Analysis
-
max time kernel
157s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
22-02-2022 14:42
Static task
static1
Behavioral task
behavioral1
Sample
19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe
Resource
win10v2004-en-20220113
General
-
Target
19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe
-
Size
9.1MB
-
MD5
3a866f19d4fad0e9d3c75101255209b2
-
SHA1
5d2b6bfff3834712a8b0e829d778c7b85a67f39e
-
SHA256
19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6
-
SHA512
55744c4fba72459074312db790ad05dec8756627655e88fa5e89673203e82679474372520b12620658c1905242c38039bc8313aa954e2ff9aba6cec9ec656edb
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
tofsee
patmushta.info
ovicrush.cn
Signatures
-
Glupteba Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1344-171-0x0000000005300000-0x0000000005C26000-memory.dmp family_glupteba behavioral2/memory/1344-172-0x0000000000400000-0x0000000000D41000-memory.dmp family_glupteba behavioral2/memory/1968-175-0x0000000000400000-0x0000000000D41000-memory.dmp family_glupteba behavioral2/memory/1256-215-0x0000000000400000-0x0000000000D41000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rUNdlL32.eXedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1880 4044 rUNdlL32.eXe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/3256-218-0x0000000000040000-0x0000000000271000-memory.dmp family_redline behavioral2/memory/3256-229-0x0000000000042000-0x0000000000078000-memory.dmp family_redline behavioral2/memory/3256-219-0x0000000000042000-0x0000000000078000-memory.dmp family_redline behavioral2/memory/3256-240-0x0000000000040000-0x0000000000271000-memory.dmp family_redline behavioral2/memory/3256-242-0x0000000000040000-0x0000000000271000-memory.dmp family_redline behavioral2/memory/1656-244-0x0000000000DF0000-0x0000000000EE4000-memory.dmp family_redline behavioral2/memory/1656-246-0x0000000000DF0000-0x0000000000EE4000-memory.dmp family_redline behavioral2/memory/1656-248-0x0000000000DF2000-0x0000000000E25000-memory.dmp family_redline behavioral2/memory/5164-258-0x00000000001D0000-0x0000000000387000-memory.dmp family_redline behavioral2/memory/1656-280-0x0000000000DF2000-0x0000000000E25000-memory.dmp family_redline behavioral2/memory/5164-268-0x00000000001D2000-0x0000000000207000-memory.dmp family_redline behavioral2/memory/5164-261-0x00000000001D0000-0x0000000000387000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Install.exe family_socelars C:\Users\Admin\AppData\Local\Temp\Install.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 2188 created 4176 2188 WerFault.exe rundll32.exe PID 1252 created 3308 1252 WerFault.exe geVu_wAoUbI1PuQKJ6bVd7VJ.exe PID 4608 created 4892 4608 WerFault.exe KeVFnUVah4Dt4kq5rllnp5Xi.exe PID 5004 created 1864 5004 WerFault.exe akYp8s_987TCNI5qcVWLnJJs.exe PID 1068 created 1552 1068 WerFault.exe KTua4yTuXa2dTw8UgYaiu0lG.exe PID 5560 created 5212 5560 WerFault.exe LTUPgJG9jEJ99QexChjfvceS.exe PID 5624 created 1864 5624 WerFault.exe akYp8s_987TCNI5qcVWLnJJs.exe PID 5744 created 4952 5744 WerFault.exe I5RY1ztuWRES9ICqj1XbrOUk.exe PID 5652 created 4892 5652 WerFault.exe KeVFnUVah4Dt4kq5rllnp5Xi.exe PID 5548 created 5204 5548 WerFault.exe TwNbMOClgncA8o1Mhyy11dUy.exe PID 5512 created 5172 5512 WerFault.exe lVSghfaLLSn5nVylEfLmiWgz.exe PID 6132 created 5212 6132 WerFault.exe LTUPgJG9jEJ99QexChjfvceS.exe PID 5244 created 5172 5244 WerFault.exe lVSghfaLLSn5nVylEfLmiWgz.exe PID 5228 created 5204 5228 WerFault.exe TwNbMOClgncA8o1Mhyy11dUy.exe PID 5612 created 3308 5612 WerFault.exe geVu_wAoUbI1PuQKJ6bVd7VJ.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
