Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
22-01-2021 11:44
Static task
static1
Behavioral task
behavioral1
Sample
ZoomInstaller.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
ZoomInstaller.exe
Resource
win10v20201028
General
-
Target
ZoomInstaller.exe
-
Size
18.7MB
-
MD5
2880073f86a4b5144b57fce296e46345
-
SHA1
c7d271855c08231209d0e2194ba1120aaac1e387
-
SHA256
d65e8a784c2ba0d9f7a029e1817b78b31324fb8c988e0467fd693b0efd890756
-
SHA512
692af220e2498d1f14ace9c36b5815e4841848cc3eef8925919ab553f9e984aa7931713501cfa23a08c44d9fd2114320c821cb6692b9e5c49d131bb5065e02fd
Malware Config
Signatures
-
Executes dropped EXE 25 IoCs
Processes:
CL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtpid process 2696 CL_Debug_Log.txt 3068 CL_Debug_Log.txt 3336 CL_Debug_Log.txt 3464 CL_Debug_Log.txt 2324 CL_Debug_Log.txt 2204 CL_Debug_Log.txt 1776 CL_Debug_Log.txt 1560 CL_Debug_Log.txt 992 CL_Debug_Log.txt 1752 CL_Debug_Log.txt 3640 CL_Debug_Log.txt 2304 CL_Debug_Log.txt 1796 CL_Debug_Log.txt 4060 CL_Debug_Log.txt 1736 CL_Debug_Log.txt 3832 CL_Debug_Log.txt 3708 CL_Debug_Log.txt 3144 CL_Debug_Log.txt 3992 CL_Debug_Log.txt 3856 CL_Debug_Log.txt 3884 CL_Debug_Log.txt 3952 CL_Debug_Log.txt 3644 CL_Debug_Log.txt 2212 CL_Debug_Log.txt 2312 CL_Debug_Log.txt -
Creates scheduled task(s) 1 TTPs 25 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2460 schtasks.exe 1668 schtasks.exe 3948 schtasks.exe 3664 schtasks.exe 508 schtasks.exe 896 schtasks.exe 3540 schtasks.exe 3660 schtasks.exe 2132 schtasks.exe 4076 schtasks.exe 1712 schtasks.exe 3892 schtasks.exe 1112 schtasks.exe 1996 schtasks.exe 2220 schtasks.exe 3288 schtasks.exe 2832 schtasks.exe 2020 schtasks.exe 1492 schtasks.exe 2188 schtasks.exe 1416 schtasks.exe 2880 schtasks.exe 2300 schtasks.exe 1244 schtasks.exe 184 schtasks.exe -
NTFS ADS 26 IoCs
Processes:
ZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\MKLUFVRL\root\CIMV2 ZoomInstaller.exe -
Suspicious behavior: EnumeratesProcesses 676 IoCs
Processes:
ZoomInstaller.exeZoomInstaller.exeZoomInstaller.exepid process 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 3976 ZoomInstaller.exe 3976 ZoomInstaller.exe 3976 ZoomInstaller.exe 3976 ZoomInstaller.exe 3976 ZoomInstaller.exe 3976 ZoomInstaller.exe 3976 ZoomInstaller.exe 3976 ZoomInstaller.exe 3976 ZoomInstaller.exe 3976 ZoomInstaller.exe 3976 ZoomInstaller.exe 3976 ZoomInstaller.exe -
Suspicious use of AdjustPrivilegeToken 100 IoCs
Processes:
CL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtCL_Debug_Log.txtdescription pid process Token: SeRestorePrivilege 2696 CL_Debug_Log.txt Token: 35 2696 CL_Debug_Log.txt Token: SeSecurityPrivilege 2696 CL_Debug_Log.txt Token: SeSecurityPrivilege 2696 CL_Debug_Log.txt Token: SeRestorePrivilege 3068 CL_Debug_Log.txt Token: 35 3068 CL_Debug_Log.txt Token: SeSecurityPrivilege 3068 CL_Debug_Log.txt Token: SeSecurityPrivilege 3068 CL_Debug_Log.txt Token: SeRestorePrivilege 3336 CL_Debug_Log.txt Token: 35 3336 CL_Debug_Log.txt Token: SeSecurityPrivilege 3336 CL_Debug_Log.txt Token: SeSecurityPrivilege 3336 CL_Debug_Log.txt Token: SeRestorePrivilege 3464 CL_Debug_Log.txt Token: 35 3464 CL_Debug_Log.txt Token: SeSecurityPrivilege 3464 CL_Debug_Log.txt Token: SeSecurityPrivilege 3464 CL_Debug_Log.txt Token: SeRestorePrivilege 2324 CL_Debug_Log.txt Token: 35 2324 CL_Debug_Log.txt Token: SeSecurityPrivilege 2324 CL_Debug_Log.txt Token: SeSecurityPrivilege 2324 CL_Debug_Log.txt Token: SeRestorePrivilege 2204 CL_Debug_Log.txt Token: 35 2204 CL_Debug_Log.txt Token: SeSecurityPrivilege 2204 CL_Debug_Log.txt Token: SeSecurityPrivilege 2204 CL_Debug_Log.txt Token: SeRestorePrivilege 1776 CL_Debug_Log.txt Token: 35 1776 CL_Debug_Log.txt Token: SeSecurityPrivilege 1776 CL_Debug_Log.txt Token: SeSecurityPrivilege 1776 CL_Debug_Log.txt Token: SeRestorePrivilege 1560 CL_Debug_Log.txt Token: 35 1560 CL_Debug_Log.txt Token: SeSecurityPrivilege 1560 CL_Debug_Log.txt Token: SeSecurityPrivilege 1560 CL_Debug_Log.txt Token: SeRestorePrivilege 992 CL_Debug_Log.txt Token: 35 992 CL_Debug_Log.txt Token: SeSecurityPrivilege 992 CL_Debug_Log.txt Token: SeSecurityPrivilege 992 CL_Debug_Log.txt Token: SeRestorePrivilege 1752 CL_Debug_Log.txt Token: 35 1752 CL_Debug_Log.txt Token: SeSecurityPrivilege 1752 CL_Debug_Log.txt Token: SeSecurityPrivilege 1752 CL_Debug_Log.txt Token: SeRestorePrivilege 3640 CL_Debug_Log.txt Token: 35 3640 CL_Debug_Log.txt Token: SeSecurityPrivilege 3640 CL_Debug_Log.txt Token: SeSecurityPrivilege 3640 CL_Debug_Log.txt Token: SeRestorePrivilege 2304 CL_Debug_Log.txt Token: 35 2304 CL_Debug_Log.txt Token: SeSecurityPrivilege 2304 CL_Debug_Log.txt Token: SeSecurityPrivilege 2304 CL_Debug_Log.txt Token: SeRestorePrivilege 1796 CL_Debug_Log.txt Token: 35 1796 CL_Debug_Log.txt Token: SeSecurityPrivilege 1796 CL_Debug_Log.txt Token: SeSecurityPrivilege 1796 CL_Debug_Log.txt Token: SeRestorePrivilege 4060 CL_Debug_Log.txt Token: 35 4060 CL_Debug_Log.txt Token: SeSecurityPrivilege 4060 CL_Debug_Log.txt Token: SeSecurityPrivilege 4060 CL_Debug_Log.txt Token: SeRestorePrivilege 1736 CL_Debug_Log.txt Token: 35 1736 CL_Debug_Log.txt Token: SeSecurityPrivilege 1736 CL_Debug_Log.txt Token: SeSecurityPrivilege 1736 CL_Debug_Log.txt Token: SeRestorePrivilege 3832 CL_Debug_Log.txt Token: 35 3832 CL_Debug_Log.txt Token: SeSecurityPrivilege 3832 CL_Debug_Log.txt Token: SeSecurityPrivilege 3832 CL_Debug_Log.txt -
Suspicious use of FindShellTrayWindow 78 IoCs
Processes:
ZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exepid process 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 3976 ZoomInstaller.exe 3976 ZoomInstaller.exe 3976 ZoomInstaller.exe 4020 ZoomInstaller.exe 4020 ZoomInstaller.exe 4020 ZoomInstaller.exe 904 ZoomInstaller.exe 904 ZoomInstaller.exe 904 ZoomInstaller.exe 3556 ZoomInstaller.exe 3556 ZoomInstaller.exe 3556 ZoomInstaller.exe 3808 ZoomInstaller.exe 3808 ZoomInstaller.exe 3808 ZoomInstaller.exe 3704 ZoomInstaller.exe 3704 ZoomInstaller.exe 3704 ZoomInstaller.exe 3772 ZoomInstaller.exe 3772 ZoomInstaller.exe 3772 ZoomInstaller.exe 1332 ZoomInstaller.exe 1332 ZoomInstaller.exe 1332 ZoomInstaller.exe 728 ZoomInstaller.exe 728 ZoomInstaller.exe 728 ZoomInstaller.exe 3032 ZoomInstaller.exe 3032 ZoomInstaller.exe 3032 ZoomInstaller.exe 192 ZoomInstaller.exe 192 ZoomInstaller.exe 192 ZoomInstaller.exe 2280 ZoomInstaller.exe 2280 ZoomInstaller.exe 2280 ZoomInstaller.exe 3676 ZoomInstaller.exe 3676 ZoomInstaller.exe 3676 ZoomInstaller.exe 3876 ZoomInstaller.exe 3876 ZoomInstaller.exe 3876 ZoomInstaller.exe 540 ZoomInstaller.exe 540 ZoomInstaller.exe 540 ZoomInstaller.exe 3232 ZoomInstaller.exe 3232 ZoomInstaller.exe 3232 ZoomInstaller.exe 1136 ZoomInstaller.exe 1136 ZoomInstaller.exe 1136 ZoomInstaller.exe 3008 ZoomInstaller.exe 3008 ZoomInstaller.exe 3008 ZoomInstaller.exe 1864 ZoomInstaller.exe 1864 ZoomInstaller.exe 1864 ZoomInstaller.exe 2308 ZoomInstaller.exe -
Suspicious use of SendNotifyMessage 78 IoCs
Processes:
ZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exeZoomInstaller.exepid process 648 ZoomInstaller.exe 648 ZoomInstaller.exe 648 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 1520 ZoomInstaller.exe 3976 ZoomInstaller.exe 3976 ZoomInstaller.exe 3976 ZoomInstaller.exe 4020 ZoomInstaller.exe 4020 ZoomInstaller.exe 4020 ZoomInstaller.exe 904 ZoomInstaller.exe 904 ZoomInstaller.exe 904 ZoomInstaller.exe 3556 ZoomInstaller.exe 3556 ZoomInstaller.exe 3556 ZoomInstaller.exe 3808 ZoomInstaller.exe 3808 ZoomInstaller.exe 3808 ZoomInstaller.exe 3704 ZoomInstaller.exe 3704 ZoomInstaller.exe 3704 ZoomInstaller.exe 3772 ZoomInstaller.exe 3772 ZoomInstaller.exe 3772 ZoomInstaller.exe 1332 ZoomInstaller.exe 1332 ZoomInstaller.exe 1332 ZoomInstaller.exe 728 ZoomInstaller.exe 728 ZoomInstaller.exe 728 ZoomInstaller.exe 3032 ZoomInstaller.exe 3032 ZoomInstaller.exe 3032 ZoomInstaller.exe 192 ZoomInstaller.exe 192 ZoomInstaller.exe 192 ZoomInstaller.exe 2280 ZoomInstaller.exe 2280 ZoomInstaller.exe 2280 ZoomInstaller.exe 3676 ZoomInstaller.exe 3676 ZoomInstaller.exe 3676 ZoomInstaller.exe 3876 ZoomInstaller.exe 3876 ZoomInstaller.exe 3876 ZoomInstaller.exe 540 ZoomInstaller.exe 540 ZoomInstaller.exe 540 ZoomInstaller.exe 3232 ZoomInstaller.exe 3232 ZoomInstaller.exe 3232 ZoomInstaller.exe 1136 ZoomInstaller.exe 1136 ZoomInstaller.exe 1136 ZoomInstaller.exe 3008 ZoomInstaller.exe 3008 ZoomInstaller.exe 3008 ZoomInstaller.exe 1864 ZoomInstaller.exe 1864 ZoomInstaller.exe 1864 ZoomInstaller.exe 2308 ZoomInstaller.exe -
Suspicious use of WriteProcessMemory 300 IoCs
Processes:
ZoomInstaller.execmd.exeZoomInstaller.execmd.exeZoomInstaller.execmd.exeZoomInstaller.execmd.exeZoomInstaller.execmd.exeZoomInstaller.exedescription pid process target process PID 648 wrote to memory of 2696 648 ZoomInstaller.exe CL_Debug_Log.txt PID 648 wrote to memory of 2696 648 ZoomInstaller.exe CL_Debug_Log.txt PID 648 wrote to memory of 2696 648 ZoomInstaller.exe CL_Debug_Log.txt PID 648 wrote to memory of 3024 648 ZoomInstaller.exe cmd.exe PID 648 wrote to memory of 3024 648 ZoomInstaller.exe cmd.exe PID 648 wrote to memory of 3024 648 ZoomInstaller.exe cmd.exe PID 3024 wrote to memory of 3660 3024 cmd.exe schtasks.exe PID 3024 wrote to memory of 3660 3024 cmd.exe schtasks.exe PID 3024 wrote to memory of 3660 3024 cmd.exe schtasks.exe PID 648 wrote to memory of 1520 648 ZoomInstaller.exe ZoomInstaller.exe PID 648 wrote to memory of 1520 648 ZoomInstaller.exe ZoomInstaller.exe PID 648 wrote to memory of 1520 648 ZoomInstaller.exe ZoomInstaller.exe PID 1520 wrote to memory of 3068 1520 ZoomInstaller.exe CL_Debug_Log.txt PID 1520 wrote to memory of 3068 1520 ZoomInstaller.exe CL_Debug_Log.txt PID 1520 wrote to memory of 3068 1520 ZoomInstaller.exe CL_Debug_Log.txt PID 1520 wrote to memory of 2056 1520 ZoomInstaller.exe cmd.exe PID 1520 wrote to memory of 2056 1520 ZoomInstaller.exe cmd.exe PID 1520 wrote to memory of 2056 1520 ZoomInstaller.exe cmd.exe PID 2056 wrote to memory of 2880 2056 cmd.exe schtasks.exe PID 2056 wrote to memory of 2880 2056 cmd.exe schtasks.exe PID 2056 wrote to memory of 2880 2056 cmd.exe schtasks.exe PID 1520 wrote to memory of 3976 1520 ZoomInstaller.exe ZoomInstaller.exe PID 1520 wrote to memory of 3976 1520 ZoomInstaller.exe ZoomInstaller.exe PID 1520 wrote to memory of 3976 1520 ZoomInstaller.exe ZoomInstaller.exe PID 3976 wrote to memory of 3336 3976 ZoomInstaller.exe CL_Debug_Log.txt PID 3976 wrote to memory of 3336 3976 ZoomInstaller.exe CL_Debug_Log.txt PID 3976 wrote to memory of 3336 3976 ZoomInstaller.exe CL_Debug_Log.txt PID 3976 wrote to memory of 196 3976 ZoomInstaller.exe cmd.exe PID 3976 wrote to memory of 196 3976 ZoomInstaller.exe cmd.exe PID 3976 wrote to memory of 196 3976 ZoomInstaller.exe cmd.exe PID 