Analysis
-
max time kernel
109s -
max time network
153s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
22-03-2021 17:40
Static task
static1
Behavioral task
behavioral1
Sample
f400dab915cf4b65ce4a277f93b1fc7b.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
f400dab915cf4b65ce4a277f93b1fc7b.exe
Resource
win10v20201028
General
-
Target
f400dab915cf4b65ce4a277f93b1fc7b.exe
-
Size
71KB
-
MD5
f400dab915cf4b65ce4a277f93b1fc7b
-
SHA1
f7d567c105c6ccec41b087699b786538d6a6cfdc
-
SHA256
fac9410d22c0e26ebfb6aa70649656a38685924cfb37638f95f35eb46b0cb71a
-
SHA512
f6595129735fb87e85197e3a3a76070d206a6979de167430e7c8ecd72de1705bffac922dc9899baf90855381187762d084cdc7e1fedbfe0ae349b67461469165
Malware Config
Extracted
raccoon
c46f13f8aadc028907d65c627fd9163161661f6c
-
url4cnc
https://telete.in/capibar
Extracted
raccoon
2ce901d964b370c5ccda7e4d68354ba040db8218
-
url4cnc
https://telete.in/tomarsjsmith3
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Blocklisted process makes network request 4 IoCs
Processes:
WScript.exeflow pid process 143 6720 WScript.exe 145 6720 WScript.exe 146 6720 WScript.exe 152 6720 WScript.exe -
Executes dropped EXE 44 IoCs
Processes:
64pbZyccRUcyR3UjPgS7BelU.exe58029094834.exe58029094834.exe90113666802.exe58029094834.exeTUc8xn1eSorfJaOFQ10e4VsP.exe9IIY5YGlvuGN04ugB5TbHJtp.exeZcsHlqRqaCKTZn9C7LkF0Sm2.exeRmj2ldYHrkOaUQL42CpXVTI8.exePZWP51Y8ekkz5Rx8v8zjSzoB.exe0zfQ8zt7WPgt63wGoaUOSkPt.exeSvhGUtyPkv8VQ1V20ZBWpWvX.exeKM9jlv2io4wJGDjTeD4LAiUW.exe2m1a70123GmejUInvqIfyXd6.exeJ5FZ9kGHwpcr7jo3a627UqxA.exemultitimer.exemultitimer.exemultitimer.exesetups.exemultitimer.exesetups.exesetups.exe2254743.24setups.exe3696807.40setups.tmpsetups.tmpsetups.tmpsetups.tmpWindows Host.exemultitimer.exemultitimer.exemultitimer.exemultitimer.exemultitimer.exemultitimer.exemultitimer.exemultitimer.exeSkinks.exe4.exe6.exevpn.exe5.exeSmartClock.exepid process 576 64pbZyccRUcyR3UjPgS7BelU.exe 3008 58029094834.exe 2996 58029094834.exe 640 90113666802.exe 3028 58029094834.exe 3784 TUc8xn1eSorfJaOFQ10e4VsP.exe 2748 9IIY5YGlvuGN04ugB5TbHJtp.exe 1788 ZcsHlqRqaCKTZn9C7LkF0Sm2.exe 1360 Rmj2ldYHrkOaUQL42CpXVTI8.exe 2140 PZWP51Y8ekkz5Rx8v8zjSzoB.exe 2616 0zfQ8zt7WPgt63wGoaUOSkPt.exe 4084 SvhGUtyPkv8VQ1V20ZBWpWvX.exe 4136 KM9jlv2io4wJGDjTeD4LAiUW.exe 4148 2m1a70123GmejUInvqIfyXd6.exe 4196 J5FZ9kGHwpcr7jo3a627UqxA.exe 4840 multitimer.exe 4888 multitimer.exe 4900 multitimer.exe 4912 setups.exe 4932 multitimer.exe 5068 setups.exe 5084 setups.exe 5008 2254743.24 356 setups.exe 4300 3696807.40 4212 setups.tmp 4360 setups.tmp 4336 setups.tmp 1836 setups.tmp 4380 Windows Host.exe 4984 multitimer.exe 4484 multitimer.exe 4384 multitimer.exe 4772 multitimer.exe 4556 multitimer.exe 4144 multitimer.exe 4372 multitimer.exe 4676 multitimer.exe 5212 Skinks.exe 5312 4.exe 5336 6.exe 5352 vpn.exe 5380 5.exe 5708 SmartClock.exe -
Sets service image path in registry 2 TTPs
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
setups.tmpsetups.tmpsetups.tmpsetups.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp -
Drops startup file 1 IoCs
Processes:
4.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4.exe -
Loads dropped DLL 45 IoCs
Processes:
58029094834.exe0zfQ8zt7WPgt63wGoaUOSkPt.exesetups.tmpsetups.tmpsetups.tmpsetups.tmpSkinks.exepid process 3028 58029094834.exe 3028 58029094834.exe 3028 58029094834.exe 3028 58029094834.exe 3028 58029094834.exe 3028 58029094834.exe 3028 58029094834.exe 3028 58029094834.exe 2616 0zfQ8zt7WPgt63wGoaUOSkPt.exe 4212 setups.tmp 4212 setups.tmp 4360 setups.tmp 4360 setups.tmp 4212 setups.tmp 4336 setups.tmp 4336 setups.tmp 4212 setups.tmp 4212 setups.tmp 4360 setups.tmp 4360 setups.tmp 4360 setups.tmp 4212 setups.tmp 4212 setups.tmp 4336 setups.tmp 4336 setups.tmp 4336 setups.tmp 4360 setups.tmp 4360 setups.tmp 4336 setups.tmp 4336 setups.tmp 1836 setups.tmp 1836 setups.tmp 1836 setups.tmp 1836 setups.tmp 1836 setups.tmp 1836 setups.tmp 1836 setups.tmp 2616 0zfQ8zt7WPgt63wGoaUOSkPt.exe 2616 0zfQ8zt7WPgt63wGoaUOSkPt.exe 2616 0zfQ8zt7WPgt63wGoaUOSkPt.exe 2616 0zfQ8zt7WPgt63wGoaUOSkPt.exe 2616 0zfQ8zt7WPgt63wGoaUOSkPt.exe 2616 0zfQ8zt7WPgt63wGoaUOSkPt.exe 2616 0zfQ8zt7WPgt63wGoaUOSkPt.exe 5212 Skinks.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
f400dab915cf4b65ce4a277f93b1fc7b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\gwaO9nWrYJdCl5kj7uR6lsHrMnBSYL4a = "C:\\Users\\Admin\\Documents\\D9xfxDAbva7ZwQRifwtRVmxj.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\qwFGAN1xGbf26iczsliT14bY7VodoYGV = "C:\\Users\\Admin\\Documents\\b20aRibOeQrRmPVfziZiQGfk.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\2sVREGAc6AuVirGLgPyR3Tk1kJVz0QgT = "C:\\Users\\Admin\\Documents\\xnPv8T9RQkRX8jpLiQv8CeEv.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\vcjKUfN2NaqSYcH60kWKiO8blEIrvS0c = "C:\\Users\\Admin\\Documents\\LSX2PgOeeuHxWpWK0Zck4tbJ.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\pmGNZ20KZAKGnzizIsbUL1ruBCc37ckd = "C:\\Users\\Admin\\Documents\\Ns58yN5y0biGYdhFBesY0uqK.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\v0jocUVIwOHOezfMrcp2fIujAJipCdpG = "C:\\Users\\Admin\\Documents\\eJV3OB6hIddICQKkyyUTAXjk.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\va56iJpWIkiBLVkB7GXddj8Wmw7vaTD3 = "C:\\Users\\Admin\\Documents\\42g7DDxOlnSXMdNPcl6FUBLF.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\9bAzlwBxHvu4VJPbGgjPmtgKRf1rdXFc = "C:\\Users\\Admin\\Documents\\64pbZyccRUcyR3UjPgS7BelU.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\snM7Ek5ZqXdhf2hbKswoiF6D6BqDtQzR = "C:\\Users\\Admin\\Documents\\ObV1pKbEHMr7i9TpFXwOa6N0.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\qDC0fQ3np0pqarCkaHMylCnGI0GyNOWt = "C:\\Users\\Admin\\Documents\\bBg1XWKk1d4qXZXp2g7BNsoM.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\UMjpmEivskplLRrxpANW6qNqcGWyK2zB = "C:\\Users\\Admin\\Documents\\j8oTeAbRrgv7aSEpg4V3YhU8.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\G2QNSDXIr9gsyj83m63cZC4WMxcZWJJO = "C:\\Users\\Admin\\Documents\\yoRQwh7GZr9tik6PaGuZfkJ1.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\sYqn3rCS4MTo1wh0lk0oh6Yjzigr1eFh = "C:\\Users\\Admin\\Documents\\ZRgd9OIM2k8iXHMTlYh4E2YB.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\DcMRGinPoYXTFOMHFaLIKa4ZaiU1V02M = "C:\\Users\\Admin\\Documents\\LbHZ5GfrbtHxN8xlNjdcP9vw.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ppqd7531CVuIQtTuWPsc3djnf84hUzot = "C:\\Users\\Admin\\Documents\\qO8JNaV8cwY2TWi4S1AVd7HS.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\O6RYOkKg5Bzz9Oi4w1oATbi0NtwDsLXC = "C:\\Users\\Admin\\Documents\\1wehyu67qVKmyCGtj7avNyjy.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\1fPCy2pBguIoYC9yyIv0BqUnu8bhXcGa = "C:\\Users\\Admin\\Documents\\UfRadla8a4nerYBOpYE3C3C5.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\DEui4NgpWDXwEpSFBRT3t1922V2m0dcv = "C:\\Users\\Admin\\Documents\\mh2IDwARaVz8hpyyFlNwm1dm.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\iBnZzMryfj4lXzsuOn9yV8Qx0LtWdXxp = "C:\\Users\\Admin\\Documents\\qrE452bwt0S8r72iZhjj6AM5.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\FAoSwqGSjAotqHuZX1uKv6ZDDjW31GY2 = "C:\\Users\\Admin\\Documents\\juIYbRFyHUWxJ6G9SImisrFn.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\7JRTg0U2QMsDEkLVZM9OUaCewKFmlVbK = "C:\\Users\\Admin\\Documents\\zl3kERW2SXnusabW317VdoYe.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\UrIpiXJrVKfqz7WXXR47tQodxXYDjbxK = "C:\\Users\\Admin\\Documents\\WQtedUNRY4LKtdiRFkzphMsw.