svchost.exedescription pid process target process PID 4528 created 1344 4528 svchost.exe Info.exe PID 4528 created 1256 4528 svchost.exe csrss.exe -
OnlyLogger Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4952-251-0x0000000001AB0000-0x0000000001AF4000-memory.dmp family_onlylogger behavioral2/memory/4952-276-0x0000000000400000-0x0000000000447000-memory.dmp family_onlylogger -
Downloads MZ/PE file
-
Executes dropped EXE 43 IoCs
Processes:
md9_1sjm.exeSoCleanInst.exeFolder.exeInfo.exeUpdbdate.exeFile.exeInstall.exepub2.exeFiles.exeFolder.exejfiag3g_gg.exejfiag3g_gg.exeInfo.execsrss.exexWutTQqWYWuD_MVjrYDgMFr6.exekATfMtvsx3wTaalPKvoAcxvM.exe1GWbk3mRPAv2fBIYn8CXkoSe.exeKTua4yTuXa2dTw8UgYaiu0lG.exeyy_BkeEzmCGqhSOvciO32pgv.exeI5RY1ztuWRES9ICqj1XbrOUk.exeU9jdj6HzHQBc1yoytxu94sMd.exeyRWrqtm606H6upc_M2XeZO_V.exepdrMk24l1OAtyXj2dapn3nCT.exewan1R7TQ2mLQAeJFG8zvxKbg.exeakYp8s_987TCNI5qcVWLnJJs.exeKeVFnUVah4Dt4kq5rllnp5Xi.exeZXo6T5S8coL_okjGbUHvsTua.exeJrC1zC9AywfbekfFb4sJvmKP.exeyv0lTacURSjC6C6EYAaS4y3k.exeYrCjvldFtaHKRSkzns8dt29c.exegeVu_wAoUbI1PuQKJ6bVd7VJ.exeslPtV4DEdVUaz3s7U7wmBZQh.exexcLWLvltuz7QcXnN9lgtqjWI.exe7ad1ub0OGnVDMRADt5iwyqSe.exeNWJLaZfldSRZdJ8glmj57d_s.exelVSghfaLLSn5nVylEfLmiWgz.exeTwNbMOClgncA8o1Mhyy11dUy.exeLTUPgJG9jEJ99QexChjfvceS.exeslPtV4DEdVUaz3s7U7wmBZQh.exeyRWrqtm606H6upc_M2XeZO_V.exeEZ7k5hn07sqlDWCR84uG6kjR.exeinjector.exeFmMf_auFungmbJ4009DeY0HS.exepid process 3340 md9_1sjm.exe 3276 SoCleanInst.exe 4620 Folder.exe 1344 Info.exe 3484 Updbdate.exe 2256 File.exe 2824 Install.exe 4028 pub2.exe 4884 Files.exe 2388 Folder.exe 2432 jfiag3g_gg.exe 412 jfiag3g_gg.exe 1968 Info.exe 1256 csrss.exe 1560 xWutTQqWYWuD_MVjrYDgMFr6.exe 368 kATfMtvsx3wTaalPKvoAcxvM.exe 3608 1GWbk3mRPAv2fBIYn8CXkoSe.exe 1552 KTua4yTuXa2dTw8UgYaiu0lG.exe 2616 yy_BkeEzmCGqhSOvciO32pgv.exe 4952 I5RY1ztuWRES9ICqj1XbrOUk.exe 2968 U9jdj6HzHQBc1yoytxu94sMd.exe 4212 yRWrqtm606H6upc_M2XeZO_V.exe 2280 pdrMk24l1OAtyXj2dapn3nCT.exe 3136 wan1R7TQ2mLQAeJFG8zvxKbg.exe 1864 akYp8s_987TCNI5qcVWLnJJs.exe 4892 KeVFnUVah4Dt4kq5rllnp5Xi.exe 1304 ZXo6T5S8coL_okjGbUHvsTua.exe 3256 JrC1zC9AywfbekfFb4sJvmKP.exe 444 yv0lTacURSjC6C6EYAaS4y3k.exe 3616 YrCjvldFtaHKRSkzns8dt29c.exe 3308 geVu_wAoUbI1PuQKJ6bVd7VJ.exe 3400 slPtV4DEdVUaz3s7U7wmBZQh.exe 1656 xcLWLvltuz7QcXnN9lgtqjWI.exe 4968 7ad1ub0OGnVDMRADt5iwyqSe.exe 5164 NWJLaZfldSRZdJ8glmj57d_s.exe 5172 lVSghfaLLSn5nVylEfLmiWgz.exe 5204 TwNbMOClgncA8o1Mhyy11dUy.exe 5212 LTUPgJG9jEJ99QexChjfvceS.exe 5324 slPtV4DEdVUaz3s7U7wmBZQh.exe 5352 yRWrqtm606H6upc_M2XeZO_V.exe 2080 EZ7k5hn07sqlDWCR84uG6kjR.exe 5976 injector.exe 5628 FmMf_auFungmbJ4009DeY0HS.exe -
Modifies Windows Firewall 1 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\Pictures\Adobe Films\YrCjvldFtaHKRSkzns8dt29c.exe upx C:\Users\Admin\Pictures\Adobe Films\YrCjvldFtaHKRSkzns8dt29c.exe upx -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Folder.exeFile.exe1GWbk3mRPAv2fBIYn8CXkoSe.exeEZ7k5hn07sqlDWCR84uG6kjR.exe19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Folder.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation File.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 1GWbk3mRPAv2fBIYn8CXkoSe.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation EZ7k5hn07sqlDWCR84uG6kjR.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepdrMk24l1OAtyXj2dapn3nCT.exepid process 4176 rundll32.exe 2280 pdrMk24l1OAtyXj2dapn3nCT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Files.exeInfo.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.ex" Files.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SummerHaze = "\"C:\\Windows\\rss\\csrss.exe\"" Info.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