196 wrote to memory of 2300 196 cmd.exe schtasks.exe PID 196 wrote to memory of 2300 196 cmd.exe schtasks.exe PID 196 wrote to memory of 2300 196 cmd.exe schtasks.exe PID 3976 wrote to memory of 4020 3976 ZoomInstaller.exe ZoomInstaller.exe PID 3976 wrote to memory of 4020 3976 ZoomInstaller.exe ZoomInstaller.exe PID 3976 wrote to memory of 4020 3976 ZoomInstaller.exe ZoomInstaller.exe PID 4020 wrote to memory of 3464 4020 ZoomInstaller.exe CL_Debug_Log.txt PID 4020 wrote to memory of 3464 4020 ZoomInstaller.exe CL_Debug_Log.txt PID 4020 wrote to memory of 3464 4020 ZoomInstaller.exe CL_Debug_Log.txt PID 4020 wrote to memory of 3468 4020 ZoomInstaller.exe cmd.exe PID 4020 wrote to memory of 3468 4020 ZoomInstaller.exe cmd.exe PID 4020 wrote to memory of 3468 4020 ZoomInstaller.exe cmd.exe PID 3468 wrote to memory of 2132 3468 cmd.exe schtasks.exe PID 3468 wrote to memory of 2132 3468 cmd.exe schtasks.exe PID 3468 wrote to memory of 2132 3468 cmd.exe schtasks.exe PID 4020 wrote to memory of 904 4020 ZoomInstaller.exe ZoomInstaller.exe PID 4020 wrote to memory of 904 4020 ZoomInstaller.exe ZoomInstaller.exe PID 4020 wrote to memory of 904 4020 ZoomInstaller.exe ZoomInstaller.exe PID 904 wrote to memory of 2324 904 ZoomInstaller.exe CL_Debug_Log.txt PID 904 wrote to memory of 2324 904 ZoomInstaller.exe CL_Debug_Log.txt PID 904 wrote to memory of 2324 904 ZoomInstaller.exe CL_Debug_Log.txt PID 904 wrote to memory of 64 904 ZoomInstaller.exe cmd.exe PID 904 wrote to memory of 64 904 ZoomInstaller.exe cmd.exe PID 904 wrote to memory of 64 904 ZoomInstaller.exe cmd.exe PID 64 wrote to memory of 3664 64 cmd.exe schtasks.exe PID 64 wrote to memory of 3664 64 cmd.exe schtasks.exe PID 64 wrote to memory of 3664 64 cmd.exe schtasks.exe PID 904 wrote to memory of 3556 904 ZoomInstaller.exe ZoomInstaller.exe PID 904 wrote to memory of 3556 904 ZoomInstaller.exe ZoomInstaller.exe PID 904 wrote to memory of 3556 904 ZoomInstaller.exe ZoomInstaller.exe PID 3556 wrote to memory of 2204 3556 ZoomInstaller.exe CL_Debug_Log.txt PID 3556 wrote to memory of 2204 3556 ZoomInstaller.exe CL_Debug_Log.txt PID 3556 wrote to memory of 2204 3556 ZoomInstaller.exe CL_Debug_Log.txt PID 3556 wrote to memory of 3652 3556 ZoomInstaller.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe"C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe"1⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe2⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe3⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe4⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe5⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe6⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"7⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"8⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe7⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"8⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"9⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe8⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"9⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"10⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe9⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"10⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"11⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe10⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"11⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"12⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe11⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"12⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