Analysis
-
max time kernel
1800s -
max time network
1800s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
22-01-2022 10:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://crackdj.com
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
https://crackdj.com
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
https://crackdj.com
Resource
win10v2004-en-20220113
Behavioral task
behavioral4
Sample
https://crackdj.com
Resource
win11
General
-
Target
https://crackdj.com
Malware Config
Extracted
socelars
http://www.nvdmzf.com/
Extracted
redline
build999999
109.107.188.167:37171
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4152 2972 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4556 2972 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 11 IoCs
Processes:
resource yara_rule behavioral2/memory/2076-330-0x00000000024A0000-0x00000000024D4000-memory.dmp family_redline behavioral2/memory/2076-333-0x0000000002660000-0x0000000002692000-memory.dmp family_redline behavioral2/memory/4952-380-0x0000000001340000-0x000000000141F000-memory.dmp family_redline behavioral2/memory/4952-373-0x0000000001340000-0x000000000141F000-memory.dmp family_redline behavioral2/memory/5048-391-0x00000000009A0000-0x0000000000A7B000-memory.dmp family_redline behavioral2/memory/5048-384-0x00000000009A0000-0x0000000000A7B000-memory.dmp family_redline behavioral2/memory/5048-381-0x00000000009A0000-0x0000000000A7B000-memory.dmp family_redline behavioral2/memory/6064-807-0x0000000000850000-0x0000000000996000-memory.dmp family_redline behavioral2/memory/5700-977-0x0000000000E90000-0x0000000000F6F000-memory.dmp family_redline behavioral2/memory/5700-980-0x0000000000E90000-0x0000000000F6F000-memory.dmp family_redline behavioral2/memory/4648-1009-0x0000000000B20000-0x0000000000BFA000-memory.dmp family_redline -
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc855aa10f_Sat094506bfb4f2.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc855aa10f_Sat094506bfb4f2.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 1576 created 4292 1576 WerFault.exe 4623381116.exe PID 4924 created 5168 4924 Conhost.exe PID 4816 created 5236 4816 WerFault.exe GcleanerEU.exe -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
OnlyLogger Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/5580-1325-0x0000000000940000-0x0000000000991000-memory.dmp family_onlylogger behavioral2/memory/5580-1327-0x0000000000400000-0x0000000000467000-memory.dmp family_onlylogger behavioral2/memory/5168-1451-0x0000000000400000-0x0000000000467000-memory.dmp family_onlylogger behavioral2/memory/5236-1456-0x0000000000400000-0x0000000000467000-memory.dmp family_onlylogger -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\7zSCF6E802A\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zSCF6E802A\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\libstdc++-6.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zSCF6E802A\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\libcurlpp.dll aspack_v212_v242 -
Blocklisted process makes network request 61 IoCs
Processes:
cmd.exerundll32.exerundll32.exeMsiExec.exeflow pid process 576 852 cmd.exe 579 4188 rundll32.exe 580 852 cmd.exe 581 852 cmd.exe 689 5580 rundll32.exe 690 5580 rundll32.exe 693 5580 rundll32.exe 693 5580 rundll32.exe 698 5580 rundll32.exe 698 5580 rundll32.exe 693 5580 rundll32.exe 709 5580 rundll32.exe 716 5580 rundll32.exe 735 5240 MsiExec.exe 736 5240 MsiExec.exe 738 5240 MsiExec.exe 742 5240 MsiExec.exe 744 5240 MsiExec.exe 745 5240 MsiExec.exe 746 5240 MsiExec.exe 747 5240 MsiExec.exe 748 5240 MsiExec.exe 749 5240 MsiExec.exe 750 5240 MsiExec.exe 751 5240 MsiExec.exe 752 5240 MsiExec.exe 753 5240 MsiExec.exe 755 5240 MsiExec.exe 757 5240 MsiExec.exe 758 5240 MsiExec.exe 759 5240 MsiExec.exe 760 5240 MsiExec.exe 761 5240 MsiExec.exe 762 5240 MsiExec.exe 763 5240 MsiExec.exe 764 5240 MsiExec.exe 765 5240 MsiExec.exe 767 5240 MsiExec.exe 768 5240 MsiExec.exe 769 5240 MsiExec.exe 770 5240 MsiExec.exe 771 5240 MsiExec.exe 772 5240 MsiExec.exe 773 5240 MsiExec.exe 774 5240 MsiExec.exe 775 5240 MsiExec.exe 776 5240 MsiExec.exe 777 5240 MsiExec.exe 778 5240 MsiExec.exe 779 5240 MsiExec.exe 780 5240 MsiExec.exe 781 5240 MsiExec.exe 782 5240 MsiExec.exe 783 5240 MsiExec.exe 786 5240 MsiExec.exe 787 5240 MsiExec.exe 788 5240 MsiExec.exe 789 5240 MsiExec.exe 791 5240 MsiExec.exe 792 5240 MsiExec.exe 793 5240 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 4 IoCs
Processes:
MSekni.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts MSekni.exe File opened for modification C:\Windows\System32\drivers\SET8089.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET8089.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe -
Executes dropped EXE 64 IoCs
Processes:
Open__Setup__3456.exeFile1.exeIntelRapid.exewin-setup-i864.exesetup_installer.exesetup_install.exe61ebc8649d86d_Sat09a4fee9807b.exe61ebc8658050b_Sat095c6f3836.exe61ebc8632c578_Sat096243e85.exe61ebc8579d193_Sat09ea8e57f896.exe61ebc85c3f8d6_Sat097601daa5.exe61ebc855aa10f_Sat094506bfb4f2.exe61ebc85aa0efa_Sat096553627f2f.exe61ebc863e3c48_Sat0908028a923.exe61ebc85f9ca8c_Sat095df864fc.exe61ebc856df6a5_Sat0903df92dc30.exe61ebc85f3ab66_Sat09e5e8eeca4.exe61ebc85d85b45_Sat0933dfd61ab.exe61ebc859e57b1_Sat09653c9bd.exe61ebc861109d8_Sat090153b775.exe61ebc8658050b_Sat095c6f3836.tmp61ebc8649d86d_Sat09a4fee9807b.exeMSekni.exeLzmwAqmV.exe25FF.tmp.exe28A0.tmp.exe4623381116.exe7508307521.exead760080-e664-4c93-8450-bbc36ff9ac73.exe78b0bb75-5a75-4a52-99af-0af0f2b4d10a.exe6e7fcf82-04bb-481b-b5d1-06d46e693ee2.exe9b3d2795-33ba-48e1-8fbb-0250781a2197.exe2cdbe193-fcaf-40e4-9a68-950838b9e219.exe8654895.exeMefuhaesazhe.exeCaezhusaeriki.exepoweroff.exepoweroff.tmpPower Off.exefq.exeConhost.exeConhost.exeGcleanerEU.exeMaskVPNUpdate.exeOriginal.exeinstaller.exe161.exe161.tmprandom.exeSetup.exeBumperWW.exerundll32.exeaskinstall42.exerandom.exeOriginal.exeDrvInst.exe75af9695-d4c9-400b-bf1b-a7124ad29336.exe10d41032-bf70-4ad8-83f4-ae7a25822c34.exec62c6b37-cd7a-4ca1-8713-b015b7bfc73a.exe61ddaf8f-4df8-4881-9377-61fd20e4774f.exetapinstall.exe8136630.exerundll32.exemask_svc.exepid process 3884 Open__Setup__3456.exe 2380 File1.exe 1828 IntelRapid.exe 3748 win-setup-i864.exe 1788 setup_installer.exe 1244 setup_install.exe 3632 61ebc8649d86d_Sat09a4fee9807b.exe 3132 61ebc8658050b_Sat095c6f3836.exe 3800 61ebc8632c578_Sat096243e85.exe 1124 61ebc8579d193_Sat09ea8e57f896.exe 3748 61ebc85c3f8d6_Sat097601daa5.exe 3952 61ebc855aa10f_Sat094506bfb4f2.exe 2836 61ebc85aa0efa_Sat096553627f2f.exe 852 61ebc863e3c48_Sat0908028a923.exe 972 61ebc85f9ca8c_Sat095df864fc.exe 3844 61ebc856df6a5_Sat0903df92dc30.exe 2416 61ebc85f3ab66_Sat09e5e8eeca4.exe 2080 61ebc85d85b45_Sat0933dfd61ab.exe 1052 61ebc859e57b1_Sat09653c9bd.exe 680 61ebc861109d8_Sat090153b775.exe 2252 61ebc8658050b_Sat095c6f3836.tmp 3008 61ebc8649d86d_Sat09a4fee9807b.exe 1104 MSekni.exe 2076 LzmwAqmV.exe 2420 25FF.tmp.exe 2176 28A0.tmp.exe 4292 4623381116.exe 4700 7508307521.exe 4952 ad760080-e664-4c93-8450-bbc36ff9ac73.exe 5048 78b0bb75-5a75-4a52-99af-0af0f2b4d10a.exe 2712 6e7fcf82-04bb-481b-b5d1-06d46e693ee2.exe 3956 9b3d2795-33ba-48e1-8fbb-0250781a2197.exe 1584 2cdbe193-fcaf-40e4-9a68-950838b9e219.exe 964 8654895.exe 4232 Mefuhaesazhe.exe 1700 Caezhusaeriki.exe 4788 poweroff.exe 4344 poweroff.tmp 4364 Power Off.exe 4940 fq.exe 5168 Conhost.exe 5180 Conhost.exe 5236 GcleanerEU.exe 5264 MaskVPNUpdate.exe 5388 Original.exe 5668 installer.exe 5688 161.exe 5924 161.tmp 5960 random.exe 6064 Setup.exe 6112 BumperWW.exe 5580 rundll32.exe 5876 askinstall42.exe 2008 random.exe 4800 Original.exe 4808 DrvInst.exe 5700 75af9695-d4c9-400b-bf1b-a7124ad29336.exe 4648 10d41032-bf70-4ad8-83f4-ae7a25822c34.exe 5316 c62c6b37-cd7a-4ca1-8713-b015b7bfc73a.exe 1048 61ddaf8f-4df8-4881-9377-61fd20e4774f.exe 5496 tapinstall.exe 5608 8136630.exe 5452 rundll32.exe 5996 mask_svc.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
File1.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion File1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion File1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IntelRapid.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Mefuhaesazhe.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Control Panel\International\Geo\Nation Mefuhaesazhe.exe -
Drops startup file 3 IoCs
Processes:
28A0.tmp.exeFile1.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oXaJMQtLP8H2iTxS.exe 28A0.tmp.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oXaJMQtLP8H2iTxS.exe 28A0.tmp.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk File1.exe -
Loads dropped DLL 64 IoCs
Processes:
setup_install.exe61ebc8658050b_Sat095c6f3836.tmpmsiexec.exerundll32.exeregsvr32.exefq.exeMaskVPNUpdate.exeinstaller.exe161.tmpMsiExec.exeregsvr32.exerundll32.exeMsiExec.exemask_svc.exepid process 1244 setup_install.exe 1244 setup_install.exe 1244 setup_install.exe 1244 setup_install.exe 1244 setup_install.exe 2252 61ebc8658050b_Sat095c6f3836.tmp 2052 msiexec.exe 2052 msiexec.exe 4188 rundll32.exe 1496 regsvr32.exe 1496 regsvr32.exe 4940 fq.exe 4940 fq.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5668 installer.exe 5668 installer.exe 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5668 installer.exe 4980 MsiExec.exe 4980 MsiExec.exe 4156 regsvr32.exe 4156 regsvr32.exe 5580 rundll32.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5240 MsiExec.exe 5240 MsiExec.exe 5240 MsiExec.exe 5240 MsiExec.exe 5240 MsiExec.exe 5240 MsiExec.exe 5240 MsiExec.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 5264 MaskVPNUpdate.exe 6096 mask_svc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\File1.exe themida C:\Users\Admin\AppData\Local\Temp\File1.exe themida behavioral2/memory/2380-122-0x00007FF620940000-0x00007FF6212BB000-memory.dmp themida behavioral2/memory/2380-123-0x00007FF620940000-0x00007FF6212BB000-memory.dmp themida behavioral2/memory/2380-124-0x00007FF620940000-0x00007FF6212BB000-memory.dmp themida C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida behavioral2/memory/1828-127-0x00007FF728110000-0x00007FF728A8B000-memory.dmp themida behavioral2/memory/1828-128-0x00007FF728110000-0x00007FF728A8B000-memory.dmp themida behavioral2/memory/1828-129-0x00007FF728110000-0x00007FF728A8B000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
6e7fcf82-04bb-481b-b5d1-06d46e693ee2.exeMSekni.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" 6e7fcf82-04bb-481b-b5d1-06d46e693ee2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Common Files\\Ciqaeluzhuli.exe\"" MSekni.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
File1.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA File1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IntelRapid.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exeinstaller.exedescription ioc process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\L: installer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 608 ip-api.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory 31 IoCs
Processes:
svchost.exeDrvInst.exesvchost.exeDrvInst.exerundll32.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2F7C264DB4F4D13E98BD0F42F39340C0 svchost.exe File created C:\Windows\System32\DriverStore\Temp\{f68888b5-45a2-8543-a374-1b3b41f133d4}\SET7AED.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f68888b5-45a2-8543-a374-1b3b41f133d4}\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #2 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #4 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61 svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f68888b5-45a2-8543-a374-1b3b41f133d4}\SET7AEB.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{f68888b5-45a2-8543-a374-1b3b41f133d4}\SET7AEB.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f68888b5-45a2-8543-a374-1b3b41f133d4}\SET7AEC.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\Tasks\AdvancedUpdater svchost.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF DrvInst.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #5 svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f68888b5-45a2-8543-a374-1b3b41f133d4}\SET7AED.tmp DrvInst.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #6 svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f68888b5-45a2-8543-a374-1b3b41f133d4}\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f68888b5-45a2-8543-a374-1b3b41f133d4} DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF rundll32.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #1 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61 svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f68888b5-45a2-8543-a374-1b3b41f133d4}\oemvista.inf DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{f68888b5-45a2-8543-a374-1b3b41f133d4}\SET7AEC.tmp DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2F7C264DB4F4D13E98BD0F42F39340C0 svchost.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #3 svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