md9_1sjm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md9_1sjm.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 322 ipinfo.io 25 ip-api.com 113 ipinfo.io 114 ipinfo.io 261 ipinfo.io 262 ipinfo.io 321 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
JrC1zC9AywfbekfFb4sJvmKP.exexcLWLvltuz7QcXnN9lgtqjWI.exeNWJLaZfldSRZdJ8glmj57d_s.exepid process 3256 JrC1zC9AywfbekfFb4sJvmKP.exe 1656 xcLWLvltuz7QcXnN9lgtqjWI.exe 5164 NWJLaZfldSRZdJ8glmj57d_s.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
slPtV4DEdVUaz3s7U7wmBZQh.exeyRWrqtm606H6upc_M2XeZO_V.exedescription pid process target process PID 3400 set thread context of 5324 3400 slPtV4DEdVUaz3s7U7wmBZQh.exe slPtV4DEdVUaz3s7U7wmBZQh.exe PID 4212 set thread context of 5352 4212 yRWrqtm606H6upc_M2XeZO_V.exe yRWrqtm606H6upc_M2XeZO_V.exe -
Drops file in Program Files directory 5 IoCs
Processes:
1GWbk3mRPAv2fBIYn8CXkoSe.exekATfMtvsx3wTaalPKvoAcxvM.exedescription ioc process File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe 1GWbk3mRPAv2fBIYn8CXkoSe.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe 1GWbk3mRPAv2fBIYn8CXkoSe.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe kATfMtvsx3wTaalPKvoAcxvM.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe kATfMtvsx3wTaalPKvoAcxvM.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini kATfMtvsx3wTaalPKvoAcxvM.exe -
Drops file in Windows directory 3 IoCs
Processes:
WerFault.exeInfo.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\rss Info.exe File created C:\Windows\rss\csrss.exe Info.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 60 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4228 4176 WerFault.exe rundll32.exe 3996 1344 WerFault.exe Info.exe 4548 1344 WerFault.exe Info.exe 1232 1344 WerFault.exe Info.exe 3776 1344 WerFault.exe Info.exe 4676 1344 WerFault.exe Info.exe 3992 1344 WerFault.exe Info.exe 4892 1344 WerFault.exe Info.exe 4556 1344 WerFault.exe Info.exe 296 1344 WerFault.exe Info.exe 1096 1344 WerFault.exe Info.exe 3108 1344 WerFault.exe Info.exe 4932 1344 WerFault.exe Info.exe 2308 1344 WerFault.exe Info.exe 4576 1344 WerFault.exe Info.exe 4028 1344 WerFault.exe Info.exe 4000 1344 WerFault.exe Info.exe 3068 1344 WerFault.exe Info.exe 1432 1344 WerFault.exe Info.exe 992 1344 WerFault.exe Info.exe 3804 1344 WerFault.exe Info.exe 4204 1344 WerFault.exe Info.exe 4224 1968 WerFault.exe Info.exe 2020 1968 WerFault.exe Info.exe 3800 1968 WerFault.exe Info.exe 4856 1968 WerFault.exe Info.exe 3400 1968 WerFault.exe Info.exe 3452 1968 WerFault.exe Info.exe 3436 1968 WerFault.exe Info.exe 4388 1968 WerFault.exe Info.exe 1908 1968 WerFault.exe Info.exe 2980 1968 WerFault.exe Info.exe 1552 1968 WerFault.exe Info.exe 1936 1968 WerFault.exe Info.exe 1716 1968 WerFault.exe Info.exe 2484 1968 WerFault.exe Info.exe 616 1968 WerFault.exe Info.exe 1988 1968 WerFault.exe Info.exe 3004 1256 WerFault.exe csrss.exe 4508 1256 WerFault.exe csrss.exe 604 1256 WerFault.exe csrss.exe 432 1256 WerFault.exe csrss.exe 3256 1256 WerFault.exe csrss.exe 2968 1256 WerFault.exe csrss.exe 3136 1256 WerFault.exe csrss.exe 2260 1256 WerFault.exe csrss.exe 