Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
03-11-2021 02:38
Static task
static1
Behavioral task
behavioral1
Sample
9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe
Resource
win7-en-20211014
General
-
Target
9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe
-
Size
434KB
-
MD5
09dfc7f65a996b7f6b1e5efc8c9bbb21
-
SHA1
72556797ab6ee2ce5faff1db89205f295f4ff57e
-
SHA256
9c650b8eddf1ade268de962e1ed3ec37eb3ca2e4e39f90dc8ec14895f9c8e27d
-
SHA512
38baee85e4c13c67230a12e490ffb31bf5d1f749440e6a4a9dcc73ba46de79c3ebe81a57b6782785afe321904f44a3e6065678fa317baf4159ccd93dc7d1b33e
Malware Config
Extracted
socelars
http://www.hhgenice.top/
Signatures
-
Detect Neshta Payload 12 IoCs
Processes:
resource yara_rule C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\odt\OFFICE~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3848 3920 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5504 3920 rundll32.exe -
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\ADOBEF~1\L8LQWB~1.EXE family_socelars C:\Users\Admin\Pictures\ADOBEF~1\L8LQWB~1.EXE family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2000 created 1560 2000 WerFault.exe SJ6R3R~1.EXE -
suricata: ET MALWARE ClipBanker Variant Activity (POST)
suricata: ET MALWARE ClipBanker Variant Activity (POST)
-
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
DYbALA.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe -
Executes dropped EXE 42 IoCs
Processes:
9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exesvchost.comAEXXQH~1.EXEsvchost.comBNBDP0~1.EXEsvchost.comSJ6R3R~1.EXEsvchost.comsvchost.comGAIVNP~1.EXEL8LQWB~1.EXEsvchost.comRDLBMB~1.EXEsvchost.comLJ2X_Z~1.EXERDLBMB~1.EXEsvchost.com9IXH21~1.EXEsvchost.comROI3BQ~1.EXEsvchost.comROI3BQ~1.tmpDYbALA.exesetup.exefoldershare.exeXygiqaemyra.exeGunaefoqabe.exeGcleanerEU.exeinstaller.exeany.exeCalculator.exegcleaner.exeany.exeautosubplayer.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exepid process 3148 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe 2392 svchost.com 872 AEXXQH~1.EXE 1908 svchost.com 1220 BNBDP0~1.EXE 2484 svchost.com 1560 SJ6R3R~1.EXE 1704 svchost.com 1804 svchost.com 3252 GAIVNP~1.EXE 2304 L8LQWB~1.EXE 2388 svchost.com 2920 RDLBMB~1.EXE 1600 svchost.com 2464 LJ2X_Z~1.EXE 3080 RDLBMB~1.EXE 652 svchost.com 3568 9IXH21~1.EXE 3572 svchost.com 1576 ROI3BQ~1.EXE 3904 svchost.com 1972 ROI3BQ~1.tmp 1056 DYbALA.exe 3832 setup.exe 3436 foldershare.exe 3044 Xygiqaemyra.exe 1472 Gunaefoqabe.exe 4716 GcleanerEU.exe 4892 installer.exe 5068 any.exe 5080 Calculator.exe 5092 gcleaner.exe 4244 any.exe 4312 autosubplayer.exe 4836 Calculator.exe 2832 Calculator.exe 2124 Calculator.exe 3288 Calculator.exe 5152 Calculator.exe 5196 Calculator.exe 5320 Calculator.exe 5864 Calculator.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
AEXXQH~1.EXEXygiqaemyra.exeCalculator.exeCalculator.exeCalculator.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation AEXXQH~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Xygiqaemyra.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe -
Loads dropped DLL 54 IoCs
Processes:
9IXH21~1.EXEROI3BQ~1.tmprundll32.exesetup.exeinstaller.exeCalculator.exeautosubplayer.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exerundll32.exeMsiExec.exeCalculator.exeCalculator.exepid process 3568 9IXH21~1.EXE 3568 9IXH21~1.EXE 3568 9IXH21~1.EXE 3568 9IXH21~1.EXE 3568 9IXH21~1.EXE 3568 9IXH21~1.EXE 1972 ROI3BQ~1.tmp 3256 rundll32.exe 3568 9IXH21~1.EXE 3832 setup.exe 3832 setup.exe 4892 installer.exe 4892 installer.exe 3832 setup.exe 3832 setup.exe 5080 Calculator.exe 3832 setup.exe 5080 Calculator.exe 5080 Calculator.exe 4312 autosubplayer.exe 3832 setup.exe 3568 9IXH21~1.EXE 3568 9IXH21~1.EXE 4836 Calculator.exe 4892 installer.exe 4312 autosubplayer.exe 2832 Calculator.exe 2832 Calculator.exe 2124 Calculator.exe 2832 Calculator.exe 2124 Calculator.exe 2124 Calculator.exe 3288 Calculator.exe 3288 Calculator.exe 3288 Calculator.exe 5152 Calculator.exe 5152 Calculator.exe 5152 Calculator.exe 5152 Calculator.exe 5196 Calculator.exe 5196 Calculator.exe 5196 Calculator.exe 5196 Calculator.exe 5532 rundll32.exe 5344 MsiExec.exe 2832 Calculator.exe 5344 MsiExec.exe 5320 Calculator.exe 5320 Calculator.exe 5320 Calculator.exe 5320 Calculator.exe 5864 Calculator.exe 5864 Calculator.exe 5864 Calculator.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
DYbALA.exesetup.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Mozilla Maintenance Service\\Juhobymola.exe\"" DYbALA.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --ZgwMku75" setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
installer.exemsiexec.exedescription ioc process File opened (read-only) \??\W: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\Y: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 20 ipinfo.io 21 ipinfo.io 44 ipinfo.io 78 ip-api.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory 7 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
svchost.exedescription pid process target process PID 3480 set thread context of 1260 3480 svchost.exe svchost.exe -
Drops file in Program Files directory 64 IoCs
Processes:
autosubplayer.exe9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exesvchost.comDYbALA.exe9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exedescription ioc process File created C:\Program Files (x86)\lighteningplayer\lua\http\index.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\mobile_browse.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\sd\jamendo.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libsmb_plugin.dll autosubplayer.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE svchost.com File created C:\Program Files (x86)\lighteningplayer\lua\extensions\VLSub.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mpeg4audio_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lighteningplayer.exe autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libmmdevice_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dirac_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\offset_window.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\soundcloud.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libftp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libtimecode_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\liboldrc_plugin.dll autosubplayer.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXE 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe File created C:\Program Files\Windows Defender Advanced Threat Protection\ZYKKYAJZCC\foldershare.exe DYbALA.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libnsv_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_ps_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mpeg4video_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\dumpmeta.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_flac_plugin.dll autosubplayer.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE svchost.com File created C:\Program Files\Windows Defender Advanced Threat Protection\ZYKKYAJZCC\foldershare.exe.config DYbALA.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\playlist_jstree.xml autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\art\03_lastfm.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvoc_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mpegaudio_plugin.dll autosubplayer.