Processes:
File1.exeIntelRapid.exe61ebc863e3c48_Sat0908028a923.exead760080-e664-4c93-8450-bbc36ff9ac73.exe78b0bb75-5a75-4a52-99af-0af0f2b4d10a.exe6e7fcf82-04bb-481b-b5d1-06d46e693ee2.exe9b3d2795-33ba-48e1-8fbb-0250781a2197.exe2cdbe193-fcaf-40e4-9a68-950838b9e219.exeSetup.exeOriginal.exe75af9695-d4c9-400b-bf1b-a7124ad29336.exec62c6b37-cd7a-4ca1-8713-b015b7bfc73a.exe61ddaf8f-4df8-4881-9377-61fd20e4774f.exe10d41032-bf70-4ad8-83f4-ae7a25822c34.exemask_svc.exemask_svc.exemask_svc.exepid process 2380 File1.exe 1828 IntelRapid.exe 852 61ebc863e3c48_Sat0908028a923.exe 4952 ad760080-e664-4c93-8450-bbc36ff9ac73.exe 5048 78b0bb75-5a75-4a52-99af-0af0f2b4d10a.exe 2712 6e7fcf82-04bb-481b-b5d1-06d46e693ee2.exe 3956 9b3d2795-33ba-48e1-8fbb-0250781a2197.exe 1584 2cdbe193-fcaf-40e4-9a68-950838b9e219.exe 6064 Setup.exe 4800 Original.exe 5700 75af9695-d4c9-400b-bf1b-a7124ad29336.exe 5316 c62c6b37-cd7a-4ca1-8713-b015b7bfc73a.exe 1048 61ddaf8f-4df8-4881-9377-61fd20e4774f.exe 4648 10d41032-bf70-4ad8-83f4-ae7a25822c34.exe 5996 mask_svc.exe 664 mask_svc.exe 6096 mask_svc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
svchost.exeOriginal.exedescription pid process target process PID 2688 set thread context of 4604 2688 svchost.exe svchost.exe PID 5388 set thread context of 4800 5388 Original.exe Original.exe -
Drops file in Program Files directory 64 IoCs
Processes:
161.tmpmsiexec.exepoweroff.tmpMaskVPNUpdate.exeMSekni.exedescription ioc process File created C:\Program Files (x86)\MaskVPN\is-KPQSR.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\is-6FBLT.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\is-8T18K.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-JU4PI.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\unins000.msg 161.tmp File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.ini msiexec.exe File opened for modification C:\Program Files (x86)\powerOff\Power Off.exe poweroff.tmp File created C:\Program Files (x86)\powerOff\is-EK896.tmp poweroff.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp64\devcon.exe 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-8SCP6.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-PJUNA.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-4FGI4.tmp 161.tmp File created C:\Program Files (x86)\Footer Quotes\uninstall.tar MaskVPNUpdate.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\EULA.url msiexec.exe File created C:\Program Files (x86)\MaskVPN\is-VG18P.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\is-PMQUU.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\is-KDLPS.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-4CD2D.tmp 161.tmp File opened for modification C:\Program Files (x86)\MaskVPN\polstore.dll 161.tmp File created C:\Program Files (x86)\AW Manager\Windows Manager\Uninstall.lnk msiexec.exe File opened for modification C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe 161.tmp File created C:\Program Files (x86)\MaskVPN\is-KP597.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\is-U7FAG.tmp 161.tmp File created C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe msiexec.exe File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp32\devcon.exe 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-PR1NH.tmp 161.tmp File opened for modification C:\Program Files (x86)\MaskVPN\unins000.dat 161.tmp File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPN.exe 161.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.dll 161.tmp File created C:\Program Files (x86)\MaskVPN\unins000.dat 161.tmp File created C:\Program Files (x86)\MaskVPN\is-VBAT8.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-11DON.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-QP4QN.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-MQL9I.tmp 161.tmp File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Privacy.url msiexec.exe File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.exe 161.tmp File created C:\Program Files (x86)\MaskVPN\is-UDHQK.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\is-DGUVQ.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-9TSOO.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-0RDM0.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-MLR2V.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-H4AAE.tmp 161.tmp File created C:\Program Files\Windows Security\ZLXYNZURWQ\poweroff.exe MSekni.exe File created C:\Program Files (x86)\powerOff\unins000.dat poweroff.tmp File opened for modification C:\Program Files (x86)\MaskVPN\ssleay32.dll 161.tmp File created C:\Program Files (x86)\MaskVPN\is-MN89A.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-CKFRM.tmp 161.tmp File created C:\Program Files (x86)\Footer Quotes\infile_x64.cab MaskVPNUpdate.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.exe msiexec.exe File opened for modification C:\Program Files (x86)\MaskVPN\libeay32.dll 161.tmp File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exe 161.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\win732\tapinstall.exe 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-63N5G.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-GIMDG.tmp 161.tmp File opened for modification C:\Program Files (x86)\MaskVPN\version MaskVPNUpdate.exe File created C:\Program Files (x86)\Common Files\Ciqaeluzhuli.exe.config MSekni.exe File opened for modification C:\Program Files (x86)\MaskVPN\ipseccmd.exe 161.tmp File created C:\Program Files (x86)\MaskVPN\is-5H6QS.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-AJA50.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-DUU26.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-GN5KR.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-ET45G.tmp 161.tmp File created C:\Program Files (x86)\powerOff\is-3J4RE.tmp poweroff.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libMaskVPN.dll 161.tmp -
Drops file in Windows directory 56 IoCs
Processes:
msiexec.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMaskVPNUpdate.exeDrvInst.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exesvchost.exeWerFault.exeMicrosoftEdgeCP.exerundll32.exeDrvInst.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exedescription ioc process File opened for modification C:\Windows\Installer\MSI4237.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdge.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI85C2.tmp msiexec.exe File created C:\Windows\Installer\{a58e4f69-d4e3-8a76-6fe9-ceca6547fd3e}\2e6e40394c455899c25a735c705ee3e7 MaskVPNUpdate.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe File opened for modification C:\Windows\Installer\MSIDEFA.tmp msiexec.exe File created C:\Windows\Installer\{a58e4f69-d4e3-8a76-6fe9-ceca6547fd3e}\e42520b4318dfd8363560a718a5000cc.001 MaskVPNUpdate.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\f7cb78a.msi msiexec.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSI391E.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f7cb787.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI8562.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Installer\MSI50DE.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIA062.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\INF\setupapi.dev.log rundll32.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\MSI8592.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDB6F.tmp msiexec.exe File created C:\Windows\Installer\{a58e4f69-d4e3-8a76-6fe9-ceca6547fd3e}\e42520b4318dfd8363560a718a5000cc MaskVPNUpdate.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdge.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File created C:\Windows\Installer\{a58e4f69-d4e3-8a76-6fe9-ceca6547fd3e}\2e6e40394c455899c25a735c705ee3e7.001 MaskVPNUpdate.exe File opened for modification C:\Windows\Installer\MSI668B.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSID6E9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7CE4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8409.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI869E.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSI314D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8640.tmp msiexec.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\Installer\f7cb787.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIBECA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID12C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE0A1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI65CF.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSIC5A1.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2036 4292 WerFault.exe 4623381116.exe 4348 4292 WerFault.exe 4623381116.exe 1380 4292 WerFault.exe 4623381116.exe 4892 4292 WerFault.exe 4623381116.exe 2320 4292 WerFault.exe 4623381116.exe 5036 4292 WerFault.exe 4623381116.exe 1576 4292 WerFault.exe 4623381116.exe 2040 5168 WerFault.exe GcleanerEU.exe 4920 5236 WerFault.exe GcleanerEU.exe 2708 5236 WerFault.exe GcleanerEU.exe 4804 5168 WerFault.exe GcleanerEU.exe 5908 5580 WerFault.exe gcleaner.exe 5636 5580 WerFault.exe gcleaner.exe 5216 5236 WerFault.exe GcleanerEU.exe 5848 5168 WerFault.exe GcleanerEU.exe 2296 5580 WerFault.exe gcleaner.exe 6084 5168 WerFault.exe GcleanerEU.exe 1968 5236 WerFault.exe GcleanerEU.exe 1988 5580 WerFault.exe gcleaner.exe 4720 5168 WerFault.exe GcleanerEU.exe 5284 5236 WerFault.exe GcleanerEU.exe 4968 5580 WerFault.exe gcleaner.exe 4972 5168 WerFault.exe GcleanerEU.exe 5708 5236 WerFault.exe GcleanerEU.exe 4820 5168 WerFault.exe GcleanerEU.exe 4924 5168 WerFault.exe GcleanerEU.exe 5136 5236 WerFault.exe GcleanerEU.exe 4816 5236 WerFault.exe GcleanerEU.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exetapinstall.exeDrvInst.exeDrvInst.exerundll32.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exeOpen__Setup__3456.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Open__Setup__3456.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Open__Setup__3456.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2128 timeout.exe -
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2796 taskkill.exe 3632 taskkill.exe 4824 taskkill.exe 1480 taskkill.exe -
Processes:
MicrosoftEdgeCP.exebrowser_broker.exeMicrosoftEdge.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