620 1256 WerFault.exe csrss.exe 3928 1256 WerFault.exe csrss.exe 1988 1256 WerFault.exe csrss.exe 2456 1256 WerFault.exe csrss.exe 3308 1256 WerFault.exe csrss.exe 5692 3308 WerFault.exe geVu_wAoUbI1PuQKJ6bVd7VJ.exe 6100 1864 WerFault.exe akYp8s_987TCNI5qcVWLnJJs.exe 4748 1256 WerFault.exe csrss.exe 4316 4952 WerFault.exe I5RY1ztuWRES9ICqj1XbrOUk.exe 6140 1864 WerFault.exe akYp8s_987TCNI5qcVWLnJJs.exe 1748 5172 WerFault.exe lVSghfaLLSn5nVylEfLmiWgz.exe 4848 1256 WerFault.exe csrss.exe 1936 1256 WerFault.exe csrss.exe 1704 5204 WerFault.exe TwNbMOClgncA8o1Mhyy11dUy.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
pub2.exeyRWrqtm606H6upc_M2XeZO_V.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI yRWrqtm606H6upc_M2XeZO_V.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI yRWrqtm606H6upc_M2XeZO_V.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI yRWrqtm606H6upc_M2XeZO_V.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 3460 schtasks.exe 5800 schtasks.exe 5684 schtasks.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1996 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
Info.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" Info.exe -
Processes:
File.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 File.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 File.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
pub2.exejfiag3g_gg.exepid process 4028 pub2.exe 4028 pub2.exe 412 jfiag3g_gg.exe 412 jfiag3g_gg.exe 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2712 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
pub2.exeyRWrqtm606H6upc_M2XeZO_V.exepid process 4028 pub2.exe 5352 yRWrqtm606H6upc_M2XeZO_V.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
SoCleanInst.exeInstall.exemd9_1sjm.exeWerFault.exetaskkill.exedescription pid process Token: SeDebugPrivilege 3276 SoCleanInst.exe Token: SeCreateTokenPrivilege 2824 Install.exe Token: SeAssignPrimaryTokenPrivilege 2824 Install.exe Token: SeLockMemoryPrivilege 2824 Install.exe Token: SeIncreaseQuotaPrivilege 2824 Install.exe Token: SeMachineAccountPrivilege 2824 Install.exe Token: SeTcbPrivilege 2824 Install.exe Token: SeSecurityPrivilege 2824 Install.exe Token: SeTakeOwnershipPrivilege 2824 Install.exe Token: SeLoadDriverPrivilege 2824 Install.exe Token: SeSystemProfilePrivilege 2824 Install.exe Token: SeSystemtimePrivilege 2824 Install.exe Token: SeProfSingleProcessPrivilege 2824 Install.exe Token: SeIncBasePriorityPrivilege 2824 Install.exe Token: SeCreatePagefilePrivilege 2824 Install.exe Token: SeCreatePermanentPrivilege 2824 Install.exe Token: SeBackupPrivilege 2824 Install.exe Token: SeRestorePrivilege 2824 Install.exe Token: SeShutdownPrivilege 2824 Install.exe Token: SeDebugPrivilege 2824 Install.exe Token: SeAuditPrivilege 2824 Install.exe Token: SeSystemEnvironmentPrivilege 2824 Install.exe Token: SeChangeNotifyPrivilege 2824 Install.exe Token: SeRemoteShutdownPrivilege 2824 Install.exe Token: SeUndockPrivilege 2824 Install.exe Token: SeSyncAgentPrivilege 2824 Install.exe Token: SeEnableDelegationPrivilege 2824 Install.exe Token: SeManageVolumePrivilege 2824 Install.exe Token: SeImpersonatePrivilege 2824 Install.exe Token: SeCreateGlobalPrivilege 2824 Install.exe Token: 31 2824 Install.exe Token: 32 2824 Install.exe Token: 33 2824 Install.exe Token: 34 2824 Install.exe Token: 35 2824 Install.exe Token: SeManageVolumePrivilege 3340 md9_1sjm.exe Token: SeRestorePrivilege 4228 WerFault.exe Token: SeBackupPrivilege 4228 WerFault.exe Token: SeBackupPrivilege 4228 WerFault.exe Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeDebugPrivilege 1996 taskkill.exe Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 -