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\cli.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\dummy.luac autosubplayer.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dts_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libnsc_plugin.dll autosubplayer.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\ACCESS~1\wordpad.exe 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc-48.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libfilesystem_plugin.dll autosubplayer.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe svchost.com File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE svchost.com File created C:\Program Files (x86)\lighteningplayer\plugins\access\libsdp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvobsub_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe svchost.com File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libstats_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\anevia_xml.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libwin_msg_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\keystore\libfile_keystore_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_a52_plugin.dll autosubplayer.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE svchost.com File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe File created C:\Program Files (x86)\lighteningplayer\regstr autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libty_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\logger\libfile_logger_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\liblogger_plugin.dll autosubplayer.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\dailymotion.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdiracsys_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libshm_plugin.dll autosubplayer.exe -
Drops file in Windows directory 27 IoCs
Processes:
svchost.comsvchost.commsiexec.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comMicrosoftEdgeCP.exe9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exesvchost.comsvchost.comMicrosoftEdge.exesvchost.comdescription ioc process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File created C:\Windows\Installer\f7769cd.msi msiexec.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\svchost.com 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\Installer\f7769cd.msi msiexec.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4024 1560 WerFault.exe SJ6R3R~1.EXE 3184 1560 WerFault.exe SJ6R3R~1.EXE 3132 1560 WerFault.exe SJ6R3R~1.EXE 3184 1560 WerFault.exe SJ6R3R~1.EXE 1040 1560 WerFault.exe SJ6R3R~1.EXE 3160 1560 WerFault.exe SJ6R3R~1.EXE 4084 1560 WerFault.exe SJ6R3R~1.EXE 3848 1560 WerFault.exe SJ6R3R~1.EXE 2000 1560 WerFault.exe SJ6R3R~1.EXE -
NSIS installer 8 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\ADOBEF~1\9IXH21~1.EXE nsis_installer_1 C:\Users\Admin\Pictures\ADOBEF~1\9IXH21~1.EXE nsis_installer_2 C:\Users\Admin\Pictures\ADOBEF~1\9IXH21~1.EXE nsis_installer_1 C:\Users\Admin\Pictures\ADOBEF~1\9IXH21~1.EXE nsis_installer_2 C:\Users\Admin\AppData\Roaming\Calculator\setup.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Calculator\setup.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\Calculator\setup.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Calculator\setup.exe nsis_installer_2 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3160 schtasks.exe 3756 schtasks.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4060 taskkill.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 16 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exe9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exeAEXXQH~1.EXEMicrosoftEdgeCP.exesvchost.exerundll32.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersio = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings AEXXQH~1.EXE Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "268435456" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI = "{6A90C9B0-06F4-4C74-999A-6440A4A5BC0A}" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{K2QMW1I5-C7CF-APK0-W60J-X1GR5HEJENXO}\1 = "22" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 25b0743d06c1d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 01000000baf7300d941f8fc11cd49b1eb732b0849aa2b3d7e8ae17180976100faf5c6794c3f48ecd7f48c36e5cf9946cabd4f70e6273325374121b6e99e47085 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-087602 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 25b0743d06c1d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{J4ZPT3Z1-W6KY-VVT4-W36K-U3VX5NTXVQUQ} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 25b0743d06c1d701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 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 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe -
Processes:
L8LQWB~1.EXEinstaller.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 L8LQWB~1.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 L8LQWB~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 04000000010000001000000087ce0b7b2a0e4900e158719b37a893720f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d43190000000100000010000000749966cecc95c1874194ca7203f9b6202000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 86 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 185 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
AEXXQH~1.EXEBNBDP0~1.EXEpid process 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 872 AEXXQH~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE 1220 BNBDP0~1.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
MicrosoftEdgeCP.exepid process 4268 MicrosoftEdgeCP.exe 4268 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
L8LQWB~1.EXEWerFault.exetaskkill.exerundll32.exesvchost.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeDYbALA.exesvchost.exedescription pid process Token: SeCreateTokenPrivilege 2304 L8LQWB~1.EXE Token: SeAssignPrimaryTokenPrivilege 2304 L8LQWB~1.EXE Token: SeLockMemoryPrivilege 2304 L8LQWB~1.EXE Token: SeIncreaseQuotaPrivilege 2304 L8LQWB~1.EXE Token: SeMachineAccountPrivilege 2304 L8LQWB~1.EXE Token: SeTcbPrivilege 2304 L8LQWB~1.EXE Token: SeSecurityPrivilege 2304 L8LQWB~1.EXE Token: SeTakeOwnershipPrivilege 2304 L8LQWB~1.EXE Token: SeLoadDriverPrivilege 2304 L8LQWB~1.EXE Token: SeSystemProfilePrivilege 2304 L8LQWB~1.EXE Token: SeSystemtimePrivilege 2304 L8LQWB~1.EXE Token: SeProfSingleProcessPrivilege 2304 L8LQWB~1.EXE Token: SeIncBasePriorityPrivilege 2304 L8LQWB~1.EXE Token: SeCreatePagefilePrivilege 2304 L8LQWB~1.EXE Token: SeCreatePermanentPrivilege 2304 L8LQWB~1.EXE Token: SeBackupPrivilege 2304 L8LQWB~1.EXE Token: SeRestorePrivilege 2304 L8LQWB~1.EXE Token: SeShutdownPrivilege 2304 L8LQWB~1.EXE Token: SeDebugPrivilege 2304 L8LQWB~1.EXE Token: SeAuditPrivilege 2304 L8LQWB~1.EXE Token: SeSystemEnvironmentPrivilege 2304 L8LQWB~1.EXE Token: SeChangeNotifyPrivilege 2304 L8LQWB~1.EXE Token: SeRemoteShutdownPrivilege 2304 L8LQWB~1.EXE Token: SeUndockPrivilege 2304 L8LQWB~1.EXE Token: SeSyncAgentPrivilege 2304 L8LQWB~1.EXE Token: SeEnableDelegationPrivilege 2304 L8LQWB~1.EXE Token: SeManageVolumePrivilege 2304 L8LQWB~1.EXE Token: SeImpersonatePrivilege 2304 L8LQWB~1.EXE Token: SeCreateGlobalPrivilege 2304 L8LQWB~1.EXE Token: 31 2304 L8LQWB~1.EXE Token: 32 2304 L8LQWB~1.EXE Token: 33 2304 L8LQWB~1.EXE Token: 34 2304 L8LQWB~1.EXE Token: 35 2304 