Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
22-03-2021 13:54
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe
Resource
win10v20201028
General
-
Target
SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe
-
Size
9KB
-
MD5
f8372b779001bb5a6c401c657ee514ed
-
SHA1
a053936768d122d397326eb905d7e49b14dd4a88
-
SHA256
2c2d88dbff1f9196148cc3c7501d4c45b05ef51887651b3bcdbb111fcc7a2ba2
-
SHA512
ecf6af25303e73dc5aba38861a871ed473db3f20f2f43f160a08e014c81910b0439f516401758540151abe148b59afb86b9e59eb4452f3c52a90b01666c84c0c
Malware Config
Extracted
raccoon
c46f13f8aadc028907d65c627fd9163161661f6c
-
url4cnc
https://telete.in/capibar
Extracted
raccoon
2ce901d964b370c5ccda7e4d68354ba040db8218
-
url4cnc
https://telete.in/tomarsjsmith3
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 36 IoCs
Processes:
1OdBw50emClNYbnlhAiPcd9X.exe09766142298.exe08105887548.exe09766142298.exe09766142298.exeZPirRGHDyXZ5DOgm9nehiJru.exeMcFLH4cQiy0RZvRFzvR5PemU.exe09qWwsiooH9CAptxQP8SinQH.exeJVYrYrj1odYWfEj5MX8d6Pau.exe5ozjNM4kVMXfkEATAws87FG5.exeh4kVWolyQpZAeuQNyK4PFpVo.exeiSpYFsXk9nrErrCPdlyXl5xA.exeLsgZrTCtJZvKhvFuKclICGKO.exei6g7EZ2yfQWuBHBL8eJ4ebuy.exeaeKG6alpWG7BThHrSZ2d0MBN.exeHs5Okw5erNnkkS4et8PnsaMO.exexNFEuPvreN4kqdxlgkDhFH09.exexv7pPScDzu4FwTBPLHyznQW1.exei6QswwA1CSrlJniofrQhHvSL.exeJVYrYrj1odYWfEj5MX8d6Pau.exeiSpYFsXk9nrErrCPdlyXl5xA.exemultitimer.exemultitimer.exemultitimer.exemultitimer.exesetups.exe909241.9setups.exesetups.tmp1380028.154106991.452979255.32setups.tmpWindows Host.exemultitimer.exemultitimer.exepid process 2268 1OdBw50emClNYbnlhAiPcd9X.exe 1996 09766142298.exe 4068 08105887548.exe 2668 09766142298.exe 3556 09766142298.exe 500 ZPirRGHDyXZ5DOgm9nehiJru.exe 2884 McFLH4cQiy0RZvRFzvR5PemU.exe 2656 09qWwsiooH9CAptxQP8SinQH.exe 2904 JVYrYrj1odYWfEj5MX8d6Pau.exe 724 5ozjNM4kVMXfkEATAws87FG5.exe 3768 h4kVWolyQpZAeuQNyK4PFpVo.exe 1848 iSpYFsXk9nrErrCPdlyXl5xA.exe 1304 LsgZrTCtJZvKhvFuKclICGKO.exe 3008 i6g7EZ2yfQWuBHBL8eJ4ebuy.exe 364 aeKG6alpWG7BThHrSZ2d0MBN.exe 1348 Hs5Okw5erNnkkS4et8PnsaMO.exe 4100 xNFEuPvreN4kqdxlgkDhFH09.exe 4136 xv7pPScDzu4FwTBPLHyznQW1.exe 4284 i6QswwA1CSrlJniofrQhHvSL.exe 4564 JVYrYrj1odYWfEj5MX8d6Pau.exe 4660 iSpYFsXk9nrErrCPdlyXl5xA.exe 5004 multitimer.exe 5016 multitimer.exe 5028 multitimer.exe 1040 multitimer.exe 1232 setups.exe 4276 909241.9 4268 setups.exe 4524 setups.tmp 3704 1380028.15 4540 4106991.45 4288 2979255.32 4764 setups.tmp 4636 Windows Host.exe 5632 multitimer.exe 5708 multitimer.exe -
Sets service image path in registry 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
setups.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp -
Loads dropped DLL 27 IoCs
Processes:
JVYrYrj1odYWfEj5MX8d6Pau.exe09766142298.exesetups.tmpsetups.tmp5ozjNM4kVMXfkEATAws87FG5.exeaeKG6alpWG7BThHrSZ2d0MBN.exepid process 4564 JVYrYrj1odYWfEj5MX8d6Pau.exe 3556 09766142298.exe 4524 setups.tmp 4524 setups.tmp 4524 setups.tmp 4524 setups.tmp 4524 setups.tmp 4764 setups.tmp 4764 setups.tmp 4764 setups.tmp 4524 setups.tmp 4524 setups.tmp 4764 setups.tmp 4764 setups.tmp 4764 setups.tmp 4764 setups.tmp 3556 09766142298.exe 3556 09766142298.exe 3556 09766142298.exe 3556 09766142298.exe 3556 09766142298.exe 3556 09766142298.exe 3556 09766142298.exe 724 5ozjNM4kVMXfkEATAws87FG5.exe 724 5ozjNM4kVMXfkEATAws87FG5.exe 364 aeKG6alpWG7BThHrSZ2d0MBN.exe 364 aeKG6alpWG7BThHrSZ2d0MBN.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
multitimer.exeSecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\u34g321x4w5 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\HDHRUJ1459\\multitimer.exe\" 1 3.1616421316.6058a1c425626" multitimer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\JGBX4s9kehQYWTo3ciONxYpDNr3Qiscz = "C:\\Users\\Admin\\Documents\\ER2eY5LCiHj8Rjg505JAlPMg.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\tvrL6SJkdxpwNofccoEKwulLnLBFofsJ = "C:\\Users\\Admin\\Documents\\GmsxiEpY6ZnhmkPBMnpPy6U7.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\FqyHQx4Z565hCABYgnWKFCUEkPmjrrHR = "C:\\Users\\Admin\\Documents\\y99wXRHiptNZUIbVHzFRehOm.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\aoriwvG790kPGOUqSVYooM4XVdZhh0YH = "C:\\Users\\Admin\\Documents\\i6g7EZ2yfQWuBHBL8eJ4ebuy.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\QXXwFeOfNW2fFOAeCsmjBzLBgiT3m01H = "C:\\Users\\Admin\\Documents\\jFm07rXMHHuZ8V7ZHz6bQbRX.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\hAovMplb5sOiRypZfzarRssBVCv4X0KG = "C:\\Users\\Admin\\Documents\\qyfIdg7MBci4lYy5uUh02jlk.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\qjyH2NQrgrxGmziQl7NeV2KL1iUThtYN = "C:\\Users\\Admin\\Documents\\aeKG6alpWG7BThHrSZ2d0MBN.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\7Fb7uMS2xyhtwwogTZO7A8LacDPTVMLJ = "C:\\Users\\Admin\\Documents\\H8hTvxuDBf8Gc2aB0jhok85d.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\8gcLWPeOghU38PVMDIYf8Ty3tgomrtdy = "C:\\Users\\Admin\\Documents\\1jrdtF5VMEUFCoQsliEhJDwH.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\JMPybrGAusXUCfPGFF5XCS0kZ2L5DLHd = "C:\\Users\\Admin\\Documents\\yXJkQiFHss2dn1Ixeae3mVGg.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\hwbTZRLBzdOdeK7TaVQali0wQwFYdkm2 = "C:\\Users\\Admin\\Documents\\Kkrn1Gea4ITjvV58j9Ge7SRa.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\O5VFnCgHz8Poi9K2YWzjqUUaYyG6Nxqy = "C:\\Users\\Admin\\Documents\\3g8sMEcwbBFwKDe9XbOGgEKl.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\cw08b9H6iX75LpX93uO8Wh24kYTE6b1S = "C:\\Users\\Admin\\Documents\\oA3fkLPDV9EoZPlhwgjGFVgC.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\5hVBK1hTN4hugBwZpoMC4TboNCktZx9l = "C:\\Users\\Admin\\Documents\\SYH5UsSSZNCaU128X3Ou6qkI.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\c6ZXmexJ0QfmtBFc1m128h2xYmPT27Jx = "C:\\Users\\Admin\\Documents\\ep4aypXoteqt0nA2rNGrqA8r.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\qOhRPQteNPDpGmedcpYQrlVkwijyeuTC = "C:\\Users\\Admin\\Documents\\prkI5bkRu7pSmDp3yZtHYmfk.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\gZ5lyM4v6CNZTwimOEWsHzZweVEj54dI = "C:\\Users\\Admin\\Documents\\BvNh0l3x0tqJXey1LMpWE3T6.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\dbPV985XmVyIq32OyEMzpqzznw70xAxv = "C:\\Users\\Admin\\Documents\\ffcOkV27vMNnhZf15pVKdtdQ.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\eCnRFQyHy7DpaY1hvsYZ0o777NInSnAR = "C:\\Users\\Admin\\Documents\\ZHutPO6qqRWN8R0Hae2vEHSJ.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Sy7RdiwFFLkFXd3w9zRWOgam0ojVjLm1 = "C:\\Users\\Admin\\Documents\\G5zlLB3X9ACB0GbiJa2yAPCk.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\rAapsWKO6fSPMI0JUbE8LEXxwvJ7jraa = "C:\\Users\\Admin\\Documents\\ap8cJClsYMseANnOQfFPd9a0.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\A0xw8KIBxsPAG7RPMTmcg40IOKq0iXe4 = "C:\\Users\\Admin\\Documents\\snP2zvC2PkYIZ2wEqBgQtxFK.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\CCAKhQtbz4adDn0OgG75eiHWLMWmhR5n = "C:\\Users\\Admin\\Documents\\i1QN2A4Ygvv6v6gjTFKsx4xB.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\AIHdHUzBiE7DvH56Fs2MmEeExq52xdl0 = "C:\\Users\\Admin\\Documents\\bQBaqR9oz5NVRZiYoDH9glzq.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\NEEcuskpmNXXdDAfVrzNQ3QkxDDTwLMr = "C:\\Users\\Admin\\Documents\\mk25o4CY8ro1yii5P2mn35ze.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\HdV97ECGceobqxizYOcnaVJKXn9xHcz9 = "C:\\Users\\Admin\\Documents\\BWvyUgUxAcDvHtqz7DBTFCQK.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\6pCnMwhP1WLNE2nOUndSzjozSpWpgA0b = "C:\\Users\\Admin\\Documents\\SQGEpLAm7StRHbeZBxElB0z9.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\6VMi54EeQoDMwny24jxYgY38gOSYZgsV = "C:\\Users\\Admin\\Documents\\PHLlfE6qzSruWVIC2qqvO4J4.