mask_svc.exesvchost.exeDrvInst.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-461 = "Afghanistan Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-382 = "South Africa Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2181 = "Astrakhan Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-162 = "Central Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-41 = "E. South America Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2842 = "Saratov Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs mask_svc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-32 = "Mid-Atlantic Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2322 = "Sakhalin Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1662 = "Bahia Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2771 = "Omsk Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1042 = "Ulaanbaatar Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-431 = "Iran Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-71 = "Newfoundland Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2141 = "Transbaikal Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-152 = "Central America Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-572 = "China Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-631 = "Tokyo Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2061 = "North Korea Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2002 = "Cabo Verde Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-562 = "SE Asia Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-571 = "China Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-542 = "Myanmar Standard Time" mask_svc.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exesvchost.exeMicrosoftEdgeCP.exemsiexec.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\FileNames\ MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "601" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.hentaiheroes.com\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\SOFTWARE\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaV = "%windir%\\Speech_OneCore\\Engines\\SR\\en-US-N\\r1033sr.lxa" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\SOFTWARE\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaV = "CC" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\SOFTWARE\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaV = "{15E16AEC-F2F0-4E52-B0DF-029D11E58E4B}" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{MILK21RL-C710-MWL1-5042-AV1QIJC7L5L4} svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "9" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\plarium.com\ = "281" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\downloadoperagx.com\Total = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Language = "1033" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\SOFTWARE\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaV = "Female" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\plarium.com\ = "411" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\SOFTWARE\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaV = "16000" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\plarium.com\Total = "242" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\plarium.com\Total = "321" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.youtube.com\ = "6" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = af28c6293d0fd801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\hentaiheroes.com\NumberOf = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000929e28980c8b81dd8471b871efb9fefdf2ec5adde02fe95521d3c57e67a549899afa60e4f7966205eaedf6e47c0b59e507b2ab480d46af4edbc1 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\SOFTWARE\Microsoft\Speech_OneCore\Isolated\PIjyYIeAhMCaaV = "SR en-US Lookup Lexicon" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\youtube.com\NumberOfSubdomai = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\downloadoperagx.com MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\plarium.com\Total = "9" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\downloadoperagx.com\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\plarium.com\Total = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\plarium.com\Total = "74" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 73f121ba3d0fd801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\NextUpdateDate = "349601799" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "74" MicrosoftEdgeCP.exe -
Processes:
rundll32.exeinstaller.exe161.tmpdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC 161.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 0300000001000000140000005e66e0ca2367757e800e65b770629026e131a7dc2000000001000000ba060000308206b63082059ea003020102021004d54dc0a2016b263eeeb255d321056e300d06092a864886f70d0101050500306f310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312e302c060355040313254469676943657274204173737572656420494420436f6465205369676e696e672043412d31301e170d3133303831333030303030305a170d3136303930323132303030305a308181310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100a10462099150b2575bc037614701c292ba96e98270fdb06e1d1f40343e720e259d6f9fdf59bcb9365f8cea69689aed7a4354591db75509826ad71ab3f00cb18ed11157effc5eb3bf5730b33b5ba76fd73f3fd7f1b2256410223a7f8f5f52b6fb8b31a979cc50f831880fc837c81168e74dd4f57368ef55a1dbe480a815128e0d944d4d70be02ed65efe486a020f50dfdfe6d2a0dfab3ff9885fdb1bc39b79bb0a38183e42d557a60da66883c3307c208655da1a43eeb2393ea10b200f55ddfd66da47eae911eebe43113c7aafdf8e13d2fef2604eac2e3739021816b323dc9ef0f8411a1a7921023ff3cd7f1f4d4307f6ad13816d47b93823c9683069315088d0203010001a382033930820335301f0603551d230418301680147b68ce29aac017be497ae1e53fd6a7f7458f3532301d0603551d0e041604149afe50cc7c723e76b49c036a97a88c8135cb6651300e0603551d0f0101ff04040302078030130603551d25040c300a06082b0601050507030330730603551d1f046c306a3033a031a02f862d687474703a2f2f63726c332e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c3033a031a02f862d687474703a2f2f63726c342e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c308201c40603551d20048201bb308201b7308201b306096086480186fd6c0301308201a4303a06082b06010505070201162e687474703a2f2f7777772e64696769636572742e636f6d2f73736c2d6370732d7265706f7369746f72792e68746d3082016406082b06010505070202308201561e8201520041006e007900200075007300650020006f00660020007400680069007300200043006500720074006900660069006300610074006500200063006f006e0073007400690074007500740065007300200061006300630065007000740061006e006300650020006f00660020007400680065002000440069006700690043006500720074002000430050002f00430050005300200061006e00640020007400680065002000520065006c00790069006e0067002000500061007200740079002000410067007200650065006d0065006e00740020007700680069006300680020006c0069006d006900740020006c0069006100620069006c00690074007900200061006e0064002000610072006500200069006e0063006f00720070006f00720061007400650064002000680065007200650069006e0020006200790020007200650066006500720065006e00630065002e30818206082b0601050507010104763074302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304c06082b060105050730028640687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274417373757265644944436f64655369676e696e6743412d312e637274300c0603551d130101ff04023000300d06092a864886f70d0101050500038201010035d3e402ab7e93e4c84f74475c2403fbaf99335beb29aef76c0cbadf9eed476e26ae26aa5e87bb55e851926d2db986d674efd71abe7ecdc4b57c98d65b862725bd09e466949c3cf68cb40631d734ee948e4a7e5c849edf9757530a17e85c91e3dbc61e31a5d30b7250e83316c23728cc3fc0c721f61780a9f8542b575131652426be91885d9756313eff308755b60ccf6ade5f7bd7e32690a51c0b470a3bfe9dbedad74b535349ff469baa3e4d741d7db011501f80afdc4138a345c36e78710681be9d5b2bd45620bfaddf8e4ebd58e0820296f5c40c06fc48db187ff49fcaf489866fdae7c4d7224e3548bac384a5e7b59175c8fd6a667fa6ee3838802ce9be 161.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 030000000100000014000000cbc64d0fc770b1694df723bb18b5679ce09b61ca20000000010000000c06000030820608308204f0a00302010202100ebd24bdfbd4adddd2edd27e8fb1953c300d06092a864886f70d01010b0500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b302906035504031322446967694365727420455620436f6465205369676e696e6720434120285348413229301e170d3136303230393030303030305a170d3139303231333132303030305a3082011d311d301b060355040f0c1450726976617465204f7267616e697a6174696f6e31133011060b2b0601040182373c0201031302555331193017060b2b0601040182373c020102130844656c61776172653110300e06035504051307333736313235363129302706035504091320353938302053746f6e6572696467652044726976652c20537569746520313033310e300c060355041113053934353838310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100dbfa60e717145ef04d047ef2824532ee8a363d6b8fda58b639832f07eccba53b0446715d150e886195607af12d04e77a0f90bca14e70a782603b0ee5b9dca6cf43d5befb9887c54a3a507a82c7dd4a3fec3aed83171ff020b0c1ca50b87751a597b13454a31bd07796eea97ee55631a43d92cbc7275dfc6da478de5f3c8e2c3431db592d2410de2e789465cf73498df4e042aaa085855603e5165b84e25f27c6d29f77a1cc7bf2875da81395715c662b0333b025b37fcac7bd2f3b50a497613d972182c25e796e0dc453264c6e5340bd4962d5d3d37db06dfc03efb0ba8215b9ef2ef52c15d369db3a732259d286a9aa761ccafff0558c8efdab678d785cfe370203010001a38201f1308201ed301f0603551d230418301680148fe87ef06d326a000523c770976a3a90ff6bead4301d0603551d0e041604149bb182bc8ec73483e7d3569d57448488d1803437302e0603551d1104273025a02306082b06010505070803a01730150c1355532d44454c41574152452d33373631323536300e0603551d0f0101ff04040302078030130603551d25040c300a06082b06010505070303307b0603551d1f047430723037a035a0338631687474703a2f2f63726c332e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c3037a035a0338631687474703a2f2f63726c342e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c304b0603551d2004443042303706096086480186fd6c0302302a302806082b06010505070201161c68747470733a2f2f7777772e64696769636572742e636f6d2f4350533007060567810c0103307e06082b0601050507010104723070302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304806082b06010505073002863c687474703a2f2f636163657274732e64696769636572742e636f6d2f44696769436572744556436f64655369676e696e6743412d534841322e637274300c0603551d130101ff04023000300d06092a864886f70d01010b050003820101006c24a9a7e30a7db2301b344f60cd1b1daf32fce4207ff625bd635f062f8a65301a7d66fade8ba809d0863421631692ef527119eaed4d1f012a98606727c8682aaf1099ca03ab9e996184f4186bce0ca7739c9e6e7144972012ac6eb4ac7db2122b244546f09647fa477a0613401f42e72f4a56fd687d946c4a41e1d1238fe8959e0b6e0cb692e92d96ccc7bde669843c60a374d001608328688790f65ababb20c78c59dad5b32bd79d67c60341c754eae510e08f897e6190c3af2d171261bcea2905545682ace869cd7cc3e66e635dd4f6420dcdc0909b780456523f685aec28b7a5585fae78f36ae3b84d0690f5ee0aa522245546508b2fadb6975f6082d11f 161.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA 161.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 0f00000001000000200000002dc1a6a6cb0cb42f7e0d2c56f38bc7decbccd143405f669070ce130f9249ba48030000000100000014000000cbc64d0fc770b1694df723bb18b5679ce09b61ca20000000010000000c06000030820608308204f0a00302010202100ebd24bdfbd4adddd2edd27e8fb1953c300d06092a864886f70d01010b0500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b302906035504031322446967694365727420455620436f6465205369676e696e6720434120285348413229301e170d3136303230393030303030305a170d3139303231333132303030305a3082011d311d301b060355040f0c1450726976617465204f7267616e697a6174696f6e31133011060b2b0601040182373c0201031302555331193017060b2b0601040182373c020102130844656c61776172653110300e06035504051307333736313235363129302706035504091320353938302053746f6e6572696467652044726976652c20537569746520313033310e300c060355041113053934353838310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100dbfa60e717145ef04d047ef2824532ee8a363d6b8fda58b639832f07eccba53b0446715d150e886195607af12d04e77a0f90bca14e70a782603b0ee5b9dca6cf43d5befb9887c54a3a507a82c7dd4a3fec3aed83171ff020b0c1ca50b87751a597b13454a31bd07796eea97ee55631a43d92cbc7275dfc6da478de5f3c8e2c3431db592d2410de2e789465cf73498df4e042aaa085855603e5165b84e25f27c6d29f77a1cc7bf2875da81395715c662b0333b025b37fcac7bd2f3b50a497613d972182c25e796e0dc453264c6e5340bd4962d5d3d37db06dfc03efb0ba8215b9ef2ef52c15d369db3a732259d286a9aa761ccafff0558c8efdab678d785cfe370203010001a38201f1308201ed301f0603551d230418301680148fe87ef06d326a000523c770976a3a90ff6bead4301d0603551d0e041604149bb182bc8ec73483e7d3569d57448488d1803437302e0603551d1104273025a02306082b06010505070803a01730150c1355532d44454c41574152452d33373631323536300e0603551d0f0101ff04040302078030130603551d25040c300a06082b06010505070303307b0603551d1f047430723037a035a0338631687474703a2f2f63726c332e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c3037a035a0338631687474703a2f2f63726c342e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c304b0603551d2004443042303706096086480186fd6c0302302a302806082b06010505070201161c68747470733a2f2f7777772e64696769636572742e636f6d2f4350533007060567810c0103307e06082b0601050507010104723070302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304806082b06010505073002863c687474703a2f2f636163657274732e64696769636572742e636f6d2f44696769436572744556436f64655369676e696e6743412d534841322e637274300c0603551d130101ff04023000300d06092a864886f70d01010b050003820101006c24a9a7e30a7db2301b344f60cd1b1daf32fce4207ff625bd635f062f8a65301a7d66fade8ba809d0863421631692ef527119eaed4d1f012a98606727c8682aaf1099ca03ab9e996184f4186bce0ca7739c9e6e7144972012ac6eb4ac7db2122b244546f09647fa477a0613401f42e72f4a56fd687d946c4a41e1d1238fe8959e0b6e0cb692e92d96ccc7bde669843c60a374d001608328688790f65ababb20c78c59dad5b32bd79d67c60341c754eae510e08f897e6190c3af2d171261bcea2905545682ace869cd7cc3e66e635dd4f6420dcdc0909b780456523f685aec28b7a5585fae78f36ae3b84d0690f5ee0aa522245546508b2fadb6975f6082d11f rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 rundll32.exe -