L8LQWB~1.EXE Token: SeRestorePrivilege 4024 WerFault.exe Token: SeBackupPrivilege 4024 WerFault.exe Token: SeDebugPrivilege 4060 taskkill.exe Token: SeDebugPrivilege 4024 WerFault.exe Token: SeDebugPrivilege 3256 rundll32.exe Token: SeDebugPrivilege 3256 rundll32.exe Token: SeDebugPrivilege 3480 svchost.exe Token: SeDebugPrivilege 3256 rundll32.exe Token: SeDebugPrivilege 3256 rundll32.exe Token: SeDebugPrivilege 3256 rundll32.exe Token: SeDebugPrivilege 3256 rundll32.exe Token: SeDebugPrivilege 3256 rundll32.exe Token: SeDebugPrivilege 3184 WerFault.exe Token: SeDebugPrivilege 3256 rundll32.exe Token: SeDebugPrivilege 3256 rundll32.exe Token: SeDebugPrivilege 3256 rundll32.exe Token: SeDebugPrivilege 3256 rundll32.exe Token: SeDebugPrivilege 3132 WerFault.exe Token: SeDebugPrivilege 3256 rundll32.exe Token: SeDebugPrivilege 3256 rundll32.exe Token: SeDebugPrivilege 3184 WerFault.exe Token: SeDebugPrivilege 1040 WerFault.exe Token: SeDebugPrivilege 3160 WerFault.exe Token: SeDebugPrivilege 4084 WerFault.exe Token: SeDebugPrivilege 3848 WerFault.exe Token: SeDebugPrivilege 2000 WerFault.exe Token: SeDebugPrivilege 1056 DYbALA.exe Token: SeAssignPrimaryTokenPrivilege 2808 svchost.exe Token: SeIncreaseQuotaPrivilege 2808 svchost.exe Token: SeSecurityPrivilege 2808 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
installer.exeCalculator.exepid process 4892 installer.exe 5080 Calculator.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 4416 MicrosoftEdge.exe 4268 MicrosoftEdgeCP.exe 4268 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exesvchost.comAEXXQH~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comRDLBMB~1.EXEL8LQWB~1.EXEcmd.exesvchost.comdescription pid process target process PID 2768 wrote to memory of 3148 2768 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe PID 2768 wrote to memory of 3148 2768 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe PID 2768 wrote to memory of 3148 2768 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe PID 3148 wrote to memory of 2392 3148 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe svchost.com PID 3148 wrote to memory of 2392 3148 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe svchost.com PID 3148 wrote to memory of 2392 3148 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe svchost.com PID 2392 wrote to memory of 872 2392 svchost.com AEXXQH~1.EXE PID 2392 wrote to memory of 872 2392 svchost.com AEXXQH~1.EXE PID 2392 wrote to memory of 872 2392 svchost.com AEXXQH~1.EXE PID 3148 wrote to memory of 3756 3148 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe schtasks.exe PID 3148 wrote to memory of 3756 3148 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe schtasks.exe PID 3148 wrote to memory of 3756 3148 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe schtasks.exe PID 3148 wrote to memory of 3160 3148 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe schtasks.exe PID 3148 wrote to memory of 3160 3148 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe schtasks.exe PID 3148 wrote to memory of 3160 3148 9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe schtasks.exe PID 872 wrote to memory of 1908 872 AEXXQH~1.EXE svchost.com PID 872 wrote to memory of 1908 872 AEXXQH~1.EXE svchost.com PID 872 wrote to memory of 1908 872 AEXXQH~1.EXE svchost.com PID 1908 wrote to memory of 1220 1908 svchost.com BNBDP0~1.EXE PID 1908 wrote to memory of 1220 1908 svchost.com BNBDP0~1.EXE PID 872 wrote to memory of 2484 872 AEXXQH~1.EXE svchost.com PID 872 wrote to memory of 2484 872 AEXXQH~1.EXE svchost.com PID 872 wrote to memory of 2484 872 AEXXQH~1.EXE svchost.com PID 2484 wrote to memory of 1560 2484 svchost.com SJ6R3R~1.EXE PID 2484 wrote to memory of 1560 2484 svchost.com SJ6R3R~1.EXE PID 2484 wrote to memory of 1560 2484 svchost.com SJ6R3R~1.EXE PID 872 wrote to memory of 1704 872 AEXXQH~1.EXE svchost.com PID 872 wrote to memory of 1704 872 AEXXQH~1.EXE svchost.com PID 872 wrote to memory of 1704 872 AEXXQH~1.EXE svchost.com PID 872 wrote to memory of 1804 872 AEXXQH~1.EXE svchost.com PID 872 wrote to memory of 1804 872 AEXXQH~1.EXE svchost.com PID 872 wrote to memory of 1804 872 AEXXQH~1.EXE svchost.com PID 1704 wrote to memory of 3252 1704 svchost.com GAIVNP~1.EXE PID 1704 wrote to memory of 3252 1704 svchost.com GAIVNP~1.EXE PID 1704 wrote to memory of 3252 1704 svchost.com GAIVNP~1.EXE PID 1804 wrote to memory of 2304 1804 svchost.com L8LQWB~1.EXE PID 1804 wrote to memory of 2304 1804 svchost.com L8LQWB~1.EXE PID 1804 wrote to memory of 2304 1804 svchost.com L8LQWB~1.EXE PID 872 wrote to memory of 2388 872 AEXXQH~1.EXE svchost.com PID 872 wrote to memory of 2388 872 AEXXQH~1.EXE svchost.com PID 872 wrote to memory of 2388 872 AEXXQH~1.EXE svchost.com PID 2388 wrote to memory of 2920 2388 svchost.com RDLBMB~1.EXE PID 2388 wrote to memory of 2920 2388 svchost.com RDLBMB~1.EXE PID 2388 wrote to memory of 2920 2388 svchost.com RDLBMB~1.EXE PID 872 wrote to memory of 1600 872 AEXXQH~1.EXE svchost.com PID 872 wrote to memory of 1600 872 AEXXQH~1.EXE svchost.com PID 872 wrote to memory of 1600 872 AEXXQH~1.EXE svchost.com PID 1600 wrote to memory of 2464 1600 svchost.com LJ2X_Z~1.EXE PID 1600 wrote to memory of 2464 1600 svchost.com LJ2X_Z~1.EXE PID 2920 wrote to memory of 3080 2920 RDLBMB~1.EXE RDLBMB~1.EXE PID 2920 wrote to memory of 3080 2920 RDLBMB~1.EXE RDLBMB~1.EXE PID 2920 wrote to memory of 3080 2920 RDLBMB~1.EXE RDLBMB~1.EXE PID 2304 wrote to memory of 2296 2304 L8LQWB~1.EXE cmd.exe PID 2304 wrote to memory of 2296 2304 L8LQWB~1.EXE cmd.exe PID 2304 wrote to memory of 2296 2304 L8LQWB~1.EXE cmd.exe PID 872 wrote to memory of 652 872 AEXXQH~1.EXE svchost.com PID 872 wrote to memory of 652 872 AEXXQH~1.EXE svchost.com PID 872 wrote to memory of 652 872 AEXXQH~1.EXE svchost.com PID 2296 wrote to memory of 4060 2296 cmd.exe taskkill.exe PID 2296 wrote to memory of 4060 2296 cmd.exe taskkill.exe PID 2296 wrote to memory of 4060 2296 cmd.exe taskkill.exe PID 652 wrote to memory of 3568 652 svchost.com 9IXH21~1.EXE PID 652 wrote to memory of 3568 652 svchost.com 9IXH21~1.EXE PID 652 wrote to memory of 3568 652 svchost.com 9IXH21~1.EXE
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3480 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
PID:1260
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2808 -
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵PID:3796
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2792
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2696
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2528
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2516
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1952
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1388
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1356
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1184
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1124
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵PID:1072
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:360
-
C:\Users\Admin\AppData\Local\Temp\9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe"C:\Users\Admin\AppData\Local\Temp\9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\DOCUME~1\AEXXQH~1.EXE"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\DOCUME~1\AEXXQH~1.EXEC:\Users\Admin\DOCUME~1\AEXXQH~1.EXE4⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\Pictures\ADOBEF~1\BNBDP0~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\Pictures\ADOBEF~1\BNBDP0~1.EXEC:\Users\Admin\Pictures\ADOBEF~1\BNBDP0~1.EXE6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\Pictures\ADOBEF~1\SJ6R3R~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\Pictures\ADOBEF~1\SJ6R3R~1.EXEC:\Users\Admin\Pictures\ADOBEF~1\SJ6R3R~1.EXE6⤵
- Executes dropped EXE
PID:1560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 6647⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 6847⤵
- Program crash
PID:3184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 8127⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 8007⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 11647⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 11807⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 12167⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 12607⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 11287⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\Pictures\ADOBEF~1\GAIVNP~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\Pictures\ADOBEF~1\GAIVNP~1.EXEC:\Users\Admin\Pictures\ADOBEF~1\GAIVNP~1.EXE6⤵
- Executes dropped EXE
PID:3252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\ADOBEF~1\GAIVNP~1.EXE"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\ADOBEF~1\GAIVNP~1.EXE"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3904 -
C:\Windows\SysWOW64\mshta.exeC:\Windows\System32\mshta.exe vbsCrIPT:cLoSE( CrEaTeoBJeCt( WscRIpT.sHElL ). Run ( cmd /R cOpY /Y ""C:\Users\Admin\Pictures\ADOBEF~1\GAIVNP~1.EXE"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\ADOBEF~1\GAIVNP~1.EXE"" ) do taskkill -f -iM ""%~NxM"" , 0 , truE ) )8⤵PID:1776
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\Pictures\ADOBEF~1\L8LQWB~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\Pictures\ADOBEF~1\L8LQWB~1.EXEC:\Users\Admin\Pictures\ADOBEF~1\L8LQWB~1.EXE6⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\Pictures\ADOBEF~1\RDLBMB~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\Pictures\ADOBEF~1\RDLBMB~1.EXEC:\Users\Admin\Pictures\ADOBEF~1\RDLBMB~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\Pictures\ADOBEF~1\RDLBMB~1.EXE"C:\Users\Admin\Pictures\ADOBEF~1\RDLBMB~1.EXE" -u7⤵
- Executes dropped EXE
PID:3080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\Pictures\ADOBEF~1\LJ2X_Z~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\Pictures\ADOBEF~1\LJ2X_Z~1.EXEC:\Users\Admin\Pictures\ADOBEF~1\LJ2X_Z~1.EXE6⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\Pictures\ADOBEF~1\9IXH21~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\Pictures\ADOBEF~1\9IXH21~1.EXEC:\Users\Admin\Pictures\ADOBEF~1\9IXH21~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3568 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=17⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:3832 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--ZgwMku75"8⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:5080 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1e8,0x1ec,0x1f0,0x1c4,0x1f4,0x7ffa8dccdec0,0x7ffa8dccded0,0x7ffa8dccdee09⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4836 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1804,8559460093177566949,7573012518431593550,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5080_104333119" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1816 /prefetch:29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2832 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1804,8559460093177566949,7573012518431593550,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5080_104333119" --mojo-platform-channel-handle=1864 /prefetch:89⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2124 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1804,8559460093177566949,7573012518431593550,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5080_104333119" --mojo-platform-channel-handle=2120 /prefetch:89⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3288 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1804,8559460093177566949,7573012518431593550,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5080_104333119" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2560 /prefetch:19⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
PID:5152 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1804,8559460093177566949,7573012518431593550,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5080_104333119" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2668 /prefetch:19⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
PID:5196 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1804,8559460093177566949,7573012518431593550,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5080_104333119" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3580 /prefetch:29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5320 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1804,8559460093177566949,7573012518431593550,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5080_104333119" --mojo-platform-channel-handle=2132 /prefetch:89⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\Pictures\ADOBEF~1\ROI3BQ~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3572 -
C:\Users\Admin\Pictures\ADOBEF~1\ROI3BQ~1.EXEC:\Users\Admin\Pictures\ADOBEF~1\ROI3BQ~1.EXE6⤵
- Executes dropped EXE
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\is-56GSL.tmp\ROI3BQ~1.tmp"C:\Users\Admin\AppData\Local\Temp\is-56GSL.tmp\ROI3BQ~1.tmp" /SL5="$5004A,506127,422400,C:\Users\Admin\Pictures\ADOBEF~1\ROI3BQ~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\is-5CA4R.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-5CA4R.tmp\DYbALA.exe" /S /UID=27098⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1056 -
C:\Program Files\Windows Defender Advanced Threat Protection\ZYKKYAJZCC\foldershare.exe"C:\Program Files\Windows Defender Advanced Threat Protection\ZYKKYAJZCC\foldershare.exe" /VERYSILENT9⤵
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\85-51fca-a63-50699-72d1e4748e946\Xygiqaemyra.exe"C:\Users\Admin\AppData\Local\Temp\85-51fca-a63-50699-72d1e4748e946\Xygiqaemyra.exe"9⤵
- Executes dropped EXE
- Checks computer location settings
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\90-e6d75-f08-047bf-c5c2214415ee7\Gunaefoqabe.exe"C:\Users\Admin\AppData\Local\Temp\90-e6d75-f08-047bf-c5c2214415ee7\Gunaefoqabe.exe"9⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hrsnyffg.31x\GcleanerEU.exe /eufive & exit10⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\hrsnyffg.31x\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\hrsnyffg.31x\GcleanerEU.exe /eufive11⤵
- Executes dropped EXE
PID:4716 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\j0ef5jzw.vfn\installer.exe /qn CAMPAIGN="654" & exit10⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\j0ef5jzw.vfn\installer.exeC:\Users\Admin\AppData\Local\Temp\j0ef5jzw.vfn\installer.exe /qn CAMPAIGN="654"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:4892 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\j0ef5jzw.vfn\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\j0ef5jzw.vfn\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1635647747 /qn CAMPAIGN=""654"" " CAMPAIGN="654"12⤵PID:5636
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wmjlylhc.eye\any.exe & exit10⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\wmjlylhc.eye\any.exeC:\Users\Admin\AppData\Local\Temp\wmjlylhc.eye\any.exe11⤵
- Executes dropped EXE
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\wmjlylhc.eye\any.exe"C:\Users\Admin\AppData\Local\Temp\wmjlylhc.eye\any.exe" -u12⤵
- Executes dropped EXE
PID:4244 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\f1jv4vwj.ryg\gcleaner.exe /mixfive & exit10⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\f1jv4vwj.ryg\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\f1jv4vwj.ryg\gcleaner.exe /mixfive11⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\j2sx10nh.hyu\autosubplayer.exe /S & exit10⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\j2sx10nh.hyu\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\j2sx10nh.hyu\autosubplayer.exe /S11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:4312 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsoB82.tmp\tempfile.ps1"12⤵PID:5228
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:3756 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:3160
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:3848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4416
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4588
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:4268
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
PID:5016 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6406B5D783647839A298D45F17DA87DF C2⤵
- Loads dropped DLL
PID:5344
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:4984
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4944
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:5532
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5160
Network
MITRE ATT&CK Enterprise v6
Persistence
Change Default File Association
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Install Root Certificate
1Modify Registry
5Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
cc95397eb04084b2c4c14aa01c00f7a7
SHA11a71ba29e07b2038f5af1206358183e0da3438c6
SHA256ba98154d991fa48eb8a9a9a126198f4a5ae7182cb60ff5c1f38cdbce4a174420
SHA5129f12f059dee07c263cf09a3e98cff0822c08d52d3e5925ecc2beedc19f4e49d7f103e0fd7b6af64af1682f6f7eaec46b4c3342c0284d9d89ff937a287cce2fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
de64f756ab38da7a52cbcc8f9a808544
SHA1669f15b7469569d4a6b141f7f8bd55abbb4ca25c
SHA256f875ac4e55bb19f508f2b655597e40c186dd935fb96992ccce4e5811f5ff0026
SHA51258fdcbae33a958bb0ce8bc0fc3c88f6c9d979dd2f5f2998dddbf3a0d6ea86a582d0ef588c63bba24e9afe00de41a439a1498b5d404862290e01b6607f2256668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
91b7148b0ada0304565b74d36921995c
SHA1bc76ac813926bbf4db979e3a0119cba1026433d5
SHA256379a603f53fd11f860dcbdd3aac7e152b733abdc4bd3369b0d532db83ca2e68d
SHA5125c71be9badcdd3375d60962b1890070d67f457196640caba928b526636ef42ccfdc9e7e0b99888328b6bd98d95d4b0ad4541d159c59807a183fb7f068ffd0aa8
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exeMD5
9a112488064fd03d4a259e0f1db9d323
SHA1ca15a3ddc76363f69ad3c9123b920a687d94e41d
SHA256ccfd37710068b3998537ac325e29555ba9375ebf1230cf90e9dcf133e06bcdf3
SHA5120114e1cd3f9bf1eb390c00bfd4235519b5b67bac1402599ae66ed219b299a24c5576a41b38af7aca2dfc76ca23db2bd67a448f7239318fa8ddd7bd7878ededbc
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9C650B8EDDF1ADE268DE962E1ED3EC37EB3CA2E4E39F9.exeMD5
9a112488064fd03d4a259e0f1db9d323
SHA1ca15a3ddc76363f69ad3c9123b920a687d94e41d
SHA256ccfd37710068b3998537ac325e29555ba9375ebf1230cf90e9dcf133e06bcdf3
SHA5120114e1cd3f9bf1eb390c00bfd4235519b5b67bac1402599ae66ed219b299a24c5576a41b38af7aca2dfc76ca23db2bd67a448f7239318fa8ddd7bd7878ededbc
-
C:\Users\Admin\AppData\Local\Temp\is-56GSL.tmp\ROI3BQ~1.tmpMD5
89b035e6a5fd0db09a26338bb5af5ff1
SHA19a784d145a596c69578625fd1793d65592d740de
SHA256f1f90b6ffab442821650618d48117fe861d19a783a862d86941e6477a5b26173
SHA51231d2ba520080348ffa2695308dc5e01696b32598b2c525cd745eee429e302617fd8c5d566eed8b627816671898b0783670885a4a63b22c8be56cc343457fefc6
-
C:\Users\Admin\AppData\Local\Temp\is-5CA4R.tmp\DYbALA.exeMD5
8491639b7ee679dc16690f6fdd2c058a
SHA150a6b570d228be780577b5f052d85c7ef14191d1
SHA25639d7e0eefe3f1f055050950f113617fe6ddd972e65064afd90c85b15b4e7ccd6
SHA5120c2ab282b1a0c4d95574912711b5d41c8db0e1e7e08cf490affb0ca0c287c28c55679a67edf2b38250bdf49367284dbea689a2ee657d8359d86504d3760289eb
-
C:\Users\Admin\AppData\Local\Temp\is-5CA4R.tmp\DYbALA.exeMD5
8491639b7ee679dc16690f6fdd2c058a
SHA150a6b570d228be780577b5f052d85c7ef14191d1
SHA25639d7e0eefe3f1f055050950f113617fe6ddd972e65064afd90c85b15b4e7ccd6
SHA5120c2ab282b1a0c4d95574912711b5d41c8db0e1e7e08cf490affb0ca0c287c28c55679a67edf2b38250bdf49367284dbea689a2ee657d8359d86504d3760289eb
-
C:\Users\Admin\AppData\Local\Temp\sqlite.datMD5
2f4deef5cc569e4a047304ceb3fd72e3
SHA1a1afee78788a5f09e6549401f1174855d6153918
SHA256b9dd95647261f011115534b0753f4f39d546baff680ef6cd4787748a023a360a
SHA5123e3f477db3acbfbb025f83e5b0d7cea7fd02bd924dbc69e5d64fe58d2f8b4a38be4f54f6b010d7770c51f8fd1d46dbdf198cdcaa6f1f258a15e1330524156eb2
-
C:\Users\Admin\AppData\Local\Temp\sqlite.dllMD5
d2c3e38d64273ea56d503bb3fb2a8b5d
SHA1177da7d99381bbc83ede6b50357f53944240d862
SHA25625ceb44c2ba4fc9e0153a2f605a70a58b0a42dfaa795667adc11c70bb8909b52
SHA5122c21ecf8cbad2efe94c7cb55092e5b9e5e8c0392ee15ad04d1571f787761bf26f2f52f3d75a83a321952aeff362a237024779bbdc9c6fd4972c9d76c6038b117
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeMD5
9bfeaddb5a3445517fd9ee2b0dd38725
SHA1af9dd7e7236fd20c0211ecfc401e101c860a6d21
SHA2561f2328098690aa12c05cd35defab63e10c3a7c0895ece968ec0fcaa945664fe2
SHA512409703651e53c47d05d2aa266689dbfcb7b6e238d2280d09139e4c971d26efa85cf3547984286e1134f7ef260de312bc16d9e9e61c680e31de564c8950892b61
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeMD5
9bfeaddb5a3445517fd9ee2b0dd38725
SHA1af9dd7e7236fd20c0211ecfc401e101c860a6d21
SHA2561f2328098690aa12c05cd35defab63e10c3a7c0895ece968ec0fcaa945664fe2
SHA512409703651e53c47d05d2aa266689dbfcb7b6e238d2280d09139e4c971d26efa85cf3547984286e1134f7ef260de312bc16d9e9e61c680e31de564c8950892b61
-
C:\Users\Admin\DOCUME~1\AEXXQH~1.EXEMD5
7c53b803484c308fa9e64a81afba9608
SHA1f5c658a76eee69bb97b0c10425588c4c0671fcbc
SHA256a0914ae7b12a78738b47a8c48b844db99ceb902b835274500eb07101cce540f0
SHA5125ee38abde2a0e0d419806b21f7b5a2807c27a210b863999ea5e1e5f8785cd24e53d7cae4f13727eb2304e71a85f7cc544029f67eb7eff2e1ed9634105ba9cb11
-
C:\Users\Admin\DOCUME~1\AEXXQH~1.EXEMD5
7c53b803484c308fa9e64a81afba9608
SHA1f5c658a76eee69bb97b0c10425588c4c0671fcbc
SHA256a0914ae7b12a78738b47a8c48b844db99ceb902b835274500eb07101cce540f0
SHA5125ee38abde2a0e0d419806b21f7b5a2807c27a210b863999ea5e1e5f8785cd24e53d7cae4f13727eb2304e71a85f7cc544029f67eb7eff2e1ed9634105ba9cb11
-
C:\Users\Admin\Pictures\ADOBEF~1\9IXH21~1.EXEMD5
026f662acf289ac556293bb8f269cf6e
SHA193855378dbbc2051eb3e91ecef17f049e6bdcaa7
SHA2566966c58be31fef56adfc3764bc7f7dffcbcafdff769d694ae0b1eaf18e0abfdb
SHA5121facc5921a10712fd9e178dd40b923c03d13645b208d7ee6d5a359b5347b927ea78e49d8cf1139bb951c91666679fff53af56bdf58b78efba843011f01b49773
-
C:\Users\Admin\Pictures\ADOBEF~1\9IXH21~1.EXEMD5
026f662acf289ac556293bb8f269cf6e
SHA193855378dbbc2051eb3e91ecef17f049e6bdcaa7
SHA2566966c58be31fef56adfc3764bc7f7dffcbcafdff769d694ae0b1eaf18e0abfdb
SHA5121facc5921a10712fd9e178dd40b923c03d13645b208d7ee6d5a359b5347b927ea78e49d8cf1139bb951c91666679fff53af56bdf58b78efba843011f01b49773
-
C:\Users\Admin\Pictures\ADOBEF~1\BNBDP0~1.EXEMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\ADOBEF~1\BNBDP0~1.EXEMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\ADOBEF~1\GAIVNP~1.EXEMD5
13b05e37c68321a0d11fbc336bdd5e13
SHA154ff09ccf69316c0c72a23f2bb7bdb1b1fa319cf
SHA2567147f6e289cc0c676b4d679a1c013d4cb0f399594acd5bdd2774911a5bca317a
SHA5127efab007d30321846acde2e0757ca619ded0a78ea46b386739fdebdb8291d2ba99140644bf822b286418e550f6b3d7b994c0efb0c9648af607e51e3ef05125ce
-
C:\Users\Admin\Pictures\ADOBEF~1\GAIVNP~1.EXEMD5
13b05e37c68321a0d11fbc336bdd5e13
SHA154ff09ccf69316c0c72a23f2bb7bdb1b1fa319cf
SHA2567147f6e289cc0c676b4d679a1c013d4cb0f399594acd5bdd2774911a5bca317a
SHA5127efab007d30321846acde2e0757ca619ded0a78ea46b386739fdebdb8291d2ba99140644bf822b286418e550f6b3d7b994c0efb0c9648af607e51e3ef05125ce
-
C:\Users\Admin\Pictures\ADOBEF~1\L8LQWB~1.EXEMD5
2ba1dd330ef73ab2e48faed5a7e70492
SHA182fcb1851caee98444d6f81835edca7ce4f457b2
SHA25696edac817bfbdfa36ad06884077dd1de14bbd0d0999e9771aa10021f8835ccb9
SHA51216307f16357dd5b015fd722b49f94761964402279bf3cbc8ddebb2855053b60a9dcaea2dc608fc4b8f6134b2f7bf8059e4a23639f67b619a898b8f92b03e20a4
-
C:\Users\Admin\Pictures\ADOBEF~1\L8LQWB~1.EXEMD5
2ba1dd330ef73ab2e48faed5a7e70492
SHA182fcb1851caee98444d6f81835edca7ce4f457b2
SHA25696edac817bfbdfa36ad06884077dd1de14bbd0d0999e9771aa10021f8835ccb9
SHA51216307f16357dd5b015fd722b49f94761964402279bf3cbc8ddebb2855053b60a9dcaea2dc608fc4b8f6134b2f7bf8059e4a23639f67b619a898b8f92b03e20a4
-
C:\Users\Admin\Pictures\ADOBEF~1\LJ2X_Z~1.EXEMD5
6d6147dc459a34905e68396a8c554525
SHA1f9c5ae56737c3b4e0d0157f8755f06b091606984
SHA25697c0c04ae83b9599b78f61d809cfb2428984b25a79d2d986dfdbad6858101af9
SHA512e7827ecef737772f877891dd048a53e5a4ce3419c414ffb3f6fbf4676c70475130606af5ac5f5fc66e80b63fd013276d774dc8472f9ba49081baeabd97c99f24
-
C:\Users\Admin\Pictures\ADOBEF~1\LJ2X_Z~1.EXEMD5
6d6147dc459a34905e68396a8c554525
SHA1f9c5ae56737c3b4e0d0157f8755f06b091606984
SHA25697c0c04ae83b9599b78f61d809cfb2428984b25a79d2d986dfdbad6858101af9
SHA512e7827ecef737772f877891dd048a53e5a4ce3419c414ffb3f6fbf4676c70475130606af5ac5f5fc66e80b63fd013276d774dc8472f9ba49081baeabd97c99f24
-
C:\Users\Admin\Pictures\ADOBEF~1\RDLBMB~1.EXEMD5
ad0b9bd8cdaba862d346e9cd551f381f
SHA1564cd97f47396bd5d3f8977fbef02691a885a666
SHA256e852926791745a6ded438269c590cf206746c924f38a1689af277a81a6412f96
SHA5122b5955f2557901c7dcdb8d1d7ee86636bce5beed33bbd40abdcf12ca271316df463bbae30395b3a77dd130adec33fe9770e332fccd6f8b2eee9a7051b3160a1e
-
C:\Users\Admin\Pictures\ADOBEF~1\RDLBMB~1.EXEMD5
ad0b9bd8cdaba862d346e9cd551f381f
SHA1564cd97f47396bd5d3f8977fbef02691a885a666
SHA256e852926791745a6ded438269c590cf206746c924f38a1689af277a81a6412f96
SHA5122b5955f2557901c7dcdb8d1d7ee86636bce5beed33bbd40abdcf12ca271316df463bbae30395b3a77dd130adec33fe9770e332fccd6f8b2eee9a7051b3160a1e
-
C:\Users\Admin\Pictures\ADOBEF~1\RDLBMB~1.EXEMD5
ad0b9bd8cdaba862d346e9cd551f381f
SHA1564cd97f47396bd5d3f8977fbef02691a885a666
SHA256e852926791745a6ded438269c590cf206746c924f38a1689af277a81a6412f96
SHA5122b5955f2557901c7dcdb8d1d7ee86636bce5beed33bbd40abdcf12ca271316df463bbae30395b3a77dd130adec33fe9770e332fccd6f8b2eee9a7051b3160a1e
-
C:\Users\Admin\Pictures\ADOBEF~1\ROI3BQ~1.EXEMD5
3b25bb47c77da6404c1b75133ccf2b1f
SHA1ad56d15bfd135c9d2e4383032dbae1cc6c9974f7
SHA256e9a3c66d5e14cf9e6a50183cbd85e3b2ea157094f7f65c7666a0ff20cf1c73e3
SHA5127b5785bbab9788dd7dad861caf7e78cae6706e7bfe91533994e77402e6018ce8d38456bcaea1bb2663db045ef1ba9c2f24304ad314315caff5ddcc92e3096f38
-
C:\Users\Admin\Pictures\ADOBEF~1\ROI3BQ~1.EXEMD5
3b25bb47c77da6404c1b75133ccf2b1f
SHA1ad56d15bfd135c9d2e4383032dbae1cc6c9974f7
SHA256e9a3c66d5e14cf9e6a50183cbd85e3b2ea157094f7f65c7666a0ff20cf1c73e3
SHA5127b5785bbab9788dd7dad861caf7e78cae6706e7bfe91533994e77402e6018ce8d38456bcaea1bb2663db045ef1ba9c2f24304ad314315caff5ddcc92e3096f38
-
C:\Users\Admin\Pictures\ADOBEF~1\SJ6R3R~1.EXEMD5
cd2f1891e3d3c22b57aab02f52e3d7a1
SHA1a0da7ca14e2be8b8b5f91970392199649eb5089d
SHA2565aad8a1c46980c8fa2b6ac7a1a24a429e129ff23b80a9ed58d571f05950ccc14
SHA512373573cc24e0ed7853300ac8e0f14db92dcb88574ec52210d7a5520b9da4a02f6a10653598bb118b032e1e80e444fdd9f552d96138cff555a77823667302090f
-
C:\Users\Admin\Pictures\ADOBEF~1\SJ6R3R~1.EXEMD5
cd2f1891e3d3c22b57aab02f52e3d7a1
SHA1a0da7ca14e2be8b8b5f91970392199649eb5089d
SHA2565aad8a1c46980c8fa2b6ac7a1a24a429e129ff23b80a9ed58d571f05950ccc14
SHA512373573cc24e0ed7853300ac8e0f14db92dcb88574ec52210d7a5520b9da4a02f6a10653598bb118b032e1e80e444fdd9f552d96138cff555a77823667302090f
-
C:\Windows\directx.sysMD5
467e4b6adc02ad38d29e6a39095f1192
SHA1b8bb7450bd1b114a1b1f48e3f0eb313854ee79c9
SHA256112adc74bfaf4829596cfe05c7178800bddd18d1b8d55fe9aff89c2143889329
SHA5129f585400167ebb67c102efa4b9b641e022a9adc8f9d86264bbce2499077a2b6c3d0d352aaffe4268bc3281d4b234bf4461c4d456a9526d9d345b227224f3c58d
-
C:\Windows\directx.sysMD5
7a0ba654162dde2b08f1b43f8a7971f0
SHA13fcbc8a39245b63e8328bf2ff4c70e961ce86d7f
SHA2560815086ded28dfeaefd34530abe3820320876665b6b6cfdefbb483f1cef2b023
SHA512969de468b7d2989323195b853146a63bf5833f6881a0914177e26ea25dab8517f00fa98b1b1ecf80ec522dfb96d9b01165b8e8bbed40d0a4d2e3ce5e26f864d9
-
C:\Windows\directx.sysMD5
43e4512b95602efeb2de70cf4e740f14
SHA12d3d10ac14920ffeab86b0e089f5bfce3259a87f
SHA256d8020a8dd2f84bebb545f5159cfe9b5a201aaa89d0b34128b08c5bc30e2a8f4b
SHA512236a591b5819b3b7dc9f8e3975547306e22492a751e8964ea278334f68ea967b0aee7ad44b2dea6181a93b77f0318d7f484330ba546c0c2dd1e3d781472e05c1
-
C:\Windows\directx.sysMD5
43e4512b95602efeb2de70cf4e740f14
SHA12d3d10ac14920ffeab86b0e089f5bfce3259a87f
SHA256d8020a8dd2f84bebb545f5159cfe9b5a201aaa89d0b34128b08c5bc30e2a8f4b
SHA512236a591b5819b3b7dc9f8e3975547306e22492a751e8964ea278334f68ea967b0aee7ad44b2dea6181a93b77f0318d7f484330ba546c0c2dd1e3d781472e05c1
-
C:\Windows\directx.sysMD5
df9645c6001d0e791d076b6e512777f0
SHA14a3279fd328d204364c357898ab6c8cbcae123d1
SHA256b8b282d1463578cffaecb4e1ec1b6251d34c65a176159e6459be800568e46a5f
SHA5124ed82e2ed8a204ddeccae24739600f7283fe798db0ada8715a6343b758d864da3784bb73ca5a24a7ab4509827aa7bad96abf5289206526e740a0e757f9400a85
-
C:\Windows\directx.sysMD5
b7f074bd1e571d267cbe279c74b3a0aa
SHA11c146ede303a142b0ff90dfb14310b85a450e6bc
SHA25602ed2de95c5c744db34c8f76cd9c1c94dc86321df0bb344079103a1449269fd8
SHA5121ffcebeab7af6d8f64e2e6eff221e8e22e92d3bc6e909aff05abbec71df6a79e3edb464720d282d55cc62b5af1201daa786f77098bbd736693e9c0c0f8558b14
-
C:\Windows\directx.sysMD5
b7f074bd1e571d267cbe279c74b3a0aa
SHA11c146ede303a142b0ff90dfb14310b85a450e6bc
SHA25602ed2de95c5c744db34c8f76cd9c1c94dc86321df0bb344079103a1449269fd8
SHA5121ffcebeab7af6d8f64e2e6eff221e8e22e92d3bc6e909aff05abbec71df6a79e3edb464720d282d55cc62b5af1201daa786f77098bbd736693e9c0c0f8558b14
-
C:\Windows\directx.sysMD5
8c5e329b7661851bde9ef8549dab1d1c
SHA1d98aa842eb38a65ca07f5a4a96516c87e73e3ff5
SHA256f9552599bb407c7821aa86e1f92378ba7a66fc9e8cc4b4fc4dd9b755b82a1feb
SHA512e20b60fa25878c407693daf9fb42867bb5915c579cf6d419b962759af0944173e1d6cac5dadcfde8083541eaafb02ac8583f3bb1693568b6f994793fb91efaf0
-
C:\Windows\directx.sysMD5
432901d5919186402b6ed16e21a67453
SHA12306180d7802d0b754dcc42a847376bf18c5e238
SHA256d665fd23f347289f718efeb9321f7964f8a1741a3f51f5715360401708f2d599
SHA5128051d35a76206503a3abedf4cfe19de5beb202f7a4ec12ff8ec0d79092e609b646a391c430cfd7113fb58e9d3f37209776dabf0e7d661ea453bdf52146525437
-
C:\Windows\svchost.comMD5
36fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
C:\Windows\svchost.comMD5
36fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
C:\Windows\svchost.comMD5
36fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
C:\Windows\svchost.comMD5
36fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
C:\Windows\svchost.comMD5
36fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
C:\Windows\svchost.comMD5
36fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
C:\Windows\svchost.comMD5
36fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
C:\Windows\svchost.comMD5
36fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
C:\Windows\svchost.comMD5
36fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
C:\Windows\svchost.comMD5
36fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
C:\Windows\svchost.comMD5
36fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
C:\odt\OFFICE~1.EXEMD5
02c3d242fe142b0eabec69211b34bc55
SHA1ea0a4a6d6078b362f7b3a4ad1505ce49957dc16e
SHA2562a1ed24be7e3859b46ec3ebc316789ead5f12055853f86a9656e04b4bb771842
SHA5120efb08492eaaa2e923beddc21566e98fbbef3a102f9415ff310ec616f5c84fd2ba3a7025b05e01c0bdf37e5e2f64dfd845f9254a376144cc7d827e7577dbb099
-
\Users\Admin\AppData\Local\Temp\is-5CA4R.tmp\idp.dllMD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
\Users\Admin\AppData\Local\Temp\nsy97F8.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
\Users\Admin\AppData\Local\Temp\nsy97F8.tmp\System.dllMD5
fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
\Users\Admin\AppData\Local\Temp\nsz413D.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
\Users\Admin\AppData\Local\Temp\nsz413D.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
\Users\Admin\AppData\Local\Temp\nsz413D.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
\Users\Admin\AppData\Local\Temp\nsz413D.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
\Users\Admin\AppData\Local\Temp\nsz413D.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
\Users\Admin\AppData\Local\Temp\nsz413D.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
\Users\Admin\AppData\Local\Temp\nsz413D.tmp\System.dllMD5
fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
\Users\Admin\AppData\Local\Temp\sqlite.dllMD5
d2c3e38d64273ea56d503bb3fb2a8b5d
SHA1177da7d99381bbc83ede6b50357f53944240d862
SHA25625ceb44c2ba4fc9e0153a2f605a70a58b0a42dfaa795667adc11c70bb8909b52
SHA5122c21ecf8cbad2efe94c7cb55092e5b9e5e8c0392ee15ad04d1571f787761bf26f2f52f3d75a83a321952aeff362a237024779bbdc9c6fd4972c9d76c6038b117
-
memory/360-336-0x0000023D47CE0000-0x0000023D47CE2000-memory.dmpFilesize
8KB
-
memory/360-233-0x0000023D48600000-0x0000023D48672000-memory.dmpFilesize
456KB
-
memory/360-352-0x0000023D48B40000-0x0000023D48BB2000-memory.dmpFilesize
456KB
-
memory/360-223-0x0000023D47CE0000-0x0000023D47CE2000-memory.dmpFilesize
8KB
-
memory/360-221-0x0000023D47CE0000-0x0000023D47CE2000-memory.dmpFilesize
8KB
-
memory/652-174-0x0000000000000000-mapping.dmp
-
memory/872-128-0x0000000005D30000-0x0000000005E7A000-memory.dmpFilesize
1.3MB
-
memory/872-122-0x0000000000000000-mapping.dmp
-
memory/1056-260-0x00000000022A0000-0x00000000022A2000-memory.dmpFilesize
8KB
-
memory/1056-211-0x0000000000000000-mapping.dmp
-
memory/1072-238-0x000001630AE90000-0x000001630AE92000-memory.dmpFilesize
8KB
-
memory/1072-240-0x000001630B400000-0x000001630B472000-memory.dmpFilesize
456KB
-
memory/1072-356-0x000001630B4F0000-0x000001630B562000-memory.dmpFilesize
456KB
-
memory/1072-237-0x000001630AE90000-0x000001630AE92000-memory.dmpFilesize
8KB
-
memory/1124-236-0x000002B91E180000-0x000002B91E182000-memory.dmpFilesize
8KB
-
memory/1124-239-0x000002B91EA30000-0x000002B91EAA2000-memory.dmpFilesize
456KB
-
memory/1124-235-0x000002B91E180000-0x000002B91E182000-memory.dmpFilesize
8KB
-
memory/1124-355-0x000002B91F170000-0x000002B91F1E2000-memory.dmpFilesize
456KB
-
memory/1184-359-0x000001B596E40000-0x000001B596EB2000-memory.dmpFilesize
456KB
-
memory/1184-245-0x000001B596100000-0x000001B596102000-memory.dmpFilesize
8KB
-
memory/1184-246-0x000001B596100000-0x000001B596102000-memory.dmpFilesize
8KB
-
memory/1184-255-0x000001B5968A0000-0x000001B596912000-memory.dmpFilesize
456KB
-
memory/1220-134-0x0000000000000000-mapping.dmp
-
memory/1260-231-0x0000020531E70000-0x0000020531EE2000-memory.dmpFilesize
456KB
-
memory/1260-219-0x00007FF66DB74060-mapping.dmp
-
memory/1260-222-0x0000020533690000-0x0000020533692000-memory.dmpFilesize
8KB
-
memory/1260-263-0x00000205336C0000-0x00000205336DB000-memory.dmpFilesize
108KB
-
memory/1260-264-0x0000020534700000-0x0000020534806000-memory.dmpFilesize
1.0MB
-
memory/1260-262-0x0000020533690000-0x0000020533692000-memory.dmpFilesize
8KB
-
memory/1260-220-0x0000020533690000-0x0000020533692000-memory.dmpFilesize
8KB
-
memory/1260-261-0x0000020533690000-0x0000020533692000-memory.dmpFilesize
8KB
-
memory/1356-248-0x000001C48D370000-0x000001C48D372000-memory.dmpFilesize
8KB
-
memory/1356-256-0x000001C48D910000-0x000001C48D982000-memory.dmpFilesize
456KB
-
memory/1356-247-0x000001C48D370000-0x000001C48D372000-memory.dmpFilesize
8KB
-
memory/1356-360-0x000001C48DE40000-0x000001C48DEB2000-memory.dmpFilesize
456KB
-
memory/1388-357-0x000001C590350000-0x000001C5903C2000-memory.dmpFilesize
456KB
-
memory/1388-253-0x000001C5902D0000-0x000001C590342000-memory.dmpFilesize
456KB
-
memory/1388-241-0x000001C58FC60000-0x000001C58FC62000-memory.dmpFilesize
8KB
-
memory/1388-242-0x000001C58FC60000-0x000001C58FC62000-memory.dmpFilesize
8KB
-
memory/1472-277-0x0000000002440000-0x0000000002442000-memory.dmpFilesize
8KB
-
memory/1472-276-0x0000000000000000-mapping.dmp
-
memory/1472-279-0x0000000002442000-0x0000000002444000-memory.dmpFilesize
8KB
-
memory/1472-280-0x0000000002444000-0x0000000002445000-memory.dmpFilesize
4KB
-
memory/1472-282-0x0000000002445000-0x0000000002446000-memory.dmpFilesize
4KB
-
memory/1560-171-0x00000000005A0000-0x00000000005E4000-memory.dmpFilesize
272KB
-
memory/1560-140-0x0000000000000000-mapping.dmp
-
memory/1560-172-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1560-170-0x0000000000450000-0x000000000059A000-memory.dmpFilesize
1.3MB
-
memory/1576-193-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/1576-185-0x0000000000000000-mapping.dmp
-
memory/1600-162-0x0000000000000000-mapping.dmp
-
memory/1704-142-0x0000000000000000-mapping.dmp
-
memory/1776-195-0x0000000000000000-mapping.dmp
-
memory/1804-145-0x0000000000000000-mapping.dmp
-
memory/1908-130-0x0000000000000000-mapping.dmp
-
memory/1952-254-0x000002BFFE560000-0x000002BFFE5D2000-memory.dmpFilesize
456KB
-
memory/1952-358-0x000002BFFE670000-0x000002BFFE6E2000-memory.dmpFilesize
456KB
-
memory/1952-243-0x000002BFFDEC0000-0x000002BFFDEC2000-memory.dmpFilesize
8KB
-
memory/1952-244-0x000002BFFDEC0000-0x000002BFFDEC2000-memory.dmpFilesize
8KB
-
memory/1972-196-0x0000000000000000-mapping.dmp
-
memory/1972-205-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/2124-312-0x00000254A96A0000-0x00000254A96A2000-memory.dmpFilesize
8KB
-
memory/2124-314-0x00000254A96A0000-0x00000254A96A2000-memory.dmpFilesize
8KB
-
memory/2124-309-0x0000000000000000-mapping.dmp
-
memory/2296-173-0x0000000000000000-mapping.dmp
-
memory/2304-154-0x0000000000000000-mapping.dmp
-
memory/2388-155-0x0000000000000000-mapping.dmp
-
memory/2392-118-0x0000000000000000-mapping.dmp
-
memory/2464-166-0x0000000000000000-mapping.dmp
-
memory/2484-136-0x0000000000000000-mapping.dmp
-
memory/2516-353-0x0000010248080000-0x00000102480F2000-memory.dmpFilesize
456KB
-
memory/2516-225-0x0000010247660000-0x0000010247662000-memory.dmpFilesize
8KB
-
memory/2516-224-0x0000010247660000-0x0000010247662000-memory.dmpFilesize
8KB
-
memory/2516-337-0x0000010247660000-0x0000010247662000-memory.dmpFilesize
8KB
-
memory/2516-234-0x0000010248000000-0x0000010248072000-memory.dmpFilesize
456KB
-
memory/2528-338-0x000001C07EAD0000-0x000001C07EAD2000-memory.dmpFilesize
8KB
-
memory/2528-354-0x000001C07F390000-0x000001C07F402000-memory.dmpFilesize
456KB
-
memory/2528-228-0x000001C07EAD0000-0x000001C07EAD2000-memory.dmpFilesize
8KB
-
memory/2528-230-0x000001C07EAD0000-0x000001C07EAD2000-memory.dmpFilesize
8KB
-
memory/2528-232-0x000001C07F2A0000-0x000001C07F312000-memory.dmpFilesize
456KB
-
memory/2696-218-0x0000012639640000-0x0000012639642000-memory.dmpFilesize
8KB
-
memory/2696-229-0x000001263A100000-0x000001263A172000-memory.dmpFilesize
456KB
-
memory/2696-351-0x000001263A530000-0x000001263A5A2000-memory.dmpFilesize
456KB
-
memory/2696-335-0x0000012639640000-0x0000012639642000-memory.dmpFilesize
8KB
-
memory/2696-217-0x0000012639640000-0x0000012639642000-memory.dmpFilesize
8KB
-
memory/2792-362-0x00000298CA3B0000-0x00000298CA422000-memory.dmpFilesize
456KB
-
memory/2792-258-0x00000298C9E60000-0x00000298C9ED2000-memory.dmpFilesize
456KB
-
memory/2792-251-0x00000298C9610000-0x00000298C9612000-memory.dmpFilesize
8KB
-
memory/2792-252-0x00000298C9610000-0x00000298C9612000-memory.dmpFilesize
8KB
-
memory/2808-361-0x000001A332B60000-0x000001A332BD2000-memory.dmpFilesize
456KB
-
memory/2808-257-0x000001A332450000-0x000001A3324C2000-memory.dmpFilesize
456KB
-
memory/2808-249-0x000001A3320C0000-0x000001A3320C2000-memory.dmpFilesize
8KB
-
memory/2808-250-0x000001A3320C0000-0x000001A3320C2000-memory.dmpFilesize
8KB
-
memory/2832-313-0x000001C29B9F0000-0x000001C29B9F2000-memory.dmpFilesize
8KB
-
memory/2832-310-0x000001C29B9F0000-0x000001C29B9F2000-memory.dmpFilesize
8KB
-
memory/2832-307-0x0000000000000000-mapping.dmp
-
memory/2832-332-0x000001C29B9F0000-0x000001C29B9F2000-memory.dmpFilesize
8KB
-
memory/2832-333-0x000001C29B9F0000-0x000001C29B9F2000-memory.dmpFilesize
8KB
-
memory/2920-160-0x0000000000000000-mapping.dmp
-
memory/3044-273-0x0000000001150000-0x0000000001152000-memory.dmpFilesize
8KB
-
memory/3044-271-0x0000000000000000-mapping.dmp
-
memory/3080-168-0x0000000000000000-mapping.dmp
-
memory/3148-115-0x0000000000000000-mapping.dmp
-
memory/3160-125-0x0000000000000000-mapping.dmp
-
memory/3252-150-0x0000000000000000-mapping.dmp
-
memory/3252-153-0x0000000002550000-0x0000000002551000-memory.dmpFilesize
4KB
-
memory/3252-152-0x0000000002550000-0x0000000002551000-memory.dmpFilesize
4KB
-
memory/3256-207-0x0000000000000000-mapping.dmp
-
memory/3256-214-0x0000000004D90000-0x0000000004DED000-memory.dmpFilesize
372KB
-
memory/3256-210-0x0000000004EC1000-0x0000000004FC2000-memory.dmpFilesize
1.0MB
-
memory/3288-315-0x00000247ED2B0000-0x00000247ED2B2000-memory.dmpFilesize
8KB
-
memory/3288-316-0x00000247ED2B0000-0x00000247ED2B2000-memory.dmpFilesize
8KB
-
memory/3288-311-0x0000000000000000-mapping.dmp
-
memory/3436-270-0x0000000000000000-mapping.dmp
-
memory/3436-272-0x0000000002310000-0x0000000002312000-memory.dmpFilesize
8KB
-
memory/3436-274-0x0000000002312000-0x0000000002314000-memory.dmpFilesize
8KB
-
memory/3436-275-0x0000000002314000-0x0000000002315000-memory.dmpFilesize
4KB
-
memory/3436-278-0x0000000002315000-0x0000000002316000-memory.dmpFilesize
4KB
-
memory/3480-216-0x000002A758AA0000-0x000002A758AA2000-memory.dmpFilesize
8KB
-
memory/3480-350-0x000002A759070000-0x000002A7590E2000-memory.dmpFilesize
456KB
-
memory/3480-349-0x000002A758DD0000-0x000002A758E1D000-memory.dmpFilesize
308KB
-
memory/3480-226-0x000002A758AC0000-0x000002A758B0D000-memory.dmpFilesize
308KB
-
memory/3480-215-0x000002A758AA0000-0x000002A758AA2000-memory.dmpFilesize
8KB
-
memory/3480-334-0x000002A758AA0000-0x000002A758AA2000-memory.dmpFilesize
8KB
-
memory/3480-227-0x000002A758E40000-0x000002A758EB2000-memory.dmpFilesize
456KB
-
memory/3568-179-0x0000000000000000-mapping.dmp
-
memory/3572-181-0x0000000000000000-mapping.dmp
-
memory/3756-124-0x0000000000000000-mapping.dmp
-
memory/3796-281-0x0000000000000000-mapping.dmp
-
memory/3832-265-0x0000000000000000-mapping.dmp
-
memory/3904-190-0x0000000000000000-mapping.dmp
-
memory/4060-177-0x0000000000000000-mapping.dmp
-
memory/4244-295-0x0000000000000000-mapping.dmp
-
memory/4312-296-0x0000000000000000-mapping.dmp
-
memory/4440-283-0x0000000000000000-mapping.dmp
-
memory/4632-284-0x0000000000000000-mapping.dmp
-
memory/4716-299-0x0000000000400000-0x000000000058E000-memory.dmpFilesize
1.6MB
-
memory/4716-297-0x00000000008A1000-0x00000000008CC000-memory.dmpFilesize
172KB
-
memory/4716-298-0x0000000000590000-0x00000000006DA000-memory.dmpFilesize
1.3MB
-
memory/4716-285-0x0000000000000000-mapping.dmp
-
memory/4748-286-0x0000000000000000-mapping.dmp
-
memory/4836-305-0x0000018E44C60000-0x0000018E44C62000-memory.dmpFilesize
8KB
-
memory/4836-304-0x0000018E44C60000-0x0000018E44C62000-memory.dmpFilesize
8KB
-
memory/4836-303-0x0000000000000000-mapping.dmp
-
memory/4892-287-0x0000000000000000-mapping.dmp
-
memory/4908-288-0x0000000000000000-mapping.dmp
-
memory/5000-289-0x0000000000000000-mapping.dmp
-
memory/5016-301-0x000001ECCF630000-0x000001ECCF632000-memory.dmpFilesize
8KB
-
memory/5016-300-0x000001ECCF630000-0x000001ECCF632000-memory.dmpFilesize
8KB
-
memory/5068-290-0x0000000000000000-mapping.dmp
-
memory/5080-294-0x000001A3E25B0000-0x000001A3E25B2000-memory.dmpFilesize
8KB
-
memory/5080-293-0x000001A3E25B0000-0x000001A3E25B2000-memory.dmpFilesize
8KB
-
memory/5080-291-0x0000000000000000-mapping.dmp
-
memory/5092-292-0x0000000000000000-mapping.dmp
-
memory/5092-306-0x0000000000590000-0x000000000063E000-memory.dmpFilesize
696KB
-
memory/5092-308-0x0000000000400000-0x000000000058E000-memory.dmpFilesize
1.6MB
-
memory/5152-321-0x0000022C0F2A0000-0x0000022C0F2A2000-memory.dmpFilesize
8KB
-
memory/5152-319-0x0000022C0F2A0000-0x0000022C0F2A2000-memory.dmpFilesize
8KB
-
memory/5152-318-0x0000022C0F2A0000-0x0000022C0F2A2000-memory.dmpFilesize
8KB
-
memory/5152-317-0x0000000000000000-mapping.dmp
-
memory/5152-323-0x0000022C0F2A0000-0x0000022C0F2A2000-memory.dmpFilesize
8KB
-
memory/5196-327-0x000001B527FA0000-0x000001B527FA2000-memory.dmpFilesize
8KB
-
memory/5196-320-0x0000000000000000-mapping.dmp
-
memory/5196-322-0x000001B527FA0000-0x000001B527FA2000-memory.dmpFilesize
8KB
-
memory/5196-324-0x000001B527FA0000-0x000001B527FA2000-memory.dmpFilesize
8KB
-
memory/5196-329-0x000001B527FA0000-0x000001B527FA2000-memory.dmpFilesize
8KB
-
memory/5228-325-0x0000000000000000-mapping.dmp
-
memory/5228-376-0x0000000006D30000-0x0000000006D31000-memory.dmpFilesize
4KB
-
memory/5320-363-0x0000000000000000-mapping.dmp
-
memory/5344-326-0x0000000000000000-mapping.dmp
-
memory/5344-330-0x0000000000380000-0x0000000000381000-memory.dmpFilesize
4KB
-
memory/5344-328-0x0000000000380000-0x0000000000381000-memory.dmpFilesize
4KB
-
memory/5532-331-0x0000000000000000-mapping.dmp
-
memory/5532-348-0x0000000004A20000-0x0000000004A7D000-memory.dmpFilesize
372KB
-
memory/5532-347-0x0000000004912000-0x0000000004A13000-memory.dmpFilesize
1.0MB
-
memory/5636-373-0x0000000000000000-mapping.dmp
-
memory/5864-370-0x0000000000000000-mapping.dmp