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\jzJQYB2113yEzljGqiCDzcSsKFqtm0FM = "C:\\Users\\Admin\\Documents\\cUpWFwKFnSY64YmnPJL1RPgV.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\qopzK8otPZpuJUvQxsyhsEN00vN4F5ul = "C:\\Users\\Admin\\Documents\\UIJFTgMDMf06UEMTTiCqGtT4.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\v85FejSwU4A2kdpNyx5YXLCBSxYEjFLH = "C:\\Users\\Admin\\Documents\\wPZA5WwAmMwo2ibwJtA0Qohz.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\6CSFH9E06LhgwWM3yNmxO9tnb2ZP6Z3z = "C:\\Users\\Admin\\Documents\\FfG8baKDykNdtS6RUatDdPs9.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\hgFJefw3Q1DoFn4RqZSmxoFscXoz7eJD = "C:\\Users\\Admin\\Documents\\zIu4hrso8pT4ABcUZkZNXvC5.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Z5epF6JBzOPMbHehCwEoBc0iqMdJnpvs = "C:\\Users\\Admin\\Documents\\lXzIp9XFW8IvbqnVb6cpW2OP.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\92Mfrtl0vo6fSZW2UlY6bXE9mHlmnbrq = "C:\\Users\\Admin\\Documents\\oq8Rbwpm79OzmdePNhOYT7Bo.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\JQZLGpAMPf6l89ANCYvbxGlPOATNh9Rj = "C:\\Users\\Admin\\Documents\\tG8z4olxl2K8z2aC5gfDaKEP.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\hR0HiqVuZaro5bTnusCov4NfEw3142xq = "C:\\Users\\Admin\\Documents\\KlBXJPgwZv8JldvwjxO13ea3.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\SooOjy4hRstpUxwtSwQ1cM3AYbCHKoM1 = "C:\\Users\\Admin\\Documents\\xGCYHF5zgWhhuae8NzOPn5v6.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\M5z06lPoqxW2681aNjishghenwswdQut = "C:\\Users\\Admin\\Documents\\sFIwnvnIPpWMz3ne1gzLP8hM.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\zAJqRm9ns4B2njBcSOtUNB1zNLFuSSCh = "C:\\Users\\Admin\\Documents\\5sWP28M0scm2GsuH8gddwXuB.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\V0rVKc3Awzuv9KLtXyceianxCzVgdgbE = "C:\\Users\\Admin\\Documents\\ees3dx88SPQLccw5Zb36xaVF.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\KLaOYiBERecRn9XEZc24XlOEXZ18wlyW = "C:\\Users\\Admin\\Documents\\VEsJsaeRhqrDmtTDibIrL9Zf.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\MsA1JZv5MjSjyh0OA40sjqZS18RYsDem = "C:\\Users\\Admin\\Documents\\BOTtKnA2dlI464LdSGeVSY31.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\yRb9FNS6jSQBKbbi2Ji2vEmVekwKdvl2 = "C:\\Users\\Admin\\Documents\\GlYLTcu9tIOBZimqhx8VrN4N.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\vNqbDYZ4HjrT58R3oR59w2gM9y22Ald9 = "C:\\Users\\Admin\\Documents\\ZeJeguDDAymOvA0DDL117Zmi.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\zbcNpEszG23jjxUVrhIp0wvnp8cFEp8s = "C:\\Users\\Admin\\Documents\\HZK57fy0gsx5KYK9ZPNs0ZQ2.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\UYv4SULdr5Ez29RkxMEgK1Gx42CcRMZg = "C:\\Users\\Admin\\Documents\\O0lpeXbmb6YYdXQ5oNk2JrrK.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ubrsgGE4Ou3O1PEqV7kYTUe0j2WR5fgZ = "C:\\Users\\Admin\\Documents\\mK3zFkeQQzQAehQXZm6RVNZO.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\dKyXbpnpqdZrYwcI08tg0yv120HyptPQ = "C:\\Users\\Admin\\Documents\\hFLSjSOLmYK9HljJFbVGeRry.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\PpdJNsh1XkFBFfY1rqUf0NwScFCBPGjb = "C:\\Users\\Admin\\Documents\\GOvRQ9JqJK2OmJM1OTKMCoJW.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\lwUMGVbI28SU4bPTnRt3gq11zqoPcZ4o = "C:\\Users\\Admin\\Documents\\K7uTCyuvIqCrtmolr77XygPx.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\vCQYyyeEuu5Iet4hT6pKcYGYushlYOGs = "C:\\Users\\Admin\\Documents\\3D7OYB0AUlvn02m9Amg24Lp7.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\EvHMTfGzt0rfskkTVdZ2dEA7SYaj4MXk = "C:\\Users\\Admin\\Documents\\NQVsW8Jn7fhK9F8b2VaKMmWd.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\GxgWvsR4ui1q7QVV0hMk6gwX2v69ZJfC = "C:\\Users\\Admin\\Documents\\MYm5ADVbCuefrYRTpl5RpJKh.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Alu1L5eJsJRGbEGrAV0GBx2cmODz7ulN = "C:\\Users\\Admin\\Documents\\iS31bS9Qv6iWEqrbfhcbeU15.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\G9z8X3eDcl922TrSQIePrNlxR3MzxR4A = "C:\\Users\\Admin\\Documents\\kTBpatjPATB3Gm8riucQ2jOf.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\pTXnmEgbKonjoAx8XrdPku9G4GG7WCvx = "C:\\Users\\Admin\\Documents\\q71vflarRSXxQLkEcrwHF36E.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\fOCKOBhzYS853s85RREEVN0wt5H48wgW = "C:\\Users\\Admin\\Documents\\3EYXHx2ge0gbjNzz8Etd0g18.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\FhziSvZgwfxGYZxNEC2vJiGy2CVplnTG = "C:\\Users\\Admin\\Documents\\eVPQhaolCyb54yhuquXHOYll.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\YN9xxMdO3zHya8rmYqHAiTgiUSqYBtJP = "C:\\Users\\Admin\\Documents\\f3vKrIMxXkfMTDvnOkO1IQAa.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\dFQpvOCwsEog2UfXO1VkcYKP2tp2qdm7 = "C:\\Users\\Admin\\Documents\\wEoCCFviPEiEuv6BwyxcCzo1.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\pdIwbivNs2Ap8DE31TpkDy4Z6Fnvu1oG = "C:\\Users\\Admin\\Documents\\QC0PCdzXMXYUKI3Gj35k4JFN.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\jtzW5Ad1O4sVdehxXB82MlRr7H5rICma = "C:\\Users\\Admin\\Documents\\6mjjVD5olLlSHOHgzCslefJ1.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\AQHApbe0mpyrqCg0KqsYeAsyAX2dvPxg = "C:\\Users\\Admin\\Documents\\cIcfyos49RSZwaoEjGuPJ5Cf.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\p8Mk8nkjJ6u5hUUQk2GUvHUJ8t8duJuo = "C:\\Users\\Admin\\Documents\\jxrnSfy5GAchjPEa9uh2o57H.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\nZqLmLtmG2ock2tdYr0QqAJo6aNCzN1V = "C:\\Users\\Admin\\Documents\\NCN6NCJi2HmtrXNesAf8F1cO.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\i39YoaPC0Azo5KyAn2krCBD73KTUmVVN = "C:\\Users\\Admin\\Documents\\wqjaDEQOfrdOaBzxp1ccTi1f.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\v4wDID97JzLGPZqjEjUeuzsSYQVG9JPY = "C:\\Users\\Admin\\Documents\\evYtSSaULXJWnnwlUsfD2GFO.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\UUE6EAYrXPsPujsB9stWkOjjQ4Sdiucw = "C:\\Users\\Admin\\Documents\\3wD7SQMERIj15egt8COLSH3C.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\73Bfk8wi0RNXYEm2IhIiAWT8VlRfWkhy = "C:\\Users\\Admin\\Documents\\faK4RuxWT1CiDNb1H0wirqbD.exe" f400dab915cf4b65ce4a277f93b1fc7b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Maps connected drives based on registry 3 TTPs 8 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
multitimer.exemultitimer.exemultitimer.exemultitimer.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
58029094834.exe58029094834.exedescription pid process target process PID 3008 set thread context of 2996 3008 58029094834.exe 58029094834.exe PID 2996 set thread context of 3028 2996 58029094834.exe 58029094834.exe -
Drops file in Windows directory 9 IoCs
Processes:
multitimer.exemultitimer.exemultitimer.exeMicrosoftEdge.exemultitimer.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
90113666802.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 90113666802.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 90113666802.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 4 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exepid process 4656 timeout.exe 4608 timeout.exe 5464 timeout.exe 7396 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
Processes:
multitimer.exemultitimer.exemultitimer.exemultitimer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2828 taskkill.exe -
Processes:
browser_broker.exeMicrosoftEdgeCP.exeMicrosoftEdge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 998267c856add601 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "74" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\multiadblock.com\NumberOfSub = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\multiadblock.com\ = "28" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "5" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000bb32518893b2dd90154fb2489c253670eb9d5582f740e610e03397b924c7cb9863c907ac988eb669fbdab1ecd64b7d4626a5de930c2b59a37a9c MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\multiadblock.com\Total = "110" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = f4b74cc04b1fd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\multiadblock.com MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 5708 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
setups.tmpsetups.tmpsetups.tmpsetups.tmpmultitimer.exemultitimer.exemultitimer.exepid process 4212 setups.tmp 4212 setups.tmp 4360 setups.tmp 4360 setups.tmp 4336 setups.tmp 4336 setups.tmp 1836 setups.tmp 1836 setups.tmp 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4556 multitimer.exe 4144 multitimer.exe 4144 multitimer.exe 4372 multitimer.exe 4372 multitimer.exe 4372 multitimer.exe 4372 multitimer.exe 4372 multitimer.exe 4372 multitimer.exe 4372 multitimer.exe 4372 multitimer.exe 4372 multitimer.exe 4144 multitimer.exe 4144 multitimer.exe 4144 multitimer.exe 4144 multitimer.exe 4144 multitimer.exe 4144 multitimer.exe 4144 multitimer.exe 4144 multitimer.exe 4372 multitimer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
f400dab915cf4b65ce4a277f93b1fc7b.exepid process 496 f400dab915cf4b65ce4a277f93b1fc7b.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
J5FZ9kGHwpcr7jo3a627UqxA.exeSvhGUtyPkv8VQ1V20ZBWpWvX.exepid process 4196 J5FZ9kGHwpcr7jo3a627UqxA.exe 4196 J5FZ9kGHwpcr7jo3a627UqxA.exe 4196 J5FZ9kGHwpcr7jo3a627UqxA.exe 4084 SvhGUtyPkv8VQ1V20ZBWpWvX.exe 4084 SvhGUtyPkv8VQ1V20ZBWpWvX.exe 4084 SvhGUtyPkv8VQ1V20ZBWpWvX.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
MicrosoftEdgeCP.exepid process 5772 MicrosoftEdgeCP.exe 5772 MicrosoftEdgeCP.exe 5772 MicrosoftEdgeCP.exe 5772 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
f400dab915cf4b65ce4a277f93b1fc7b.exetaskkill.exe9IIY5YGlvuGN04ugB5TbHJtp.exePZWP51Y8ekkz5Rx8v8zjSzoB.exeZcsHlqRqaCKTZn9C7LkF0Sm2.exeKM9jlv2io4wJGDjTeD4LAiUW.exeJ5FZ9kGHwpcr7jo3a627UqxA.exe2m1a70123GmejUInvqIfyXd6.exeRmj2ldYHrkOaUQL42CpXVTI8.exeSvhGUtyPkv8VQ1V20ZBWpWvX.exe2254743.24multitimer.exemultitimer.exemultitimer.exemultitimer.exemultitimer.exemultitimer.exemultitimer.exemultitimer.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription pid process Token: SeDebugPrivilege 496 f400dab915cf4b65ce4a277f93b1fc7b.exe Token: SeDebugPrivilege 2828 taskkill.exe Token: SeDebugPrivilege 2748 9IIY5YGlvuGN04ugB5TbHJtp.exe Token: SeDebugPrivilege 2140 PZWP51Y8ekkz5Rx8v8zjSzoB.exe Token: SeDebugPrivilege 1788 ZcsHlqRqaCKTZn9C7LkF0Sm2.exe Token: SeDebugPrivilege 4136 KM9jlv2io4wJGDjTeD4LAiUW.exe Token: SeLoadDriverPrivilege 4196 J5FZ9kGHwpcr7jo3a627UqxA.exe Token: SeLoadDriverPrivilege 4196 J5FZ9kGHwpcr7jo3a627UqxA.exe Token: SeLoadDriverPrivilege 4196 J5FZ9kGHwpcr7jo3a627UqxA.exe Token: SeDebugPrivilege 4148 2m1a70123GmejUInvqIfyXd6.exe Token: SeDebugPrivilege 1360 Rmj2ldYHrkOaUQL42CpXVTI8.exe Token: SeLoadDriverPrivilege 4084 SvhGUtyPkv8VQ1V20ZBWpWvX.exe Token: SeLoadDriverPrivilege 4084 SvhGUtyPkv8VQ1V20ZBWpWvX.exe Token: SeLoadDriverPrivilege 4084 SvhGUtyPkv8VQ1V20ZBWpWvX.exe Token: SeDebugPrivilege 5008 2254743.24 Token: SeDebugPrivilege 4888 multitimer.exe Token: SeDebugPrivilege 4900 multitimer.exe Token: SeDebugPrivilege 4932 multitimer.exe Token: SeDebugPrivilege 4840 multitimer.exe Token: SeDebugPrivilege 4556 multitimer.exe Token: SeDebugPrivilege 4144 multitimer.exe Token: SeDebugPrivilege 4372 multitimer.exe Token: SeDebugPrivilege 4676 multitimer.exe Token: SeDebugPrivilege 3432 MicrosoftEdge.exe Token: SeDebugPrivilege 3432 MicrosoftEdge.exe Token: SeDebugPrivilege 3432 MicrosoftEdge.exe Token: SeDebugPrivilege 3432 MicrosoftEdge.exe Token: SeDebugPrivilege 5932 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5932 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5932 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 5932 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 676 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 676 MicrosoftEdgeCP.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
90113666802.exepid process 640 90113666802.exe 640 90113666802.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 3432 MicrosoftEdge.exe 5772 MicrosoftEdgeCP.exe 5772 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f400dab915cf4b65ce4a277f93b1fc7b.exe64pbZyccRUcyR3UjPgS7BelU.execmd.exe58029094834.execmd.execmd.exe58029094834.exe58029094834.exedescription pid process target process PID 496 wrote to memory of 576 496 f400dab915cf4b65ce4a277f93b1fc7b.exe 64pbZyccRUcyR3UjPgS7BelU.exe PID 496 wrote to memory of 576 496 f400dab915cf4b65ce4a277f93b1fc7b.exe 64pbZyccRUcyR3UjPgS7BelU.exe PID 496 wrote to memory of 576 496 f400dab915cf4b65ce4a277f93b1fc7b.exe 64pbZyccRUcyR3UjPgS7BelU.exe PID 576 wrote to memory of 3676 576 64pbZyccRUcyR3UjPgS7BelU.exe cmd.exe PID 576 wrote to memory of 3676 576 64pbZyccRUcyR3UjPgS7BelU.exe cmd.exe PID 576 wrote to memory of 3676 576 64pbZyccRUcyR3UjPgS7BelU.exe cmd.exe PID 3676 wrote to memory of 3008 3676 cmd.exe 58029094834.exe PID 3676 wrote to memory of 3008 3676 cmd.exe 58029094834.exe PID 3676 wrote to memory of 3008 3676 cmd.exe 58029094834.exe PID 3008 wrote to memory of 2996 3008 58029094834.exe 58029094834.exe PID 3008 wrote to memory of 2996 3008 58029094834.exe 58029094834.exe PID 3008 wrote to memory of 2996 3008 58029094834.exe 58029094834.exe PID 3008 wrote to memory of 2996 3008 58029094834.exe 58029094834.exe PID 3008 wrote to memory of 2996 3008 58029094834.exe 58029094834.exe PID 3008 wrote to memory of 2996 3008 58029094834.exe 58029094834.exe PID 3008 wrote to memory of 2996 3008 58029094834.exe 58029094834.exe PID 3008 wrote to memory of 2996 3008 58029094834.exe 58029094834.exe PID 3008 wrote to memory of 2996 3008 58029094834.exe 58029094834.exe PID 576 wrote to memory of 3036 576 64pbZyccRUcyR3UjPgS7BelU.exe cmd.exe PID 576 wrote to memory of 3036 576 64pbZyccRUcyR3UjPgS7BelU.exe cmd.exe PID 576 wrote to memory of 3036 576 64pbZyccRUcyR3UjPgS7BelU.exe cmd.exe PID 576 wrote to memory of 1496 576 64pbZyccRUcyR3UjPgS7BelU.exe cmd.exe PID 576 wrote to memory of 1496 576 64pbZyccRUcyR3UjPgS7BelU.exe cmd.exe PID 576 wrote to memory of 1496 576 64pbZyccRUcyR3UjPgS7BelU.exe cmd.exe PID 3036 wrote to memory of 640 3036 cmd.exe 90113666802.exe PID 3036 wrote to memory of 640 3036 cmd.exe 90113666802.exe PID 3036 wrote to memory of 640 3036 cmd.exe 90113666802.exe PID 1496 wrote to memory of 2828 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 2828 1496 cmd.exe taskkill.exe PID 1496 wrote to memory of 2828 1496 cmd.exe taskkill.exe PID 2996 wrote to memory of 3028 2996 58029094834.exe 58029094834.exe PID 2996 wrote to memory of 3028 2996 58029094834.exe 58029094834.exe PID 2996 wrote to memory of 3028 2996 58029094834.exe 58029094834.exe PID 2996 wrote to memory of 3028 2996 58029094834.exe 58029094834.exe PID 2996 wrote to memory of 3028 2996 58029094834.exe 58029094834.exe PID 2996 wrote to memory of 3028 2996 58029094834.exe 58029094834.exe PID 2996 wrote to memory of 3028 2996 58029094834.exe 58029094834.exe PID 2996 wrote to memory of 3028 2996 58029094834.exe 58029094834.exe PID 2996 wrote to memory of 3028 2996 58029094834.exe 58029094834.exe PID 496 wrote to memory of 3784 496 f400dab915cf4b65ce4a277f93b1fc7b.exe TUc8xn1eSorfJaOFQ10e4VsP.exe PID 496 wrote to memory of 3784 496 f400dab915cf4b65ce4a277f93b1fc7b.exe TUc8xn1eSorfJaOFQ10e4VsP.exe PID 496 wrote to memory of 3784 496 f400dab915cf4b65ce4a277f93b1fc7b.exe TUc8xn1eSorfJaOFQ10e4VsP.exe PID 496 wrote to memory of 2748 496 f400dab915cf4b65ce4a277f93b1fc7b.exe 9IIY5YGlvuGN04ugB5TbHJtp.exe PID 496 wrote to memory of 2748 496 f400dab915cf4b65ce4a277f93b1fc7b.exe 9IIY5YGlvuGN04ugB5TbHJtp.exe PID 496 wrote to memory of 1788 496 f400dab915cf4b65ce4a277f93b1fc7b.exe ZcsHlqRqaCKTZn9C7LkF0Sm2.exe PID 496 wrote to memory of 1788 496 f400dab915cf4b65ce4a277f93b1fc7b.exe ZcsHlqRqaCKTZn9C7LkF0Sm2.exe PID 496 wrote to memory of 1360 496 f400dab915cf4b65ce4a277f93b1fc7b.exe Rmj2ldYHrkOaUQL42CpXVTI8.exe PID 496 wrote to memory of 1360 496 f400dab915cf4b65ce4a277f93b1fc7b.exe Rmj2ldYHrkOaUQL42CpXVTI8.exe PID 496 wrote to memory of 2140 496 f400dab915cf4b65ce4a277f93b1fc7b.exe PZWP51Y8ekkz5Rx8v8zjSzoB.exe PID 496 wrote to memory of 2140 496 f400dab915cf4b65ce4a277f93b1fc7b.exe PZWP51Y8ekkz5Rx8v8zjSzoB.exe PID 496 wrote to memory of 2616 496 f400dab915cf4b65ce4a277f93b1fc7b.exe 0zfQ8zt7WPgt63wGoaUOSkPt.exe PID 496 wrote to memory of 2616 496 f400dab915cf4b65ce4a277f93b1fc7b.exe 0zfQ8zt7WPgt63wGoaUOSkPt.exe PID 496 wrote to memory of 2616 496 f400dab915cf4b65ce4a277f93b1fc7b.exe 0zfQ8zt7WPgt63wGoaUOSkPt.exe PID 496 wrote to memory of 4084 496 f400dab915cf4b65ce4a277f93b1fc7b.exe SvhGUtyPkv8VQ1V20ZBWpWvX.exe PID 496 wrote to memory of 4084 496 f400dab915cf4b65ce4a277f93b1fc7b.exe SvhGUtyPkv8VQ1V20ZBWpWvX.exe PID 496 wrote to memory of 4084 496 f400dab915cf4b65ce4a277f93b1fc7b.exe SvhGUtyPkv8VQ1V20ZBWpWvX.exe PID 496 wrote to memory of 4136 496 f400dab915cf4b65ce4a277f93b1fc7b.exe KM9jlv2io4wJGDjTeD4LAiUW.exe PID 496 wrote to memory of 4136 496 f400dab915cf4b65ce4a277f93b1fc7b.exe KM9jlv2io4wJGDjTeD4LAiUW.exe PID 496 wrote to memory of 4148 496 f400dab915cf4b65ce4a277f93b1fc7b.exe 2m1a70123GmejUInvqIfyXd6.exe PID 496 wrote to memory of 4148 496 f400dab915cf4b65ce4a277f93b1fc7b.exe 2m1a70123GmejUInvqIfyXd6.exe PID 496 wrote to memory of 4196 496 f400dab915cf4b65ce4a277f93b1fc7b.exe J5FZ9kGHwpcr7jo3a627UqxA.exe PID 496 wrote to memory of 4196 496 f400dab915cf4b65ce4a277f93b1fc7b.exe J5FZ9kGHwpcr7jo3a627UqxA.exe PID 496 wrote to memory of 4196 496 f400dab915cf4b65ce4a277f93b1fc7b.exe J5FZ9kGHwpcr7jo3a627UqxA.exe PID 3028 wrote to memory of 4508 3028 58029094834.exe cmd.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\f400dab915cf4b65ce4a277f93b1fc7b.exe"C:\Users\Admin\AppData\Local\Temp\f400dab915cf4b65ce4a277f93b1fc7b.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\64pbZyccRUcyR3UjPgS7BelU.exe"C:\Users\Admin\Documents\64pbZyccRUcyR3UjPgS7BelU.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\58029094834.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\58029094834.exe"C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\58029094834.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\58029094834.exe"C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\58029094834.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\58029094834.exe"C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\58029094834.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\58029094834.exe"7⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK8⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\90113666802.exe" /mix3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\90113666802.exe"C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\90113666802.exe" /mix4⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\Skinks.exe"C:\Users\Admin\AppData\Local\Temp\Skinks.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"6⤵
- Executes dropped EXE
- Drops startup file
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\AppData\Local\Temp\New Feature\6.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\6.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CmD < Veduto.aspx7⤵
-
C:\Windows\SysWOW64\cmd.exeCmD8⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^aTBSeprklsEdUBjaIQPOTdrkjIzkdxVxYGzCSmbkAwUsrqIIuWPCefDwPdGzQRVQvlagiKmozDgScLijqKtxFzsIrsMCTrcIutVTIzBvvGonwL$" Ama.aspx9⤵
-
C:\Users\Admin\AppData\Roaming\oSXbHZepFnQhkxxrjgN\Allora.exe.comAllora.exe.com S9⤵
-
C:\Users\Admin\AppData\Roaming\oSXbHZepFnQhkxxrjgN\Allora.exe.comC:\Users\Admin\AppData\Roaming\oSXbHZepFnQhkxxrjgN\Allora.exe.com S10⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 309⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CmD < Sospettoso.xlsx7⤵
-
C:\Windows\SysWOW64\cmd.exeCmD8⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^yZVxJnOtboCOwYACmuqprbTxDxRIXwIZDiDmtkKRJgAQVpuqCvmPrrQHuBQfGyicmDlUxwbhvpmOWrnxhQuACSVAsVaDcxlDitdaYjFBYkzUEwLrevwQZGTHHKCmIUSwYVHRMucwlFCd$" Fermare.xlsx9⤵
-
C:\Users\Admin\AppData\Roaming\AdikuzPulW\Dimmi.exe.comDimmi.exe.com x9⤵
-
C:\Users\Admin\AppData\Roaming\AdikuzPulW\Dimmi.exe.comC:\Users\Admin\AppData\Roaming\AdikuzPulW\Dimmi.exe.com x10⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 309⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\New Feature\5.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\5.exe"6⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c icacls "C:\Users\Admin\AppData\Local\Disk" /inheritance:e /deny "Admin:(R,REA,RA,RD)" & attrib +s +h "C:\Users\Admin\AppData\Local\Disk" & schtasks /create /tn \Services\Diagnostic /tr "'C:\Users\Admin\AppData\Local\Disk\AutoIt3\AutoIt3_x64.exe' 'C:\Users\Admin\AppData\Local\Disk\AutoIt3\Settings.au3'" /st 00:04 /du 9906:30 /sc once /ri 1 /f7⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\AppData\Local\Disk" /inheritance:e /deny "Admin:(R,REA,RA,RD)"8⤵
- Modifies file permissions
-
C:\Windows\system32\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Local\Disk"8⤵
- Views/modifies file attributes
-
C:\Windows\system32\schtasks.exeschtasks /create /tn \Services\Diagnostic /tr "'C:\Users\Admin\AppData\Local\Disk\AutoIt3\AutoIt3_x64.exe' 'C:\Users\Admin\AppData\Local\Disk\AutoIt3\Settings.au3'" /st 00:04 /du 9906:30 /sc once /ri 1 /f8⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Vellerese.vbs"7⤵
- Blocklisted process makes network request
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\New Feature\5.exe"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 28⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\xHpbZBmho & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\90113666802.exe"5⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 36⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "64pbZyccRUcyR3UjPgS7BelU.exe" /f & erase "C:\Users\Admin\Documents\64pbZyccRUcyR3UjPgS7BelU.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "64pbZyccRUcyR3UjPgS7BelU.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\TUc8xn1eSorfJaOFQ10e4VsP.exe"C:\Users\Admin\Documents\TUc8xn1eSorfJaOFQ10e4VsP.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\9IIY5YGlvuGN04ugB5TbHJtp.exe"C:\Users\Admin\Documents\9IIY5YGlvuGN04ugB5TbHJtp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\QW9X4P1SUW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\QW9X4P1SUW\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1053⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\QW9X4P1SUW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\QW9X4P1SUW\multitimer.exe" 1 3.1616435001.6058d739235d5 1054⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\QW9X4P1SUW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\QW9X4P1SUW\multitimer.exe" 2 3.1616435001.6058d739235d55⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\FOG70QER54\setups.exe"C:\Users\Admin\AppData\Local\Temp\FOG70QER54\setups.exe" ll3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-FN2AL.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-FN2AL.tmp\setups.tmp" /SL5="$601C8,290870,64000,C:\Users\Admin\AppData\Local\Temp\FOG70QER54\setups.exe" ll4⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Documents\ZcsHlqRqaCKTZn9C7LkF0Sm2.exe"C:\Users\Admin\Documents\ZcsHlqRqaCKTZn9C7LkF0Sm2.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\5PF9VQY6JP\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\5PF9VQY6JP\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1053⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\5PF9VQY6JP\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\5PF9VQY6JP\multitimer.exe" 1 3.1616435000.6058d738e1454 1054⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\5PF9VQY6JP\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\5PF9VQY6JP\multitimer.exe" 2 3.1616435000.6058d738e14545⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\DQEZ47L728\setups.exe"C:\Users\Admin\AppData\Local\Temp\DQEZ47L728\setups.exe" ll3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\SvhGUtyPkv8VQ1V20ZBWpWvX.exe"C:\Users\Admin\Documents\SvhGUtyPkv8VQ1V20ZBWpWvX.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\J5FZ9kGHwpcr7jo3a627UqxA.exe"C:\Users\Admin\Documents\J5FZ9kGHwpcr7jo3a627UqxA.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\2m1a70123GmejUInvqIfyXd6.exe"C:\Users\Admin\Documents\2m1a70123GmejUInvqIfyXd6.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\3696807.40"C:\ProgramData\3696807.40"3⤵
- Executes dropped EXE
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"4⤵
- Executes dropped EXE
-
C:\ProgramData\2254743.24"C:\ProgramData\2254743.24"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\KM9jlv2io4wJGDjTeD4LAiUW.exe"C:\Users\Admin\Documents\KM9jlv2io4wJGDjTeD4LAiUW.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\THMKRSB6UX\setups.exe"C:\Users\Admin\AppData\Local\Temp\THMKRSB6UX\setups.exe" ll3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\BU1NYA1698\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\BU1NYA1698\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1053⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\BU1NYA1698\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\BU1NYA1698\multitimer.exe" 1 3.1616435001.6058d7391f0e3 1054⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\BU1NYA1698\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\BU1NYA1698\multitimer.exe" 2 3.1616435001.6058d7391f0e35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\0zfQ8zt7WPgt63wGoaUOSkPt.exe"C:\Users\Admin\Documents\0zfQ8zt7WPgt63wGoaUOSkPt.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\Documents\0zfQ8zt7WPgt63wGoaUOSkPt.exe"3⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Documents\PZWP51Y8ekkz5Rx8v8zjSzoB.exe"C:\Users\Admin\Documents\PZWP51Y8ekkz5Rx8v8zjSzoB.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\DQEZ47L728\setups.exe"C:\Users\Admin\AppData\Local\Temp\DQEZ47L728\setups.exe" ll3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DR63RDNAG1\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\DR63RDNAG1\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1053⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\DR63RDNAG1\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\DR63RDNAG1\multitimer.exe" 1 3.1616435000.6058d73862d7f 1054⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DR63RDNAG1\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\DR63RDNAG1\multitimer.exe" 2 3.1616435000.6058d73862d7f5⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\Rmj2ldYHrkOaUQL42CpXVTI8.exe"C:\Users\Admin\Documents\Rmj2ldYHrkOaUQL42CpXVTI8.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\is-RI2LL.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-RI2LL.tmp\setups.tmp" /SL5="$1201C6,290870,64000,C:\Users\Admin\AppData\Local\Temp\DQEZ47L728\setups.exe" ll1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\is-IC7BE.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-IC7BE.tmp\setups.tmp" /SL5="$10200,290870,64000,C:\Users\Admin\AppData\Local\Temp\THMKRSB6UX\setups.exe" ll1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\is-CBQHR.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-CBQHR.tmp\setups.tmp" /SL5="$E01E6,290870,64000,C:\Users\Admin\AppData\Local\Temp\DQEZ47L728\setups.exe" ll1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Local\Disk\AutoIt3\AutoIt3_x64.exeC:\Users\Admin\AppData\Local\Disk\AutoIt3\AutoIt3_x64.exe "C:\Users\Admin\AppData\Local\Disk\AutoIt3\Settings.au3"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Hidden Files and Directories
2Modify Registry
3File Permissions Modification
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\2254743.24MD5
5378979a5785412ccb0e225ced77edb5
SHA1cc8d3bdc64e253cb7613828ee30b12538131d561
SHA256ca1cefe7d1a07210c0a8e7633d13cd2b02d356356d5684d1c2329af0070e0b8e
SHA5126f7ecaa35d3bdfd8b44914e0af34dd8a4ae05edc470431af111aee7562d3048f3034aee213c6259b887af6339d06a79814a63bb2cc879a32a8ffbc8a8317816f
-
C:\ProgramData\2254743.24MD5
5378979a5785412ccb0e225ced77edb5
SHA1cc8d3bdc64e253cb7613828ee30b12538131d561
SHA256ca1cefe7d1a07210c0a8e7633d13cd2b02d356356d5684d1c2329af0070e0b8e
SHA5126f7ecaa35d3bdfd8b44914e0af34dd8a4ae05edc470431af111aee7562d3048f3034aee213c6259b887af6339d06a79814a63bb2cc879a32a8ffbc8a8317816f
-
C:\ProgramData\3696807.40MD5
24c4a7e5a55c14695c52eecda5703130
SHA1e1ee0a177616e126e1adea68da00b998a0ec342d
SHA256f6d16539af6379713e8a54debf880140e48492241e820db2dc8dc49c45d240b0
SHA5127f0e91261e149f2cfcd68e069b51983ef4d1834d28756f84df155905989b714bbf90ad54e11913ff1bff9f05557f01aa8a7bc60a4c042e430cbd2ee52d42fb7f
-
C:\ProgramData\3696807.40MD5
24c4a7e5a55c14695c52eecda5703130
SHA1e1ee0a177616e126e1adea68da00b998a0ec342d
SHA256f6d16539af6379713e8a54debf880140e48492241e820db2dc8dc49c45d240b0
SHA5127f0e91261e149f2cfcd68e069b51983ef4d1834d28756f84df155905989b714bbf90ad54e11913ff1bff9f05557f01aa8a7bc60a4c042e430cbd2ee52d42fb7f
-
C:\Users\Admin\AppData\Local\Temp\5PF9VQY6JP\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\5PF9VQY6JP\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\5PF9VQY6JP\multitimer.exe.configMD5
3f1498c07d8713fe5c315db15a2a2cf3
SHA1ef5f42fd21f6e72bdc74794f2496884d9c40bbfb
SHA25652ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0
SHA512cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d
-
C:\Users\Admin\AppData\Local\Temp\BU1NYA1698\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\BU1NYA1698\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\BU1NYA1698\multitimer.exe.configMD5
3f1498c07d8713fe5c315db15a2a2cf3
SHA1ef5f42fd21f6e72bdc74794f2496884d9c40bbfb
SHA25652ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0
SHA512cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d
-
C:\Users\Admin\AppData\Local\Temp\DQEZ47L728\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\DQEZ47L728\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\DQEZ47L728\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\DR63RDNAG1\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\DR63RDNAG1\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\DR63RDNAG1\multitimer.exe.configMD5
3f1498c07d8713fe5c315db15a2a2cf3
SHA1ef5f42fd21f6e72bdc74794f2496884d9c40bbfb
SHA25652ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0
SHA512cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d
-
C:\Users\Admin\AppData\Local\Temp\FOG70QER54\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\FOG70QER54\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\QW9X4P1SUW\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\QW9X4P1SUW\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\QW9X4P1SUW\multitimer.exe.configMD5
3f1498c07d8713fe5c315db15a2a2cf3
SHA1ef5f42fd21f6e72bdc74794f2496884d9c40bbfb
SHA25652ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0
SHA512cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d
-
C:\Users\Admin\AppData\Local\Temp\THMKRSB6UX\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\THMKRSB6UX\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\is-CBQHR.tmp\setups.tmpMD5
f0078bb51601997fc35eb4d048471554
SHA1e1577d111803636347d16c8c306892f3a1092ce3
SHA256a35552a160dfc65ed85d8920b7a6c6a6c73f8bd3133ff50839e04eb2b00f9e57
SHA5124f160431b55d8b800e9051b504582ab1f65cec0bbeeed1e7dadeb70931220f9f0132ba251feb312d92acca1dbe2c63b6b8a20d937bee533d3532e2a3dda324c4
-
C:\Users\Admin\AppData\Local\Temp\is-FN2AL.tmp\setups.tmpMD5
f0078bb51601997fc35eb4d048471554
SHA1e1577d111803636347d16c8c306892f3a1092ce3
SHA256a35552a160dfc65ed85d8920b7a6c6a6c73f8bd3133ff50839e04eb2b00f9e57
SHA5124f160431b55d8b800e9051b504582ab1f65cec0bbeeed1e7dadeb70931220f9f0132ba251feb312d92acca1dbe2c63b6b8a20d937bee533d3532e2a3dda324c4
-
C:\Users\Admin\AppData\Local\Temp\is-RI2LL.tmp\setups.tmpMD5
f0078bb51601997fc35eb4d048471554
SHA1e1577d111803636347d16c8c306892f3a1092ce3
SHA256a35552a160dfc65ed85d8920b7a6c6a6c73f8bd3133ff50839e04eb2b00f9e57
SHA5124f160431b55d8b800e9051b504582ab1f65cec0bbeeed1e7dadeb70931220f9f0132ba251feb312d92acca1dbe2c63b6b8a20d937bee533d3532e2a3dda324c4
-
C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\58029094834.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\58029094834.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\58029094834.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\58029094834.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\90113666802.exeMD5
6f5b1279d943e548259d62f00650044a
SHA1367d5ff6ee971fcac30cf8b453eea8f47a936264
SHA256118f24dab3dce4a5ae6e3ab078551cbc628b475abeeafa07a5972622aaa38812
SHA51275e655e6df832bccafca641f0af62165da644a92ce3055d30b12b2dd0d241df4b43ea4de4429e3719b9e7f198882c5a0b3f44ab45900797d41787fdaf60988fe
-
C:\Users\Admin\AppData\Local\Temp\{AVJs-shZ9h-a37N-eoKCZ}\90113666802.exeMD5
6f5b1279d943e548259d62f00650044a
SHA1367d5ff6ee971fcac30cf8b453eea8f47a936264
SHA256118f24dab3dce4a5ae6e3ab078551cbc628b475abeeafa07a5972622aaa38812
SHA51275e655e6df832bccafca641f0af62165da644a92ce3055d30b12b2dd0d241df4b43ea4de4429e3719b9e7f198882c5a0b3f44ab45900797d41787fdaf60988fe
-
C:\Users\Admin\Documents\0zfQ8zt7WPgt63wGoaUOSkPt.exeMD5
b8dfbf8460b17bca22633963d6f863da
SHA1b2f468d69dde881f730f53418bcfc02c4ec62f52
SHA256e3b5d4113eeec5c27fafdabb16b48d42d35cfd3ad94e1e43cb0300155d5e48e9
SHA512d0d317c4b66d3a2eaa9808801db6e86fcd4d7f819fc931b526d8a29f5ec67a03d18a4999205a12b4e97f2db5bab05320a4e243598007d797388ad1cfb2449f4a
-
C:\Users\Admin\Documents\0zfQ8zt7WPgt63wGoaUOSkPt.exeMD5
b8dfbf8460b17bca22633963d6f863da
SHA1b2f468d69dde881f730f53418bcfc02c4ec62f52
SHA256e3b5d4113eeec5c27fafdabb16b48d42d35cfd3ad94e1e43cb0300155d5e48e9
SHA512d0d317c4b66d3a2eaa9808801db6e86fcd4d7f819fc931b526d8a29f5ec67a03d18a4999205a12b4e97f2db5bab05320a4e243598007d797388ad1cfb2449f4a
-
C:\Users\Admin\Documents\2m1a70123GmejUInvqIfyXd6.exeMD5
3a43f860afe6941d92f53046bbd6194c
SHA11ac615c10f7a6aa5b82b0569189f9d98972a6544
SHA2561e801ec01234ce075108618a4bdcff570ffff471c64eaf602a87531a6b35fb28
SHA512e23d5a39e6df3360f849e527afb055eca6466b3c35a3ab01c5aee33307d5c647a24730431c98598e3ca83a3df12862b88f612a769bf1cdeb4cb16e72f08b0cce
-
C:\Users\Admin\Documents\2m1a70123GmejUInvqIfyXd6.exeMD5
3a43f860afe6941d92f53046bbd6194c
SHA11ac615c10f7a6aa5b82b0569189f9d98972a6544
SHA2561e801ec01234ce075108618a4bdcff570ffff471c64eaf602a87531a6b35fb28
SHA512e23d5a39e6df3360f849e527afb055eca6466b3c35a3ab01c5aee33307d5c647a24730431c98598e3ca83a3df12862b88f612a769bf1cdeb4cb16e72f08b0cce
-
C:\Users\Admin\Documents\64pbZyccRUcyR3UjPgS7BelU.exeMD5
b22f601e1c1e2400a0fcd0e9835f03ed
SHA1d23a32d7a9ac91a8bcc701b147e334ae47cc802a
SHA256c23d42a1c5b99920c37bb46a6b64ef68b686255a915a0e8cf1942f3f65335268
SHA512f2e9266248f9812bececa281f5218962ed37ea3ac4405d11e2220ec51a9e52ffab84d87c5cfa6b7f3ce7249e009cc0ed2a742b1e93d1b908c9e2dfd9f4b5295c
-
C:\Users\Admin\Documents\64pbZyccRUcyR3UjPgS7BelU.exeMD5
b22f601e1c1e2400a0fcd0e9835f03ed
SHA1d23a32d7a9ac91a8bcc701b147e334ae47cc802a
SHA256c23d42a1c5b99920c37bb46a6b64ef68b686255a915a0e8cf1942f3f65335268
SHA512f2e9266248f9812bececa281f5218962ed37ea3ac4405d11e2220ec51a9e52ffab84d87c5cfa6b7f3ce7249e009cc0ed2a742b1e93d1b908c9e2dfd9f4b5295c
-
C:\Users\Admin\Documents\9IIY5YGlvuGN04ugB5TbHJtp.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\9IIY5YGlvuGN04ugB5TbHJtp.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\J5FZ9kGHwpcr7jo3a627UqxA.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
C:\Users\Admin\Documents\J5FZ9kGHwpcr7jo3a627UqxA.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
C:\Users\Admin\Documents\KM9jlv2io4wJGDjTeD4LAiUW.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\KM9jlv2io4wJGDjTeD4LAiUW.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\PZWP51Y8ekkz5Rx8v8zjSzoB.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\PZWP51Y8ekkz5Rx8v8zjSzoB.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\Rmj2ldYHrkOaUQL42CpXVTI8.exeMD5
3a43f860afe6941d92f53046bbd6194c
SHA11ac615c10f7a6aa5b82b0569189f9d98972a6544
SHA2561e801ec01234ce075108618a4bdcff570ffff471c64eaf602a87531a6b35fb28
SHA512e23d5a39e6df3360f849e527afb055eca6466b3c35a3ab01c5aee33307d5c647a24730431c98598e3ca83a3df12862b88f612a769bf1cdeb4cb16e72f08b0cce
-
C:\Users\Admin\Documents\Rmj2ldYHrkOaUQL42CpXVTI8.exeMD5
3a43f860afe6941d92f53046bbd6194c
SHA11ac615c10f7a6aa5b82b0569189f9d98972a6544
SHA2561e801ec01234ce075108618a4bdcff570ffff471c64eaf602a87531a6b35fb28
SHA512e23d5a39e6df3360f849e527afb055eca6466b3c35a3ab01c5aee33307d5c647a24730431c98598e3ca83a3df12862b88f612a769bf1cdeb4cb16e72f08b0cce
-
C:\Users\Admin\Documents\SvhGUtyPkv8VQ1V20ZBWpWvX.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
C:\Users\Admin\Documents\SvhGUtyPkv8VQ1V20ZBWpWvX.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
C:\Users\Admin\Documents\TUc8xn1eSorfJaOFQ10e4VsP.exeMD5
b8dfbf8460b17bca22633963d6f863da
SHA1b2f468d69dde881f730f53418bcfc02c4ec62f52
SHA256e3b5d4113eeec5c27fafdabb16b48d42d35cfd3ad94e1e43cb0300155d5e48e9
SHA512d0d317c4b66d3a2eaa9808801db6e86fcd4d7f819fc931b526d8a29f5ec67a03d18a4999205a12b4e97f2db5bab05320a4e243598007d797388ad1cfb2449f4a
-
C:\Users\Admin\Documents\TUc8xn1eSorfJaOFQ10e4VsP.exeMD5
b8dfbf8460b17bca22633963d6f863da
SHA1b2f468d69dde881f730f53418bcfc02c4ec62f52
SHA256e3b5d4113eeec5c27fafdabb16b48d42d35cfd3ad94e1e43cb0300155d5e48e9
SHA512d0d317c4b66d3a2eaa9808801db6e86fcd4d7f819fc931b526d8a29f5ec67a03d18a4999205a12b4e97f2db5bab05320a4e243598007d797388ad1cfb2449f4a
-
C:\Users\Admin\Documents\ZcsHlqRqaCKTZn9C7LkF0Sm2.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\ZcsHlqRqaCKTZn9C7LkF0Sm2.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
\Users\Admin\AppData\LocalLow\cR1dL5pE5dG6mD5k\freebl3.dllMD5
60acd24430204ad2dc7f148b8cfe9bdc
SHA1989f377b9117d7cb21cbe92a4117f88f9c7693d9
SHA2569876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97
SHA512626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01
-
\Users\Admin\AppData\LocalLow\cR1dL5pE5dG6mD5k\freebl3.dllMD5
60acd24430204ad2dc7f148b8cfe9bdc
SHA1989f377b9117d7cb21cbe92a4117f88f9c7693d9
SHA2569876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97
SHA512626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01
-
\Users\Admin\AppData\LocalLow\cR1dL5pE5dG6mD5k\freebl3.dllMD5
60acd24430204ad2dc7f148b8cfe9bdc
SHA1989f377b9117d7cb21cbe92a4117f88f9c7693d9
SHA2569876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97
SHA512626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01
-
\Users\Admin\AppData\LocalLow\cR1dL5pE5dG6mD5k\mozglue.dllMD5
eae9273f8cdcf9321c6c37c244773139
SHA18378e2a2f3635574c106eea8419b5eb00b8489b0
SHA256a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc
SHA51206e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097
-
\Users\Admin\AppData\LocalLow\cR1dL5pE5dG6mD5k\nss3.dllMD5
02cc7b8ee30056d5912de54f1bdfc219
SHA1a6923da95705fb81e368ae48f93d28522ef552fb
SHA2561989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5
SHA5120d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5
-
\Users\Admin\AppData\LocalLow\cR1dL5pE5dG6mD5k\softokn3.dllMD5
4e8df049f3459fa94ab6ad387f3561ac
SHA106ed392bc29ad9d5fc05ee254c2625fd65925114
SHA25625a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871
SHA5123dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6
-
\Users\Admin\AppData\LocalLow\cR1dL5pE5dG6mD5k\softokn3.dllMD5
4e8df049f3459fa94ab6ad387f3561ac
SHA106ed392bc29ad9d5fc05ee254c2625fd65925114
SHA25625a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871
SHA5123dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6
-
\Users\Admin\AppData\LocalLow\sqlite3.dllMD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4
-
\Users\Admin\AppData\LocalLow\sqlite3.dllMD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4
-
\Users\Admin\AppData\Local\Temp\is-CRLA8.tmp\_isetup\_isdecmp.dllMD5
fd4743e2a51dd8e0d44f96eae1853226
SHA1646cef384e949aaf61e6d0b243d8d84ab04e79b7
SHA2566535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b
SHA5124587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d
-
memory/356-165-0x0000000000000000-mapping.dmp
-
memory/496-6-0x00000000051D0000-0x00000000051D1000-memory.dmpFilesize
4KB
-
memory/496-3-0x0000000000800000-0x0000000000801000-memory.dmpFilesize
4KB
-
memory/496-7-0x0000000005180000-0x0000000005181000-memory.dmpFilesize
4KB
-
memory/496-2-0x0000000073520000-0x0000000073C0E000-memory.dmpFilesize
6.9MB
-
memory/496-8-0x0000000005190000-0x0000000005191000-memory.dmpFilesize
4KB
-
memory/496-9-0x0000000008EB0000-0x0000000008EB3000-memory.dmpFilesize
12KB
-
memory/496-10-0x0000000005183000-0x0000000005185000-memory.dmpFilesize
8KB
-
memory/496-5-0x0000000005830000-0x0000000005831000-memory.dmpFilesize
4KB
-
memory/496-11-0x0000000009930000-0x0000000009931000-memory.dmpFilesize
4KB
-
memory/576-12-0x0000000000000000-mapping.dmp
-
memory/576-16-0x0000000000950000-0x000000000097D000-memory.dmpFilesize
180KB
-
memory/576-15-0x0000000000CD0000-0x0000000000CD1000-memory.dmpFilesize
4KB
-
memory/576-17-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/640-34-0x0000000000000000-mapping.dmp
-
memory/640-40-0x0000000000DA0000-0x0000000000DA1000-memory.dmpFilesize
4KB
-
memory/640-42-0x0000000000400000-0x00000000004E3000-memory.dmpFilesize
908KB
-
memory/640-41-0x0000000000DA0000-0x0000000000E7F000-memory.dmpFilesize
892KB
-
memory/1360-124-0x0000000000920000-0x0000000000934000-memory.dmpFilesize
80KB
-
memory/1360-106-0x00000000004D0000-0x00000000004D1000-memory.dmpFilesize
4KB
-
memory/1360-129-0x0000000000C10000-0x0000000000C11000-memory.dmpFilesize
4KB
-
memory/1360-81-0x00007FF9A7E40000-0x00007FF9A882C000-memory.dmpFilesize
9.9MB
-
memory/1360-122-0x000000001B200000-0x000000001B202000-memory.dmpFilesize
8KB
-
memory/1360-72-0x0000000000000000-mapping.dmp
-
memory/1496-32-0x0000000000000000-mapping.dmp
-
memory/1788-71-0x0000000000000000-mapping.dmp
-
memory/1788-86-0x00007FF9A7E40000-0x00007FF9A882C000-memory.dmpFilesize
9.9MB
-
memory/1788-114-0x0000000001250000-0x0000000001252000-memory.dmpFilesize
8KB
-
memory/1836-215-0x0000000003791000-0x0000000003798000-memory.dmpFilesize
28KB
-
memory/1836-192-0x0000000000000000-mapping.dmp
-
memory/1836-220-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1836-212-0x0000000002221000-0x0000000002225000-memory.dmpFilesize
16KB
-
memory/1836-213-0x0000000003751000-0x000000000377C000-memory.dmpFilesize
172KB
-
memory/2140-82-0x00007FF9A7E40000-0x00007FF9A882C000-memory.dmpFilesize
9.9MB
-
memory/2140-113-0x000000001B790000-0x000000001B792000-memory.dmpFilesize
8KB
-
memory/2140-73-0x0000000000000000-mapping.dmp
-
memory/2616-131-0x0000000000D70000-0x0000000000D71000-memory.dmpFilesize
4KB
-
memory/2616-74-0x0000000000000000-mapping.dmp
-
memory/2748-115-0x0000000000DC0000-0x0000000000DC2000-memory.dmpFilesize
8KB
-
memory/2748-70-0x00007FF9A7E40000-0x00007FF9A882C000-memory.dmpFilesize
9.9MB
-
memory/2748-64-0x0000000000000000-mapping.dmp
-
memory/2748-92-0x0000000000640000-0x0000000000641000-memory.dmpFilesize
4KB
-
memory/2828-38-0x0000000000000000-mapping.dmp
-
memory/2996-39-0x0000000000400000-0x00000000008A2000-memory.dmpFilesize
4.6MB
-
memory/2996-27-0x0000000000400000-0x0000000002B75000-memory.dmpFilesize
39.5MB
-
memory/2996-28-0x0000000000401F10-mapping.dmp
-
memory/2996-33-0x00000000032B0000-0x00000000032B1000-memory.dmpFilesize
4KB
-
memory/2996-37-0x00000000030B0000-0x000000000315C000-memory.dmpFilesize
688KB
-
memory/2996-43-0x0000000003490000-0x0000000003491000-memory.dmpFilesize
4KB
-
memory/2996-46-0x0000000003380000-0x000000000342C000-memory.dmpFilesize
688KB
-
memory/2996-31-0x0000000000400000-0x0000000002B75000-memory.dmpFilesize
39.5MB
-
memory/3008-25-0x0000000000400000-0x00000000008D0000-memory.dmpFilesize
4.8MB
-
memory/3008-19-0x0000000000000000-mapping.dmp
-
memory/3008-22-0x0000000000EC0000-0x0000000000EC1000-memory.dmpFilesize
4KB
-
memory/3008-26-0x00000000010F0000-0x00000000011C4000-memory.dmpFilesize
848KB
-
memory/3008-24-0x0000000001220000-0x0000000001221000-memory.dmpFilesize
4KB
-
memory/3008-23-0x0000000000EC0000-0x0000000000F99000-memory.dmpFilesize
868KB
-
memory/3028-49-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/3028-45-0x0000000000403B90-mapping.dmp
-
memory/3028-44-0x0000000000400000-0x0000000002B44000-memory.dmpFilesize
39.3MB
-
memory/3028-48-0x0000000000400000-0x0000000002B44000-memory.dmpFilesize
39.3MB
-
memory/3028-54-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/3028-53-0x0000000003180000-0x0000000003211000-memory.dmpFilesize
580KB
-
memory/3028-52-0x0000000003180000-0x0000000003181000-memory.dmpFilesize
4KB
-
memory/3028-51-0x0000000000400000-0x0000000002B2D000-memory.dmpFilesize
39.2MB
-
memory/3028-50-0x0000000002D20000-0x0000000002DAD000-memory.dmpFilesize
564KB
-
memory/3036-30-0x0000000000000000-mapping.dmp
-
memory/3676-18-0x0000000000000000-mapping.dmp
-
memory/3784-130-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/3784-128-0x0000000000D10000-0x0000000000DA1000-memory.dmpFilesize
580KB
-
memory/3784-63-0x0000000000000000-mapping.dmp
-
memory/3784-125-0x0000000000DD0000-0x0000000000DD1000-memory.dmpFilesize
4KB
-
memory/4084-75-0x0000000000000000-mapping.dmp
-
memory/4084-117-0x0000000003070000-0x000000000397F000-memory.dmpFilesize
9.1MB
-
memory/4084-133-0x0000000003070000-0x000000000397F000-memory.dmpFilesize
9.1MB
-
memory/4084-109-0x0000000002670000-0x0000000002AE6000-memory.dmpFilesize
4.5MB
-
memory/4136-95-0x00007FF9A7E40000-0x00007FF9A882C000-memory.dmpFilesize
9.9MB
-
memory/4136-121-0x000000001B820000-0x000000001B822000-memory.dmpFilesize
8KB
-
memory/4136-87-0x0000000000000000-mapping.dmp
-
memory/4144-256-0x00007FF9A3BC0000-0x00007FF9A4560000-memory.dmpFilesize
9.6MB
-
memory/4144-262-0x0000000000F30000-0x0000000000F32000-memory.dmpFilesize
8KB
-
memory/4144-253-0x0000000000000000-mapping.dmp
-
memory/4148-120-0x000000001B680000-0x000000001B682000-memory.dmpFilesize
8KB
-
memory/4148-88-0x0000000000000000-mapping.dmp
-
memory/4148-116-0x0000000000F60000-0x0000000000F61000-memory.dmpFilesize
4KB
-
memory/4148-98-0x00007FF9A7E40000-0x00007FF9A882C000-memory.dmpFilesize
9.9MB
-
memory/4196-91-0x0000000000000000-mapping.dmp
-
memory/4196-119-0x00000000026F0000-0x0000000002B66000-memory.dmpFilesize
4.5MB
-
memory/4196-134-0x00000000030F0000-0x00000000039FF000-memory.dmpFilesize
9.1MB
-
memory/4196-123-0x00000000030F0000-0x00000000039FF000-memory.dmpFilesize
9.1MB
-
memory/4212-203-0x0000000002E41000-0x0000000002E6C000-memory.dmpFilesize
172KB
-
memory/4212-206-0x0000000002E81000-0x0000000002E88000-memory.dmpFilesize
28KB
-
memory/4212-168-0x0000000000000000-mapping.dmp
-
memory/4212-200-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4212-198-0x00000000006B1000-0x00000000006B5000-memory.dmpFilesize
16KB
-
memory/4300-181-0x0000000073520000-0x0000000073C0E000-memory.dmpFilesize
6.9MB
-
memory/4300-223-0x0000000004490000-0x0000000004491000-memory.dmpFilesize
4KB
-
memory/4300-214-0x000000000D580000-0x000000000D594000-memory.dmpFilesize
80KB
-
memory/4300-193-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/4300-221-0x0000000004C90000-0x0000000004C91000-memory.dmpFilesize
4KB
-
memory/4300-167-0x0000000000000000-mapping.dmp
-
memory/4300-210-0x0000000004AB0000-0x0000000004AB1000-memory.dmpFilesize
4KB
-
memory/4336-207-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/4336-208-0x0000000003791000-0x00000000037BC000-memory.dmpFilesize
172KB
-
memory/4336-171-0x0000000000000000-mapping.dmp
-
memory/4336-211-0x0000000003751000-0x0000000003758000-memory.dmpFilesize
28KB
-
memory/4336-202-0x0000000003121000-0x0000000003125000-memory.dmpFilesize
16KB
-
memory/4360-172-0x0000000000000000-mapping.dmp
-
memory/4360-204-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4360-201-0x0000000002811000-0x0000000002815000-memory.dmpFilesize
16KB
-
memory/4372-257-0x0000000000000000-mapping.dmp
-
memory/4372-259-0x00007FF9A3BC0000-0x00007FF9A4560000-memory.dmpFilesize
9.6MB
-
memory/4372-263-0x0000000002510000-0x0000000002512000-memory.dmpFilesize
8KB
-
memory/4380-227-0x0000000000000000-mapping.dmp
-
memory/4380-233-0x0000000004C20000-0x0000000004C21000-memory.dmpFilesize
4KB
-
memory/4380-228-0x0000000073520000-0x0000000073C0E000-memory.dmpFilesize
6.9MB
-
memory/4384-247-0x00007FF9A3BC0000-0x00007FF9A4560000-memory.dmpFilesize
9.6MB
-
memory/4384-249-0x0000000002FF0000-0x0000000002FF2000-memory.dmpFilesize
8KB
-
memory/4384-244-0x0000000000000000-mapping.dmp
-
memory/4484-242-0x00007FF9A3BC0000-0x00007FF9A4560000-memory.dmpFilesize
9.6MB
-
memory/4484-240-0x0000000000000000-mapping.dmp
-
memory/4484-250-0x0000000002210000-0x0000000002212000-memory.dmpFilesize
8KB
-
memory/4508-127-0x0000000000000000-mapping.dmp
-
memory/4556-255-0x00007FF9A3BC0000-0x00007FF9A4560000-memory.dmpFilesize
9.6MB
-
memory/4556-254-0x0000000000000000-mapping.dmp
-
memory/4556-261-0x00000000023C0000-0x00000000023C2000-memory.dmpFilesize
8KB
-
memory/4608-252-0x0000000000000000-mapping.dmp
-
memory/4656-137-0x0000000000000000-mapping.dmp
-
memory/4676-264-0x0000000002D20000-0x0000000002D22000-memory.dmpFilesize
8KB
-
memory/4676-260-0x00007FF9A3BC0000-0x00007FF9A4560000-memory.dmpFilesize
9.6MB
-
memory/4676-258-0x0000000000000000-mapping.dmp
-
memory/4684-243-0x0000000000000000-mapping.dmp
-
memory/4772-248-0x00007FF9A3BC0000-0x00007FF9A4560000-memory.dmpFilesize
9.6MB
-
memory/4772-251-0x0000000000BD0000-0x0000000000BD2000-memory.dmpFilesize
8KB
-
memory/4772-245-0x0000000000000000-mapping.dmp
-
memory/4840-138-0x0000000000000000-mapping.dmp
-
memory/4840-188-0x00007FF9A3BC0000-0x00007FF9A4560000-memory.dmpFilesize
9.6MB
-
memory/4840-191-0x0000000002740000-0x0000000002742000-memory.dmpFilesize
8KB
-
memory/4888-189-0x00007FF9A3BC0000-0x00007FF9A4560000-memory.dmpFilesize
9.6MB
-
memory/4888-196-0x0000000002C20000-0x0000000002C22000-memory.dmpFilesize
8KB
-
memory/4888-142-0x0000000000000000-mapping.dmp
-
memory/4900-143-0x0000000000000000-mapping.dmp
-
memory/4900-186-0x0000000002680000-0x0000000002682000-memory.dmpFilesize
8KB
-
memory/4900-187-0x00007FF9A3BC0000-0x00007FF9A4560000-memory.dmpFilesize
9.6MB
-
memory/4912-144-0x0000000000000000-mapping.dmp
-
memory/4912-164-0x0000000000401000-0x000000000040C000-memory.dmpFilesize
44KB
-
memory/4932-182-0x00007FF9A3BC0000-0x00007FF9A4560000-memory.dmpFilesize
9.6MB
-
memory/4932-146-0x0000000000000000-mapping.dmp
-
memory/4932-190-0x0000000000E70000-0x0000000000E72000-memory.dmpFilesize
8KB
-
memory/4984-241-0x00007FF9A3BC0000-0x00007FF9A4560000-memory.dmpFilesize
9.6MB
-
memory/4984-239-0x0000000000000000-mapping.dmp
-
memory/4984-246-0x0000000002C70000-0x0000000002C72000-memory.dmpFilesize
8KB
-
memory/5008-154-0x0000000000000000-mapping.dmp
-
memory/5008-169-0x0000000073520000-0x0000000073C0E000-memory.dmpFilesize
6.9MB
-
memory/5008-218-0x0000000005140000-0x0000000005174000-memory.dmpFilesize
208KB
-
memory/5008-222-0x000000000A630000-0x000000000A631000-memory.dmpFilesize
4KB
-
memory/5008-194-0x0000000002B80000-0x0000000002B81000-memory.dmpFilesize
4KB
-
memory/5008-180-0x0000000000980000-0x0000000000981000-memory.dmpFilesize
4KB
-
memory/5008-226-0x0000000005190000-0x0000000005191000-memory.dmpFilesize
4KB
-
memory/5008-266-0x0000000005EC0000-0x0000000005EC1000-memory.dmpFilesize
4KB
-
memory/5068-155-0x0000000000000000-mapping.dmp
-
memory/5084-157-0x0000000000000000-mapping.dmp
-
memory/5212-267-0x0000000000000000-mapping.dmp
-
memory/5244-268-0x0000000000000000-mapping.dmp
-
memory/5312-281-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/5312-269-0x0000000000000000-mapping.dmp
-
memory/5312-274-0x0000000000D30000-0x0000000000D31000-memory.dmpFilesize
4KB
-
memory/5312-280-0x0000000000980000-0x00000000009A6000-memory.dmpFilesize
152KB
-
memory/5336-270-0x0000000000000000-mapping.dmp
-
memory/5352-271-0x0000000000000000-mapping.dmp
-
memory/5380-272-0x0000000000000000-mapping.dmp
-
memory/5464-273-0x0000000000000000-mapping.dmp
-
memory/5548-275-0x0000000000000000-mapping.dmp
-
memory/5560-276-0x0000000000000000-mapping.dmp
-
memory/5596-277-0x0000000000000000-mapping.dmp
-
memory/5644-278-0x0000000000000000-mapping.dmp
-
memory/5708-279-0x0000000000000000-mapping.dmp
-
memory/5708-284-0x0000000000D70000-0x0000000000D71000-memory.dmpFilesize
4KB
-
memory/5804-282-0x0000000000000000-mapping.dmp
-
memory/5884-283-0x0000000000000000-mapping.dmp
-
memory/6488-287-0x0000000000000000-mapping.dmp
-
memory/6560-288-0x0000000000000000-mapping.dmp
-
memory/6596-289-0x0000000000000000-mapping.dmp
-
memory/6648-290-0x0000000000000000-mapping.dmp