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\w0oNtSctHMHuG1AtT7t2ZHdAcJ3qyYNU = "C:\\Users\\Admin\\Documents\\rq4WvfW5ai1soqOOrZaR9XCo.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\4t2ulNtlAlHCLyOeghX6iKvSiadC7C2C = "C:\\Users\\Admin\\Documents\\kXwVRm2NhsA59gn70zDVMiTU.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wt4TCuXULh9w8lWQGuU2jkQEUujjffut = "C:\\Users\\Admin\\Documents\\GXy7xWxSLma9fqCIqfFTLXj3.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\c4rqXIYdizcMsMGgoKNoF5vebiqqWhEu = "C:\\Users\\Admin\\Documents\\kyjmf7OcQHLbSGD1Al6JD09L.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\nCpaZ7OEdHlaqXwjLXGbSSmSDYumjxHy = "C:\\Users\\Admin\\Documents\\bUaiKghfFLwMbengHK3ytnE5.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\8liHMb7aZ18jay69AhpBTaHC5t6yvEN7 = "C:\\Users\\Admin\\Documents\\5FFNFEOyQ0bqUqZwIyJG58hN.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ZbyNkd9w9P8r7r1mgjOO74KQSQkp0hGJ = "C:\\Users\\Admin\\Documents\\hkTv8jB5QsPNJuH3kvwV7YhW.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\EHMxDz38tUnNsfz22JEeUSQV4jWMdahK = "C:\\Users\\Admin\\Documents\\qlUZaGCRbhARiEdbTMXE0f1x.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\zvQanIFImni0m6bcNhQf9afdSvVR6Y0X = "C:\\Users\\Admin\\Documents\\McFLH4cQiy0RZvRFzvR5PemU.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\dvAclYg2Bkuv11ZKjievoSzw7Mj4JNaw = "C:\\Users\\Admin\\Documents\\YF3uewOlQjLsM3Yaf52zGlh6.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\jK4an0QVFgPaCFUb43oWlLs1r2AbC3vk = "C:\\Users\\Admin\\Documents\\7PM7JR5MbJqxQBdkOqY3vWZ0.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ANUga2t1ftw7umG7NSiWJ3jBUNeqtcE5 = "C:\\Users\\Admin\\Documents\\bGIAIXaKudavQQVJKzRYXgKW.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\FCGyyNhAFb67oV0HAOM1D4CPBBPW1EoN = "C:\\Users\\Admin\\Documents\\JXwU56j0FxlejV0aagIgf5pJ.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\MviUeyRyGmzXiowL2bFnlqmug9To6pGC = "C:\\Users\\Admin\\Documents\\A4hNYltUM2bvWQhSywPBY7IT.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\v7xwNQrhAbxuISA9mkV2w9MnXsup2YXn = "C:\\Users\\Admin\\Documents\\p3GaiMqfGeLrzC7r2nDHVBpV.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\NLUByR1Xhtltl7tQ6hVYnbuJrtWrMrX9 = "C:\\Users\\Admin\\Documents\\nQUxHnzZKNjznIG4Ic8ZAoSn.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\wKJLbjWGas1n0Tku2U06yCSUrFmS8Ot1 = "C:\\Users\\Admin\\Documents\\ZPirRGHDyXZ5DOgm9nehiJru.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\GsSJXZCq9vt43ya0LZ0AfP5xVrlyMn1p = "C:\\Users\\Admin\\Documents\\Hs5Okw5erNnkkS4et8PnsaMO.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\WoYigL7jl4CZDLxya5vKj5HlHMvpXkEj = "C:\\Users\\Admin\\Documents\\RnbDSQpAl2s5dxu9KXxhZsd1.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\103edqeTwcdKKh8n5d0RvC4o0jz8N1tW = "C:\\Users\\Admin\\Documents\\thUS4POlnChOaPsxXfMqbXdv.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\TGcN4C7u0js5OVT37IodOOCG1UoXkuMQ = "C:\\Users\\Admin\\Documents\\ckpxrUc5E43XgQ1WMr6yhLfc.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\UKlUFP99opUFGsoDZgNdCfGIezS5h8Zd = "C:\\Users\\Admin\\Documents\\Gkq0LUz5Z7TnEPJJfM51kmuw.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\AoixeSdZOUcBESQ6ahAJiJfcM7GQTEt4 = "C:\\Users\\Admin\\Documents\\hE298P3EcWVqmw8suREZLnoG.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\FpU2HKzK7w0zJo6GH76lQ6uwgGA8nni5 = "C:\\Users\\Admin\\Documents\\ykPNlokacOYANKrCnUAWs3S0.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\QvDoJXXHojC11WHeHgqmi2nVppe2SAin = "C:\\Users\\Admin\\Documents\\eD8I0GLQBK2BWg4c8B2tJ16I.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\dz8RLxzqwP7DASyme3mdwRXEkeZqRTqI = "C:\\Users\\Admin\\Documents\\y5kDbePaPFy8rQJEJyNbCqUw.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\5n8V3H3i9xZzbBOwPq3KbQ0IqqXlFPpM = "C:\\Users\\Admin\\Documents\\EOLz9u1QCUG0gDfqP5Lq72he.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\EVWjXkKFWczC1tBsHmfFrFi4Mx9i3xtD = "C:\\Users\\Admin\\Documents\\FMek1OBC7Jh7h6H0XC1YhCOE.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\vfMM4BcqWOjPKhUYOI2Nby9wRTNQwlRh = "C:\\Users\\Admin\\Documents\\eIg9DCyyzTaDY7u9Zgl3e6Gv.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\sib0k2hwDfGZuIjTKa52tTjWwTZyPdJg = "C:\\Users\\Admin\\Documents\\xjfMmt87jFjfUXuVM2eAoQJo.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\icuhIcE2cBoy6XKwllMKYE2NwSzUOClw = "C:\\Users\\Admin\\Documents\\1IrnVCSiHuwkruRNwUzMkFmR.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\XCAcEJg34OTvZ5bDgIDAjaSOv2NOtTvg = "C:\\Users\\Admin\\Documents\\YDgGziguicSiw6Vo7orMX173.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\VuhBLVsNynwpTV5gVeWSh61q5fvA6QHr = "C:\\Users\\Admin\\Documents\\uXqqc9S2yxeYN4THxru0KDgD.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\4qRTLZLNsjJUnWhtpteMybYf83cxWU2s = "C:\\Users\\Admin\\Documents\\PGIZSiWA3XTwp8jUWtEFzlbA.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\810Q8g5sFkjQDw8hDs9bjUBcpvkdi660 = "C:\\Users\\Admin\\Documents\\5ozjNM4kVMXfkEATAws87FG5.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
09766142298.exe09766142298.exeJVYrYrj1odYWfEj5MX8d6Pau.exeiSpYFsXk9nrErrCPdlyXl5xA.exedescription pid process target process PID 1996 set thread context of 2668 1996 09766142298.exe 09766142298.exe PID 2668 set thread context of 3556 2668 09766142298.exe 09766142298.exe PID 2904 set thread context of 4564 2904 JVYrYrj1odYWfEj5MX8d6Pau.exe JVYrYrj1odYWfEj5MX8d6Pau.exe PID 1848 set thread context of 4660 1848 iSpYFsXk9nrErrCPdlyXl5xA.exe iSpYFsXk9nrErrCPdlyXl5xA.exe -
Drops file in Windows directory 5 IoCs
Processes:
multitimer.exemultitimer.exeMicrosoftEdge.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4316 4288 WerFault.exe 2979255.32 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
JVYrYrj1odYWfEj5MX8d6Pau.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI JVYrYrj1odYWfEj5MX8d6Pau.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI JVYrYrj1odYWfEj5MX8d6Pau.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI JVYrYrj1odYWfEj5MX8d6Pau.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
08105887548.exe5ozjNM4kVMXfkEATAws87FG5.exeaeKG6alpWG7BThHrSZ2d0MBN.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 08105887548.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5ozjNM4kVMXfkEATAws87FG5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5ozjNM4kVMXfkEATAws87FG5.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 aeKG6alpWG7BThHrSZ2d0MBN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString aeKG6alpWG7BThHrSZ2d0MBN.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 08105887548.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 5 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 5360 timeout.exe 5396 timeout.exe 5416 timeout.exe 4948 timeout.exe 7360 timeout.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 2748 taskkill.exe 5124 taskkill.exe 632 taskkill.exe -
Processes:
MicrosoftEdge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000780a816d5a5fd31d36ad11eaade0e6f9b8f026088dbcd7111765624ecf471b673b0c66e0357a165f89fc6245d010c7c537017e5cf3ab49faa9375ab9c4efb5393fb327a7cda5a6e78319b6523bd9f7f4614608eceefbfa9417e70b3013017d96921e96951682ea338b234cb265db706294e047ed074dbfe1ae9375ceb91b09ce986f99c9fbafc2b3d23a6b464db6b715dcef52262f3f24fc5f5d27f146dfaec061c5c1ceedce6e5ca17e96c5030a40651794677d1272bd748d63d027cdebd1011f40ab13667ee54ad50f2d407b778aaf2ded1ad23986bcb86bc728f4c0e0a9a1c1ffe9adb15e6a76a80d739b409de09ff51b0d2da71b4a92cea78d5b595f8775b824f16e9b10bf73f298dd00991b08058c3e973af5d107ad7925a345b606e0f8aece0d482a335f459dd0d7dbb693c63a2977c2168448bd34bf5f96af4a77e2b9771dd800d666b14171d6bb32dca41a1aefe48d6a4b21ab7d147788aae250225936316437dc4baa0247c834cedeee3b87b1a6fdd922fa6dc09c8b732d8b32e219ab297cb94e81e06971c71631f011e2811eded0bb617407e227d9298a22d99fcc984c8b00d0c3 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "5" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{75E93821-7B8C-40A9-B2EC-1B230BC49B7A} = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 010000006903dcf78978b5931355a2e2420b6076f904ca41cdc312f35e83546ea2502bb2d0c4025d52d4d8f3cb61f1392b85a5958ab660ce604e137ff404d0654f6d716e4d8fa6e61a15e93775bf4d81215fc22bab02a383137f8d6e9c42 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\SplashScreen Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\DatastoreSchemaVersion = "8" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DontShowMeThisDialogAgain MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "{DB6C8AFF-250F-41AE-9B75-7E91397A5364}" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
setups.tmpsetups.tmppid process 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 4524 setups.tmp 4524 setups.tmp 3016 3016 4764 setups.tmp 4764 setups.tmp 3016 3016 3016 3016 3016 3016 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exepid process 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
i6QswwA1CSrlJniofrQhHvSL.exexNFEuPvreN4kqdxlgkDhFH09.exepid process 4284 i6QswwA1CSrlJniofrQhHvSL.exe 4284 i6QswwA1CSrlJniofrQhHvSL.exe 4284 i6QswwA1CSrlJniofrQhHvSL.exe 4100 xNFEuPvreN4kqdxlgkDhFH09.exe 4100 xNFEuPvreN4kqdxlgkDhFH09.exe 4100 xNFEuPvreN4kqdxlgkDhFH09.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
JVYrYrj1odYWfEj5MX8d6Pau.exepid process 4564 JVYrYrj1odYWfEj5MX8d6Pau.exe -
Suspicious use of AdjustPrivilegeToken 59 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exetaskkill.exe09qWwsiooH9CAptxQP8SinQH.exeLsgZrTCtJZvKhvFuKclICGKO.exeMcFLH4cQiy0RZvRFzvR5PemU.exeHs5Okw5erNnkkS4et8PnsaMO.exei6QswwA1CSrlJniofrQhHvSL.exexv7pPScDzu4FwTBPLHyznQW1.exeh4kVWolyQpZAeuQNyK4PFpVo.exexNFEuPvreN4kqdxlgkDhFH09.exe909241.94106991.45WerFault.exemultitimer.exemultitimer.exemultitimer.exemultitimer.exetaskkill.exetaskkill.exeMicrosoftEdge.exedescription pid process Token: SeDebugPrivilege 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Token: SeDebugPrivilege 2748 taskkill.exe Token: SeDebugPrivilege 2656 09qWwsiooH9CAptxQP8SinQH.exe Token: SeDebugPrivilege 1304 LsgZrTCtJZvKhvFuKclICGKO.exe Token: SeDebugPrivilege 2884 McFLH4cQiy0RZvRFzvR5PemU.exe Token: SeDebugPrivilege 1348 Hs5Okw5erNnkkS4et8PnsaMO.exe Token: SeLoadDriverPrivilege 4284 i6QswwA1CSrlJniofrQhHvSL.exe Token: SeLoadDriverPrivilege 4284 i6QswwA1CSrlJniofrQhHvSL.exe Token: SeLoadDriverPrivilege 4284 i6QswwA1CSrlJniofrQhHvSL.exe Token: SeDebugPrivilege 4136 xv7pPScDzu4FwTBPLHyznQW1.exe Token: SeDebugPrivilege 3768 h4kVWolyQpZAeuQNyK4PFpVo.exe Token: SeLoadDriverPrivilege 4100 xNFEuPvreN4kqdxlgkDhFH09.exe Token: SeLoadDriverPrivilege 4100 xNFEuPvreN4kqdxlgkDhFH09.exe Token: SeLoadDriverPrivilege 4100 xNFEuPvreN4kqdxlgkDhFH09.exe Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 Token: SeDebugPrivilege 4276 909241.9 Token: SeDebugPrivilege 4540 4106991.45 Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 Token: SeRestorePrivilege 4316 WerFault.exe Token: SeBackupPrivilege 4316 WerFault.exe Token: SeDebugPrivilege 4316 WerFault.exe Token: SeDebugPrivilege 5028 multitimer.exe Token: SeDebugPrivilege 5004 multitimer.exe Token: SeDebugPrivilege 5016 multitimer.exe Token: SeDebugPrivilege 1040 multitimer.exe Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 Token: SeTakeOwnershipPrivilege 3016 Token: SeRestorePrivilege 3016 Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 Token: SeDebugPrivilege 5124 taskkill.exe Token: SeDebugPrivilege 632 taskkill.exe Token: SeDebugPrivilege 4872 MicrosoftEdge.exe Token: SeDebugPrivilege 4872 MicrosoftEdge.exe Token: SeDebugPrivilege 4872 MicrosoftEdge.exe Token: SeDebugPrivilege 4872 MicrosoftEdge.exe Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
08105887548.exepid process 4068 08105887548.exe 4068 08105887548.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
MicrosoftEdge.exepid process 3016 4872 MicrosoftEdge.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3016 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe1OdBw50emClNYbnlhAiPcd9X.execmd.execmd.exe09766142298.execmd.exe09766142298.exedescription pid process target process PID 580 wrote to memory of 2268 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1OdBw50emClNYbnlhAiPcd9X.exe PID 580 wrote to memory of 2268 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1OdBw50emClNYbnlhAiPcd9X.exe PID 580 wrote to memory of 2268 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1OdBw50emClNYbnlhAiPcd9X.exe PID 2268 wrote to memory of 3888 2268 1OdBw50emClNYbnlhAiPcd9X.exe cmd.exe PID 2268 wrote to memory of 3888 2268 1OdBw50emClNYbnlhAiPcd9X.exe cmd.exe PID 2268 wrote to memory of 3888 2268 1OdBw50emClNYbnlhAiPcd9X.exe cmd.exe PID 3888 wrote to memory of 1996 3888 cmd.exe 09766142298.exe PID 3888 wrote to memory of 1996 3888 cmd.exe 09766142298.exe PID 3888 wrote to memory of 1996 3888 cmd.exe 09766142298.exe PID 2268 wrote to memory of 2636 2268 1OdBw50emClNYbnlhAiPcd9X.exe cmd.exe PID 2268 wrote to memory of 2636 2268 1OdBw50emClNYbnlhAiPcd9X.exe cmd.exe PID 2268 wrote to memory of 2636 2268 1OdBw50emClNYbnlhAiPcd9X.exe cmd.exe PID 2636 wrote to memory of 4068 2636 cmd.exe 08105887548.exe PID 2636 wrote to memory of 4068 2636 cmd.exe 08105887548.exe PID 2636 wrote to memory of 4068 2636 cmd.exe 08105887548.exe PID 2268 wrote to memory of 488 2268 1OdBw50emClNYbnlhAiPcd9X.exe cmd.exe PID 2268 wrote to memory of 488 2268 1OdBw50emClNYbnlhAiPcd9X.exe cmd.exe PID 2268 wrote to memory of 488 2268 1OdBw50emClNYbnlhAiPcd9X.exe cmd.exe PID 1996 wrote to memory of 2668 1996 09766142298.exe 09766142298.exe PID 1996 wrote to memory of 2668 1996 09766142298.exe 09766142298.exe PID 1996 wrote to memory of 2668 1996 09766142298.exe 09766142298.exe PID 1996 wrote to memory of 2668 1996 09766142298.exe 09766142298.exe PID 1996 wrote to memory of 2668 1996 09766142298.exe 09766142298.exe PID 1996 wrote to memory of 2668 1996 09766142298.exe 09766142298.exe PID 1996 wrote to memory of 2668 1996 09766142298.exe 09766142298.exe PID 1996 wrote to memory of 2668 1996 09766142298.exe 09766142298.exe PID 1996 wrote to memory of 2668 1996 09766142298.exe 09766142298.exe PID 488 wrote to memory of 2748 488 cmd.exe taskkill.exe PID 488 wrote to memory of 2748 488 cmd.exe taskkill.exe PID 488 wrote to memory of 2748 488 cmd.exe taskkill.exe PID 2668 wrote to memory of 3556 2668 09766142298.exe 09766142298.exe PID 2668 wrote to memory of 3556 2668 09766142298.exe 09766142298.exe PID 2668 wrote to memory of 3556 2668 09766142298.exe 09766142298.exe PID 2668 wrote to memory of 3556 2668 09766142298.exe 09766142298.exe PID 2668 wrote to memory of 3556 2668 09766142298.exe 09766142298.exe PID 2668 wrote to memory of 3556 2668 09766142298.exe 09766142298.exe PID 2668 wrote to memory of 3556 2668 09766142298.exe 09766142298.exe PID 2668 wrote to memory of 3556 2668 09766142298.exe 09766142298.exe PID 2668 wrote to memory of 3556 2668 09766142298.exe 09766142298.exe PID 580 wrote to memory of 2884 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe McFLH4cQiy0RZvRFzvR5PemU.exe PID 580 wrote to memory of 2884 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe McFLH4cQiy0RZvRFzvR5PemU.exe PID 580 wrote to memory of 2656 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 09qWwsiooH9CAptxQP8SinQH.exe PID 580 wrote to memory of 2656 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 09qWwsiooH9CAptxQP8SinQH.exe PID 580 