel-ha ndle=4984 --field-tr ial-handle =2004,i,16 3901366601 0223883,15 0405582066 64522354,2 62144 /pre fetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 456 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_search_i ndexer.moj om.SearchI ndexerInte rfaceBroke r --lang=e n-GB --ser vice-sandb ox-type=se arch_index er --messa ge-loop-ty pe-ui --mo jo-platfor m-channel- handle=608 4 --field- trial-hand le=2004,i, 1639013666 010223883, 1504055820 6664522354 ,262144 /p refetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - ssvagent.exe (PID: 3652 cmdline:
"C:\PROGRA ~2\Java\jr e-1.8\bin\ ssvagent.e xe" -new MD5: F9A898A606E7F5A1CD7CFFA8079253A0) - iexplore.exe (PID: 7244 cmdline:
"C:\Progra m Files (x 86)\Intern et Explore r\IEXPLORE .EXE" SCOD EF:3720 CR EDAT:20206 6 /prefetc h:2 MD5: 6F0F06D6AB125A99E43335427066A4A1)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split), wagga (name): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: frack113: |
Source: | Author: frack113, Nasreddine Bencherchali: |
Source: | Author: frack113: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-02T12:16:22.113361+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49707 | 77.75.76.70 | 80 | TCP |
2024-10-02T12:16:23.980004+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49707 | 77.75.76.70 | 80 | TCP |
2024-10-02T12:16:26.673684+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49707 | 77.75.76.70 | 80 | TCP |
2024-10-02T12:16:35.593694+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49765 | 77.75.76.70 | 80 | TCP |
2024-10-02T12:16:37.099132+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49765 | 77.75.76.70 | 80 | TCP |
2024-10-02T12:16:38.974886+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49765 | 77.75.76.70 | 80 | TCP |
2024-10-02T12:16:41.372917+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49765 | 77.75.76.70 | 80 | TCP |
2024-10-02T12:16:43.050976+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49765 | 77.75.76.70 | 80 | TCP |
2024-10-02T12:16:46.292462+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49765 | 77.75.76.70 | 80 | TCP |
2024-10-02T12:16:48.599342+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49765 | 77.75.76.70 | 80 | TCP |
2024-10-02T12:16:49.917865+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49765 | 77.75.76.70 | 80 | TCP |
2024-10-02T12:17:04.630823+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49960 | 77.75.78.30 | 443 | TCP |
2024-10-02T12:17:08.501285+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49966 | 77.75.78.30 | 443 | TCP |
2024-10-02T12:17:10.907798+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49969 | 77.75.78.30 | 443 | TCP |
2024-10-02T12:17:12.823071+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49972 | 77.75.78.30 | 443 | TCP |
2024-10-02T12:17:21.078549+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49981 | 77.75.78.30 | 443 | TCP |
2024-10-02T12:17:27.273153+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.16 | 49996 | 77.75.78.30 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-02T12:16:36.357307+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.16 | 49775 | 172.217.23.110 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
Source: | Code function: | 20_2_04819970 | |
Source: | Code function: | 20_2_04819BA0 | |
Source: | Code function: | 20_2_047E7BC0 |
Source: | HTTP Parser: |
Source: | Window detected: |
Source: | Registry value created: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Source: | File opened: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |