Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
22-03-2021 16:25
Static task
static1
Behavioral task
behavioral1
Sample
PlayerUI.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
PlayerUI.exe
Resource
win10v20201028
General
-
Target
PlayerUI.exe
-
Size
71KB
-
MD5
1bce563f5e72b35bc1d2b0c9429c503b
-
SHA1
0c1d555c2daddb0e6528a2800ff973ea8335f841
-
SHA256
52693062f8af884f53bc708c947256273d6362ba955b5b16653557f80150925c
-
SHA512
15b8af66bb7bd768d6333838cfc765c6a98217bfe7a7156d3865407ee8961cf4e3f7bbf4e3f72f5292d1fe46e9493c905dbcf8aa9c7074f81123f0da1e391aea
Malware Config
Extracted
raccoon
c46f13f8aadc028907d65c627fd9163161661f6c
-
url4cnc
https://telete.in/capibar
Extracted
raccoon
2ce901d964b370c5ccda7e4d68354ba040db8218
-
url4cnc
https://telete.in/tomarsjsmith3
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Executes dropped EXE 46 IoCs
Processes:
ywgCliHHH2YIh9EIi2MY8OOI.exe21898959284.exe21898959284.exe29282301844.exe21898959284.exeWjeJyEUGTfghxfv72ZrgXe1s.exeMBn8xbNPSPx0KoPOw1m1yYOF.exeswy0tE5zr78nPG4J3XJCQejx.exexiiatWQJMODckWNKXorXf4v6.exeVhTrW0aZHgW8797AAYZMvyH1.exejzmfqHFgaclKxGspSX6rhwWi.exeFMDTqcO9BQcKncAJdA5kQCYG.exeMHrQFjBWuohfpjV6jHp2vISq.exeFUHxs7JXA3aDGnAVFgzn3GT0.exesI1vRiOTSMVojiBncpwVrcOL.exeeoxqxYXDLGlYB2L0vjM4moX0.exeePSUz500Krvoa16c0imE9UEO.exe8891293.973594532.39timeout.exemultitimer.exemultitimer.exemultitimer.exesetups.exesetups.exesetups.exesetups.tmp4820733.53setups.tmpsetups.tmp6262796.68Windows Host.exemultitimer.execmd.exemultitimer.exemultitimer.exemultitimer.exemultitimer.exemultitimer.exemultitimer.exeSkinks.exe4.exe6.exevpn.exe5.exeSmartClock.exepid process 1732 ywgCliHHH2YIh9EIi2MY8OOI.exe 1804 21898959284.exe 2664 21898959284.exe 2348 29282301844.exe 4252 21898959284.exe 4404 WjeJyEUGTfghxfv72ZrgXe1s.exe 4416 MBn8xbNPSPx0KoPOw1m1yYOF.exe 4428 swy0tE5zr78nPG4J3XJCQejx.exe 4528 xiiatWQJMODckWNKXorXf4v6.exe 4568 VhTrW0aZHgW8797AAYZMvyH1.exe 4580 jzmfqHFgaclKxGspSX6rhwWi.exe 4556 FMDTqcO9BQcKncAJdA5kQCYG.exe 4596 MHrQFjBWuohfpjV6jHp2vISq.exe 4604 FUHxs7JXA3aDGnAVFgzn3GT0.exe 4792 sI1vRiOTSMVojiBncpwVrcOL.exe 4812 eoxqxYXDLGlYB2L0vjM4moX0.exe 4836 ePSUz500Krvoa16c0imE9UEO.exe 3176 8891293.97 4204 3594532.39 2648 timeout.exe 1324 multitimer.exe 4352 multitimer.exe 4564 multitimer.exe 4872 setups.exe 4880 setups.exe 4632 setups.exe 5116 setups.tmp 4468 4820733.53 4032 setups.tmp 4932 setups.tmp 4148 6262796.68 4588 Windows Host.exe 5524 multitimer.exe 5504 cmd.exe 5536 multitimer.exe 5556 multitimer.exe 5808 multitimer.exe 5820 multitimer.exe 5856 multitimer.exe 5920 multitimer.exe 6072 Skinks.exe 6108 4.exe 6128 6.exe 4924 vpn.exe 1788 5.exe 5844 SmartClock.exe -
Sets service image path in registry 2 TTPs
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
setups.tmpsetups.tmpsetups.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp -
Drops startup file 1 IoCs
Processes:
4.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4.exe -
Loads dropped DLL 30 IoCs
Processes:
setups.tmpsetups.tmpsetups.tmp21898959284.exeSkinks.exepid process 5116 setups.tmp 5116 setups.tmp 4032 setups.tmp 4032 setups.tmp 5116 setups.tmp 5116 setups.tmp 5116 setups.tmp 4932 setups.tmp 4932 setups.tmp 4032 setups.tmp 4032 setups.tmp 4032 setups.tmp 5116 setups.tmp 5116 setups.tmp 4032 setups.tmp 4032 setups.tmp 4932 setups.tmp 4932 setups.tmp 4932 setups.tmp 4932 setups.tmp 4932 setups.tmp 4252 21898959284.exe 4252 21898959284.exe 4252 21898959284.exe 4252 21898959284.exe 4252 21898959284.exe 4252 21898959284.exe 4252 21898959284.exe 4252 21898959284.exe 6072 Skinks.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
PlayerUI.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ef2iwWLriYPVlbuZxB6DHFzOhqcUV0lM = "C:\\Users\\Admin\\Documents\\uFhbHtXMVL85QFdLAWcbqikA.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Muavi Music Player aml5FKcRPSNIneHId8_EsmwFNj2hhSfRjrDu = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosofthcYeU_yquwzuVkFCDr7ZtQ4tUpdater.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\5tTvZKRMVdKyYzQIBcVPUyl8FCM3YSKj = "C:\\Users\\Admin\\Documents\\SYVsqCcjfOtvVYmCr55iHsG4.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\TJfFgFMCx4p4h9J2cZkeFK2x3VIUAHdu = "C:\\Users\\Admin\\Documents\\erNY7qyFpNuWfzMvIX6B0ugv.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\x4TRsLEXRzmmaHkoqft0WXZNgLetOfix = "C:\\Users\\Admin\\Documents\\Ddp7jlzCRKSIpkCHyzOjsPjH.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uu4mV1I3IWpujJCTaX4dWMCR4Mkja6v0 = "C:\\Users\\Admin\\Documents\\LS6tWJsQUXiXCIknyGcyuVMJ.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\WlM4QvCxFRHHXsx0eoJoeUqvZwFU8oou = "C:\\Users\\Admin\\Documents\\1QolG0ttCNedwMiuiEkYTG7G.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\oRWE0wxnBVFtc1rDkaB107gZuZsC0ou3 = "C:\\Users\\Admin\\Documents\\kXYsJlDQt9n4xWZjWHVSQqog.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\aPBEfoDIHOpMKW2kCwcCsECZvgMnLgOz = "C:\\Users\\Admin\\Documents\\a6f5kRLBRCwU90bFcJnlXkFb.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\a1C72rmZLTg8yjVQwBSkwKSPdKtkJg9o = "C:\\Users\\Admin\\Documents\\95Y0oKNc2GQAhq0RzbW1CU45.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\pnBG41VswD1DfJi8m7Dzt7ZZG3sRM6l7 = "C:\\Users\\Admin\\Documents\\eh6l1yZ9ARW2zHkimDnplh3Y.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Xb4d8cnPCW7aOWEJqJzXShWrHgVR97Or = "C:\\Users\\Admin\\Documents\\3WZsDeRwrfRQPZxBjRNy5MuE.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\r4t5F7l2Rwyl90gGfD7Pk5h4AZXTCrMH = "C:\\Users\\Admin\\Documents\\NpMPBWxjBXzthSulaTgIDFyE.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ZkWABzWyEWnSiXCsF1KxkvkRjfNy6y9L = "C:\\Users\\Admin\\Documents\\oAhPsrK2v2zZiH7GDrHAvcKG.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\1CI48lgDftq9FQIvDGtC6Vx8fzdHcc7n = "C:\\Users\\Admin\\Documents\\uP3vhti5w6LcwQwVziRAPHW9.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\dxhJKMZecFaiLQWGPQwJXoeMqlJKSn5n = "C:\\Users\\Admin\\Documents\\vHl6aYRzMBSQLwm2GT94QIxd.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\xNQRNLyJDxibiS8eBKat76lLZrf1e0wq = "C:\\Users\\Admin\\Documents\\NjL4oNHYfN4SQA5HFZ4gpglo.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\FgrDZzpI7rzm8OQxUMdRvpmEeDrOQonD = "C:\\Users\\Admin\\Documents\\8QHnWgpsg8mUucesNZJZr4Pd.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\XZhZByQjJ51mOg2TYqch2pFjFvnwvlWr = "C:\\Users\\Admin\\Documents\\hXU1jVeV5kEqdoI9dvtGM0Bu.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\CNvyy5AP5NocTExq7KwZGL2OeGiJzgFH = "C:\\Users\\Admin\\Documents\\xluJAev7TAJVQvFTa3MwxpfZ.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\qyfyqpaUslzgcaMqomkkGUHoN614dVQE = "C:\\Users\\Admin\\Documents\\pT1lRCXduZiq4LV0Na5R5kuN.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ROQMeDgH4coCVLMjiuycqx9v82kX3YZc = "C:\\Users\\Admin\\Documents\\9FrQwcHEbOKBB8V4VesNVgI9.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\m6MDCP0GCEzpGxU67I6FUWjyuswGd4Zz = "C:\\Users\\Admin\\Documents\\XrJxUtYF0RFZPdmLKjqxkh8U.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\eC3c2K0NOVUIQUXJwqKa8qS7Dq5uOqVa = "C:\\Users\\Admin\\Documents\\VSm40HW1LdRV3WIy2jdbn4GJ.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\eN55UgpFIUDc009d0mXIOIGPS6TfK5gF = "C:\\Users\\Admin\\Documents\\F6RFNWGbRuxRTfLh2UVFZAa2.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\k1hILmW496NJlvXHiRfPszhYmFGRr7IT = "C:\\Users\\Admin\\Documents\\oe6yPfyAsBIuTt9xgfefSV9P.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\dTpbDTlA2R3rDi1CfOMOlyriyykSHNjo = "C:\\Users\\Admin\\Documents\\fXEg34GQvmudwwJADvtuA1Tn.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\0GOBgR9XtfNnIDc9CpyPq0yAuTw61mlu = "C:\\Users\\Admin\\Documents\\4v4hXBdnVbm4gOmd8ydv2Kwz.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\MvQelbpt0Y6Q4okSZYqLiHU2wucgqRlN = "C:\\Users\\Admin\\Documents\\swy0tE5zr78nPG4J3XJCQejx.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\c9R3vtztwYs820bwzOmGtN72ETrDnx5Y = "C:\\Users\\Admin\\Documents\\5AVCKIUjg4NYQhJUECGvohHc.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\6iuyW4nEWasVl0te1s3DnmFWWOmazkva = "C:\\Users\\Admin\\Documents\\2yAQUnHCzT10U4spkG8u7cLq.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ooh14XQUOdYrtuHuEybZQx29nCXGeyKB = "C:\\Users\\Admin\\Documents\\sBGE6IA2oorl10T9jZepDq9g.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\MmS9ba6lA0VG1hU5RzDE2SOglHVI7nry = "C:\\Users\\Admin\\Documents\\0DfVQHfm9nMuKO5FRDikICtV.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\NYGkIU5hs1uhG4tKu5Qkv9eQr1Hcr8Qg = "C:\\Users\\Admin\\Documents\\Pvp11t4Y5jCqGGPMw7Ah2sT2.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\CNvY17Tw0MvyAgvRtboSvpqhOIsxI40I = "C:\\Users\\Admin\\Documents\\DHFoEmmeNgCXKmVKqOkfm5I7.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\9frpdeEGgMudNuh6KeB0eEj7WsF4yU0R = "C:\\Users\\Admin\\Documents\\Z19VNXs6DkVP7G10xO1FDIjk.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\DhSBDcwNcyQrUr6McKwF3TdZcb9rYaUr = "C:\\Users\\Admin\\Documents\\YeTqr76jzlgIM48nuBaT6qxz.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\xBp9yaDrmMZSJ53pujmAQfRmekH9slcD = "C:\\Users\\Admin\\Documents\\6f8OwPj0sjeMPw54yNIvh3Bh.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\gBEcmDwEjaPvBtNmsJj662O1MUzkQZXc = "C:\\Users\\Admin\\Documents\\rpIr6tqubSRdsfw71SBnqPci.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zu61pmpJ147zaboj97ANqS25bPnaw0B6 = "C:\\Users\\Admin\\Documents\\nCWq4Q7lcSxGRy7Qax7Sfr4y.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\1BZa9PWB3Br2KeP3BKkCDgEUZoQYhdOb = "C:\\Users\\Admin\\Documents\\IhQJTF6znnPW0H08JXThrqIG.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\6xwj3JcFAwTBG4CVmIyEzL5Dthv8UPD7 = "C:\\Users\\Admin\\Documents\\FUWBhFrR5akLDVtxGNlhxIGv.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ma8B3QHL2sJlJmHDH9utWfdaQF3MhyVs = "C:\\Users\\Admin\\Documents\\aEWMqToAS6eujef2RrKFusLi.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Me0rPf3wGNe9KCRWAqlEoUc1cDEkAxfk = "C:\\Users\\Admin\\Documents\\BhO78ePSkhqpnAJa5gK8MajX.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\sK6QX9V8FZwYFZjhlw5WMbFvhsPPs6SU = "C:\\Users\\Admin\\Documents\\H68eM4Ohia7Po7FqC5nv2x5v.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\KKzKeCgtPTMp1QIDUbr7T8O92NwYZZV7 = "C:\\Users\\Admin\\Documents\\e6ZRmkCDfpTIDwfzz4y77gIo.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\CYybCvF8cUF9QQ5YbzBPkEC42dcT1fd1 = "C:\\Users\\Admin\\Documents\\23jK0bxwFem2zKbOkU6Z4BtP.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\KTxLCOBoBxmZWc5jbUateZX9ZdV2L5w0 = "C:\\Users\\Admin\\Documents\\E75hUURtg7El8quGQCxD1N1k.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\1szVYeuvsVxf0TCetCGUAoBB0jxEUYnL = "C:\\Users\\Admin\\Documents\\OlEtTHYv7eLRCrrLKP4pUC5v.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\eZK3R86eZxE9TB9y2C8mTudt9lEJN3cS = "C:\\Users\\Admin\\Documents\\2NAKTEA1HPTXGGPLctukIjzk.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\7yOJHsvUJvDAFSNS4wz2Aq8UxXXiemQr = "C:\\Users\\Admin\\Documents\\v6NVQNGx3RUt1zGemqiC9DSE.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\SqEjhTbEzf9aVLJdM18QzbJdzxwx77mF = "C:\\Users\\Admin\\Documents\\VESLt5B9B66kOSHuaVKoZPwO.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\lGmOsS2prOmlfRx0BuN0NMpW1FYa8x9A = "C:\\Users\\Admin\\Documents\\EbDkPpNcBukf3b7f4qOvoECo.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\1G3PCLuTiCDx3G2mUA59PYAWh8v5naEV = "C:\\Users\\Admin\\Documents\\72v9uPws3QRLWxQYyGBeam4e.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ENVbGWPFHPy3Bbj2VjfQTdPuuIE5zcUP = "C:\\Users\\Admin\\Documents\\mUVmjxxP1CN3bXwNMEIwXXwz.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Q6brjC0v8bN6CBslgak4LEkqp08aHtB9 = "C:\\Users\\Admin\\Documents\\ePSUz500Krvoa16c0imE9UEO.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\cQQaMgluOfL7JcpeAI3ZPV0sEVUCNfSZ = "C:\\Users\\Admin\\Documents\\uFl3vPDmazXuhH9msANR1VpJ.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\gnO32sMsbJhpwlSd8jL1woOwa96VRaQu = "C:\\Users\\Admin\\Documents\\wdudZ2EFIDbagED1wrjeHCmi.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ZXoYD9sAXyBz7TndfAksJVZzJ31APDpP = "C:\\Users\\Admin\\Documents\\zhZnt4lKxlSsi2oDxQKDDkwc.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Xrz7UdOcDFXHA4NgztdSqJcja1xaBOZH = "C:\\Users\\Admin\\Documents\\aOeBHg2KOSBetwVK5mXZzTZu.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Nm9AIDgzc3Z7NTMS234F2nIk0Pwh37dl = "C:\\Users\\Admin\\Documents\\oi5OwTEJ5nFwQgDdfoCneDpr.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\AglJOz1708WpG0k0pnrv0e1TwK9EJM7B = "C:\\Users\\Admin\\Documents\\8D2ZOuvRFl6d3JCga67A67ce.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\rt8vnw6xD0fZ9iYbp2CYH7VjONvHherj = "C:\\Users\\Admin\\Documents\\ywgCliHHH2YIh9EIi2MY8OOI.exe" PlayerUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\PGyVNaIJKE0KIKDvUscTQib7WwTZIKmz = "C:\\Users\\Admin\\Documents\\3qOFnTMAwmaWlXSysMio3zeH.exe" PlayerUI.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Maps connected drives based on registry 3 TTPs 8 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
multitimer.exemultitimer.exemultitimer.exemultitimer.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
21898959284.exe21898959284.exedescription pid process target process PID 1804 set thread context of 2664 1804 21898959284.exe 21898959284.exe PID 2664 set thread context of 4252 2664 21898959284.exe 21898959284.exe -
Drops file in Windows directory 9 IoCs
Processes:
timeout.exemultitimer.exemultitimer.exeMicrosoftEdge.exemultitimer.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new timeout.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new timeout.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
29282301844.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 29282301844.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 29282301844.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 2648 timeout.exe 1900 timeout.exe 6936 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
Processes:
multitimer.exemultitimer.exemultitimer.exemultitimer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 4184 taskkill.exe 4856 taskkill.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = f3e87e01411fd701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "{708B98A3-0C82-434F-903D-6D84B89ECD0E}" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 9881d5fc401fd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\SettingsVersion = "2" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 5844 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
setups.tmpsetups.tmpsetups.tmp8891293.974820733.53multitimer.exepid process 5116 setups.tmp 5116 setups.tmp 4032 setups.tmp 4032 setups.tmp 4932 setups.tmp 4932 setups.tmp 3176 8891293.97 3176 8891293.97 4468 4820733.53 4468 4820733.53 3176 8891293.97 4468 4820733.53 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe 5808 multitimer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
PlayerUI.exepid process 4052 PlayerUI.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
eoxqxYXDLGlYB2L0vjM4moX0.exeFUHxs7JXA3aDGnAVFgzn3GT0.exepid process 4812 eoxqxYXDLGlYB2L0vjM4moX0.exe 4812 eoxqxYXDLGlYB2L0vjM4moX0.exe 4812 eoxqxYXDLGlYB2L0vjM4moX0.exe 4604 FUHxs7JXA3aDGnAVFgzn3GT0.exe 4604 FUHxs7JXA3aDGnAVFgzn3GT0.exe 4604 FUHxs7JXA3aDGnAVFgzn3GT0.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
Windows Host.exepid process 4588 Windows Host.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
PlayerUI.exetaskkill.exeMHrQFjBWuohfpjV6jHp2vISq.exeePSUz500Krvoa16c0imE9UEO.exedescription pid process Token: SeDebugPrivilege 4052 PlayerUI.exe Token: SeDebugPrivilege 4184 taskkill.exe Token: SeCreateTokenPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeAssignPrimaryTokenPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeLockMemoryPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeIncreaseQuotaPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeMachineAccountPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeTcbPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeSecurityPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeTakeOwnershipPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeLoadDriverPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeSystemProfilePrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeSystemtimePrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeProfSingleProcessPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeIncBasePriorityPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeCreatePagefilePrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeCreatePermanentPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeBackupPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeRestorePrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeShutdownPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeDebugPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeAuditPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeSystemEnvironmentPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeChangeNotifyPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeRemoteShutdownPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeUndockPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeSyncAgentPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeEnableDelegationPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeManageVolumePrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeImpersonatePrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeCreateGlobalPrivilege 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: 31 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: 32 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: 33 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: 34 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: 35 4596 MHrQFjBWuohfpjV6jHp2vISq.exe Token: SeCreateTokenPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeAssignPrimaryTokenPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeLockMemoryPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeIncreaseQuotaPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeMachineAccountPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeTcbPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeSecurityPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeTakeOwnershipPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeLoadDriverPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeSystemProfilePrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeSystemtimePrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeProfSingleProcessPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeIncBasePriorityPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeCreatePagefilePrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeCreatePermanentPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeBackupPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeRestorePrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeShutdownPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeDebugPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeAuditPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeSystemEnvironmentPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeChangeNotifyPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeRemoteShutdownPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeUndockPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeSyncAgentPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeEnableDelegationPrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeManageVolumePrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe Token: SeImpersonatePrivilege 4836 ePSUz500Krvoa16c0imE9UEO.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
29282301844.exepid process 2348 29282301844.exe 2348 29282301844.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 2632 MicrosoftEdge.exe 5716 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
PlayerUI.exeywgCliHHH2YIh9EIi2MY8OOI.execmd.exe21898959284.execmd.execmd.exe21898959284.exedescription pid process target process PID 4052 wrote to memory of 1732 4052 PlayerUI.exe ywgCliHHH2YIh9EIi2MY8OOI.exe PID 4052 wrote to memory of 1732 4052 PlayerUI.exe ywgCliHHH2YIh9EIi2MY8OOI.exe PID 4052 wrote to memory of 1732 4052 PlayerUI.exe ywgCliHHH2YIh9EIi2MY8OOI.exe PID 1732 wrote to memory of 3964 1732 ywgCliHHH2YIh9EIi2MY8OOI.exe cmd.exe PID 1732 wrote to memory of 3964 1732 ywgCliHHH2YIh9EIi2MY8OOI.exe cmd.exe PID 1732 wrote to memory of 3964 1732 ywgCliHHH2YIh9EIi2MY8OOI.exe cmd.exe PID 3964 wrote to memory of 1804 3964 cmd.exe 21898959284.exe PID 3964 wrote to memory of 1804 3964 cmd.exe 21898959284.exe PID 3964 wrote to memory of 1804 3964 cmd.exe 21898959284.exe PID 1804 wrote to memory of 2664 1804 21898959284.exe 21898959284.exe PID 1804 wrote to memory of 2664 1804 21898959284.exe 21898959284.exe PID 1804 wrote to memory of 2664 1804 21898959284.exe 21898959284.exe PID 1804 wrote to memory of 2664 1804 21898959284.exe 21898959284.exe PID 1804 wrote to memory of 2664 1804 21898959284.exe 21898959284.exe PID 1804 wrote to memory of 2664 1804 21898959284.exe 21898959284.exe PID 1804 wrote to memory of 2664 1804 21898959284.exe 21898959284.exe PID 1804 wrote to memory of 2664 1804 21898959284.exe 21898959284.exe PID 1804 wrote to memory of 2664 1804 21898959284.exe 21898959284.exe PID 1732 wrote to memory of 4008 1732 ywgCliHHH2YIh9EIi2MY8OOI.exe cmd.exe PID 1732 wrote to memory of 4008 1732 ywgCliHHH2YIh9EIi2MY8OOI.exe cmd.exe PID 1732 wrote to memory of 4008 1732 ywgCliHHH2YIh9EIi2MY8OOI.exe cmd.exe PID 4008 wrote to memory of 2348 4008 cmd.exe 29282301844.exe PID 4008 wrote to memory of 2348 4008 cmd.exe 29282301844.exe PID 4008 wrote to memory of 2348 4008 cmd.exe 29282301844.exe PID 1732 wrote to memory of 4108 1732 ywgCliHHH2YIh9EIi2MY8OOI.exe cmd.exe PID 1732 wrote to memory of 4108 1732 ywgCliHHH2YIh9EIi2MY8OOI.exe cmd.exe PID 1732 wrote to memory of 4108 1732 ywgCliHHH2YIh9EIi2MY8OOI.exe cmd.exe PID 4108 wrote to memory of 4184 4108 cmd.exe taskkill.exe PID 4108 wrote to memory of 4184 4108 cmd.exe taskkill.exe PID 4108 wrote to memory of 4184 4108 cmd.exe taskkill.exe PID 2664 wrote to memory of 4252 2664 21898959284.exe 21898959284.exe PID 2664 wrote to memory of 4252 2664 21898959284.exe 21898959284.exe PID 2664 wrote to memory of 4252 2664 21898959284.exe 21898959284.exe PID 2664 wrote to memory of 4252 2664 21898959284.exe 21898959284.exe PID 2664 wrote to memory of 4252 2664 21898959284.exe 21898959284.exe PID 2664 wrote to memory of 4252 2664 21898959284.exe 21898959284.exe PID 2664 wrote to memory of 4252 2664 21898959284.exe 21898959284.exe PID 2664 wrote to memory of 4252 2664 21898959284.exe 21898959284.exe PID 2664 wrote to memory of 4252 2664 21898959284.exe 21898959284.exe PID 4052 wrote to memory of 4404 4052 PlayerUI.exe WjeJyEUGTfghxfv72ZrgXe1s.exe PID 4052 wrote to memory of 4404 4052 PlayerUI.exe WjeJyEUGTfghxfv72ZrgXe1s.exe PID 4052 wrote to memory of 4404 4052 PlayerUI.exe WjeJyEUGTfghxfv72ZrgXe1s.exe PID 4052 wrote to memory of 4416 4052 PlayerUI.exe MBn8xbNPSPx0KoPOw1m1yYOF.exe PID 4052 wrote to memory of 4416 4052 PlayerUI.exe MBn8xbNPSPx0KoPOw1m1yYOF.exe PID 4052 wrote to memory of 4428 4052 PlayerUI.exe swy0tE5zr78nPG4J3XJCQejx.exe PID 4052 wrote to memory of 4428 4052 PlayerUI.exe swy0tE5zr78nPG4J3XJCQejx.exe PID 4052 wrote to memory of 4528 4052 PlayerUI.exe xiiatWQJMODckWNKXorXf4v6.exe PID 4052 wrote to memory of 4528 4052 PlayerUI.exe xiiatWQJMODckWNKXorXf4v6.exe PID 4052 wrote to memory of 4556 4052 PlayerUI.exe FMDTqcO9BQcKncAJdA5kQCYG.exe PID 4052 wrote to memory of 4556 4052 PlayerUI.exe FMDTqcO9BQcKncAJdA5kQCYG.exe PID 4052 wrote to memory of 4568 4052 PlayerUI.exe VhTrW0aZHgW8797AAYZMvyH1.exe PID 4052 wrote to memory of 4568 4052 PlayerUI.exe VhTrW0aZHgW8797AAYZMvyH1.exe PID 4052 wrote to memory of 4568 4052 PlayerUI.exe VhTrW0aZHgW8797AAYZMvyH1.exe PID 4052 wrote to memory of 4580 4052 PlayerUI.exe jzmfqHFgaclKxGspSX6rhwWi.exe PID 4052 wrote to memory of 4580 4052 PlayerUI.exe jzmfqHFgaclKxGspSX6rhwWi.exe PID 4052 wrote to memory of 4596 4052 PlayerUI.exe MHrQFjBWuohfpjV6jHp2vISq.exe PID 4052 wrote to memory of 4596 4052 PlayerUI.exe MHrQFjBWuohfpjV6jHp2vISq.exe PID 4052 wrote to memory of 4596 4052 PlayerUI.exe MHrQFjBWuohfpjV6jHp2vISq.exe PID 4052 wrote to memory of 4604 4052 PlayerUI.exe FUHxs7JXA3aDGnAVFgzn3GT0.exe PID 4052 wrote to memory of 4604 4052 PlayerUI.exe FUHxs7JXA3aDGnAVFgzn3GT0.exe PID 4052 wrote to memory of 4604 4052 PlayerUI.exe FUHxs7JXA3aDGnAVFgzn3GT0.exe PID 4052 wrote to memory of 4792 4052 PlayerUI.exe sI1vRiOTSMVojiBncpwVrcOL.exe PID 4052 wrote to memory of 4792 4052 PlayerUI.exe sI1vRiOTSMVojiBncpwVrcOL.exe PID 4052 wrote to memory of 4836 4052 PlayerUI.exe ePSUz500Krvoa16c0imE9UEO.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\PlayerUI.exe"C:\Users\Admin\AppData\Local\Temp\PlayerUI.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\ywgCliHHH2YIh9EIi2MY8OOI.exe"C:\Users\Admin\Documents\ywgCliHHH2YIh9EIi2MY8OOI.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\21898959284.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\21898959284.exe"C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\21898959284.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\21898959284.exe"C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\21898959284.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\21898959284.exe"C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\21898959284.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\21898959284.exe"7⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK8⤵
- Executes dropped EXE
- Drops file in Windows directory
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\29282301844.exe" /mix3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\29282301844.exe"C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\29282301844.exe" /mix4⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\Skinks.exe"C:\Users\Admin\AppData\Local\Temp\Skinks.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"6⤵
- Executes dropped EXE
- Drops startup file
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\AppData\Local\Temp\New Feature\6.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\6.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CmD < Veduto.aspx7⤵
-
C:\Windows\SysWOW64\cmd.exeCmD8⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^aTBSeprklsEdUBjaIQPOTdrkjIzkdxVxYGzCSmbkAwUsrqIIuWPCefDwPdGzQRVQvlagiKmozDgScLijqKtxFzsIrsMCTrcIutVTIzBvvGonwL$" Ama.aspx9⤵
-
C:\Users\Admin\AppData\Roaming\oSXbHZepFnQhkxxrjgN\Allora.exe.comAllora.exe.com S9⤵
-
C:\Users\Admin\AppData\Roaming\oSXbHZepFnQhkxxrjgN\Allora.exe.comC:\Users\Admin\AppData\Roaming\oSXbHZepFnQhkxxrjgN\Allora.exe.com S10⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 309⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CmD < Sospettoso.xlsx7⤵
-
C:\Windows\SysWOW64\cmd.exeCmD8⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^yZVxJnOtboCOwYACmuqprbTxDxRIXwIZDiDmtkKRJgAQVpuqCvmPrrQHuBQfGyicmDlUxwbhvpmOWrnxhQuACSVAsVaDcxlDitdaYjFBYkzUEwLrevwQZGTHHKCmIUSwYVHRMucwlFCd$" Fermare.xlsx9⤵
-
C:\Users\Admin\AppData\Roaming\AdikuzPulW\Dimmi.exe.comDimmi.exe.com x9⤵
-
C:\Users\Admin\AppData\Roaming\AdikuzPulW\Dimmi.exe.comC:\Users\Admin\AppData\Roaming\AdikuzPulW\Dimmi.exe.com x10⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 309⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\New Feature\5.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\5.exe"6⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c icacls "C:\Users\Admin\AppData\Local\Disk" /inheritance:e /deny "Admin:(R,REA,RA,RD)" & attrib +s +h "C:\Users\Admin\AppData\Local\Disk" & schtasks /create /tn \Services\Diagnostic /tr "'C:\Users\Admin\AppData\Local\Disk\AutoIt3\AutoIt3_x64.exe' 'C:\Users\Admin\AppData\Local\Disk\AutoIt3\Settings.au3'" /st 00:04 /du 9906:30 /sc once /ri 1 /f7⤵
-
C:\Windows\system32\icacls.exeicacls "C:\Users\Admin\AppData\Local\Disk" /inheritance:e /deny "Admin:(R,REA,RA,RD)"8⤵
- Modifies file permissions
-
C:\Windows\system32\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Local\Disk"8⤵
- Views/modifies file attributes
-
C:\Windows\system32\schtasks.exeschtasks /create /tn \Services\Diagnostic /tr "'C:\Users\Admin\AppData\Local\Disk\AutoIt3\AutoIt3_x64.exe' 'C:\Users\Admin\AppData\Local\Disk\AutoIt3\Settings.au3'" /st 00:04 /du 9906:30 /sc once /ri 1 /f8⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Vellerese.vbs"7⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\New Feature\5.exe"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 28⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\qWlcHvhq & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\29282301844.exe"5⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 36⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "ywgCliHHH2YIh9EIi2MY8OOI.exe" /f & erase "C:\Users\Admin\Documents\ywgCliHHH2YIh9EIi2MY8OOI.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "ywgCliHHH2YIh9EIi2MY8OOI.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\swy0tE5zr78nPG4J3XJCQejx.exe"C:\Users\Admin\Documents\swy0tE5zr78nPG4J3XJCQejx.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\714DAPD36Q\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\714DAPD36Q\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1053⤵
-
C:\Users\Admin\AppData\Local\Temp\714DAPD36Q\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\714DAPD36Q\multitimer.exe" 1 3.1616430367.6058c51f4adc3 1054⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\714DAPD36Q\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\714DAPD36Q\multitimer.exe" 2 3.1616430367.6058c51f4adc35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\AWZNATKBWM\setups.exe"C:\Users\Admin\AppData\Local\Temp\AWZNATKBWM\setups.exe" ll3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-C8BK7.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-C8BK7.tmp\setups.tmp" /SL5="$301EE,290870,64000,C:\Users\Admin\AppData\Local\Temp\AWZNATKBWM\setups.exe" ll4⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Documents\MBn8xbNPSPx0KoPOw1m1yYOF.exe"C:\Users\Admin\Documents\MBn8xbNPSPx0KoPOw1m1yYOF.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\ZRPKQ9C41L\setups.exe"C:\Users\Admin\AppData\Local\Temp\ZRPKQ9C41L\setups.exe" ll3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-9T83L.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-9T83L.tmp\setups.tmp" /SL5="$501E0,290870,64000,C:\Users\Admin\AppData\Local\Temp\ZRPKQ9C41L\setups.exe" ll4⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\VA06Z90MBR\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\VA06Z90MBR\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1053⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\VA06Z90MBR\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\VA06Z90MBR\multitimer.exe" 1 3.1616430367.6058c51f4ac79 1054⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\VA06Z90MBR\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\VA06Z90MBR\multitimer.exe" 2 3.1616430367.6058c51f4ac795⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Documents\xiiatWQJMODckWNKXorXf4v6.exe"C:\Users\Admin\Documents\xiiatWQJMODckWNKXorXf4v6.exe"2⤵
- Executes dropped EXE
-
C:\ProgramData\8891293.97"C:\ProgramData\8891293.97"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\3594532.39"C:\ProgramData\3594532.39"3⤵
- Executes dropped EXE
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
-
C:\Users\Admin\Documents\jzmfqHFgaclKxGspSX6rhwWi.exe"C:\Users\Admin\Documents\jzmfqHFgaclKxGspSX6rhwWi.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1053⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exe" 1 3.1616430367.6058c51f49859 1054⤵
-
C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exe" 2 3.1616430367.6058c51f498595⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Enumerates system info in registry
-
C:\Users\Admin\Documents\FUHxs7JXA3aDGnAVFgzn3GT0.exe"C:\Users\Admin\Documents\FUHxs7JXA3aDGnAVFgzn3GT0.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
-
C:\Users\Admin\Documents\MHrQFjBWuohfpjV6jHp2vISq.exe"C:\Users\Admin\Documents\MHrQFjBWuohfpjV6jHp2vISq.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
-
C:\Users\Admin\Documents\VhTrW0aZHgW8797AAYZMvyH1.exe"C:\Users\Admin\Documents\VhTrW0aZHgW8797AAYZMvyH1.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\FMDTqcO9BQcKncAJdA5kQCYG.exe"C:\Users\Admin\Documents\FMDTqcO9BQcKncAJdA5kQCYG.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\HZN9AXGVQ2\setups.exe"C:\Users\Admin\AppData\Local\Temp\HZN9AXGVQ2\setups.exe" ll3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exe" 0 30603cc16d3187a8.64379538 0 1053⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exe" 1 3.1616430367.6058c51f46628 1054⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exe" 2 3.1616430367.6058c51f466285⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Enumerates system info in registry
-
C:\Users\Admin\Documents\WjeJyEUGTfghxfv72ZrgXe1s.exe"C:\Users\Admin\Documents\WjeJyEUGTfghxfv72ZrgXe1s.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\sI1vRiOTSMVojiBncpwVrcOL.exe"C:\Users\Admin\Documents\sI1vRiOTSMVojiBncpwVrcOL.exe"2⤵
- Executes dropped EXE
-
C:\ProgramData\6262796.68"C:\ProgramData\6262796.68"3⤵
- Executes dropped EXE
-
C:\ProgramData\4820733.53"C:\ProgramData\4820733.53"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Documents\ePSUz500Krvoa16c0imE9UEO.exe"C:\Users\Admin\Documents\ePSUz500Krvoa16c0imE9UEO.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\eoxqxYXDLGlYB2L0vjM4moX0.exe"C:\Users\Admin\Documents\eoxqxYXDLGlYB2L0vjM4moX0.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
-
C:\Users\Admin\AppData\Local\Temp\is-C8BK8.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-C8BK8.tmp\setups.tmp" /SL5="$701F2,290870,64000,C:\Users\Admin\AppData\Local\Temp\HZN9AXGVQ2\setups.exe" ll1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Local\Disk\AutoIt3\AutoIt3_x64.exeC:\Users\Admin\AppData\Local\Disk\AutoIt3\AutoIt3_x64.exe "C:\Users\Admin\AppData\Local\Disk\AutoIt3\Settings.au3"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Hidden Files and Directories
2Modify Registry
3File Permissions Modification
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\3594532.39MD5
24c4a7e5a55c14695c52eecda5703130
SHA1e1ee0a177616e126e1adea68da00b998a0ec342d
SHA256f6d16539af6379713e8a54debf880140e48492241e820db2dc8dc49c45d240b0
SHA5127f0e91261e149f2cfcd68e069b51983ef4d1834d28756f84df155905989b714bbf90ad54e11913ff1bff9f05557f01aa8a7bc60a4c042e430cbd2ee52d42fb7f
-
C:\ProgramData\3594532.39MD5
24c4a7e5a55c14695c52eecda5703130
SHA1e1ee0a177616e126e1adea68da00b998a0ec342d
SHA256f6d16539af6379713e8a54debf880140e48492241e820db2dc8dc49c45d240b0
SHA5127f0e91261e149f2cfcd68e069b51983ef4d1834d28756f84df155905989b714bbf90ad54e11913ff1bff9f05557f01aa8a7bc60a4c042e430cbd2ee52d42fb7f
-
C:\ProgramData\4820733.53MD5
5378979a5785412ccb0e225ced77edb5
SHA1cc8d3bdc64e253cb7613828ee30b12538131d561
SHA256ca1cefe7d1a07210c0a8e7633d13cd2b02d356356d5684d1c2329af0070e0b8e
SHA5126f7ecaa35d3bdfd8b44914e0af34dd8a4ae05edc470431af111aee7562d3048f3034aee213c6259b887af6339d06a79814a63bb2cc879a32a8ffbc8a8317816f
-
C:\ProgramData\4820733.53MD5
5378979a5785412ccb0e225ced77edb5
SHA1cc8d3bdc64e253cb7613828ee30b12538131d561
SHA256ca1cefe7d1a07210c0a8e7633d13cd2b02d356356d5684d1c2329af0070e0b8e
SHA5126f7ecaa35d3bdfd8b44914e0af34dd8a4ae05edc470431af111aee7562d3048f3034aee213c6259b887af6339d06a79814a63bb2cc879a32a8ffbc8a8317816f
-
C:\ProgramData\6262796.68MD5
24c4a7e5a55c14695c52eecda5703130
SHA1e1ee0a177616e126e1adea68da00b998a0ec342d
SHA256f6d16539af6379713e8a54debf880140e48492241e820db2dc8dc49c45d240b0
SHA5127f0e91261e149f2cfcd68e069b51983ef4d1834d28756f84df155905989b714bbf90ad54e11913ff1bff9f05557f01aa8a7bc60a4c042e430cbd2ee52d42fb7f
-
C:\ProgramData\6262796.68MD5
24c4a7e5a55c14695c52eecda5703130
SHA1e1ee0a177616e126e1adea68da00b998a0ec342d
SHA256f6d16539af6379713e8a54debf880140e48492241e820db2dc8dc49c45d240b0
SHA5127f0e91261e149f2cfcd68e069b51983ef4d1834d28756f84df155905989b714bbf90ad54e11913ff1bff9f05557f01aa8a7bc60a4c042e430cbd2ee52d42fb7f
-
C:\ProgramData\8891293.97MD5
5378979a5785412ccb0e225ced77edb5
SHA1cc8d3bdc64e253cb7613828ee30b12538131d561
SHA256ca1cefe7d1a07210c0a8e7633d13cd2b02d356356d5684d1c2329af0070e0b8e
SHA5126f7ecaa35d3bdfd8b44914e0af34dd8a4ae05edc470431af111aee7562d3048f3034aee213c6259b887af6339d06a79814a63bb2cc879a32a8ffbc8a8317816f
-
C:\ProgramData\8891293.97MD5
5378979a5785412ccb0e225ced77edb5
SHA1cc8d3bdc64e253cb7613828ee30b12538131d561
SHA256ca1cefe7d1a07210c0a8e7633d13cd2b02d356356d5684d1c2329af0070e0b8e
SHA5126f7ecaa35d3bdfd8b44914e0af34dd8a4ae05edc470431af111aee7562d3048f3034aee213c6259b887af6339d06a79814a63bb2cc879a32a8ffbc8a8317816f
-
C:\Users\Admin\AppData\Local\Temp\714DAPD36Q\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\714DAPD36Q\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\714DAPD36Q\multitimer.exe.configMD5
3f1498c07d8713fe5c315db15a2a2cf3
SHA1ef5f42fd21f6e72bdc74794f2496884d9c40bbfb
SHA25652ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0
SHA512cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d
-
C:\Users\Admin\AppData\Local\Temp\AWZNATKBWM\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\AWZNATKBWM\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\HNRJUR018X\multitimer.exe.configMD5
3f1498c07d8713fe5c315db15a2a2cf3
SHA1ef5f42fd21f6e72bdc74794f2496884d9c40bbfb
SHA25652ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0
SHA512cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d
-
C:\Users\Admin\AppData\Local\Temp\HZN9AXGVQ2\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\HZN9AXGVQ2\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\VA06Z90MBR\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\VA06Z90MBR\multitimer.exeMD5
6f99180b9f9c2bd1508e1fde675bd5ba
SHA1e4ad18208fd07b3e1db3c03d49bd1e2c8781ed21
SHA25626b49d438607ea9db9d8d4ffdc585995ef625f14e07be5c79a50e464a07b72a8
SHA512e7bc489ddd756fc25ffd817a88732ff3652788a3a15ba5e08583a78fa75a8737ef50760851ed6328c1869ad1d139439fa6246942f03c6a6530c4a5023cac30de
-
C:\Users\Admin\AppData\Local\Temp\VA06Z90MBR\multitimer.exe.configMD5
3f1498c07d8713fe5c315db15a2a2cf3
SHA1ef5f42fd21f6e72bdc74794f2496884d9c40bbfb
SHA25652ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0
SHA512cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d
-
C:\Users\Admin\AppData\Local\Temp\ZRPKQ9C41L\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\ZRPKQ9C41L\setups.exeMD5
ce400cac413aafe82fe5e0fa61383714
SHA1e330f73f74e3d8e8c2acf8f4b42fb37d8f4afb52
SHA256ffa9936a10c5ab7ea9dfee9a2e116649d62efc4b667e0a5d23dc8eedb31a471e
SHA512858acfe9025f0fc1790e8cee028c7ff036f2f6d749ca4ab46f541da338c84839a581af79353c50e9f95fadd0d7e3bf2a42ec1d1ed2362802dda4f45b1e75a2a6
-
C:\Users\Admin\AppData\Local\Temp\is-9T83L.tmp\setups.tmpMD5
f0078bb51601997fc35eb4d048471554
SHA1e1577d111803636347d16c8c306892f3a1092ce3
SHA256a35552a160dfc65ed85d8920b7a6c6a6c73f8bd3133ff50839e04eb2b00f9e57
SHA5124f160431b55d8b800e9051b504582ab1f65cec0bbeeed1e7dadeb70931220f9f0132ba251feb312d92acca1dbe2c63b6b8a20d937bee533d3532e2a3dda324c4
-
C:\Users\Admin\AppData\Local\Temp\is-C8BK7.tmp\setups.tmpMD5
f0078bb51601997fc35eb4d048471554
SHA1e1577d111803636347d16c8c306892f3a1092ce3
SHA256a35552a160dfc65ed85d8920b7a6c6a6c73f8bd3133ff50839e04eb2b00f9e57
SHA5124f160431b55d8b800e9051b504582ab1f65cec0bbeeed1e7dadeb70931220f9f0132ba251feb312d92acca1dbe2c63b6b8a20d937bee533d3532e2a3dda324c4
-
C:\Users\Admin\AppData\Local\Temp\is-C8BK8.tmp\setups.tmpMD5
f0078bb51601997fc35eb4d048471554
SHA1e1577d111803636347d16c8c306892f3a1092ce3
SHA256a35552a160dfc65ed85d8920b7a6c6a6c73f8bd3133ff50839e04eb2b00f9e57
SHA5124f160431b55d8b800e9051b504582ab1f65cec0bbeeed1e7dadeb70931220f9f0132ba251feb312d92acca1dbe2c63b6b8a20d937bee533d3532e2a3dda324c4
-
C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\21898959284.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\21898959284.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\21898959284.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\21898959284.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\29282301844.exeMD5
6f5b1279d943e548259d62f00650044a
SHA1367d5ff6ee971fcac30cf8b453eea8f47a936264
SHA256118f24dab3dce4a5ae6e3ab078551cbc628b475abeeafa07a5972622aaa38812
SHA51275e655e6df832bccafca641f0af62165da644a92ce3055d30b12b2dd0d241df4b43ea4de4429e3719b9e7f198882c5a0b3f44ab45900797d41787fdaf60988fe
-
C:\Users\Admin\AppData\Local\Temp\{iDJJ-zdJUt-juwz-5MNqI}\29282301844.exeMD5
6f5b1279d943e548259d62f00650044a
SHA1367d5ff6ee971fcac30cf8b453eea8f47a936264
SHA256118f24dab3dce4a5ae6e3ab078551cbc628b475abeeafa07a5972622aaa38812
SHA51275e655e6df832bccafca641f0af62165da644a92ce3055d30b12b2dd0d241df4b43ea4de4429e3719b9e7f198882c5a0b3f44ab45900797d41787fdaf60988fe
-
C:\Users\Admin\Documents\FMDTqcO9BQcKncAJdA5kQCYG.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\FMDTqcO9BQcKncAJdA5kQCYG.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\FUHxs7JXA3aDGnAVFgzn3GT0.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
C:\Users\Admin\Documents\FUHxs7JXA3aDGnAVFgzn3GT0.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
C:\Users\Admin\Documents\MBn8xbNPSPx0KoPOw1m1yYOF.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\MBn8xbNPSPx0KoPOw1m1yYOF.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\MHrQFjBWuohfpjV6jHp2vISq.exeMD5
06035c751a095a6cbcd82229c8df63f9
SHA10c751f6b5ad619d4ac85ad70045b2e806913c6dc
SHA256d345f33223ebaab130427ade2f259a25978fd96218b6cb81f7cb87e0d3597835
SHA512eeb0c21f2f43ddcee7f8e9245161ca3cbb13bd11bbc77decabe6862eeda79e3214df465d36b515598e2dbdc23c426131ac2a0dc185120b4b73f57019cd31435d
-
C:\Users\Admin\Documents\MHrQFjBWuohfpjV6jHp2vISq.exeMD5
06035c751a095a6cbcd82229c8df63f9
SHA10c751f6b5ad619d4ac85ad70045b2e806913c6dc
SHA256d345f33223ebaab130427ade2f259a25978fd96218b6cb81f7cb87e0d3597835
SHA512eeb0c21f2f43ddcee7f8e9245161ca3cbb13bd11bbc77decabe6862eeda79e3214df465d36b515598e2dbdc23c426131ac2a0dc185120b4b73f57019cd31435d
-
C:\Users\Admin\Documents\VhTrW0aZHgW8797AAYZMvyH1.exeMD5
2c81352d9b21d98d34f6db0f95c6f8ba
SHA111eef38c83e76696eaf746ff3b82e1b9a3b7d417
SHA2563e86a5bd67c6f546deedd91f4d737d22007a950c841195e2195124df585884ea
SHA5127fad429d3d16094658d90ac1d4e3fa556fb430d1dacb28620899f9d33a7cd0593b2f49cb206d1b0c0ee16076f2d24d36f38efd083e01ce39f36b7e98d0ddc739
-
C:\Users\Admin\Documents\VhTrW0aZHgW8797AAYZMvyH1.exeMD5
2c81352d9b21d98d34f6db0f95c6f8ba
SHA111eef38c83e76696eaf746ff3b82e1b9a3b7d417
SHA2563e86a5bd67c6f546deedd91f4d737d22007a950c841195e2195124df585884ea
SHA5127fad429d3d16094658d90ac1d4e3fa556fb430d1dacb28620899f9d33a7cd0593b2f49cb206d1b0c0ee16076f2d24d36f38efd083e01ce39f36b7e98d0ddc739
-
C:\Users\Admin\Documents\WjeJyEUGTfghxfv72ZrgXe1s.exeMD5
2c81352d9b21d98d34f6db0f95c6f8ba
SHA111eef38c83e76696eaf746ff3b82e1b9a3b7d417
SHA2563e86a5bd67c6f546deedd91f4d737d22007a950c841195e2195124df585884ea
SHA5127fad429d3d16094658d90ac1d4e3fa556fb430d1dacb28620899f9d33a7cd0593b2f49cb206d1b0c0ee16076f2d24d36f38efd083e01ce39f36b7e98d0ddc739
-
C:\Users\Admin\Documents\WjeJyEUGTfghxfv72ZrgXe1s.exeMD5
2c81352d9b21d98d34f6db0f95c6f8ba
SHA111eef38c83e76696eaf746ff3b82e1b9a3b7d417
SHA2563e86a5bd67c6f546deedd91f4d737d22007a950c841195e2195124df585884ea
SHA5127fad429d3d16094658d90ac1d4e3fa556fb430d1dacb28620899f9d33a7cd0593b2f49cb206d1b0c0ee16076f2d24d36f38efd083e01ce39f36b7e98d0ddc739
-
C:\Users\Admin\Documents\ePSUz500Krvoa16c0imE9UEO.exeMD5
06035c751a095a6cbcd82229c8df63f9
SHA10c751f6b5ad619d4ac85ad70045b2e806913c6dc
SHA256d345f33223ebaab130427ade2f259a25978fd96218b6cb81f7cb87e0d3597835
SHA512eeb0c21f2f43ddcee7f8e9245161ca3cbb13bd11bbc77decabe6862eeda79e3214df465d36b515598e2dbdc23c426131ac2a0dc185120b4b73f57019cd31435d
-
C:\Users\Admin\Documents\ePSUz500Krvoa16c0imE9UEO.exeMD5
06035c751a095a6cbcd82229c8df63f9
SHA10c751f6b5ad619d4ac85ad70045b2e806913c6dc
SHA256d345f33223ebaab130427ade2f259a25978fd96218b6cb81f7cb87e0d3597835
SHA512eeb0c21f2f43ddcee7f8e9245161ca3cbb13bd11bbc77decabe6862eeda79e3214df465d36b515598e2dbdc23c426131ac2a0dc185120b4b73f57019cd31435d
-
C:\Users\Admin\Documents\eoxqxYXDLGlYB2L0vjM4moX0.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
C:\Users\Admin\Documents\eoxqxYXDLGlYB2L0vjM4moX0.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
C:\Users\Admin\Documents\jzmfqHFgaclKxGspSX6rhwWi.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\jzmfqHFgaclKxGspSX6rhwWi.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\sI1vRiOTSMVojiBncpwVrcOL.exeMD5
3a43f860afe6941d92f53046bbd6194c
SHA11ac615c10f7a6aa5b82b0569189f9d98972a6544
SHA2561e801ec01234ce075108618a4bdcff570ffff471c64eaf602a87531a6b35fb28
SHA512e23d5a39e6df3360f849e527afb055eca6466b3c35a3ab01c5aee33307d5c647a24730431c98598e3ca83a3df12862b88f612a769bf1cdeb4cb16e72f08b0cce
-
C:\Users\Admin\Documents\sI1vRiOTSMVojiBncpwVrcOL.exeMD5
3a43f860afe6941d92f53046bbd6194c
SHA11ac615c10f7a6aa5b82b0569189f9d98972a6544
SHA2561e801ec01234ce075108618a4bdcff570ffff471c64eaf602a87531a6b35fb28
SHA512e23d5a39e6df3360f849e527afb055eca6466b3c35a3ab01c5aee33307d5c647a24730431c98598e3ca83a3df12862b88f612a769bf1cdeb4cb16e72f08b0cce
-
C:\Users\Admin\Documents\swy0tE5zr78nPG4J3XJCQejx.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\swy0tE5zr78nPG4J3XJCQejx.exeMD5
44d571c683487729e95513109e9cedb3
SHA11e7ca736d8e8e53ca5ff4a6272b0d5d7c2c1b7ab
SHA2563bfcebec300352ab85eaddb8c3c214c1a47cccb230ed620f1636bb728a62bfe5
SHA5125b9db7b317bc6f067bca463292a6203b332ea4992b4a0e24eb37724349509dcb75d8af3ebf1be16bc21090c2fde9b83e5fd7d2b1ba8ebecd1726f06ab297478c
-
C:\Users\Admin\Documents\xiiatWQJMODckWNKXorXf4v6.exeMD5
3a43f860afe6941d92f53046bbd6194c
SHA11ac615c10f7a6aa5b82b0569189f9d98972a6544
SHA2561e801ec01234ce075108618a4bdcff570ffff471c64eaf602a87531a6b35fb28
SHA512e23d5a39e6df3360f849e527afb055eca6466b3c35a3ab01c5aee33307d5c647a24730431c98598e3ca83a3df12862b88f612a769bf1cdeb4cb16e72f08b0cce
-
C:\Users\Admin\Documents\xiiatWQJMODckWNKXorXf4v6.exeMD5
3a43f860afe6941d92f53046bbd6194c
SHA11ac615c10f7a6aa5b82b0569189f9d98972a6544
SHA2561e801ec01234ce075108618a4bdcff570ffff471c64eaf602a87531a6b35fb28
SHA512e23d5a39e6df3360f849e527afb055eca6466b3c35a3ab01c5aee33307d5c647a24730431c98598e3ca83a3df12862b88f612a769bf1cdeb4cb16e72f08b0cce
-
C:\Users\Admin\Documents\ywgCliHHH2YIh9EIi2MY8OOI.exeMD5
b22f601e1c1e2400a0fcd0e9835f03ed
SHA1d23a32d7a9ac91a8bcc701b147e334ae47cc802a
SHA256c23d42a1c5b99920c37bb46a6b64ef68b686255a915a0e8cf1942f3f65335268
SHA512f2e9266248f9812bececa281f5218962ed37ea3ac4405d11e2220ec51a9e52ffab84d87c5cfa6b7f3ce7249e009cc0ed2a742b1e93d1b908c9e2dfd9f4b5295c
-
C:\Users\Admin\Documents\ywgCliHHH2YIh9EIi2MY8OOI.exeMD5
b22f601e1c1e2400a0fcd0e9835f03ed
SHA1d23a32d7a9ac91a8bcc701b147e334ae47cc802a
SHA256c23d42a1c5b99920c37bb46a6b64ef68b686255a915a0e8cf1942f3f65335268
SHA512f2e9266248f9812bececa281f5218962ed37ea3ac4405d11e2220ec51a9e52ffab84d87c5cfa6b7f3ce7249e009cc0ed2a742b1e93d1b908c9e2dfd9f4b5295c
-
\Users\Admin\AppData\Local\Temp\is-G7MDF.tmp\_isetup\_isdecmp.dllMD5
fd4743e2a51dd8e0d44f96eae1853226
SHA1646cef384e949aaf61e6d0b243d8d84ab04e79b7
SHA2566535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b
SHA5124587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d
-
\Users\Admin\AppData\Local\Temp\is-G7MDF.tmp\_isetup\_isdecmp.dllMD5
fd4743e2a51dd8e0d44f96eae1853226
SHA1646cef384e949aaf61e6d0b243d8d84ab04e79b7
SHA2566535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b
SHA5124587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d
-
\Users\Admin\AppData\Local\Temp\is-LU1MR.tmp\_isetup\_isdecmp.dllMD5
fd4743e2a51dd8e0d44f96eae1853226
SHA1646cef384e949aaf61e6d0b243d8d84ab04e79b7
SHA2566535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b
SHA5124587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d
-
\Users\Admin\AppData\Local\Temp\is-LU1MR.tmp\_isetup\_isdecmp.dllMD5
fd4743e2a51dd8e0d44f96eae1853226
SHA1646cef384e949aaf61e6d0b243d8d84ab04e79b7
SHA2566535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b
SHA5124587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d
-
\Users\Admin\AppData\Local\Temp\is-LU1MR.tmp\idp.dllMD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
memory/212-306-0x0000000000000000-mapping.dmp
-
memory/1324-186-0x0000000002E00000-0x00000000037A0000-memory.dmpFilesize
9.6MB
-
memory/1324-150-0x0000000000000000-mapping.dmp
-
memory/1324-224-0x0000000001260000-0x0000000001262000-memory.dmpFilesize
8KB
-
memory/1336-296-0x0000000000000000-mapping.dmp
-
memory/1500-301-0x0000000000000000-mapping.dmp
-
memory/1732-15-0x0000000000DD0000-0x0000000000DD1000-memory.dmpFilesize
4KB
-
memory/1732-12-0x0000000000000000-mapping.dmp
-
memory/1732-17-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1732-16-0x0000000000950000-0x000000000097D000-memory.dmpFilesize
180KB
-
memory/1788-290-0x0000000000000000-mapping.dmp
-
memory/1804-24-0x0000000000400000-0x00000000008D0000-memory.dmpFilesize
4.8MB
-
memory/1804-23-0x0000000000F50000-0x0000000001029000-memory.dmpFilesize
868KB
-
memory/1804-30-0x00000000011B0000-0x0000000001284000-memory.dmpFilesize
848KB
-
memory/1804-25-0x0000000001340000-0x0000000001341000-memory.dmpFilesize
4KB
-
memory/1804-22-0x0000000000F50000-0x0000000000F51000-memory.dmpFilesize
4KB
-
memory/1804-19-0x0000000000000000-mapping.dmp
-
memory/1900-292-0x0000000000000000-mapping.dmp
-
memory/2348-39-0x0000000000E00000-0x0000000000E01000-memory.dmpFilesize
4KB
-
memory/2348-32-0x0000000000000000-mapping.dmp
-
memory/2348-42-0x0000000000400000-0x00000000004E3000-memory.dmpFilesize
908KB
-
memory/2348-41-0x0000000000E00000-0x0000000000EDF000-memory.dmpFilesize
892KB
-
memory/2648-151-0x0000000000000000-mapping.dmp
-
memory/2648-187-0x0000000002DE0000-0x0000000003780000-memory.dmpFilesize
9.6MB
-
memory/2648-225-0x0000000001600000-0x0000000001602000-memory.dmpFilesize
8KB
-
memory/2648-291-0x0000000000000000-mapping.dmp
-
memory/2664-43-0x0000000003350000-0x0000000003351000-memory.dmpFilesize
4KB
-
memory/2664-31-0x0000000000400000-0x0000000002B75000-memory.dmpFilesize
39.5MB
-
memory/2664-38-0x0000000000400000-0x00000000008A2000-memory.dmpFilesize
4.6MB
-
memory/2664-37-0x0000000003160000-0x000000000320C000-memory.dmpFilesize
688KB
-
memory/2664-45-0x0000000003350000-0x00000000033FC000-memory.dmpFilesize
688KB
-
memory/2664-36-0x0000000003160000-0x0000000003161000-memory.dmpFilesize
4KB
-
memory/2664-26-0x0000000000400000-0x0000000002B75000-memory.dmpFilesize
39.5MB
-
memory/2664-27-0x0000000000401F10-mapping.dmp
-
memory/3176-147-0x000000000A540000-0x000000000A574000-memory.dmpFilesize
208KB
-
memory/3176-220-0x00000000051B0000-0x00000000051B1000-memory.dmpFilesize
4KB
-
memory/3176-160-0x000000000A590000-0x000000000A591000-memory.dmpFilesize
4KB
-
memory/3176-136-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB
-
memory/3176-138-0x00000000008E0000-0x00000000008E1000-memory.dmpFilesize
4KB
-
memory/3176-133-0x0000000000000000-mapping.dmp
-
memory/3176-143-0x0000000001240000-0x0000000001241000-memory.dmpFilesize
4KB
-
memory/3744-234-0x0000000000000000-mapping.dmp
-
memory/3964-18-0x0000000000000000-mapping.dmp
-
memory/4008-29-0x0000000000000000-mapping.dmp
-
memory/4032-216-0x0000000002FC1000-0x0000000002FC8000-memory.dmpFilesize
28KB
-
memory/4032-207-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4032-206-0x0000000002191000-0x0000000002195000-memory.dmpFilesize
16KB
-
memory/4032-213-0x0000000002E41000-0x0000000002E6C000-memory.dmpFilesize
172KB
-
memory/4032-180-0x0000000000000000-mapping.dmp
-
memory/4052-10-0x0000000008AB0000-0x0000000008AB3000-memory.dmpFilesize
12KB
-
memory/4052-11-0x0000000009DB0000-0x0000000009DB1000-memory.dmpFilesize
4KB
-
memory/4052-3-0x0000000000640000-0x0000000000641000-memory.dmpFilesize
4KB
-
memory/4052-2-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB
-
memory/4052-5-0x0000000005420000-0x0000000005421000-memory.dmpFilesize
4KB
-
memory/4052-6-0x0000000004F20000-0x0000000004F21000-memory.dmpFilesize
4KB
-
memory/4052-7-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/4052-8-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/4052-9-0x00000000050D3000-0x00000000050D5000-memory.dmpFilesize
8KB
-
memory/4108-33-0x0000000000000000-mapping.dmp
-
memory/4148-197-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB
-
memory/4148-188-0x0000000000000000-mapping.dmp
-
memory/4148-238-0x0000000004B30000-0x0000000004B31000-memory.dmpFilesize
4KB
-
memory/4184-40-0x0000000000000000-mapping.dmp
-
memory/4204-146-0x0000000000C10000-0x0000000000C11000-memory.dmpFilesize
4KB
-
memory/4204-155-0x0000000005170000-0x0000000005171000-memory.dmpFilesize
4KB
-
memory/4204-137-0x0000000000000000-mapping.dmp
-
memory/4204-148-0x0000000000C20000-0x0000000000C34000-memory.dmpFilesize
80KB
-
memory/4204-170-0x0000000004FA0000-0x0000000004FA1000-memory.dmpFilesize
4KB
-
memory/4204-144-0x0000000000670000-0x0000000000671000-memory.dmpFilesize
4KB
-
memory/4204-142-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB
-
memory/4252-48-0x0000000000400000-0x0000000002B44000-memory.dmpFilesize
39.3MB
-
memory/4252-50-0x0000000002EA0000-0x0000000002F2D000-memory.dmpFilesize
564KB
-
memory/4252-85-0x0000000003090000-0x0000000003121000-memory.dmpFilesize