"13⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe12⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"13⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"14⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe13⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"14⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"15⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe14⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"15⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"16⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe15⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"16⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"17⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe16⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"17⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"18⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe17⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"18⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"18⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"19⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe18⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"19⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"19⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"20⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe19⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"20⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"20⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"21⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe20⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"21⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"21⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"22⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe21⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"22⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"22⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"23⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe22⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"23⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"23⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"24⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe23⤵
- NTFS ADS
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"24⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"24⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"25⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe24⤵
- NTFS ADS
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"25⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"25⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"26⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe25⤵
- NTFS ADS
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"26⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"26⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"27⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exeC:\Users\Admin\AppData\Local\Temp\ZoomInstaller.exe26⤵
- NTFS ADS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\64.exeMD5
d28947e45827b68d6c5c2bf40a1c19b1
SHA12393a2585317007ad0a37d42beea229a8bcbeb6d
SHA25604b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8
SHA51262dbed59a52c6c04a7d348c021d876dd9fdb903121980e119db7fd3f58eeb50b1f6b1bb6e60621527761f8427f63a06edd6058b4425addb83169699ff15816e5
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtMD5
43141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtMD5
ef90ec8b4a09b6b6c0f9012bab02034e
SHA16d856c4aa803a0dca16ae5231f63e666f73012eb
SHA256311026cc47d7eed96d1bc23b3211e14da29262ae017d7406bd150459002bf296
SHA512205d4c4a7c689e01b420ecd4db5d6390e46ee1408c4363f952c89f9a7193f4108ae18ecd7536e4d108f76d68a5d9fc88edfb8752327248dd7e84610047607d66
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlMD5
9160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
memory/64-53-0x0000000000000000-mapping.dmp
-
memory/188-987-0x0000000000000000-mapping.dmp
-
memory/192-1068-0x0000000000000000-mapping.dmp
-
memory/196-29-0x0000000000000000-mapping.dmp
-
memory/508-1049-0x0000000000000000-mapping.dmp
-
memory/540-2093-0x0000000000000000-mapping.dmp
-
memory/648-8-0x0000000000A80000-0x0000000000A81000-memory.dmpFilesize
4KB
-
memory/728-1027-0x0000000000000000-mapping.dmp
-
memory/740-1060-0x0000000000000000-mapping.dmp
-
memory/904-45-0x0000000000000000-mapping.dmp
-
memory/992-1008-0x0000000000000000-mapping.dmp
-
memory/1292-1982-0x0000000000000000-mapping.dmp
-
memory/1332-1015-0x0000000000000000-mapping.dmp
-
memory/1492-1983-0x0000000000000000-mapping.dmp
-
memory/1520-13-0x0000000000000000-mapping.dmp
-
memory/1560-996-0x0000000000000000-mapping.dmp
-
memory/1668-1995-0x0000000000000000-mapping.dmp
-
memory/1712-2007-0x0000000000000000-mapping.dmp
-
memory/1736-2003-0x0000000000000000-mapping.dmp
-
memory/1752-1020-0x0000000000000000-mapping.dmp
-
memory/1776-984-0x0000000000000000-mapping.dmp
-
memory/1796-1979-0x0000000000000000-mapping.dmp
-
memory/1996-988-0x0000000000000000-mapping.dmp
-
memory/2020-1061-0x0000000000000000-mapping.dmp
-
memory/2056-17-0x0000000000000000-mapping.dmp
-
memory/2120-999-0x0000000000000000-mapping.dmp
-
memory/2132-42-0x0000000000000000-mapping.dmp
-
memory/2176-1994-0x0000000000000000-mapping.dmp
-
memory/2204-972-0x0000000000000000-mapping.dmp
-
memory/2220-1000-0x0000000000000000-mapping.dmp
-
memory/2248-2006-0x0000000000000000-mapping.dmp
-
memory/2252-2089-0x0000000000000000-mapping.dmp
-
memory/2268-1048-0x0000000000000000-mapping.dmp
-
memory/2280-1986-0x0000000000000000-mapping.dmp
-
memory/2300-34-0x0000000000000000-mapping.dmp
-
memory/2304-1057-0x0000000000000000-mapping.dmp
-
memory/2324-50-0x0000000000000000-mapping.dmp
-
memory/2440-1011-0x0000000000000000-mapping.dmp
-
memory/2696-2-0x0000000000000000-mapping.dmp
-
memory/2832-1012-0x0000000000000000-mapping.dmp
-
memory/2880-18-0x0000000000000000-mapping.dmp
-
memory/3024-5-0x0000000000000000-mapping.dmp
-
memory/3032-1052-0x0000000000000000-mapping.dmp
-
memory/3068-14-0x0000000000000000-mapping.dmp
-
memory/3200-1023-0x0000000000000000-mapping.dmp
-
memory/3288-976-0x0000000000000000-mapping.dmp
-
memory/3336-26-0x0000000000000000-mapping.dmp
-
memory/3464-38-0x0000000000000000-mapping.dmp
-
memory/3468-41-0x0000000000000000-mapping.dmp
-
memory/3556-57-0x0000000000000000-mapping.dmp
-
memory/3640-1045-0x0000000000000000-mapping.dmp
-
memory/3652-975-0x0000000000000000-mapping.dmp
-
memory/3660-6-0x0000000000000000-mapping.dmp
-
memory/3664-54-0x0000000000000000-mapping.dmp
-
memory/3676-2002-0x0000000000000000-mapping.dmp
-
memory/3704-991-0x0000000000000000-mapping.dmp
-
memory/3772-1003-0x0000000000000000-mapping.dmp
-
memory/3808-979-0x0000000000000000-mapping.dmp
-
memory/3832-2086-0x0000000000000000-mapping.dmp
-
memory/3876-2010-0x0000000000000000-mapping.dmp
-
memory/3892-2090-0x0000000000000000-mapping.dmp
-
memory/3976-21-0x0000000000000000-mapping.dmp
-
memory/4020-37-0x0000000000000000-mapping.dmp
-
memory/4060-1991-0x0000000000000000-mapping.dmp
-
memory/4076-1024-0x0000000000000000-mapping.dmp