NTFS ADS 2 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\Open__Setup__3456.rar:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\Setup_i864x.zip:Zone.Identifier firefox.exe -
Runs ping.exe 1 TTPs 13 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 4644 PING.EXE 5464 PING.EXE 5136 PING.EXE 3716 PING.EXE 2540 PING.EXE 2268 PING.EXE 4848 PING.EXE 4112 PING.EXE 4352 PING.EXE 1480 PING.EXE 4448 PING.EXE 5336 PING.EXE 3408 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 674 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 550 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
IntelRapid.exepid process 1828 IntelRapid.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
61ebc863e3c48_Sat0908028a923.exepowershell.exerundll32.exesvchost.exead760080-e664-4c93-8450-bbc36ff9ac73.exe78b0bb75-5a75-4a52-99af-0af0f2b4d10a.exe6e7fcf82-04bb-481b-b5d1-06d46e693ee2.exe9b3d2795-33ba-48e1-8fbb-0250781a2197.exe2cdbe193-fcaf-40e4-9a68-950838b9e219.exeWerFault.exeWerFault.exepoweroff.tmpcmd.exepid process 852 61ebc863e3c48_Sat0908028a923.exe 852 61ebc863e3c48_Sat0908028a923.exe 1784 powershell.exe 1784 powershell.exe 4188 rundll32.exe 4188 rundll32.exe 2688 svchost.exe 2688 svchost.exe 1784 powershell.exe 4952 ad760080-e664-4c93-8450-bbc36ff9ac73.exe 4952 ad760080-e664-4c93-8450-bbc36ff9ac73.exe 1784 powershell.exe 5048 78b0bb75-5a75-4a52-99af-0af0f2b4d10a.exe 5048 78b0bb75-5a75-4a52-99af-0af0f2b4d10a.exe 2712 6e7fcf82-04bb-481b-b5d1-06d46e693ee2.exe 2712 6e7fcf82-04bb-481b-b5d1-06d46e693ee2.exe 3956 9b3d2795-33ba-48e1-8fbb-0250781a2197.exe 3956 9b3d2795-33ba-48e1-8fbb-0250781a2197.exe 1584 2cdbe193-fcaf-40e4-9a68-950838b9e219.exe 1584 2cdbe193-fcaf-40e4-9a68-950838b9e219.exe 1584 2cdbe193-fcaf-40e4-9a68-950838b9e219.exe 1584 2cdbe193-fcaf-40e4-9a68-950838b9e219.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4348 WerFault.exe 4344 poweroff.tmp 4344 poweroff.tmp 1380 cmd.exe 1380 cmd.exe -
Suspicious behavior: MapViewOfSection 12 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exepid process 5820 MicrosoftEdgeCP.exe 5820 MicrosoftEdgeCP.exe 5820 MicrosoftEdgeCP.exe 5820 MicrosoftEdgeCP.exe 5820 MicrosoftEdgeCP.exe 5820 MicrosoftEdgeCP.exe 5468 MicrosoftEdgeCP.exe 5468 MicrosoftEdgeCP.exe 4664 MicrosoftEdgeCP.exe 4664 MicrosoftEdgeCP.exe 4664 MicrosoftEdgeCP.exe 4664 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
firefox.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe61ebc855aa10f_Sat094506bfb4f2.exe61ebc85f9ca8c_Sat095df864fc.exeLzmwAqmV.exepowershell.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2728 firefox.exe Token: SeDebugPrivilege 2728 firefox.exe Token: SeDebugPrivilege 2728 firefox.exe Token: SeRestorePrivilege 3176 7zG.exe Token: 35 3176 7zG.exe Token: SeSecurityPrivilege 3176 7zG.exe Token: SeSecurityPrivilege 3176 7zG.exe Token: SeRestorePrivilege 3596 7zG.exe Token: 35 3596 7zG.exe Token: SeSecurityPrivilege 3596 7zG.exe Token: SeSecurityPrivilege 3596 7zG.exe Token: SeDebugPrivilege 2728 firefox.exe Token: SeDebugPrivilege 2728 firefox.exe Token: SeDebugPrivilege 2728 firefox.exe Token: SeRestorePrivilege 1320 7zG.exe Token: 35 1320 7zG.exe Token: SeSecurityPrivilege 1320 7zG.exe Token: SeSecurityPrivilege 1320 7zG.exe Token: SeRestorePrivilege 204 7zG.exe Token: 35 204 7zG.exe Token: SeSecurityPrivilege 204 7zG.exe Token: SeSecurityPrivilege 204 7zG.exe Token: SeRestorePrivilege 3800 7zG.exe Token: 35 3800 7zG.exe Token: SeSecurityPrivilege 3800 7zG.exe Token: SeSecurityPrivilege 3800 7zG.exe Token: SeCreateTokenPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeAssignPrimaryTokenPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeLockMemoryPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeIncreaseQuotaPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeMachineAccountPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeTcbPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeSecurityPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeTakeOwnershipPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeLoadDriverPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeSystemProfilePrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeSystemtimePrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeProfSingleProcessPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeIncBasePriorityPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeCreatePagefilePrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeCreatePermanentPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeBackupPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeRestorePrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeShutdownPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeDebugPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeAuditPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeSystemEnvironmentPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeChangeNotifyPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeRemoteShutdownPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeUndockPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeSyncAgentPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeEnableDelegationPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeManageVolumePrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeImpersonatePrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeCreateGlobalPrivilege 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: 31 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: 32 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: 33 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: 34 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: 35 3952 61ebc855aa10f_Sat094506bfb4f2.exe Token: SeDebugPrivilege 972 61ebc85f9ca8c_Sat095df864fc.exe Token: SeDebugPrivilege 2076 LzmwAqmV.exe Token: SeDebugPrivilege 1784 powershell.exe Token: SeDebugPrivilege 3632 taskkill.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
firefox.exe7zG.exe7zG.exeOpen__Setup__3456.exe7zG.exe7zG.exe7zG.exepoweroff.tmp7zG.exeinstaller.exe161.tmppid process 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 3176 7zG.exe 3596 7zG.exe 3884 Open__Setup__3456.exe 3884 Open__Setup__3456.exe 3884 Open__Setup__3456.exe 3884 Open__Setup__3456.exe 3884 Open__Setup__3456.exe 3884 Open__Setup__3456.exe 1320 7zG.exe 204 7zG.exe 3800 7zG.exe 4344 poweroff.tmp 5088 7zG.exe 5668 installer.exe 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp 5924 161.tmp -
Suspicious use of SendNotifyMessage 9 IoCs
Processes:
firefox.exeOpen__Setup__3456.exepid process 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 3884 Open__Setup__3456.exe 3884 Open__Setup__3456.exe 3884 Open__Setup__3456.exe 3884 Open__Setup__3456.exe 3884 Open__Setup__3456.exe 3884 Open__Setup__3456.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
firefox.exewin-setup-i864.exesetup_installer.exesetup_install.exe61ebc8632c578_Sat096243e85.exe61ebc8579d193_Sat09ea8e57f896.exe61ebc855aa10f_Sat094506bfb4f2.exe61ebc863e3c48_Sat0908028a923.exetaskkill.exe61ebc8658050b_Sat095c6f3836.exe61ebc85c3f8d6_Sat097601daa5.exe61ebc8658050b_Sat095c6f3836.tmp61ebc8649d86d_Sat09a4fee9807b.exeLzmwAqmV.exe25FF.tmp.exe28A0.tmp.exe7508307521.exead760080-e664-4c93-8450-bbc36ff9ac73.exe78b0bb75-5a75-4a52-99af-0af0f2b4d10a.exe6e7fcf82-04bb-481b-b5d1-06d46e693ee2.exe9b3d2795-33ba-48e1-8fbb-0250781a2197.exe2cdbe193-fcaf-40e4-9a68-950838b9e219.exe8654895.exepoweroff.exepoweroff.tmpfq.exeMaskVPNUpdate.exe161.exe161.tmprandom.exeMicrosoftEdge.exeSetup.exeBumperWW.exeaskinstall42.exerandom.exeOriginal.execmd.exe75af9695-d4c9-400b-bf1b-a7124ad29336.exe10d41032-bf70-4ad8-83f4-ae7a25822c34.exec62c6b37-cd7a-4ca1-8713-b015b7bfc73a.exe61ddaf8f-4df8-4881-9377-61fd20e4774f.exetapinstall.exe8136630.exeMicrosoftEdgeCP.exepid process 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 2728 firefox.exe 3748 win-setup-i864.exe 1788 setup_installer.exe 1244 setup_install.exe 3800 61ebc8632c578_Sat096243e85.exe 1124 61ebc8579d193_Sat09ea8e57f896.exe 3952 61ebc855aa10f_Sat094506bfb4f2.exe 852 61ebc863e3c48_Sat0908028a923.exe 3632 taskkill.exe 3632 taskkill.exe 3632 taskkill.exe 3132 61ebc8658050b_Sat095c6f3836.exe 3748 61ebc85c3f8d6_Sat097601daa5.exe 2252 61ebc8658050b_Sat095c6f3836.tmp 3008 61ebc8649d86d_Sat09a4fee9807b.exe 3008 61ebc8649d86d_Sat09a4fee9807b.exe 3008 61ebc8649d86d_Sat09a4fee9807b.exe 2076 LzmwAqmV.exe 2420 25FF.tmp.exe 2176 28A0.tmp.exe 4700 7508307521.exe 4952 ad760080-e664-4c93-8450-bbc36ff9ac73.exe 5048 78b0bb75-5a75-4a52-99af-0af0f2b4d10a.exe 2712 6e7fcf82-04bb-481b-b5d1-06d46e693ee2.exe 3956 9b3d2795-33ba-48e1-8fbb-0250781a2197.exe 1584 2cdbe193-fcaf-40e4-9a68-950838b9e219.exe 964 8654895.exe 4788 poweroff.exe 4344 poweroff.tmp 4940 fq.exe 5264 MaskVPNUpdate.exe 5688 161.exe 5924 161.tmp 5960 random.exe 5960 random.exe 5960 random.exe 5412 MicrosoftEdge.exe 6064 Setup.exe 6112 BumperWW.exe 5876 askinstall42.exe 2008 random.exe 2008 random.exe 2008 random.exe 4800 Original.exe 4496 cmd.exe 5700 75af9695-d4c9-400b-bf1b-a7124ad29336.exe 4648 10d41032-bf70-4ad8-83f4-ae7a25822c34.exe 5316 c62c6b37-cd7a-4ca1-8713-b015b7bfc73a.exe 1048 61ddaf8f-4df8-4881-9377-61fd20e4774f.exe 5496 tapinstall.exe 5608 8136630.exe 5820 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 2480 wrote to memory of 2728 2480 firefox.exe firefox.exe PID 2480 wrote to memory of 2728 2480 firefox.exe firefox.exe PID 2480 wrote to memory of 2728 2480 firefox.exe firefox.exe PID 2480 wrote to memory of 2728 2480 firefox.exe firefox.exe PID 2480 wrote to memory of 2728 2480 firefox.exe firefox.exe PID 2480 wrote to memory of 2728 2480 firefox.exe firefox.exe PID 2480 wrote to memory of 2728 2480 firefox.exe firefox.exe PID 2480 wrote to memory of 2728 2480 firefox.exe firefox.exe PID 2480 wrote to memory of 2728 2480 firefox.exe firefox.exe PID 2728 wrote to memory of 864 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 864 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 376 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 1408 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 1408 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 1408 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 1408 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 1408 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 1408 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 1408 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 1408 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 1408 2728 firefox.exe firefox.exe PID 2728 wrote to memory of 1408 2728 firefox.exe firefox.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://crackdj.com1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://crackdj.com2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2728.0.1035290803\1625872707" -parentBuildID 20200403170909 -prefsHandle 1516 -prefMapHandle 1488 -prefsLen 1 -prefMapSize 219808 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2728 "\\.\pipe\gecko-crash-server-pipe.2728" 1624 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2728.3.1213462959\1807353833" -childID 1 -isForBrowser -prefsHandle 2284 -prefMapHandle 2276 -prefsLen 156 -prefMapSize 219808 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2728 "\\.\pipe\gecko-crash-server-pipe.2728" 2336 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2728.13.1471300882\1015299077" -childID 2 -isForBrowser -prefsHandle 3356 -prefMapHandle 3352 -prefsLen 7013 -prefMapSize 219808 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2728 "\\.\pipe\gecko-crash-server-pipe.2728" 3364 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2728.20.383565118\865548174" -childID 3 -isForBrowser -prefsHandle 3596 -prefMapHandle 4100 -prefsLen 7941 -prefMapSize 219808 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2728 "\\.\pipe\gecko-crash-server-pipe.2728" 4120 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2728.27.268814184\953494499" -childID 4 -isForBrowser -prefsHandle 8528 -prefMapHandle 8520 -prefsLen 8937 -prefMapSize 219808 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2728 "\\.\pipe\gecko-crash-server-pipe.2728" 8500 tab3⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc85d85b45_Sat0933dfd61ab.exe61ebc85d85b45_Sat0933dfd61ab.exe4⤵
- Executes dropped EXE
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Open__Setup__3456\" -spe -an -ai#7zMap31303:96:7zEvent59571⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Open__Setup__3456\Open__Setup__3456\" -spe -an -ai#7zMap31895:132:7zEvent161311⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Downloads\Open__Setup__3456\Open__Setup__3456.exe"C:\Users\Admin\Downloads\Open__Setup__3456\Open__Setup__3456.exe"1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\File1.exe"C:\Users\Admin\AppData\Local\Temp\File1.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 3 & del /f /q "C:\Users\Admin\Downloads\Open__Setup__3456\Open__Setup__3456.exe"2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Setup_i864x\" -spe -an -ai#7zMap29069:84:7zEvent242851⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Setup_i864x\PASSWORD-IS-hello587785.txt1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Setup_i864x\app-setup-i864\" -spe -an -ai#7zMap26917:114:7zEvent22961⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Setup_i864x\app-setup-i864\win-setup-i864\" -spe -an -ai#7zMap1433:144:7zEvent58371⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Downloads\Setup_i864x\app-setup-i864\win-setup-i864.exe"C:\Users\Admin\Downloads\Setup_i864x\app-setup-i864\win-setup-i864.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 61ebc855aa10f_Sat094506bfb4f2.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc855aa10f_Sat094506bfb4f2.exe61ebc855aa10f_Sat094506bfb4f2.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 61ebc85c3f8d6_Sat097601daa5.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc85c3f8d6_Sat097601daa5.exe61ebc85c3f8d6_Sat097601daa5.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /Y .\oF0NJ.B6⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 61ebc86696359_Sat0918b27058a.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 61ebc8658050b_Sat095c6f3836.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 61ebc8649d86d_Sat09a4fee9807b.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 61ebc863e3c48_Sat0908028a923.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 61ebc8632c578_Sat096243e85.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 61ebc861109d8_Sat090153b775.exe /mixtwo4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 61ebc85f9ca8c_Sat095df864fc.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 61ebc85f3ab66_Sat09e5e8eeca4.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 61ebc85d85b45_Sat0933dfd61ab.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 61ebc85aa0efa_Sat096553627f2f.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 61ebc859e57b1_Sat09653c9bd.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 61ebc8579d193_Sat09ea8e57f896.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 61ebc856df6a5_Sat0903df92dc30.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8649d86d_Sat09a4fee9807b.exe61ebc8649d86d_Sat09a4fee9807b.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8649d86d_Sat09a4fee9807b.exe"C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8649d86d_Sat09a4fee9807b.exe" -a2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8632c578_Sat096243e85.exe61ebc8632c578_Sat096243e85.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\25FF.tmp.exe"C:\Users\Admin\AppData\Roaming\25FF.tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\28A0.tmp.exe"C:\Users\Admin\AppData\Roaming\28A0.tmp.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8632c578_Sat096243e85.exe" >> NUL2⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc863e3c48_Sat0908028a923.exe61ebc863e3c48_Sat0908028a923.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\ad760080-e664-4c93-8450-bbc36ff9ac73.exe"C:\Users\Admin\AppData\Local\Temp\ad760080-e664-4c93-8450-bbc36ff9ac73.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\78b0bb75-5a75-4a52-99af-0af0f2b4d10a.exe"C:\Users\Admin\AppData\Local\Temp\78b0bb75-5a75-4a52-99af-0af0f2b4d10a.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\6e7fcf82-04bb-481b-b5d1-06d46e693ee2.exe"C:\Users\Admin\AppData\Local\Temp\6e7fcf82-04bb-481b-b5d1-06d46e693ee2.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\9b3d2795-33ba-48e1-8fbb-0250781a2197.exe"C:\Users\Admin\AppData\Local\Temp\9b3d2795-33ba-48e1-8fbb-0250781a2197.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\8654895.exe"C:\Users\Admin\AppData\Roaming\8654895.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s QtGUM.8Qe -u4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\2cdbe193-fcaf-40e4-9a68-950838b9e219.exe"C:\Users\Admin\AppData\Local\Temp\2cdbe193-fcaf-40e4-9a68-950838b9e219.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc856df6a5_Sat0903df92dc30.exe61ebc856df6a5_Sat0903df92dc30.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc861109d8_Sat090153b775.exe61ebc861109d8_Sat090153b775.exe /mixtwo1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc859e57b1_Sat09653c9bd.exe61ebc859e57b1_Sat09653c9bd.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc85f3ab66_Sat09e5e8eeca4.exe61ebc85f3ab66_Sat09e5e8eeca4.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc85f9ca8c_Sat095df864fc.exe61ebc85f9ca8c_Sat095df864fc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc85aa0efa_Sat096553627f2f.exe61ebc85aa0efa_Sat096553627f2f.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8579d193_Sat09ea8e57f896.exe61ebc8579d193_Sat09ea8e57f896.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\4623381116.exe" hbone2⤵
-
C:\Users\Admin\AppData\Local\Temp\4623381116.exe"C:\Users\Admin\AppData\Local\Temp\4623381116.exe" hbone3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 6684⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 6884⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 7404⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 7764⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 9924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 11604⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 13324⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\7508307521.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\7508307521.exe"C:\Users\Admin\AppData\Local\Temp\7508307521.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "61ebc8579d193_Sat09ea8e57f896.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8579d193_Sat09ea8e57f896.exe" & exit2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "61ebc8579d193_Sat09ea8e57f896.exe" /f3⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8658050b_Sat095c6f3836.exe61ebc8658050b_Sat095c6f3836.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-3JS4E.tmp\61ebc8658050b_Sat095c6f3836.tmp"C:\Users\Admin\AppData\Local\Temp\is-3JS4E.tmp\61ebc8658050b_Sat095c6f3836.tmp" /SL5="$4034A,140559,56832,C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8658050b_Sat095c6f3836.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-VR23L.tmp\MSekni.exe"C:\Users\Admin\AppData\Local\Temp\is-VR23L.tmp\MSekni.exe" /S /UID=913⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\25-f3a05-d52-d8fa8-db5a316d3ab58\Mefuhaesazhe.exe"C:\Users\Admin\AppData\Local\Temp\25-f3a05-d52-d8fa8-db5a316d3ab58\Mefuhaesazhe.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\c9-ffbc6-506-37c9b-a40cb544b0a15\Caezhusaeriki.exe"C:\Users\Admin\AppData\Local\Temp\c9-ffbc6-506-37c9b-a40cb544b0a15\Caezhusaeriki.exe"4⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uo3cnidq.f2x\fq.exe SID=778 CID=778 SILENT=1 /quiet & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\uo3cnidq.f2x\fq.exeC:\Users\Admin\AppData\Local\Temp\uo3cnidq.f2x\fq.exe SID=778 CID=778 SILENT=1 /quiet6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\nsnC2A.tmp\fq.exeC:\Users\Admin\AppData\Local\Temp\nsnC2A.tmp\fq.exe7⤵
-
C:\Users\Admin\AppData\Local\Temp\nsnC2A.tmp\fq.exe"C:\Users\Admin\AppData\Local\Temp\nsnC2A.tmp\fq.exe" SID=778 CID=778 SILENT=1 /quiet7⤵
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Edge\ExtensionInstallForcelist /v 1 /t REG_SZ /d lbiobkhhodgbcpmhjiomcemknhgabakl;file:///C:/Windows/Installer/{a58e4f69-d4e3-8a76-6fe9-ceca6547fd3e}/e42520b4318dfd8363560a718a5000cc.0018⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\ExtensionInstallForcelist /v 1 /t REG_SZ /d lbiobkhhodgbcpmhjiomcemknhgabakl;file:///C:/Windows/Installer/{a58e4f69-d4e3-8a76-6fe9-ceca6547fd3e}/e42520b4318dfd8363560a718a5000cc8⤵
-
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Program Files (x86)\Footer Quotes\chrome_manager_x64.dll" main --install-run8⤵
-
C:\Windows\system32\rundll32.exerundll32 "C:\Program Files (x86)\Footer Quotes\chrome_manager_x64.dll" main --install-run9⤵
-
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\ProgramData\hejab.dll" main -c uninstall8⤵
-
C:\Windows\system32\rundll32.exerundll32 "C:\ProgramData\hejab.dll" main -c uninstall9⤵
-
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\ProgramData\hejab.dll" main -c install-run8⤵
-
C:\Windows\system32\rundll32.exerundll32 "C:\ProgramData\hejab.dll" main -c install-run9⤵
-
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Program Files (x86)\Footer Quotes\chrome_manager_x64.dll" main -c cdo "Footer Quotes"8⤵
-
C:\Windows\system32\rundll32.exerundll32 "C:\Program Files (x86)\Footer Quotes\chrome_manager_x64.dll" main -c cdo "Footer Quotes"9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jfn2nxpi.b3m\GcleanerEU.exe /S /subid=948 & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\jfn2nxpi.b3m\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\jfn2nxpi.b3m\GcleanerEU.exe /S /subid=9486⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 8167⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 8207⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 8847⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 8847⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 6527⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 8007⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 9247⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 9007⤵
- Program crash
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jfn2nxpi.b3m\GcleanerEU.exe /eufive & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\jfn2nxpi.b3m\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\jfn2nxpi.b3m\GcleanerEU.exe /eufive6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 6487⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 6647⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 8007⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 8167⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 11247⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 11727⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 11927⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 13487⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\f4tbmlc2.xz0\Original.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\f4tbmlc2.xz0\Original.exeC:\Users\Admin\AppData\Local\Temp\f4tbmlc2.xz0\Original.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping google.com7⤵
-
C:\Windows\SysWOW64\PING.EXEping google.com8⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping facebook.com7⤵
-
C:\Windows\SysWOW64\PING.EXEping facebook.com8⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping twitter.com7⤵
-
C:\Windows\SysWOW64\PING.EXEping twitter.com8⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping google.com7⤵
-
C:\Windows\SysWOW64\PING.EXEping google.com8⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping facebook.com7⤵
-
C:\Windows\SysWOW64\PING.EXEping facebook.com8⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping twitter.com7⤵
-
C:\Windows\SysWOW64\PING.EXEping twitter.com8⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping google.com7⤵
-
C:\Windows\SysWOW64\PING.EXEping google.com8⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping facebook.com7⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\PING.EXEping facebook.com8⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping twitter.com7⤵
-
C:\Windows\SysWOW64\PING.EXEping twitter.com8⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping google.com7⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
-
C:\Windows\SysWOW64\PING.EXEping google.com8⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping facebook.com7⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\PING.EXEping facebook.com8⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping twitter.com7⤵
-
C:\Windows\SysWOW64\PING.EXEping twitter.com8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\f4tbmlc2.xz0\Original.exeC:\Users\Admin\AppData\Local\Temp\f4tbmlc2.xz0\Original.exe7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jo4pqhiy.krl\161.exe /silent /subid=798 & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\jo4pqhiy.krl\161.exeC:\Users\Admin\AppData\Local\Temp\jo4pqhiy.krl\161.exe /silent /subid=7986⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-RM6HD.tmp\161.tmp"C:\Users\Admin\AppData\Local\Temp\is-RM6HD.tmp\161.tmp" /SL5="$40418,15170975,270336,C:\Users\Admin\AppData\Local\Temp\jo4pqhiy.krl\161.exe" /silent /subid=7987⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "8⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
- Executes dropped EXE
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09019⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "8⤵
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09019⤵
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall8⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install8⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\a1lk2xw4.q2n\installer.exe /qn CAMPAIGN="654" & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\a1lk2xw4.q2n\installer.exeC:\Users\Admin\AppData\Local\Temp\a1lk2xw4.q2n\installer.exe /qn CAMPAIGN="654"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\a1lk2xw4.q2n\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\a1lk2xw4.q2n\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1642560072 /qn CAMPAIGN=""654"" " CAMPAIGN="654"7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xkfvpst4.om5\random.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\xkfvpst4.om5\random.exeC:\Users\Admin\AppData\Local\Temp\xkfvpst4.om5\random.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\xkfvpst4.om5\random.exe"C:\Users\Admin\AppData\Local\Temp\xkfvpst4.om5\random.exe" -a7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ssqdcybn.zbc\Setup.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\ssqdcybn.zbc\Setup.exeC:\Users\Admin\AppData\Local\Temp\ssqdcybn.zbc\Setup.exe6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\p1muc251.nl1\BumperWW.exe & exit5⤵
- Blocklisted process makes network request
-
C:\Users\Admin\AppData\Local\Temp\p1muc251.nl1\BumperWW.exeC:\Users\Admin\AppData\Local\Temp\p1muc251.nl1\BumperWW.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nzfc2rpz.xdg\autosubplayer.exe /S & exit5⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2oxi35am.jdj\gcleaner.exe /mixfive & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\2oxi35am.jdj\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\2oxi35am.jdj\gcleaner.exe /mixfive6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5580 -s 6687⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5580 -s 7167⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5580 -s 8047⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5580 -s 6807⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5580 -s 11367⤵
- Program crash
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2gvazaj5.vkn\askinstall42.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\2gvazaj5.vkn\askinstall42.exeC:\Users\Admin\AppData\Local\Temp\2gvazaj5.vkn\askinstall42.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rs2e5gq3.1xr\RobCleanerInstlr842628.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\rs2e5gq3.1xr\RobCleanerInstlr842628.exeC:\Users\Admin\AppData\Local\Temp\rs2e5gq3.1xr\RobCleanerInstlr842628.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\75af9695-d4c9-400b-bf1b-a7124ad29336.exe"C:\Users\Admin\AppData\Local\Temp\75af9695-d4c9-400b-bf1b-a7124ad29336.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\c62c6b37-cd7a-4ca1-8713-b015b7bfc73a.exe"C:\Users\Admin\AppData\Local\Temp\c62c6b37-cd7a-4ca1-8713-b015b7bfc73a.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\10d41032-bf70-4ad8-83f4-ae7a25822c34.exe"C:\Users\Admin\AppData\Local\Temp\10d41032-bf70-4ad8-83f4-ae7a25822c34.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\61ddaf8f-4df8-4881-9377-61fd20e4774f.exe"C:\Users\Admin\AppData\Local\Temp\61ddaf8f-4df8-4881-9377-61fd20e4774f.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\8136630.exe"C:\Users\Admin\AppData\Roaming\8136630.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s QtGUM.8Qe -u9⤵
- Loads dropped DLL
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\41tdj2it.itl\installer.exe /qn CAMPAIGN=654 & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\41tdj2it.itl\installer.exeC:\Users\Admin\AppData\Local\Temp\41tdj2it.itl\installer.exe /qn CAMPAIGN=6546⤵
-
C:\Program Files\Windows Security\ZLXYNZURWQ\poweroff.exe"C:\Program Files\Windows Security\ZLXYNZURWQ\poweroff.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\is-CJ2D5.tmp\poweroff.tmp"C:\Users\Admin\AppData\Local\Temp\is-CJ2D5.tmp\poweroff.tmp" /SL5="$5038A,490199,350720,C:\Program Files\Windows Security\ZLXYNZURWQ\poweroff.exe" /VERYSILENT5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\powerOff\Power Off.exe"C:\Program Files (x86)\powerOff\Power Off.exe" -silent -desktopShortcut -programMenu6⤵
- Executes dropped EXE
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Setup_i864x\app-setup-i864\win-setup-i864\setup_installer\" -spe -an -ai#7zMap18690:176:7zEvent95191⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D7B7B8A632BC01ED6716CCEB466D3B47 C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5E56206E51061D2EBBD1E3285834E7702⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F55F2C6036CB04CA6CF3D612298E06E2 E Global\MSI00002⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global2⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Loads dropped DLL
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{59cc132a-415e-f34e-8dad-c125d0559506}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "000000000000017C" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000198"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Setup_i864x\app-setup-i864\win-setup-i864\setup_installer\61ebc85c3f8d6_Sat097601daa5\" -spe -an -ai#7zMap17632:232:7zEvent306501⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Setup_i864x\app-setup-i864\win-setup-i864\setup_installer\61ebc85c3f8d6_Sat097601daa5\oF0NJ.b2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Program Files (x86)\Footer Quotes\chrome_manager_x64.dll" main1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies system certificate store
-
C:\Windows\system32\rundll32.exe"rundll32.exe" "C:\Program Files (x86)\Footer Quotes\chrome_manager_x64.dll" main iFE9Pxf5P I8Uffe71U2⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\hejab.dll" main1⤵
-
C:\Windows\system32\rundll32.exe"rundll32.exe" C:\ProgramData\hejab.dll main yoqd2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3c01⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Defense Evasion
Virtualization/Sandbox Evasion
1Modify Registry
3Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc855aa10f_Sat094506bfb4f2.exeMD5
2d6872b0af636d554bcdd24ca02cb9b3
SHA12be15eb936e36a63efe696c0410f805ef57f9dc2
SHA25646092ae00445f557854815b26b9a3e3d1eb6c63ebd10c81a32442e1ca868b46b
SHA5121d97407d947105be9735c79e0b7813245e3aa9e27b23dfd870384058089587c761bf0b62a24d3df5558045f0039a86fdabc40e2edb77eec0da5d2e0f60169c91
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc855aa10f_Sat094506bfb4f2.exeMD5
2d6872b0af636d554bcdd24ca02cb9b3
SHA12be15eb936e36a63efe696c0410f805ef57f9dc2
SHA25646092ae00445f557854815b26b9a3e3d1eb6c63ebd10c81a32442e1ca868b46b
SHA5121d97407d947105be9735c79e0b7813245e3aa9e27b23dfd870384058089587c761bf0b62a24d3df5558045f0039a86fdabc40e2edb77eec0da5d2e0f60169c91
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc856df6a5_Sat0903df92dc30.exeMD5
79400b1fd740d9cb7ec7c2c2e9a7d618
SHA18ab8d7dcd469853f61ca27b8afe2ab6e0f2a1bb3
SHA256556d5c93b2ceb585711ccce22e39e3327f388b893d76a3a7974967fe99a6fa7f
SHA5123ed024b02d7410d5ddc7bb772a2b3e8a5516a16d1cb5fac9f5d925da84b376b67117daf238fb53c7707e6bb86a0198534ad1e79b6ebed979b505b3faf9ae55ac
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc856df6a5_Sat0903df92dc30.exeMD5
79400b1fd740d9cb7ec7c2c2e9a7d618
SHA18ab8d7dcd469853f61ca27b8afe2ab6e0f2a1bb3
SHA256556d5c93b2ceb585711ccce22e39e3327f388b893d76a3a7974967fe99a6fa7f
SHA5123ed024b02d7410d5ddc7bb772a2b3e8a5516a16d1cb5fac9f5d925da84b376b67117daf238fb53c7707e6bb86a0198534ad1e79b6ebed979b505b3faf9ae55ac
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8579d193_Sat09ea8e57f896.exeMD5
68009cb1a158689807fe11161ae662c7
SHA148c9cdc6f2a066b2647cc494079ce9aa654417b4
SHA256208d834cec31b7d2ed5d82788548051459618479ca55012978fea7c29b6156e8
SHA512e0583ff21f7e5c5b99ed7e77d62cc7b457641066cbcff03510a500b21a70df24d7b26ef85349a09cfd2830b7c9658d304051e2265fba03194bdde9c98690846d
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8579d193_Sat09ea8e57f896.exeMD5
68009cb1a158689807fe11161ae662c7
SHA148c9cdc6f2a066b2647cc494079ce9aa654417b4
SHA256208d834cec31b7d2ed5d82788548051459618479ca55012978fea7c29b6156e8
SHA512e0583ff21f7e5c5b99ed7e77d62cc7b457641066cbcff03510a500b21a70df24d7b26ef85349a09cfd2830b7c9658d304051e2265fba03194bdde9c98690846d
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc859e57b1_Sat09653c9bd.exeMD5
e7e0b7d4a8bff3972d214a24c42e441b
SHA1ed7bbff201b9955f3f55dd35396db346bfb50ffe
SHA256df35ebe3525fadcad14036f5d8abc888b8f5a5c0474030090ebef99ad1cd809d
SHA512c3c9746417bc9a2a91be1a62d76379b1a3d2aed21c37492a59f025ebd41d2b480c6e97e22a5ebaffb076dc4a7902fb6eca4fa99d425d6178e887ce28f7a19cd8
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc859e57b1_Sat09653c9bd.exeMD5
e7e0b7d4a8bff3972d214a24c42e441b
SHA1ed7bbff201b9955f3f55dd35396db346bfb50ffe
SHA256df35ebe3525fadcad14036f5d8abc888b8f5a5c0474030090ebef99ad1cd809d
SHA512c3c9746417bc9a2a91be1a62d76379b1a3d2aed21c37492a59f025ebd41d2b480c6e97e22a5ebaffb076dc4a7902fb6eca4fa99d425d6178e887ce28f7a19cd8
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc85aa0efa_Sat096553627f2f.exeMD5
8ef42da9905b5e46ac573ea33a0b9e58
SHA1526658cb33b2a4465f482e145622f868a751a6bf
SHA256ec36f04f4afd37c581692765bfa9f256a5c24f79ced44be33ff826abf3c7db01
SHA512cd9c1ec00b2bb8a42a6d4584c117500d5195fbaaa5d42dcd90c9cd714df96a02b9124416d0cd9dd8bd34e21dafe520c676cf9ad8b30ae80057b472bdff9a9454
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc85aa0efa_Sat096553627f2f.exeMD5
8ef42da9905b5e46ac573ea33a0b9e58
SHA1526658cb33b2a4465f482e145622f868a751a6bf
SHA256ec36f04f4afd37c581692765bfa9f256a5c24f79ced44be33ff826abf3c7db01
SHA512cd9c1ec00b2bb8a42a6d4584c117500d5195fbaaa5d42dcd90c9cd714df96a02b9124416d0cd9dd8bd34e21dafe520c676cf9ad8b30ae80057b472bdff9a9454
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc85c3f8d6_Sat097601daa5.exeMD5
5c1f9058d72b34dc6653b47d692e833d
SHA1ff808334c45b63a7d07aa05d7576fd5504a4325d
SHA25697d3f0fc4785d6cef34cce5e20f87e4f395a3436d89a2a89a2ce6ab9c63b639e
SHA51205a4a883b2af82220983fb00eb654a31e634a2c2e93f3441a9b525168bf81bd8c7dea8ae403f61524d6f5dc8c7237bfe330f5b612aedab274a3273695dccd7f5
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc85c3f8d6_Sat097601daa5.exeMD5
5c1f9058d72b34dc6653b47d692e833d
SHA1ff808334c45b63a7d07aa05d7576fd5504a4325d
SHA25697d3f0fc4785d6cef34cce5e20f87e4f395a3436d89a2a89a2ce6ab9c63b639e
SHA51205a4a883b2af82220983fb00eb654a31e634a2c2e93f3441a9b525168bf81bd8c7dea8ae403f61524d6f5dc8c7237bfe330f5b612aedab274a3273695dccd7f5
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc85d85b45_Sat0933dfd61ab.exeMD5
996061fe21353bf63874579cc6c090cc
SHA1eeaf5d66e0ff5e9ddad02653c5bf6af5275e47e9
SHA256b9dad89b3de1d7f9a4b73a5d107c74f716a6e2e89d653c48ab47108b37ad699a
SHA512042ea077acfc0dff8684a5eb304af15177c4e6f54c774471b8091669b1ab16833894ca7a52917f8a6bbeacbb6532db521cea61d70ac4c5c992cb4896083d6c93
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc85d85b45_Sat0933dfd61ab.exeMD5
996061fe21353bf63874579cc6c090cc
SHA1eeaf5d66e0ff5e9ddad02653c5bf6af5275e47e9
SHA256b9dad89b3de1d7f9a4b73a5d107c74f716a6e2e89d653c48ab47108b37ad699a
SHA512042ea077acfc0dff8684a5eb304af15177c4e6f54c774471b8091669b1ab16833894ca7a52917f8a6bbeacbb6532db521cea61d70ac4c5c992cb4896083d6c93
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc85f3ab66_Sat09e5e8eeca4.exeMD5
51f2f1d55f1234aaecc2c99ddd2a99ef
SHA1f7aac7f3653c1c63f1a81cde06b29e38f44019b2
SHA2569de996a3251551ce9f5f1ee95024ebfc2e5a218590910c505f9c37b9f0cdd198
SHA5129e65477af848d2ac454157e238ae8f308b07aeb01099f864ad56fac4ae2e29a38fd0ae7ecfb45fe12bf9f14b534ae09191a0cafc1f87643cd8d5534ae84d5a47
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc85f3ab66_Sat09e5e8eeca4.exeMD5
51f2f1d55f1234aaecc2c99ddd2a99ef
SHA1f7aac7f3653c1c63f1a81cde06b29e38f44019b2
SHA2569de996a3251551ce9f5f1ee95024ebfc2e5a218590910c505f9c37b9f0cdd198
SHA5129e65477af848d2ac454157e238ae8f308b07aeb01099f864ad56fac4ae2e29a38fd0ae7ecfb45fe12bf9f14b534ae09191a0cafc1f87643cd8d5534ae84d5a47
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc85f9ca8c_Sat095df864fc.exeMD5
ce54b9287c3e4b5733035d0be085d989
SHA107a17e423bf89d9b056562d822a8f651aeb33c96
SHA256e2beaf61ef8408e20b5dd05ffab6e1a62774088b3acdebd834f51d77f9824112
SHA512c85680a63c9e852dfee438c9b8d47443f8b998ea1f8f573b3fcf1e31abc44415a1c18bac2bc6c5fb2caed0872a69fc9be758a510b9049c854fd48e31bf0815a0
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc85f9ca8c_Sat095df864fc.exeMD5
ce54b9287c3e4b5733035d0be085d989
SHA107a17e423bf89d9b056562d822a8f651aeb33c96
SHA256e2beaf61ef8408e20b5dd05ffab6e1a62774088b3acdebd834f51d77f9824112
SHA512c85680a63c9e852dfee438c9b8d47443f8b998ea1f8f573b3fcf1e31abc44415a1c18bac2bc6c5fb2caed0872a69fc9be758a510b9049c854fd48e31bf0815a0
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc861109d8_Sat090153b775.exeMD5
bce537ff666e8d100f5ee8f97c358936
SHA171b8358a3ee945a859be684d5aadbf7f3f8b968e
SHA2569ce55107b43f0d88006f9f953594235505a97f0b8fb2e77fa147282c58a65b3d
SHA51295c666e962384e46fd5327b92e3510f234d022eb06e3db5c4ef2ee3583fd8f9d4e18c7b2daab3d8277a2ad7d345a75a6bdf4e08200973af1e6e3b632eda6519b
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc861109d8_Sat090153b775.exeMD5
bce537ff666e8d100f5ee8f97c358936
SHA171b8358a3ee945a859be684d5aadbf7f3f8b968e
SHA2569ce55107b43f0d88006f9f953594235505a97f0b8fb2e77fa147282c58a65b3d
SHA51295c666e962384e46fd5327b92e3510f234d022eb06e3db5c4ef2ee3583fd8f9d4e18c7b2daab3d8277a2ad7d345a75a6bdf4e08200973af1e6e3b632eda6519b
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8632c578_Sat096243e85.exeMD5
b8ecec542a07067a193637269973c2e8
SHA197178479fd0fc608d6c0fbf243a0bb136d7b0ecb
SHA256fc6b5ec20b7f2c902e9413c71be5718eb58640d86189306fe4c592af70fe3b7e
SHA512730d74a72c7af91b10f06ae98235792740bed2afc86eb8ddc15ecaf7c31ec757ac3803697644ac0f60c2e8e0fd875b94299763ac0fed74d392ac828b61689893
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8632c578_Sat096243e85.exeMD5
b8ecec542a07067a193637269973c2e8
SHA197178479fd0fc608d6c0fbf243a0bb136d7b0ecb
SHA256fc6b5ec20b7f2c902e9413c71be5718eb58640d86189306fe4c592af70fe3b7e
SHA512730d74a72c7af91b10f06ae98235792740bed2afc86eb8ddc15ecaf7c31ec757ac3803697644ac0f60c2e8e0fd875b94299763ac0fed74d392ac828b61689893
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc863e3c48_Sat0908028a923.exeMD5
c87d40705596c39e36bfd99af4931112
SHA1c3c24758b79e793e1d36565a3b404c0865e0033d
SHA256d9391eed9b56239415fa38be7a5108fe9bf9818c0ecd53fe34412df97db50900
SHA512f53b8b3130881823fe88c8fed438325fae44a0a618c9bb074c57ee624f6b530ed775b3e96a5256efe99e5cf3f7fd451911a7d84a12332ca89e677f73179ac37f
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc863e3c48_Sat0908028a923.exeMD5
c87d40705596c39e36bfd99af4931112
SHA1c3c24758b79e793e1d36565a3b404c0865e0033d
SHA256d9391eed9b56239415fa38be7a5108fe9bf9818c0ecd53fe34412df97db50900
SHA512f53b8b3130881823fe88c8fed438325fae44a0a618c9bb074c57ee624f6b530ed775b3e96a5256efe99e5cf3f7fd451911a7d84a12332ca89e677f73179ac37f
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8649d86d_Sat09a4fee9807b.exeMD5
b0448525c5a00135bb5b658cc6745574
SHA1a08d53ce43ad01d47564a7dcdb87383652ef29f5
SHA256b53ec612c61b38e29a8500f8d495e81dfdedc6b277958f36acfee6b8ee50a859
SHA512b52e28e22916964a3d4d46e8fd09ba1f5c4867bd812d3c9af278bbeaf0ccfd9573e2bfc836c63079bc5de419b2c362247f85c3c494dfc66baf5cbadc6dbf462d
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8649d86d_Sat09a4fee9807b.exeMD5
b0448525c5a00135bb5b658cc6745574
SHA1a08d53ce43ad01d47564a7dcdb87383652ef29f5
SHA256b53ec612c61b38e29a8500f8d495e81dfdedc6b277958f36acfee6b8ee50a859
SHA512b52e28e22916964a3d4d46e8fd09ba1f5c4867bd812d3c9af278bbeaf0ccfd9573e2bfc836c63079bc5de419b2c362247f85c3c494dfc66baf5cbadc6dbf462d
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8649d86d_Sat09a4fee9807b.exeMD5
b0448525c5a00135bb5b658cc6745574
SHA1a08d53ce43ad01d47564a7dcdb87383652ef29f5
SHA256b53ec612c61b38e29a8500f8d495e81dfdedc6b277958f36acfee6b8ee50a859
SHA512b52e28e22916964a3d4d46e8fd09ba1f5c4867bd812d3c9af278bbeaf0ccfd9573e2bfc836c63079bc5de419b2c362247f85c3c494dfc66baf5cbadc6dbf462d
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8658050b_Sat095c6f3836.exeMD5
359f361117bbe89530a4856a6c3aebd0
SHA13dfb5bb6061f6ea080a0ad72b116271890dc8e8e
SHA2563f7bea1ecfb3a6c30507662e9a33c17ea19c1ad089b551a9ea8b3beb98217877
SHA512e520c5835275bf1622d60c9c6cac84ea0b2db2dbeff9e6199bd54f1fc11866d56c781b865ae573e977ded4d8e523f9691ac59615bd736873101d0ee34d8e2f04
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc8658050b_Sat095c6f3836.exeMD5
359f361117bbe89530a4856a6c3aebd0
SHA13dfb5bb6061f6ea080a0ad72b116271890dc8e8e
SHA2563f7bea1ecfb3a6c30507662e9a33c17ea19c1ad089b551a9ea8b3beb98217877
SHA512e520c5835275bf1622d60c9c6cac84ea0b2db2dbeff9e6199bd54f1fc11866d56c781b865ae573e977ded4d8e523f9691ac59615bd736873101d0ee34d8e2f04
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\61ebc86696359_Sat0918b27058a.exeMD5
7bcb383bc453989c8ec240b579830e1d
SHA16d0bdf71376c50d9b61e486a2407adc6f4a74673
SHA256f386e5a9bc2505ea039d0e16e8d9424b68a126169dd79bd757d7d954fb260575
SHA51202ae248257eec66ceb3a5f9dacce6614a77d363136642266d7a6fd2534700f69a7b2778f89e3c7e3add09802441a5bc001a90f125f7dd1d3bc329570ee51fab9
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\setup_install.exeMD5
d3209fc888cb718cf43bd45ab2036ff9
SHA1ae582cbc915e77c45e90c8161e911c42a451c4f6
SHA256c4db394bd1d0cbdc81c81172e550958d9a851975c375dfb8654b5da73f1e8d03
SHA512f7dfcbacf66ad17196a53c0749d31a609e344b345d647397ee85f86f4acbf98664dc037f384be1a3a822a427f1dfb6c87778c6de336926992704f4ec728cf195
-
C:\Users\Admin\AppData\Local\Temp\7zSCF6E802A\setup_install.exeMD5
d3209fc888cb718cf43bd45ab2036ff9
SHA1ae582cbc915e77c45e90c8161e911c42a451c4f6
SHA256c4db394bd1d0cbdc81c81172e550958d9a851975c375dfb8654b5da73f1e8d03
SHA512f7dfcbacf66ad17196a53c0749d31a609e344b345d647397ee85f86f4acbf98664dc037f384be1a3a822a427f1dfb6c87778c6de336926992704f4ec728cf195
-
C:\Users\Admin\AppData\Local\Temp\File1.exeMD5
f93691dbdd12d265f3bf5ba1e5b0b861
SHA1106e88e2d8a085f63dd5555b0ac638042ae24d54
SHA25606e29b0d5b5f212c3e549ca531ac58f847f19dca49dac25430af79c4d55cdfd0
SHA512fdc3c926deab4ba574d8ef52b5f5b8e5a3eceef952c489d84fe3b261bb97f915b9b2f94e269ad469506853e4c9354b4c416e5f75538ccced85965cc4d5e8fb2c
-
C:\Users\Admin\AppData\Local\Temp\File1.exeMD5
f93691dbdd12d265f3bf5ba1e5b0b861
SHA1106e88e2d8a085f63dd5555b0ac638042ae24d54
SHA25606e29b0d5b5f212c3e549ca531ac58f847f19dca49dac25430af79c4d55cdfd0
SHA512fdc3c926deab4ba574d8ef52b5f5b8e5a3eceef952c489d84fe3b261bb97f915b9b2f94e269ad469506853e4c9354b4c416e5f75538ccced85965cc4d5e8fb2c
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exeMD5
814dd7a518b01a1f09bb220370e0de31
SHA1c20ed51afc6bd8986b9c41aeea86bb076ea3f0ae
SHA256ce54e2d6d4b07a72adce440c500ac14deb7653f39ad121fda03016aade8026b0
SHA5123903af662711c452b65c22f946a86538c6e7f2cbdd5408854324df6a8974f11b4a94fce2badd3c2cfd4a5f8e2dbf3f138947d270611400359161ce1a67658593
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exeMD5
814dd7a518b01a1f09bb220370e0de31
SHA1c20ed51afc6bd8986b9c41aeea86bb076ea3f0ae
SHA256ce54e2d6d4b07a72adce440c500ac14deb7653f39ad121fda03016aade8026b0
SHA5123903af662711c452b65c22f946a86538c6e7f2cbdd5408854324df6a8974f11b4a94fce2badd3c2cfd4a5f8e2dbf3f138947d270611400359161ce1a67658593
-
C:\Users\Admin\AppData\Local\Temp\is-3JS4E.tmp\61ebc8658050b_Sat095c6f3836.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\AppData\Local\Temp\is-3JS4E.tmp\61ebc8658050b_Sat095c6f3836.tmpMD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\AppData\Local\Temp\is-VR23L.tmp\MSekni.exeMD5
43d9c9ee7c3856337368d1e91e167b3f
SHA10c4de80adc49a5cd6bc82f30ff4272a8e2f1b1ba
SHA25602ee25876e7b39c9417d0cff9d708d4cf9198e4fc994d3784b088c6d05fc4863
SHA512ba38cd660c91f5d7b1ab2de8ad1ba95d971e3eca40a2a2e44c5fc9295d95001b3e530222c48d444de1540118bbc3987cb6763c81fb55a9e4b2af2cf979d9d1b8
-
C:\Users\Admin\AppData\Local\Temp\is-VR23L.tmp\MSekni.exeMD5
43d9c9ee7c3856337368d1e91e167b3f
SHA10c4de80adc49a5cd6bc82f30ff4272a8e2f1b1ba
SHA25602ee25876e7b39c9417d0cff9d708d4cf9198e4fc994d3784b088c6d05fc4863
SHA512ba38cd660c91f5d7b1ab2de8ad1ba95d971e3eca40a2a2e44c5fc9295d95001b3e530222c48d444de1540118bbc3987cb6763c81fb55a9e4b2af2cf979d9d1b8
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
401ae5f30a87507e84228a6292ccdba4
SHA14b09244455d84e296e95cf9e2b83fc3947bf1023
SHA256f383fc85706c356181e2f133df139d4528b214a56e6017b7773be13de17b51dc
SHA5127c07f3725cca4342c67f3c6b0a246b114a962bc0cff234d32e4ddc9efee9e6455e5322462549c1e53fd0196b276f8dcad17579968666b140b237ce986cf2feba
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
401ae5f30a87507e84228a6292ccdba4
SHA14b09244455d84e296e95cf9e2b83fc3947bf1023
SHA256f383fc85706c356181e2f133df139d4528b214a56e6017b7773be13de17b51dc
SHA5127c07f3725cca4342c67f3c6b0a246b114a962bc0cff234d32e4ddc9efee9e6455e5322462549c1e53fd0196b276f8dcad17579968666b140b237ce986cf2feba
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exeMD5
f93691dbdd12d265f3bf5ba1e5b0b861
SHA1106e88e2d8a085f63dd5555b0ac638042ae24d54
SHA25606e29b0d5b5f212c3e549ca531ac58f847f19dca49dac25430af79c4d55cdfd0
SHA512fdc3c926deab4ba574d8ef52b5f5b8e5a3eceef952c489d84fe3b261bb97f915b9b2f94e269ad469506853e4c9354b4c416e5f75538ccced85965cc4d5e8fb2c
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exeMD5
f93691dbdd12d265f3bf5ba1e5b0b861
SHA1106e88e2d8a085f63dd5555b0ac638042ae24d54
SHA25606e29b0d5b5f212c3e549ca531ac58f847f19dca49dac25430af79c4d55cdfd0
SHA512fdc3c926deab4ba574d8ef52b5f5b8e5a3eceef952c489d84fe3b261bb97f915b9b2f94e269ad469506853e4c9354b4c416e5f75538ccced85965cc4d5e8fb2c
-
C:\Users\Admin\Downloads\Open__Setup__3456.rarMD5
48442cc8826dd5dd4c35d6d1bb37720f
SHA14d5a190ee119026b458e8c41e6d147899b00583f
SHA25634759ae7ab9e8da090e4013b1f6c06512375adb09a263d5c1019e644aef10650
SHA512614f33ed8a112687505f2b20e005b0e97ceb015c58496f91c76bc62fe6a39c0dc7fa257e9386442b4f353e533e081ad2c4c42228051e0dbbfc5dcd7dcbfa0e16
-
C:\Users\Admin\Downloads\Open__Setup__3456\Open__Setup__3456.exeMD5
f06475c0ee9cf79b5417e5f71d261038
SHA1931ee4a7392c111a37fdb4d1af5ef48f7625cf5f
SHA2560c9b4ee07031c07aa6489ef27d64f7433284e6ac83a759912b6102084286db2c
SHA51207feafe913aedeb6467a8c47f3655fed822ba882b675a579a0ae9328c5cdbee69cfd7869d090b423d92291b9e284da48502939ad59bfc88381b1d41cfde6680f
-
C:\Users\Admin\Downloads\Open__Setup__3456\Open__Setup__3456.exeMD5
f06475c0ee9cf79b5417e5f71d261038
SHA1931ee4a7392c111a37fdb4d1af5ef48f7625cf5f
SHA2560c9b4ee07031c07aa6489ef27d64f7433284e6ac83a759912b6102084286db2c
SHA51207feafe913aedeb6467a8c47f3655fed822ba882b675a579a0ae9328c5cdbee69cfd7869d090b423d92291b9e284da48502939ad59bfc88381b1d41cfde6680f
-
C:\Users\Admin\Downloads\Setup_i864x.zipMD5
6661aa238504e01b7a361340e2eff127
SHA14dd3d0310cfebea22df55d359b0b60bb9c7af47b
SHA25667dd0f525622ac315a51b34938038688a2084f0b64445fdb2ca08885009d4ce5
SHA512505c467c34048510728ec59372bd532a121cbfd6ae7c5b86d7907f29f477098a30129c463bbd9b964e41b2771cfc90312a64b3e9adb3dabcdd36fd72694b3243
-
C:\Users\Admin\Downloads\Setup_i864x\PASSWORD-IS-hello587785.txtMD5
0100c0f040c2f9c7b04eebc8efb6c8d5
SHA15dfba5730cdf501de6985154c9174f5a41d7d889
SHA25642fc77333389bfb9bf05735e324ef655cb31bece93f119f8dc4b75e941c0120d
SHA51265311982c5fdd7618a02e2f1790526477334b70e7171370bd2841d15ee46de2864236e1254b86f414a38666ece8b074020f55b26c97a1654209cc11ad0d02bfb
-
C:\Users\Admin\Downloads\Setup_i864x\app-setup-i864.zipMD5
7fcd526b535d9e3a60200d5de1cc3207
SHA1fa3c3c76bf595e2f37938175bf85b020c18fe9e9
SHA256dad4ae74346a2f5e1f6cfb437e7f8fef3e4f899cb73bcc6f7e6f47f938c124bc
SHA5123109f2055cc88ea4669c6753503712e47ce27b489a472c6d056aa3fb131cc3062fca491afafcb1bdb2b7764ebc9b4ab0d8236109f1b1245f47f63cf5eb3cddf9
-
C:\Users\Admin\Downloads\Setup_i864x\app-setup-i864\win-setup-i864.exeMD5
f18bee00e913e31b91b73402b5f1f519
SHA129bc723ade0f48d841f0301b3931cd7fc2fd3661
SHA25698fa949a63a6b84b1cc68dba20d07cc0148c13831a689834faed44fed39ed1a6
SHA5129361e55718698756f8b4eb6812ab3b5242688ba61fe956b002e97fb55a62c2ed50a0ecc814b1765a0ed853284c565f07c4aa17c3568fa35b7b49dbe84e8695c4
-
C:\Users\Admin\Downloads\Setup_i864x\app-setup-i864\win-setup-i864.exeMD5
f18bee00e913e31b91b73402b5f1f519
SHA129bc723ade0f48d841f0301b3931cd7fc2fd3661
SHA25698fa949a63a6b84b1cc68dba20d07cc0148c13831a689834faed44fed39ed1a6
SHA5129361e55718698756f8b4eb6812ab3b5242688ba61fe956b002e97fb55a62c2ed50a0ecc814b1765a0ed853284c565f07c4aa17c3568fa35b7b49dbe84e8695c4
-
\Users\Admin\AppData\Local\Temp\7zSCF6E802A\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
\Users\Admin\AppData\Local\Temp\7zSCF6E802A\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
\Users\Admin\AppData\Local\Temp\7zSCF6E802A\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zSCF6E802A\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
\Users\Admin\AppData\Local\Temp\7zSCF6E802A\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
\Users\Admin\AppData\Local\Temp\is-VR23L.tmp\idp.dllMD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
memory/324-1381-0x000001C344FD0000-0x000001C345042000-memory.dmpFilesize
456KB
-
memory/324-1379-0x000001C344760000-0x000001C3447AD000-memory.dmpFilesize
308KB
-
memory/852-307-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/852-313-0x00000000006F0000-0x0000000000708000-memory.dmpFilesize
96KB
-
memory/852-334-0x00000000023F0000-0x0000000002482000-memory.dmpFilesize
584KB
-
memory/852-331-0x00000000054A0000-0x000000000599E000-memory.dmpFilesize
5.0MB
-
memory/852-328-0x0000000000570000-0x000000000057A000-memory.dmpFilesize
40KB
-
memory/852-308-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/852-430-0x00000000006D0000-0x00000000006E8000-memory.dmpFilesize
96KB
-
memory/972-306-0x00000000004B0000-0x00000000004B8000-memory.dmpFilesize
32KB
-
memory/1048-1108-0x0000000000150000-0x0000000000181000-memory.dmpFilesize
196KB
-
memory/1124-343-0x0000000000400000-0x00000000005E6000-memory.dmpFilesize
1.9MB
-
memory/1244-267-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1244-1470-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1244-268-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1244-274-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/1244-272-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1244-273-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1244-271-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1244-270-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1244-269-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1244-905-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/1272-1472-0x000001EB1EA80000-0x000001EB1EACD000-memory.dmpFilesize
308KB
-
memory/1584-405-0x0000000000730000-0x0000000000731000-memory.dmpFilesize
4KB
-
memory/1584-414-0x0000000000780000-0x00000000007B0000-memory.dmpFilesize
192KB
-
memory/1584-429-0x00000000006C0000-0x00000000006E0000-memory.dmpFilesize
128KB
-
memory/1584-403-0x0000000000400000-0x0000000000523000-memory.dmpFilesize
1.1MB
-
memory/1584-400-0x0000000000400000-0x0000000000523000-memory.dmpFilesize
1.1MB
-
memory/1584-431-0x00000000056A0000-0x0000000005BCC000-memory.dmpFilesize
5.2MB
-
memory/1584-434-0x0000000005BD0000-0x0000000005C6C000-memory.dmpFilesize
624KB
-
memory/1784-332-0x00000000073D0000-0x00000000079F8000-memory.dmpFilesize
6.2MB
-
memory/1784-894-0x0000000002D40000-0x0000000002D5A000-memory.dmpFilesize
104KB
-
memory/1784-447-0x0000000009630000-0x00000000096D5000-memory.dmpFilesize
660KB
-
memory/1784-344-0x0000000007A70000-0x0000000007AD6000-memory.dmpFilesize
408KB
-
memory/1784-904-0x0000000002D30000-0x0000000002D38000-memory.dmpFilesize
32KB
-
memory/1784-442-0x0000000009160000-0x000000000917E000-memory.dmpFilesize
120KB
-
memory/1784-441-0x0000000009500000-0x0000000009533000-memory.dmpFilesize
204KB
-
memory/1784-347-0x0000000007D70000-0x00000000080C0000-memory.dmpFilesize
3.3MB
-
memory/1784-338-0x0000000007250000-0x0000000007272000-memory.dmpFilesize
136KB
-
memory/1784-451-0x0000000009800000-0x0000000009894000-memory.dmpFilesize
592KB
-
memory/1784-367-0x0000000007A50000-0x0000000007A6C000-memory.dmpFilesize
112KB
-
memory/1784-375-0x00000000084A0000-0x0000000008516000-memory.dmpFilesize
472KB
-
memory/1784-327-0x0000000004C50000-0x0000000004C86000-memory.dmpFilesize
216KB
-
memory/1828-129-0x00007FF728110000-0x00007FF728A8B000-memory.dmpFilesize
9.5MB
-
memory/1828-128-0x00007FF728110000-0x00007FF728A8B000-memory.dmpFilesize
9.5MB
-
memory/1828-127-0x00007FF728110000-0x00007FF728A8B000-memory.dmpFilesize
9.5MB
-
memory/2052-339-0x0000000004470000-0x000000002EF09000-memory.dmpFilesize
682.6MB
-
memory/2076-333-0x0000000002660000-0x0000000002692000-memory.dmpFilesize
200KB
-
memory/2076-340-0x0000000005820000-0x0000000005E26000-memory.dmpFilesize
6.0MB
-
memory/2076-345-0x00000000052C0000-0x00000000053CA000-memory.dmpFilesize
1.0MB
-
memory/2076-348-0x00000000053F0000-0x000000000542E000-memory.dmpFilesize
248KB
-
memory/2076-354-0x0000000005550000-0x000000000559B000-memory.dmpFilesize
300KB
-
memory/2076-342-0x0000000005290000-0x00000000052A2000-memory.dmpFilesize
72KB
-
memory/2076-330-0x00000000024A0000-0x00000000024D4000-memory.dmpFilesize
208KB
-
memory/2176-337-0x00000000008F0000-0x000000000091C000-memory.dmpFilesize
176KB
-
memory/2380-122-0x00007FF620940000-0x00007FF6212BB000-memory.dmpFilesize
9.5MB
-
memory/2380-123-0x00007FF620940000-0x00007FF6212BB000-memory.dmpFilesize
9.5MB
-
memory/2380-124-0x00007FF620940000-0x00007FF6212BB000-memory.dmpFilesize
9.5MB
-
memory/2420-341-0x0000000001190000-0x00000000011A4000-memory.dmpFilesize
80KB
-
memory/2420-346-0x0000000002DA0000-0x0000000002E06000-memory.dmpFilesize
408KB
-
memory/2420-561-0x0000000005AB0000-0x0000000005B00000-memory.dmpFilesize
320KB
-
memory/2712-395-0x00000000760F0000-0x00000000761E1000-memory.dmpFilesize
964KB
-
memory/2712-407-0x0000000074320000-0x0000000075668000-memory.dmpFilesize
19.3MB
-
memory/2712-440-0x00000000051E0000-0x00000000051EA000-memory.dmpFilesize
40KB
-
memory/2712-390-0x0000000000010000-0x00000000000C2000-memory.dmpFilesize
712KB
-
memory/2712-388-0x0000000002500000-0x0000000002501000-memory.dmpFilesize
4KB
-
memory/2712-404-0x0000000076EB0000-0x0000000077434000-memory.dmpFilesize
5.5MB
-
memory/2712-398-0x0000000000010000-0x00000000000C2000-memory.dmpFilesize
712KB
-
memory/2712-392-0x0000000075A90000-0x0000000075C52000-memory.dmpFilesize
1.8MB
-
memory/2712-401-0x0000000070490000-0x0000000070510000-memory.dmpFilesize
512KB
-
memory/3132-509-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/3132-309-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/3884-119-0x0000000000A50000-0x0000000000A60000-memory.dmpFilesize
64KB
-
memory/3884-118-0x0000000000490000-0x000000000053E000-memory.dmpFilesize
696KB
-
memory/3956-457-0x00000000022F0000-0x0000000002330000-memory.dmpFilesize
256KB
-
memory/3956-428-0x0000000000640000-0x0000000000660000-memory.dmpFilesize
128KB
-
memory/3956-399-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/3956-397-0x0000000000400000-0x000000000050C000-memory.dmpFilesize
1.0MB
-
memory/3956-412-0x0000000002290000-0x00000000022C1000-memory.dmpFilesize
196KB
-
memory/3956-394-0x0000000000400000-0x000000000050C000-memory.dmpFilesize
1.0MB
-
memory/4188-573-0x0000000004CC0000-0x0000000004D1D000-memory.dmpFilesize
372KB
-
memory/4292-800-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/4648-1009-0x0000000000B20000-0x0000000000BFA000-memory.dmpFilesize
872KB
-
memory/4788-725-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/4788-492-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/4800-878-0x00000000005B0000-0x00000000005BA000-memory.dmpFilesize
40KB
-
memory/4952-402-0x0000000076EB0000-0x0000000077434000-memory.dmpFilesize
5.5MB
-
memory/4952-377-0x0000000075A90000-0x0000000075C52000-memory.dmpFilesize
1.8MB
-
memory/4952-418-0x000000006E460000-0x000000006E4AB000-memory.dmpFilesize
300KB
-
memory/4952-373-0x0000000001340000-0x000000000141F000-memory.dmpFilesize
892KB
-
memory/4952-470-0x0000000006700000-0x000000000671E000-memory.dmpFilesize
120KB
-
memory/4952-409-0x0000000074320000-0x0000000075668000-memory.dmpFilesize
19.3MB
-
memory/4952-379-0x00000000760F0000-0x00000000761E1000-memory.dmpFilesize
964KB
-
memory/4952-374-0x0000000001000000-0x0000000001001000-memory.dmpFilesize
4KB
-
memory/4952-380-0x0000000001340000-0x000000000141F000-memory.dmpFilesize
892KB
-
memory/4952-382-0x0000000070490000-0x0000000070510000-memory.dmpFilesize
512KB
-
memory/4952-396-0x0000000005C20000-0x0000000005DE2000-memory.dmpFilesize
1.8MB
-
memory/5048-411-0x0000000074320000-0x0000000075668000-memory.dmpFilesize
19.3MB
-
memory/5048-410-0x0000000076EB0000-0x0000000077434000-memory.dmpFilesize
5.5MB
-
memory/5048-386-0x0000000000990000-0x0000000000991000-memory.dmpFilesize
4KB
-
memory/5048-381-0x00000000009A0000-0x0000000000A7B000-memory.dmpFilesize
876KB
-
memory/5048-384-0x00000000009A0000-0x0000000000A7B000-memory.dmpFilesize
876KB
-
memory/5048-389-0x00000000760F0000-0x00000000761E1000-memory.dmpFilesize
964KB
-
memory/5048-387-0x0000000075A90000-0x0000000075C52000-memory.dmpFilesize
1.8MB
-
memory/5048-393-0x0000000070490000-0x0000000070510000-memory.dmpFilesize
512KB
-
memory/5048-391-0x00000000009A0000-0x0000000000A7B000-memory.dmpFilesize
876KB
-
memory/5048-420-0x000000006E460000-0x000000006E4AB000-memory.dmpFilesize
300KB
-
memory/5168-1449-0x00000000005D0000-0x00000000005FD000-memory.dmpFilesize
180KB
-
memory/5168-1451-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/5236-1456-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/5316-1004-0x0000000001310000-0x00000000013C2000-memory.dmpFilesize
712KB
-
memory/5388-739-0x0000000000880000-0x00000000008EC000-memory.dmpFilesize
432KB
-
memory/5580-1325-0x0000000000940000-0x0000000000991000-memory.dmpFilesize
324KB
-
memory/5580-1327-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/5700-980-0x0000000000E90000-0x0000000000F6F000-memory.dmpFilesize
892KB
-
memory/5700-977-0x0000000000E90000-0x0000000000F6F000-memory.dmpFilesize
892KB
-
memory/6064-807-0x0000000000850000-0x0000000000996000-memory.dmpFilesize
1.3MB