580KB
-
memory/4252-51-0x0000000000400000-0x0000000002B2D000-memory.dmpFilesize
39.2MB
-
memory/4252-46-0x0000000000403B90-mapping.dmp
-
memory/4252-44-0x0000000000400000-0x0000000002B44000-memory.dmpFilesize
39.3MB
-
memory/4252-49-0x0000000003090000-0x0000000003091000-memory.dmpFilesize
4KB
-
memory/4252-86-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/4352-191-0x0000000002FA0000-0x0000000003940000-memory.dmpFilesize
9.6MB
-
memory/4352-227-0x0000000002F90000-0x0000000002F92000-memory.dmpFilesize
8KB
-
memory/4352-154-0x0000000000000000-mapping.dmp
-
memory/4404-119-0x0000000000DC0000-0x0000000000DC1000-memory.dmpFilesize
4KB
-
memory/4404-52-0x0000000000000000-mapping.dmp
-
memory/4404-124-0x0000000000DC0000-0x0000000000E51000-memory.dmpFilesize
580KB
-
memory/4404-125-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/4416-53-0x0000000000000000-mapping.dmp
-
memory/4416-89-0x0000000000350000-0x0000000000351000-memory.dmpFilesize
4KB
-
memory/4416-61-0x00007FFE2FBB0000-0x00007FFE3059C000-memory.dmpFilesize
9.9MB
-
memory/4416-130-0x000000001AE40000-0x000000001AE42000-memory.dmpFilesize
8KB
-
memory/4428-62-0x00007FFE2FBB0000-0x00007FFE3059C000-memory.dmpFilesize
9.9MB
-
memory/4428-118-0x000000001AD90000-0x000000001AD92000-memory.dmpFilesize
8KB
-
memory/4428-54-0x0000000000000000-mapping.dmp
-
memory/4468-267-0x0000000005510000-0x0000000005511000-memory.dmpFilesize
4KB
-
memory/4468-178-0x0000000000000000-mapping.dmp
-
memory/4468-185-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB
-
memory/4468-239-0x00000000048E0000-0x00000000048E1000-memory.dmpFilesize
4KB
-
memory/4512-307-0x0000000000000000-mapping.dmp
-
memory/4528-122-0x0000000000E50000-0x0000000000E51000-memory.dmpFilesize
4KB
-
memory/4528-74-0x00007FFE2FBB0000-0x00007FFE3059C000-memory.dmpFilesize
9.9MB
-
memory/4528-114-0x000000001B640000-0x000000001B642000-memory.dmpFilesize
8KB
-
memory/4528-95-0x0000000000940000-0x0000000000941000-memory.dmpFilesize
4KB
-
memory/4528-109-0x0000000000E40000-0x0000000000E41000-memory.dmpFilesize
4KB
-
memory/4528-116-0x0000000001060000-0x0000000001074000-memory.dmpFilesize
80KB
-
memory/4528-63-0x0000000000000000-mapping.dmp
-
memory/4556-80-0x00007FFE2FBB0000-0x00007FFE3059C000-memory.dmpFilesize
9.9MB
-
memory/4556-65-0x0000000000000000-mapping.dmp
-
memory/4556-111-0x0000000002E20000-0x0000000002E22000-memory.dmpFilesize
8KB
-
memory/4564-192-0x0000000002740000-0x00000000030E0000-memory.dmpFilesize
9.6MB
-
memory/4564-163-0x0000000000000000-mapping.dmp
-
memory/4564-228-0x0000000002730000-0x0000000002732000-memory.dmpFilesize
8KB
-
memory/4568-121-0x0000000000DD0000-0x0000000000DD1000-memory.dmpFilesize
4KB
-
memory/4568-66-0x0000000000000000-mapping.dmp
-
memory/4576-295-0x0000000000000000-mapping.dmp
-
memory/4580-79-0x00007FFE2FBB0000-0x00007FFE3059C000-memory.dmpFilesize
9.9MB
-
memory/4580-123-0x000000001AEE0000-0x000000001AEE2000-memory.dmpFilesize
8KB
-
memory/4580-67-0x0000000000000000-mapping.dmp
-
memory/4588-244-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB
-
memory/4588-253-0x0000000005430000-0x0000000005431000-memory.dmpFilesize
4KB
-
memory/4588-243-0x0000000000000000-mapping.dmp
-
memory/4596-70-0x0000000000000000-mapping.dmp
-
memory/4604-129-0x00000000031A0000-0x0000000003AAF000-memory.dmpFilesize
9.1MB
-
memory/4604-108-0x00000000027A0000-0x0000000002C16000-memory.dmpFilesize
4.5MB
-
memory/4604-115-0x00000000031A0000-0x0000000003AAF000-memory.dmpFilesize
9.1MB
-
memory/4604-71-0x0000000000000000-mapping.dmp
-
memory/4632-175-0x0000000000000000-mapping.dmp
-
memory/4792-117-0x000000001BA60000-0x000000001BA62000-memory.dmpFilesize
8KB
-
memory/4792-93-0x00007FFE2FBB0000-0x00007FFE3059C000-memory.dmpFilesize
9.9MB
-
memory/4792-87-0x0000000000000000-mapping.dmp
-
memory/4812-112-0x00000000030E0000-0x00000000039EF000-memory.dmpFilesize
9.1MB
-
memory/4812-92-0x0000000000000000-mapping.dmp
-
memory/4812-131-0x00000000026E0000-0x0000000002B56000-memory.dmpFilesize
4.5MB
-
memory/4812-132-0x00000000030E0000-0x00000000039EF000-memory.dmpFilesize
9.1MB
-
memory/4836-91-0x0000000000000000-mapping.dmp
-
memory/4856-240-0x0000000000000000-mapping.dmp
-
memory/4872-166-0x0000000000000000-mapping.dmp
-
memory/4880-165-0x0000000000000000-mapping.dmp
-
memory/4880-194-0x0000000000401000-0x000000000040C000-memory.dmpFilesize
44KB
-
memory/4924-289-0x0000000000000000-mapping.dmp
-
memory/4932-183-0x0000000000000000-mapping.dmp
-
memory/4932-212-0x00000000006C1000-0x00000000006C5000-memory.dmpFilesize
16KB
-
memory/4932-218-0x0000000003761000-0x000000000378C000-memory.dmpFilesize
172KB
-
memory/4932-222-0x0000000002251000-0x0000000002258000-memory.dmpFilesize
28KB
-
memory/4932-211-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/5116-201-0x0000000003121000-0x0000000003125000-memory.dmpFilesize
16KB
-
memory/5116-214-0x0000000003791000-0x0000000003798000-memory.dmpFilesize
28KB
-
memory/5116-202-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/5116-179-0x0000000000000000-mapping.dmp
-
memory/5116-209-0x0000000003751000-0x000000000377C000-memory.dmpFilesize
172KB
-
memory/5504-269-0x0000000002510000-0x0000000002512000-memory.dmpFilesize
8KB
-
memory/5504-258-0x0000000000000000-mapping.dmp
-
memory/5504-263-0x0000000002520000-0x0000000002EC0000-memory.dmpFilesize
9.6MB
-
memory/5504-302-0x0000000000000000-mapping.dmp
-
memory/5524-266-0x0000000002950000-0x0000000002952000-memory.dmpFilesize
8KB
-
memory/5524-262-0x0000000002960000-0x0000000003300000-memory.dmpFilesize
9.6MB
-
memory/5524-259-0x0000000000000000-mapping.dmp
-
memory/5536-264-0x0000000002B20000-0x00000000034C0000-memory.dmpFilesize
9.6MB
-
memory/5536-260-0x0000000000000000-mapping.dmp
-
memory/5536-270-0x0000000002B10000-0x0000000002B12000-memory.dmpFilesize
8KB
-
memory/5556-265-0x0000000002C00000-0x00000000035A0000-memory.dmpFilesize
9.6MB
-
memory/5556-261-0x0000000000000000-mapping.dmp
-
memory/5556-271-0x0000000001420000-0x0000000001422000-memory.dmpFilesize
8KB
-
memory/5684-298-0x0000000000000000-mapping.dmp
-
memory/5748-299-0x0000000000000000-mapping.dmp
-
memory/5808-279-0x00000000015E0000-0x00000000015E2000-memory.dmpFilesize
8KB
-
memory/5808-274-0x0000000002E10000-0x00000000037B0000-memory.dmpFilesize
9.6MB
-
memory/5808-272-0x0000000000000000-mapping.dmp
-
memory/5820-276-0x0000000002B90000-0x0000000003530000-memory.dmpFilesize
9.6MB
-
memory/5820-280-0x00000000010F0000-0x00000000010F2000-memory.dmpFilesize
8KB
-
memory/5820-273-0x0000000000000000-mapping.dmp
-
memory/5844-303-0x0000000000E70000-0x0000000000E71000-memory.dmpFilesize
4KB
-
memory/5844-300-0x0000000000000000-mapping.dmp
-
memory/5856-281-0x0000000001210000-0x0000000001212000-memory.dmpFilesize
8KB
-
memory/5856-275-0x0000000000000000-mapping.dmp
-
memory/5856-277-0x0000000002A30000-0x00000000033D0000-memory.dmpFilesize
9.6MB
-
memory/5920-282-0x0000000002730000-0x00000000030D0000-memory.dmpFilesize
9.6MB
-
memory/5920-283-0x0000000000EF0000-0x0000000000EF2000-memory.dmpFilesize
8KB
-
memory/5920-278-0x0000000000000000-mapping.dmp
-
memory/5968-284-0x0000000000000000-mapping.dmp
-
memory/6072-285-0x0000000000000000-mapping.dmp
-
memory/6108-286-0x0000000000000000-mapping.dmp
-
memory/6108-294-0x0000000000A80000-0x0000000000AA6000-memory.dmpFilesize
152KB
-
memory/6108-293-0x0000000000D80000-0x0000000000D81000-memory.dmpFilesize
4KB
-
memory/6108-297-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/6120-287-0x0000000000000000-mapping.dmp
-
memory/6128-288-0x0000000000000000-mapping.dmp
-
memory/9368-316-0x0000000000DC0000-0x0000000000DC1000-memory.dmpFilesize
4KB