Suspicious use of SetWindowsHookEx 22 IoCs
Processes:
kATfMtvsx3wTaalPKvoAcxvM.exeyy_BkeEzmCGqhSOvciO32pgv.exeyRWrqtm606H6upc_M2XeZO_V.exeJrC1zC9AywfbekfFb4sJvmKP.exeyv0lTacURSjC6C6EYAaS4y3k.exeZXo6T5S8coL_okjGbUHvsTua.exeakYp8s_987TCNI5qcVWLnJJs.exeKeVFnUVah4Dt4kq5rllnp5Xi.exe1GWbk3mRPAv2fBIYn8CXkoSe.exeI5RY1ztuWRES9ICqj1XbrOUk.exeslPtV4DEdVUaz3s7U7wmBZQh.exegeVu_wAoUbI1PuQKJ6bVd7VJ.exepdrMk24l1OAtyXj2dapn3nCT.exe7ad1ub0OGnVDMRADt5iwyqSe.exexcLWLvltuz7QcXnN9lgtqjWI.exeNWJLaZfldSRZdJ8glmj57d_s.exeslPtV4DEdVUaz3s7U7wmBZQh.exelVSghfaLLSn5nVylEfLmiWgz.exeTwNbMOClgncA8o1Mhyy11dUy.exeLTUPgJG9jEJ99QexChjfvceS.exeKTua4yTuXa2dTw8UgYaiu0lG.exeEZ7k5hn07sqlDWCR84uG6kjR.exepid process 368 kATfMtvsx3wTaalPKvoAcxvM.exe 2616 yy_BkeEzmCGqhSOvciO32pgv.exe 4212 yRWrqtm606H6upc_M2XeZO_V.exe 3256 JrC1zC9AywfbekfFb4sJvmKP.exe 444 yv0lTacURSjC6C6EYAaS4y3k.exe 1304 ZXo6T5S8coL_okjGbUHvsTua.exe 1864 akYp8s_987TCNI5qcVWLnJJs.exe 4892 KeVFnUVah4Dt4kq5rllnp5Xi.exe 3608 1GWbk3mRPAv2fBIYn8CXkoSe.exe 4952 I5RY1ztuWRES9ICqj1XbrOUk.exe 3400 slPtV4DEdVUaz3s7U7wmBZQh.exe 3308 geVu_wAoUbI1PuQKJ6bVd7VJ.exe 2280 pdrMk24l1OAtyXj2dapn3nCT.exe 4968 7ad1ub0OGnVDMRADt5iwyqSe.exe 1656 xcLWLvltuz7QcXnN9lgtqjWI.exe 5164 NWJLaZfldSRZdJ8glmj57d_s.exe 5324 slPtV4DEdVUaz3s7U7wmBZQh.exe 5172 lVSghfaLLSn5nVylEfLmiWgz.exe 5204 TwNbMOClgncA8o1Mhyy11dUy.exe 5212 LTUPgJG9jEJ99QexChjfvceS.exe 1552 KTua4yTuXa2dTw8UgYaiu0lG.exe 2080 EZ7k5hn07sqlDWCR84uG6kjR.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exeFolder.exeFiles.exerUNdlL32.eXeWerFault.exeInstall.execmd.exesvchost.exeInfo.execmd.exeFile.exedescription pid process target process PID 3068 wrote to memory of 3340 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe md9_1sjm.exe PID 3068 wrote to memory of 3340 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe md9_1sjm.exe PID 3068 wrote to memory of 3340 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe md9_1sjm.exe PID 3068 wrote to memory of 3276 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe SoCleanInst.exe PID 3068 wrote to memory of 3276 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe SoCleanInst.exe PID 3068 wrote to memory of 4620 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe Folder.exe PID 3068 wrote to memory of 4620 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe Folder.exe PID 3068 wrote to memory of 4620 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe Folder.exe PID 3068 wrote to memory of 1344 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe Info.exe PID 3068 wrote to memory of 1344 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe Info.exe PID 3068 wrote to memory of 1344 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe Info.exe PID 3068 wrote to memory of 3484 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe Updbdate.exe PID 3068 wrote to memory of 3484 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe Updbdate.exe PID 3068 wrote to memory of 3484 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe Updbdate.exe PID 3068 wrote to memory of 2256 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe File.exe PID 3068 wrote to memory of 2256 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe File.exe PID 3068 wrote to memory of 