wrote to memory of 500 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe ZPirRGHDyXZ5DOgm9nehiJru.exe PID 580 wrote to memory of 500 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe ZPirRGHDyXZ5DOgm9nehiJru.exe PID 580 wrote to memory of 500 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe ZPirRGHDyXZ5DOgm9nehiJru.exe PID 580 wrote to memory of 2904 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe JVYrYrj1odYWfEj5MX8d6Pau.exe PID 580 wrote to memory of 2904 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe JVYrYrj1odYWfEj5MX8d6Pau.exe PID 580 wrote to memory of 2904 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe JVYrYrj1odYWfEj5MX8d6Pau.exe PID 580 wrote to memory of 724 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 5ozjNM4kVMXfkEATAws87FG5.exe PID 580 wrote to memory of 724 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 5ozjNM4kVMXfkEATAws87FG5.exe PID 580 wrote to memory of 724 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 5ozjNM4kVMXfkEATAws87FG5.exe PID 580 wrote to memory of 3768 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe h4kVWolyQpZAeuQNyK4PFpVo.exe PID 580 wrote to memory of 3768 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe h4kVWolyQpZAeuQNyK4PFpVo.exe PID 580 wrote to memory of 1304 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe LsgZrTCtJZvKhvFuKclICGKO.exe PID 580 wrote to memory of 1304 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe LsgZrTCtJZvKhvFuKclICGKO.exe PID 580 wrote to memory of 1848 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe iSpYFsXk9nrErrCPdlyXl5xA.exe PID 580 wrote to memory of 1848 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe iSpYFsXk9nrErrCPdlyXl5xA.exe PID 580 wrote to memory of 1848 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe iSpYFsXk9nrErrCPdlyXl5xA.exe PID 580 wrote to memory of 3008 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe i6g7EZ2yfQWuBHBL8eJ4ebuy.exe PID 580 wrote to memory of 3008 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe i6g7EZ2yfQWuBHBL8eJ4ebuy.exe PID 580 wrote to memory of 3008 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe i6g7EZ2yfQWuBHBL8eJ4ebuy.exe PID 580 wrote to memory of 364 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe aeKG6alpWG7BThHrSZ2d0MBN.exe PID 580 wrote to memory of 364 580 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe aeKG6alpWG7BThHrSZ2d0MBN.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\1OdBw50emClNYbnlhAiPcd9X.exe"C:\Users\Admin\Documents\1OdBw50emClNYbnlhAiPcd9X.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\09766142298.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\09766142298.exe"C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\09766142298.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\09766142298.exe"C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\09766142298.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\09766142298.exe"C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\09766142298.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\09766142298.exe"7⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK8⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\08105887548.exe" /mix3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\08105887548.exe"C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\08105887548.exe" /mix4⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\Skinks.exe"C:\Users\Admin\AppData\Local\Temp\Skinks.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"7⤵
-
C:\Users\Admin\AppData\Local\Temp\New Feature\6.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\6.exe"6⤵
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CmD < Veduto.aspx7⤵
-
C:\Windows\SysWOW64\cmd.exeCmD8⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^aTBSeprklsEdUBjaIQPOTdrkjIzkdxVxYGzCSmbkAwUsrqIIuWPCefDwPdGzQRVQvlagiKmozDgScLijqKtxFzsIrsMCTrcIutVTIzBvvGonwL$" Ama.aspx9⤵
-
C:\Users\Admin\AppData\Roaming\oSXbHZepFnQhkxxrjgN\Allora.exe.comAllora.exe.com S9⤵
-
C:\Users\Admin\AppData\Roaming\oSXbHZepFnQhkxxrjgN\Allora.exe.comC:\Users\Admin\AppData\Roaming\oSXbHZepFnQhkxxrjgN\Allora.exe.com S10⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 309⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"6⤵
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CmD < Sospettoso.xlsx7⤵
-
C:\Windows\SysWOW64\cmd.exeCmD8⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^yZVxJnOtboCOwYACmuqprbTxDxRIXwIZDiDmtkKRJgAQVpuqCvmPrrQHuBQfGyicmDlUxwbhvpmOWrnxhQuACSVAsVaDcxlDitdaYjFBYkzUEwLrevwQZGTHHKCmIUSwYVHRMucwlFCd$" Fermare.xlsx9⤵
-
C:\Users\Admin\AppData\Roaming\AdikuzPulW\Dimmi.exe.comDimmi.exe.com x9⤵
-
C:\Users\Admin\AppData\Roaming\AdikuzPulW\Dimmi.exe.comC:\Users\Admin\AppData\Roaming\AdikuzPulW\Dimmi.exe.com x10⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 309⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\New Feature\5.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\5.exe"6⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c icacls "C:\Users\Admin\AppData\Local\Disk" /inheritance:e /deny "Admin:(R,REA,RA,RD)" & attrib +s +h "C:\Users\Admin\AppData\Local\Disk" & schtasks /create /tn \Services\Diagnostic /tr "'C:\Users\Admin\AppData\Local\Disk\AutoIt3\AutoIt3_x64.exe' 'C:\Users\Admin\AppData\Local\Disk\AutoIt3\Settings.au3'" /st 00:04 /du 9906:30 /sc once /ri 1 /f7⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\AppData\Local\Disk" /inheritance:e /deny "Admin:(R,REA,RA,RD)"8⤵
- Modifies file permissions
-
C:\Windows\system32\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Local\Disk"8⤵
- Views/modifies file attributes
-
C:\Windows\system32\schtasks.exeschtasks /create /tn \Services\Diagnostic /tr "'C:\Users\Admin\AppData\Local\Disk\AutoIt3\AutoIt3_x64.exe' 'C:\Users\Admin\AppData\Local\Disk\AutoIt3\Settings.au3'" /st 00:04 /du 9906:30 /sc once /ri 1 /f8⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Vellerese.vbs"7⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\New Feature\5.exe"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 28⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\PPRwHyVNDig & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\08105887548.exe"5⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 36⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "1OdBw50emClNYbnlhAiPcd9X.exe" /f & erase "C:\Users\Admin\Documents\1OdBw50emClNYbnlhAiPcd9X.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "1OdBw50emClNYbnlhAiPcd9X.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\JVYrYrj1odYWfEj5MX8d6Pau.exe"C:\Users\Admin\Documents\JVYrYrj1odYWfEj5MX8d6Pau.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\JVYrYrj1odYWfEj5MX8d6Pau.exe"C:\Users\Admin\Documents\JVYrYrj1odYWfEj5MX8d6Pau.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Documents\ZPirRGHDyXZ5DOgm9nehiJru.exe"C:\Users\Admin\Documents\ZPirRGHDyXZ5DOgm9nehiJru.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\5ozjNM4kVMXfkEATAws87FG5.exe"C:\Users\Admin\Documents\5ozjNM4kVMXfkEATAws87FG5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5ozjNM4kVMXfkEATAws87FG5.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\5ozjNM4kVMXfkEATAws87FG5.exe" & del C:\ProgramData\*.dll & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5ozjNM4kVMXfkEATAws87FG5.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Documents\09qWwsiooH9CAptxQP8SinQH.exe"C:\Users\Admin\Documents\09qWwsiooH9CAptxQP8SinQH.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1053⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exe" 1 3.1616421316.6058a1c41d9aa 1054⤵
-
C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exe" 2 3.1616421316.6058a1c41d9aa5⤵
-
C:\Users\Admin\Documents\McFLH4cQiy0RZvRFzvR5PemU.exe"C:\Users\Admin\Documents\McFLH4cQiy0RZvRFzvR5PemU.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXD3HY0Z94\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\IXD3HY0Z94\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1053⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXD3HY0Z94\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\IXD3HY0Z94\multitimer.exe" 1 3.1616421316.6058a1c41ec43 1054⤵
-
C:\Users\Admin\AppData\Local\Temp\IXD3HY0Z94\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\IXD3HY0Z94\multitimer.exe" 2 3.1616421316.6058a1c41ec435⤵
-
C:\Users\Admin\AppData\Local\Temp\KCLKS4DLCD\setups.exe"C:\Users\Admin\AppData\Local\Temp\KCLKS4DLCD\setups.exe" ll3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-P4O7N.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-P4O7N.tmp\setups.tmp" /SL5="$1D004A,290870,64000,C:\Users\Admin\AppData\Local\Temp\KCLKS4DLCD\setups.exe" ll4⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Documents\aeKG6alpWG7BThHrSZ2d0MBN.exe"C:\Users\Admin\Documents\aeKG6alpWG7BThHrSZ2d0MBN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im aeKG6alpWG7BThHrSZ2d0MBN.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\aeKG6alpWG7BThHrSZ2d0MBN.exe" & del C:\ProgramData\*.dll & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im aeKG6alpWG7BThHrSZ2d0MBN.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Documents\Hs5Okw5erNnkkS4et8PnsaMO.exe"C:\Users\Admin\Documents\Hs5Okw5erNnkkS4et8PnsaMO.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\NOZUJM1YIS\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\NOZUJM1YIS\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1053⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\NOZUJM1YIS\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\NOZUJM1YIS\multitimer.exe" 1 3.1616421316.6058a1c41dd55 1054⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\NOZUJM1YIS\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\NOZUJM1YIS\multitimer.exe" 2 3.1616421316.6058a1c41dd555⤵
-
C:\Users\Admin\AppData\Local\Temp\FVKSBMSN1P\setups.exe"C:\Users\Admin\AppData\Local\Temp\FVKSBMSN1P\setups.exe" ll3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-HQT5V.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-HQT5V.tmp\setups.tmp" /SL5="$9005E,290870,64000,C:\Users\Admin\AppData\Local\Temp\FVKSBMSN1P\setups.exe" ll4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Documents\xv7pPScDzu4FwTBPLHyznQW1.exe"C:\Users\Admin\Documents\xv7pPScDzu4FwTBPLHyznQW1.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\909241.9"C:\ProgramData\909241.9"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\1380028.15"C:\ProgramData\1380028.15"3⤵
- Executes dropped EXE
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\i6QswwA1CSrlJniofrQhHvSL.exe"C:\Users\Admin\Documents\i6QswwA1CSrlJniofrQhHvSL.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\xNFEuPvreN4kqdxlgkDhFH09.exe"C:\Users\Admin\Documents\xNFEuPvreN4kqdxlgkDhFH09.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\i6g7EZ2yfQWuBHBL8eJ4ebuy.exe"C:\Users\Admin\Documents\i6g7EZ2yfQWuBHBL8eJ4ebuy.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\iSpYFsXk9nrErrCPdlyXl5xA.exe"C:\Users\Admin\Documents\iSpYFsXk9nrErrCPdlyXl5xA.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\iSpYFsXk9nrErrCPdlyXl5xA.exe"C:\Users\Admin\Documents\iSpYFsXk9nrErrCPdlyXl5xA.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\LsgZrTCtJZvKhvFuKclICGKO.exe"C:\Users\Admin\Documents\LsgZrTCtJZvKhvFuKclICGKO.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1053⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exe" 1 3.1616421316.6058a1c425626 1054⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exe" 2 3.1616421316.6058a1c4256265⤵
-
C:\Users\Admin\Documents\h4kVWolyQpZAeuQNyK4PFpVo.exe"C:\Users\Admin\Documents\h4kVWolyQpZAeuQNyK4PFpVo.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\2979255.32"C:\ProgramData\2979255.32"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 11244⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\4106991.45"C:\ProgramData\4106991.45"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Local\Temp\59D4.tmp.exeC:\Users\Admin\AppData\Local\Temp\59D4.tmp.exe1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Roaming\rcjetvfC:\Users\Admin\AppData\Roaming\rcjetvf1⤵
-
C:\Users\Admin\AppData\Local\Disk\AutoIt3\AutoIt3_x64.exeC:\Users\Admin\AppData\Local\Disk\AutoIt3\AutoIt3_x64.exe "C:\Users\Admin\AppData\Local\Disk\AutoIt3\Settings.au3"1⤵
-
C:\Users\Admin\AppData\Local\Temp\8C01.tmp.exeC:\Users\Admin\AppData\Local\Temp\8C01.tmp.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\A352.tmp.exeC:\Users\Admin\AppData\Local\Temp\A352.tmp.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Hidden Files and Directories
2Modify Registry
3File Permissions Modification
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\1380028.15MD5
24c4a7e5a55c14695c52eecda5703130
SHA1e1ee0a177616e126e1adea68da00b998a0ec342d
SHA256f6d16539af6379713e8a54debf880140e48492241e820db2dc8dc49c45d240b0
SHA5127f0e91261e149f2cfcd68e069b51983ef4d1834d28756f84df155905989b714bbf90ad54e11913ff1bff9f05557f01aa8a7bc60a4c042e430cbd2ee52d42fb7f
-
C:\ProgramData\1380028.15MD5
24c4a7e5a55c14695c52eecda5703130
SHA1e1ee0a177616e126e1adea68da00b998a0ec342d
SHA256f6d16539af6379713e8a54debf880140e48492241e820db2dc8dc49c45d240b0
SHA5127f0e91261e149f2cfcd68e069b51983ef4d1834d28756f84df155905989b714bbf90ad54e11913ff1bff9f05557f01aa8a7bc60a4c042e430cbd2ee52d42fb7f
-
C:\ProgramData\4106991.45MD5
5378979a5785412ccb0e225ced77edb5
SHA1cc8d3bdc64e253cb7613828ee30b12538131d561
SHA256ca1cefe7d1a07210c0a8e7633d13cd2b02d356356d5684d1c2329af0070e0b8e
SHA5126f7ecaa35d3bdfd8b44914e0af34dd8a4ae05edc470431af111aee7562d3048f3034aee213c6259b887af6339d06a79814a63bb2cc879a32a8ffbc8a8317816f
-
C:\ProgramData\4106991.45MD5
5378979a5785412ccb0e225ced77edb5
SHA1cc8d3bdc64e253cb7613828ee30b12538131d561
SHA256ca1cefe7d1a07210c0a8e7633d13cd2b02d356356d5684d1c2329af0070e0b8e
SHA5126f7ecaa35d3bdfd8b44914e0af34dd8a4ae05edc470431af111aee7562d3048f3034aee213c6259b887af6339d06a79814a63bb2cc879a32a8ffbc8a8317816f
-
C:\ProgramData\909241.9MD5
5378979a5785412ccb0e225ced77edb5
SHA1cc8d3bdc64e253cb7613828ee30b12538131d561
SHA256ca1cefe7d1a07210c0a8e7633d13cd2b02d356356d5684d1c2329af0070e0b8e
SHA5126f7ecaa35d3bdfd8b44914e0af34dd8a4ae05edc470431af111aee7562d3048f3034aee213c6259b887af6339d06a79814a63bb2cc879a32a8ffbc8a8317816f
-
C:\ProgramData\909241.9MD5
5378979a5785412ccb0e225ced77edb5
SHA1cc8d3bdc64e253cb7613828ee30b12538131d561
SHA256ca1cefe7d1a07210c0a8e7633d13cd2b02d356356d5684d1c2329af0070e0b8e
SHA5126f7ecaa35d3bdfd8b44914e0af34dd8a4ae05edc470431af111aee7562d3048f3034aee213c6259b887af6339d06a79814a63bb2cc879a32a8ffbc8a8317816f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157MD5
b36036ea05943e1a76472d713b8fcaf8
SHA1d6fdd8c136667712c6fb4b618f70ba682e95dfb2
SHA256e1226c395ff3cbdff09aa8e4e8bad3a02e8341a6300d4e72c738b7b7c7674121
SHA51278737cc4812f7837dad6b6ebafbf96243cf283c3fd3adce6c1cef29874d9749d38d0dfe146caa0d081200fdb59878fd2feb5796e8e9ad7ccf535bc9f09c4d193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157MD5
40186136356dee48e5dfceb97dc34ec4
SHA17647440974c2e6a89f22932172235a2801f72c6e
SHA25600f1284154a1cea12807c70fd66310e4b06f0c21e67df093d1a041751d07028c
SHA51277f4e1a3f87a83a93b7412458dcfdeac7bc273880a96b4d3218ac9a00ebb6f233da3741287858160bfbd0c45f60c0af9d137fc5005a458f01ae6d415b973697a
-
C:\Users\Admin\AppData\Local\Temp\FVKSBMSN1P\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\FVKSBMSN1P\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exe.configMD5
3f1498c07d8713fe5c315db15a2a2cf3
SHA1ef5f42fd21f6e72bdc74794f2496884d9c40bbfb
SHA25652ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0
SHA512cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d
-
C:\Users\Admin\AppData\Local\Temp\HDHRUJ1459\multitimer.exe.configMD5
3f1498c07d8713fe5c315db15a2a2cf3
SHA1ef5f42fd21f6e72bdc74794f2496884d9c40bbfb
SHA25652ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0
SHA512cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d
-
C:\Users\Admin\AppData\Local\Temp\IXD3HY0Z94\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\IXD3HY0Z94\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\IXD3HY0Z94\multitimer.exe.configMD5
3f1498c07d8713fe5c315db15a2a2cf3
SHA1ef5f42fd21f6e72bdc74794f2496884d9c40bbfb
SHA25652ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0
SHA512cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d
-
C:\Users\Admin\AppData\Local\Temp\KCLKS4DLCD\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\KCLKS4DLCD\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\NOZUJM1YIS\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\NOZUJM1YIS\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\NOZUJM1YIS\multitimer.exe.configMD5
3f1498c07d8713fe5c315db15a2a2cf3
SHA1ef5f42fd21f6e72bdc74794f2496884d9c40bbfb
SHA25652ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0
SHA512cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d
-
C:\Users\Admin\AppData\Local\Temp\is-P4O7N.tmp\setups.tmpMD5
f0078bb51601997fc35eb4d048471554
SHA1e1577d111803636347d16c8c306892f3a1092ce3
SHA256a35552a160dfc65ed85d8920b7a6c6a6c73f8bd3133ff50839e04eb2b00f9e57
SHA5124f160431b55d8b800e9051b504582ab1f65cec0bbeeed1e7dadeb70931220f9f0132ba251feb312d92acca1dbe2c63b6b8a20d937bee533d3532e2a3dda324c4
-
C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\08105887548.exeMD5
6f5b1279d943e548259d62f00650044a
SHA1367d5ff6ee971fcac30cf8b453eea8f47a936264
SHA256118f24dab3dce4a5ae6e3ab078551cbc628b475abeeafa07a5972622aaa38812
SHA51275e655e6df832bccafca641f0af62165da644a92ce3055d30b12b2dd0d241df4b43ea4de4429e3719b9e7f198882c5a0b3f44ab45900797d41787fdaf60988fe
-
C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\08105887548.exeMD5
6f5b1279d943e548259d62f00650044a
SHA1367d5ff6ee971fcac30cf8b453eea8f47a936264
SHA256118f24dab3dce4a5ae6e3ab078551cbc628b475abeeafa07a5972622aaa38812
SHA51275e655e6df832bccafca641f0af62165da644a92ce3055d30b12b2dd0d241df4b43ea4de4429e3719b9e7f198882c5a0b3f44ab45900797d41787fdaf60988fe
-
C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\09766142298.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\09766142298.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\09766142298.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\AppData\Local\Temp\{rvf8-WELd8-uEjH-WwSyB}\09766142298.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\Documents\09qWwsiooH9CAptxQP8SinQH.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\09qWwsiooH9CAptxQP8SinQH.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\1OdBw50emClNYbnlhAiPcd9X.exeMD5
cc2b897a91d0e189e081473ee554e37d
SHA13dfe8c741dd26370d36cbd102f7bde77a2d81d0e
SHA256b0f0ac24292740006b0b9b5144ef4a94c38ea71065b643bd1d847b3fb3015c47
SHA5128d8215a7c7da32d5343a36edcd7e84138557a5a3724b8ff263ca319dbfef1e5b4e512a11d5a51f3a63259ba9d41e9db2abeb20c2bad88c76b7ed0285eafd830d
-
C:\Users\Admin\Documents\1OdBw50emClNYbnlhAiPcd9X.exeMD5
cc2b897a91d0e189e081473ee554e37d
SHA13dfe8c741dd26370d36cbd102f7bde77a2d81d0e
SHA256b0f0ac24292740006b0b9b5144ef4a94c38ea71065b643bd1d847b3fb3015c47
SHA5128d8215a7c7da32d5343a36edcd7e84138557a5a3724b8ff263ca319dbfef1e5b4e512a11d5a51f3a63259ba9d41e9db2abeb20c2bad88c76b7ed0285eafd830d
-
C:\Users\Admin\Documents\5ozjNM4kVMXfkEATAws87FG5.exeMD5
2c5431a47044915c3af281683f374c95
SHA10a228dfe15afb1f6a0c9a615a557f96ddb3d2b96
SHA25602b6aee180e967f7564c8f4f85f2ad17350c4c66fb258ff5b23546bd0a5d6373
SHA512849c8f3cfe5e485d1e0e29bc30dc9ee3f79425a1b8cca99b851e0b5246c9cf22c7abcb7a915167283b6c700e45c6ba1c491de8f293b9977f1cc87a3b69317bcd
-
C:\Users\Admin\Documents\5ozjNM4kVMXfkEATAws87FG5.exeMD5
2c5431a47044915c3af281683f374c95
SHA10a228dfe15afb1f6a0c9a615a557f96ddb3d2b96
SHA25602b6aee180e967f7564c8f4f85f2ad17350c4c66fb258ff5b23546bd0a5d6373
SHA512849c8f3cfe5e485d1e0e29bc30dc9ee3f79425a1b8cca99b851e0b5246c9cf22c7abcb7a915167283b6c700e45c6ba1c491de8f293b9977f1cc87a3b69317bcd
-
C:\Users\Admin\Documents\Hs5Okw5erNnkkS4et8PnsaMO.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\Hs5Okw5erNnkkS4et8PnsaMO.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\JVYrYrj1odYWfEj5MX8d6Pau.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
C:\Users\Admin\Documents\JVYrYrj1odYWfEj5MX8d6Pau.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
C:\Users\Admin\Documents\JVYrYrj1odYWfEj5MX8d6Pau.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
C:\Users\Admin\Documents\LsgZrTCtJZvKhvFuKclICGKO.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\LsgZrTCtJZvKhvFuKclICGKO.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\McFLH4cQiy0RZvRFzvR5PemU.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\McFLH4cQiy0RZvRFzvR5PemU.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\ZPirRGHDyXZ5DOgm9nehiJru.exeMD5
becdeb62e5a3beb6a24157d7e417bd6d
SHA1fcf81b0600f892a481f95b745ea04f085c814a44
SHA2566641d02af929defb1d8c283f82e56b4f8fc289a8ec963b98f08676bd30ca29ba
SHA5124038d204060ff6585a359685bfb2ba52bd02d25ce239051410a895be88f07febbbae2e8eb2ee3592bb8a24c6fce35b76dce4268a01df09f2feb13f6a71a27a90
-
C:\Users\Admin\Documents\ZPirRGHDyXZ5DOgm9nehiJru.exeMD5
becdeb62e5a3beb6a24157d7e417bd6d
SHA1fcf81b0600f892a481f95b745ea04f085c814a44
SHA2566641d02af929defb1d8c283f82e56b4f8fc289a8ec963b98f08676bd30ca29ba
SHA5124038d204060ff6585a359685bfb2ba52bd02d25ce239051410a895be88f07febbbae2e8eb2ee3592bb8a24c6fce35b76dce4268a01df09f2feb13f6a71a27a90
-
C:\Users\Admin\Documents\aeKG6alpWG7BThHrSZ2d0MBN.exeMD5
2c5431a47044915c3af281683f374c95
SHA10a228dfe15afb1f6a0c9a615a557f96ddb3d2b96
SHA25602b6aee180e967f7564c8f4f85f2ad17350c4c66fb258ff5b23546bd0a5d6373
SHA512849c8f3cfe5e485d1e0e29bc30dc9ee3f79425a1b8cca99b851e0b5246c9cf22c7abcb7a915167283b6c700e45c6ba1c491de8f293b9977f1cc87a3b69317bcd
-
C:\Users\Admin\Documents\aeKG6alpWG7BThHrSZ2d0MBN.exeMD5
2c5431a47044915c3af281683f374c95
SHA10a228dfe15afb1f6a0c9a615a557f96ddb3d2b96
SHA25602b6aee180e967f7564c8f4f85f2ad17350c4c66fb258ff5b23546bd0a5d6373
SHA512849c8f3cfe5e485d1e0e29bc30dc9ee3f79425a1b8cca99b851e0b5246c9cf22c7abcb7a915167283b6c700e45c6ba1c491de8f293b9977f1cc87a3b69317bcd
-
C:\Users\Admin\Documents\h4kVWolyQpZAeuQNyK4PFpVo.exeMD5
3a43f860afe6941d92f53046bbd6194c
SHA11ac615c10f7a6aa5b82b0569189f9d98972a6544
SHA2561e801ec01234ce075108618a4bdcff570ffff471c64eaf602a87531a6b35fb28
SHA512e23d5a39e6df3360f849e527afb055eca6466b3c35a3ab01c5aee33307d5c647a24730431c98598e3ca83a3df12862b88f612a769bf1cdeb4cb16e72f08b0cce
-
C:\Users\Admin\Documents\h4kVWolyQpZAeuQNyK4PFpVo.exeMD5
3a43f860afe6941d92f53046bbd6194c
SHA11ac615c10f7a6aa5b82b0569189f9d98972a6544
SHA2561e801ec01234ce075108618a4bdcff570ffff471c64eaf602a87531a6b35fb28
SHA512e23d5a39e6df3360f849e527afb055eca6466b3c35a3ab01c5aee33307d5c647a24730431c98598e3ca83a3df12862b88f612a769bf1cdeb4cb16e72f08b0cce
-
C:\Users\Admin\Documents\i6QswwA1CSrlJniofrQhHvSL.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
C:\Users\Admin\Documents\i6QswwA1CSrlJniofrQhHvSL.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
C:\Users\Admin\Documents\i6g7EZ2yfQWuBHBL8eJ4ebuy.exeMD5
becdeb62e5a3beb6a24157d7e417bd6d
SHA1fcf81b0600f892a481f95b745ea04f085c814a44
SHA2566641d02af929defb1d8c283f82e56b4f8fc289a8ec963b98f08676bd30ca29ba
SHA5124038d204060ff6585a359685bfb2ba52bd02d25ce239051410a895be88f07febbbae2e8eb2ee3592bb8a24c6fce35b76dce4268a01df09f2feb13f6a71a27a90
-
C:\Users\Admin\Documents\i6g7EZ2yfQWuBHBL8eJ4ebuy.exeMD5
becdeb62e5a3beb6a24157d7e417bd6d
SHA1fcf81b0600f892a481f95b745ea04f085c814a44
SHA2566641d02af929defb1d8c283f82e56b4f8fc289a8ec963b98f08676bd30ca29ba
SHA5124038d204060ff6585a359685bfb2ba52bd02d25ce239051410a895be88f07febbbae2e8eb2ee3592bb8a24c6fce35b76dce4268a01df09f2feb13f6a71a27a90
-
C:\Users\Admin\Documents\iSpYFsXk9nrErrCPdlyXl5xA.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
C:\Users\Admin\Documents\iSpYFsXk9nrErrCPdlyXl5xA.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
C:\Users\Admin\Documents\iSpYFsXk9nrErrCPdlyXl5xA.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
C:\Users\Admin\Documents\xNFEuPvreN4kqdxlgkDhFH09.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
C:\Users\Admin\Documents\xNFEuPvreN4kqdxlgkDhFH09.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
C:\Users\Admin\Documents\xv7pPScDzu4FwTBPLHyznQW1.exeMD5
3a43f860afe6941d92f53046bbd6194c
SHA11ac615c10f7a6aa5b82b0569189f9d98972a6544
SHA2561e801ec01234ce075108618a4bdcff570ffff471c64eaf602a87531a6b35fb28
SHA512e23d5a39e6df3360f849e527afb055eca6466b3c35a3ab01c5aee33307d5c647a24730431c98598e3ca83a3df12862b88f612a769bf1cdeb4cb16e72f08b0cce
-
C:\Users\Admin\Documents\xv7pPScDzu4FwTBPLHyznQW1.exeMD5
3a43f860afe6941d92f53046bbd6194c
SHA11ac615c10f7a6aa5b82b0569189f9d98972a6544
SHA2561e801ec01234ce075108618a4bdcff570ffff471c64eaf602a87531a6b35fb28
SHA512e23d5a39e6df3360f849e527afb055eca6466b3c35a3ab01c5aee33307d5c647a24730431c98598e3ca83a3df12862b88f612a769bf1cdeb4cb16e72f08b0cce
-
\Users\Admin\AppData\LocalLow\sqlite3.dllMD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4
-
\Users\Admin\AppData\Local\Temp\4DD3.tmpMD5
50741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
memory/364-128-0x0000000000DC0000-0x0000000000DC1000-memory.dmpFilesize
4KB
-
memory/364-71-0x0000000000000000-mapping.dmp
-
memory/488-24-0x0000000000000000-mapping.dmp
-
memory/500-123-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/500-52-0x0000000000000000-mapping.dmp
-
memory/500-142-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/500-140-0x0000000000A20000-0x0000000000AB1000-memory.dmpFilesize
580KB
-
memory/580-3-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB
-
memory/580-5-0x00000000049F0000-0x00000000049F1000-memory.dmpFilesize
4KB
-
memory/580-6-0x0000000005FB0000-0x0000000005FB1000-memory.dmpFilesize
4KB
-
memory/580-2-0x0000000073520000-0x0000000073C0E000-memory.dmpFilesize
6.9MB
-
memory/632-261-0x0000000000000000-mapping.dmp
-
memory/724-148-0x0000000000400000-0x0000000000499000-memory.dmpFilesize
612KB
-
memory/724-124-0x0000000000D80000-0x0000000000D81000-memory.dmpFilesize
4KB
-
memory/724-54-0x0000000000000000-mapping.dmp
-
memory/724-145-0x0000000000D80000-0x0000000000E16000-memory.dmpFilesize
600KB
-
memory/1040-167-0x0000000000000000-mapping.dmp
-
memory/1040-183-0x0000000002F70000-0x0000000003910000-memory.dmpFilesize
9.6MB
-
memory/1040-201-0x0000000002F60000-0x0000000002F62000-memory.dmpFilesize
8KB
-
memory/1232-166-0x0000000000000000-mapping.dmp
-
memory/1232-188-0x0000000000401000-0x000000000040C000-memory.dmpFilesize
44KB
-
memory/1304-67-0x0000000000000000-mapping.dmp
-
memory/1304-95-0x00000000000A0000-0x00000000000A1000-memory.dmpFilesize
4KB
-
memory/1304-110-0x000000001ADC0000-0x000000001ADC2000-memory.dmpFilesize
8KB
-
memory/1304-80-0x00007FF9A7280000-0x00007FF9A7C6C000-memory.dmpFilesize
9.9MB
-
memory/1348-116-0x0000000002CC0000-0x0000000002CC2000-memory.dmpFilesize
8KB
-
memory/1348-89-0x00007FF9A7280000-0x00007FF9A7C6C000-memory.dmpFilesize
9.9MB
-
memory/1348-74-0x0000000000000000-mapping.dmp
-
memory/1848-133-0x0000000000DA0000-0x0000000000DA1000-memory.dmpFilesize
4KB
-
memory/1848-68-0x0000000000000000-mapping.dmp
-
memory/1996-17-0x0000000000FB0000-0x0000000000FB1000-memory.dmpFilesize
4KB
-
memory/1996-30-0x00000000011C0000-0x0000000001294000-memory.dmpFilesize
848KB
-
memory/1996-18-0x0000000000FB0000-0x0000000001089000-memory.dmpFilesize
868KB
-
memory/1996-19-0x0000000000400000-0x00000000008D0000-memory.dmpFilesize
4.8MB
-
memory/1996-25-0x00000000011C0000-0x00000000011C1000-memory.dmpFilesize
4KB
-
memory/1996-14-0x0000000000000000-mapping.dmp
-
memory/2268-12-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2268-11-0x00000000001C0000-0x00000000001ED000-memory.dmpFilesize
180KB
-
memory/2268-10-0x0000000000D60000-0x0000000000D61000-memory.dmpFilesize
4KB
-
memory/2268-7-0x0000000000000000-mapping.dmp
-
memory/2636-20-0x0000000000000000-mapping.dmp
-
memory/2656-61-0x00007FF9A7280000-0x00007FF9A7C6C000-memory.dmpFilesize
9.9MB
-
memory/2656-51-0x0000000000000000-mapping.dmp
-
memory/2656-107-0x000000001B240000-0x000000001B242000-memory.dmpFilesize
8KB
-
memory/2668-26-0x0000000000400000-0x0000000002B75000-memory.dmpFilesize
39.5MB
-
memory/2668-33-0x0000000003130000-0x0000000003131000-memory.dmpFilesize
4KB
-
memory/2668-34-0x0000000003130000-0x00000000031DC000-memory.dmpFilesize
688KB
-
memory/2668-32-0x0000000000400000-0x0000000002B75000-memory.dmpFilesize
39.5MB
-
memory/2668-38-0x0000000003360000-0x0000000003361000-memory.dmpFilesize
4KB
-
memory/2668-40-0x0000000003280000-0x000000000332C000-memory.dmpFilesize
688KB
-
memory/2668-35-0x0000000000400000-0x00000000008A2000-memory.dmpFilesize
4.6MB
-
memory/2668-27-0x0000000000401F10-mapping.dmp
-
memory/2748-36-0x0000000000000000-mapping.dmp
-
memory/2884-70-0x00007FF9A7280000-0x00007FF9A7C6C000-memory.dmpFilesize
9.9MB
-
memory/2884-120-0x000000001AFE0000-0x000000001AFE2000-memory.dmpFilesize
8KB
-
memory/2884-50-0x0000000000000000-mapping.dmp
-
memory/2904-122-0x0000000000E20000-0x0000000000E21000-memory.dmpFilesize
4KB
-
memory/2904-136-0x0000000000030000-0x000000000003D000-memory.dmpFilesize
52KB
-
memory/2904-53-0x0000000000000000-mapping.dmp
-
memory/3008-127-0x0000000000DA0000-0x0000000000DA1000-memory.dmpFilesize
4KB
-
memory/3008-69-0x0000000000000000-mapping.dmp
-
memory/3016-155-0x0000000000E30000-0x0000000000E47000-memory.dmpFilesize
92KB
-
memory/3548-290-0x0000000000000000-mapping.dmp
-
memory/3556-46-0x0000000000400000-0x0000000002B2D000-memory.dmpFilesize
39.2MB
-
memory/3556-41-0x0000000000403B90-mapping.dmp
-
memory/3556-47-0x0000000003160000-0x0000000003161000-memory.dmpFilesize
4KB
-
memory/3556-39-0x0000000000400000-0x0000000002B44000-memory.dmpFilesize
39.3MB
-
memory/3556-43-0x0000000000400000-0x0000000002B44000-memory.dmpFilesize
39.3MB
-
memory/3556-49-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/3556-48-0x0000000003000000-0x0000000003091000-memory.dmpFilesize
580KB
-
memory/3556-44-0x0000000003160000-0x0000000003161000-memory.dmpFilesize
4KB
-
memory/3556-45-0x0000000002F70000-0x0000000002FFD000-memory.dmpFilesize
564KB
-
memory/3704-179-0x0000000000000000-mapping.dmp
-
memory/3704-211-0x0000000000490000-0x0000000000491000-memory.dmpFilesize
4KB
-
memory/3704-225-0x0000000004CC0000-0x0000000004CD4000-memory.dmpFilesize
80KB
-
memory/3704-194-0x0000000073520000-0x0000000073C0E000-memory.dmpFilesize
6.9MB
-
memory/3704-229-0x000000000DDD0000-0x000000000DDD1000-memory.dmpFilesize
4KB
-
memory/3704-226-0x0000000004EB0000-0x0000000004EB1000-memory.dmpFilesize
4KB
-
memory/3704-219-0x0000000000DD0000-0x0000000000DD1000-memory.dmpFilesize
4KB
-
memory/3704-239-0x0000000000D00000-0x0000000000D01000-memory.dmpFilesize
4KB
-
memory/3768-119-0x000000001B0E0000-0x000000001B0E2000-memory.dmpFilesize
8KB
-
memory/3768-115-0x0000000002530000-0x0000000002531000-memory.dmpFilesize
4KB
-
memory/3768-76-0x00007FF9A7280000-0x00007FF9A7C6C000-memory.dmpFilesize
9.9MB
-
memory/3768-121-0x0000000002540000-0x0000000002554000-memory.dmpFilesize
80KB
-
memory/3768-66-0x0000000000000000-mapping.dmp
-
memory/3768-97-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/3768-126-0x0000000002560000-0x0000000002561000-memory.dmpFilesize
4KB
-
memory/3888-13-0x0000000000000000-mapping.dmp
-
memory/3932-259-0x0000000000000000-mapping.dmp
-
memory/4068-29-0x0000000000EF0000-0x0000000000EF1000-memory.dmpFilesize
4KB
-
memory/4068-21-0x0000000000000000-mapping.dmp
-
memory/4068-37-0x0000000000DA0000-0x0000000000E7F000-memory.dmpFilesize
892KB
-
memory/4068-31-0x0000000000400000-0x00000000004E3000-memory.dmpFilesize
908KB
-
memory/4100-134-0x0000000003000000-0x000000000390F000-memory.dmpFilesize
9.1MB
-
memory/4100-114-0x0000000003000000-0x000000000390F000-memory.dmpFilesize
9.1MB
-
memory/4100-83-0x0000000000000000-mapping.dmp
-
memory/4100-104-0x0000000002700000-0x0000000002B76000-memory.dmpFilesize
4.5MB
-
memory/4136-86-0x0000000000000000-mapping.dmp
-
memory/4136-132-0x000000001B000000-0x000000001B002000-memory.dmpFilesize
8KB
-
memory/4136-94-0x00007FF9A7280000-0x00007FF9A7C6C000-memory.dmpFilesize
9.9MB
-
memory/4208-260-0x0000000000000000-mapping.dmp
-
memory/4268-174-0x0000000000000000-mapping.dmp
-
memory/4276-208-0x00000000015F0000-0x00000000015F1000-memory.dmpFilesize
4KB
-
memory/4276-177-0x0000000073520000-0x0000000073C0E000-memory.dmpFilesize
6.9MB
-
memory/4276-173-0x0000000000000000-mapping.dmp
-
memory/4276-237-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/4276-227-0x0000000005010000-0x0000000005044000-memory.dmpFilesize
208KB
-
memory/4276-298-0x0000000009AB0000-0x0000000009AB1000-memory.dmpFilesize
4KB
-
memory/4276-230-0x0000000009A10000-0x0000000009A11000-memory.dmpFilesize
4KB
-
memory/4276-243-0x00000000015D0000-0x00000000015D1000-memory.dmpFilesize
4KB
-
memory/4276-189-0x0000000000D30000-0x0000000000D31000-memory.dmpFilesize
4KB
-
memory/4284-113-0x0000000002680000-0x0000000002AF6000-memory.dmpFilesize
4.5MB
-
memory/4284-118-0x0000000003080000-0x000000000398F000-memory.dmpFilesize
9.1MB
-
memory/4284-144-0x0000000003080000-0x000000000398F000-memory.dmpFilesize
9.1MB
-
memory/4284-101-0x0000000000000000-mapping.dmp
-
memory/4288-200-0x0000000000000000-mapping.dmp
-
memory/4288-205-0x0000000073520000-0x0000000073C0E000-memory.dmpFilesize
6.9MB
-
memory/4288-228-0x0000000005220000-0x0000000005221000-memory.dmpFilesize
4KB
-
memory/4316-250-0x0000000004A60000-0x0000000004A61000-memory.dmpFilesize
4KB
-
memory/4452-305-0x0000000000000000-mapping.dmp
-
memory/4500-291-0x0000000000000000-mapping.dmp
-
memory/4524-220-0x00000000038E1000-0x00000000038E8000-memory.dmpFilesize
28KB
-
memory/4524-180-0x0000000000000000-mapping.dmp
-
memory/4524-209-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4524-216-0x0000000003761000-0x000000000378C000-memory.dmpFilesize
172KB
-
memory/4524-210-0x00000000024A1000-0x00000000024A5000-memory.dmpFilesize
16KB
-
memory/4540-197-0x0000000073520000-0x0000000073C0E000-memory.dmpFilesize
6.9MB
-
memory/4540-182-0x0000000000000000-mapping.dmp
-
memory/4540-245-0x0000000005630000-0x0000000005631000-memory.dmpFilesize
4KB
-
memory/4564-129-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/4564-131-0x0000000000402A38-mapping.dmp
-
memory/4636-254-0x0000000004C20000-0x0000000004C21000-memory.dmpFilesize
4KB
-
memory/4636-258-0x0000000007920000-0x0000000007921000-memory.dmpFilesize
4KB
-
memory/4636-244-0x0000000000000000-mapping.dmp
-
memory/4636-246-0x0000000073520000-0x0000000073C0E000-memory.dmpFilesize
6.9MB
-
memory/4648-303-0x0000000000000000-mapping.dmp
-
memory/4660-143-0x0000000000402A38-mapping.dmp
-
memory/4752-307-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/4752-292-0x0000000000000000-mapping.dmp
-
memory/4752-301-0x0000000000E50000-0x0000000000E51000-memory.dmpFilesize
4KB
-
memory/4752-306-0x0000000000980000-0x00000000009A6000-memory.dmpFilesize
152KB
-
memory/4756-300-0x0000000000000000-mapping.dmp
-
memory/4764-224-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4764-202-0x0000000000000000-mapping.dmp
-
memory/4764-221-0x0000000003771000-0x000000000379C000-memory.dmpFilesize
172KB
-
memory/4764-217-0x00000000022A1000-0x00000000022A5000-memory.dmpFilesize
16KB
-
memory/4764-222-0x0000000003751000-0x0000000003758000-memory.dmpFilesize
28KB
-
memory/4948-302-0x0000000000000000-mapping.dmp
-
memory/5004-213-0x0000000003140000-0x0000000003142000-memory.dmpFilesize
8KB
-
memory/5004-186-0x0000000003150000-0x0000000003AF0000-memory.dmpFilesize
9.6MB
-
memory/5004-157-0x0000000000000000-mapping.dmp
-
memory/5016-207-0x0000000001380000-0x0000000001382000-memory.dmpFilesize
8KB
-
memory/5016-185-0x0000000002BD0000-0x0000000003570000-memory.dmpFilesize
9.6MB
-
memory/5016-158-0x0000000000000000-mapping.dmp
-
memory/5028-159-0x0000000000000000-mapping.dmp
-
memory/5028-204-0x0000000002B80000-0x0000000002B82000-memory.dmpFilesize
8KB
-
memory/5028-184-0x0000000002B90000-0x0000000003530000-memory.dmpFilesize
9.6MB
-
memory/5056-304-0x0000000000000000-mapping.dmp
-
memory/5124-262-0x0000000000000000-mapping.dmp
-
memory/5176-263-0x0000000000000000-mapping.dmp
-
memory/5248-297-0x0000000000000000-mapping.dmp
-
memory/5360-264-0x0000000000000000-mapping.dmp
-
memory/5368-294-0x0000000000000000-mapping.dmp
-
memory/5396-265-0x0000000000000000-mapping.dmp
-
memory/5416-266-0x0000000000000000-mapping.dmp
-
memory/5596-308-0x0000000000D10000-0x0000000000D11000-memory.dmpFilesize
4KB
-
memory/5632-267-0x0000000000000000-mapping.dmp
-
memory/5632-271-0x0000000002640000-0x0000000002642000-memory.dmpFilesize
8KB
-
memory/5632-268-0x0000000002650000-0x0000000002FF0000-memory.dmpFilesize
9.6MB
-
memory/5708-270-0x0000000002500000-0x0000000002EA0000-memory.dmpFilesize
9.6MB
-
memory/5708-272-0x00000000024F0000-0x00000000024F2000-memory.dmpFilesize
8KB
-
memory/5708-269-0x0000000000000000-mapping.dmp
-
memory/5764-275-0x0000000002290000-0x0000000002C30000-memory.dmpFilesize
9.6MB
-
memory/5764-279-0x0000000002280000-0x0000000002282000-memory.dmpFilesize
8KB
-
memory/5764-273-0x0000000000000000-mapping.dmp
-
memory/5776-280-0x00000000027D0000-0x00000000027D2000-memory.dmpFilesize
8KB
-
memory/5776-274-0x0000000000000000-mapping.dmp
-
memory/5776-276-0x00000000027E0000-0x0000000003180000-memory.dmpFilesize
9.6MB
-
memory/5964-281-0x0000000000FB0000-0x0000000000FB2000-memory.dmpFilesize
8KB
-
memory/5964-278-0x00000000027E0000-0x0000000003180000-memory.dmpFilesize
9.6MB
-
memory/5964-277-0x0000000000000000-mapping.dmp
-
memory/6028-282-0x0000000000000000-mapping.dmp
-
memory/6028-284-0x0000000002160000-0x0000000002B00000-memory.dmpFilesize
9.6MB
-
memory/6028-293-0x00000000007B0000-0x00000000007B2000-memory.dmpFilesize
8KB
-
memory/6040-285-0x0000000002270000-0x0000000002C10000-memory.dmpFilesize
9.6MB
-
memory/6040-283-0x0000000000000000-mapping.dmp
-
memory/6040-295-0x0000000002260000-0x0000000002262000-memory.dmpFilesize
8KB
-
memory/6088-286-0x0000000000000000-mapping.dmp
-
memory/6088-296-0x00000000004A0000-0x00000000004A2000-memory.dmpFilesize
8KB
-
memory/6088-287-0x0000000002050000-0x00000000029F0000-memory.dmpFilesize
9.6MB
-
memory/7420-320-0x0000000000540000-0x0000000000541000-memory.dmpFilesize
4KB
-
memory/7900-323-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/7900-321-0x0000000000D00000-0x0000000000D01000-memory.dmpFilesize
4KB
-
memory/7900-322-0x0000000000D00000-0x0000000000D91000-memory.dmpFilesize
580KB
-
memory/8148-325-0x0000000000E70000-0x0000000000E71000-memory.dmpFilesize
4KB
-
memory/8148-324-0x0000000073520000-0x0000000073C0E000-memory.dmpFilesize
6.9MB