2256 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe File.exe PID 3068 wrote to memory of 2824 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe Install.exe PID 3068 wrote to memory of 2824 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe Install.exe PID 3068 wrote to memory of 2824 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe Install.exe PID 3068 wrote to memory of 4028 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe pub2.exe PID 3068 wrote to memory of 4028 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe pub2.exe PID 3068 wrote to memory of 4028 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe pub2.exe PID 3068 wrote to memory of 4884 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe Files.exe PID 3068 wrote to memory of 4884 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe Files.exe PID 3068 wrote to memory of 4884 3068 19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe Files.exe PID 4620 wrote to memory of 2388 4620 Folder.exe Folder.exe PID 4620 wrote to memory of 2388 4620 Folder.exe Folder.exe PID 4620 wrote to memory of 2388 4620 Folder.exe Folder.exe PID 4884 wrote to memory of 2432 4884 Files.exe jfiag3g_gg.exe PID 4884 wrote to memory of 2432 4884 Files.exe jfiag3g_gg.exe PID 4884 wrote to memory of 2432 4884 Files.exe jfiag3g_gg.exe PID 1880 wrote to memory of 4176 1880 rUNdlL32.eXe rundll32.exe PID 1880 wrote to memory of 4176 1880 rUNdlL32.eXe rundll32.exe PID 1880 wrote to memory of 4176 1880 rUNdlL32.eXe rundll32.exe PID 4884 wrote to memory of 412 4884 Files.exe jfiag3g_gg.exe PID 4884 wrote to memory of 412 4884 Files.exe jfiag3g_gg.exe PID 4884 wrote to memory of 412 4884 Files.exe jfiag3g_gg.exe PID 2188 wrote to memory of 4176 2188 WerFault.exe rundll32.exe PID 2188 wrote to memory of 4176 2188 WerFault.exe rundll32.exe PID 2824 wrote to memory of 856 2824 Install.exe cmd.exe PID 2824 wrote to memory of 856 2824 Install.exe cmd.exe PID 2824 wrote to memory of 856 2824 Install.exe cmd.exe PID 856 wrote to memory of 1996 856 cmd.exe taskkill.exe PID 856 wrote to memory of 1996 856 cmd.exe taskkill.exe PID 856 wrote to memory of 1996 856 cmd.exe taskkill.exe PID 4528 wrote to memory of 1968 4528 svchost.exe Info.exe PID 4528 wrote to memory of 1968 4528 svchost.exe Info.exe PID 4528 wrote to memory of 1968 4528 svchost.exe Info.exe PID 1968 wrote to memory of 3376 1968 Info.exe cmd.exe PID 1968 wrote to memory of 3376 1968 Info.exe cmd.exe PID 3376 wrote to memory of 4788 3376 cmd.exe netsh.exe PID 3376 wrote to memory of 4788 3376 cmd.exe netsh.exe PID 1968 wrote to memory of 1256 1968 Info.exe csrss.exe PID 1968 wrote to memory of 1256 1968 Info.exe csrss.exe PID 1968 wrote to memory of 1256 1968 Info.exe csrss.exe PID 2256 wrote to memory of 1560 2256 File.exe xWutTQqWYWuD_MVjrYDgMFr6.exe PID 2256 wrote to memory of 1560 2256 File.exe xWutTQqWYWuD_MVjrYDgMFr6.exe PID 2256 wrote to memory of 368 2256 File.exe kATfMtvsx3wTaalPKvoAcxvM.exe PID 2256 wrote to memory of 368 2256 File.exe kATfMtvsx3wTaalPKvoAcxvM.exe PID 2256 wrote to memory of 368 2256 File.exe kATfMtvsx3wTaalPKvoAcxvM.exe PID 2256 wrote to memory of 3608 2256 File.exe 1GWbk3mRPAv2fBIYn8CXkoSe.exe PID 2256 wrote to memory of 3608 2256 File.exe 1GWbk3mRPAv2fBIYn8CXkoSe.exe PID 2256 wrote to memory of 3608 2256 File.exe 1GWbk3mRPAv2fBIYn8CXkoSe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe"C:\Users\Admin\AppData\Local\Temp\19aa56dc98677b4838ec221d983bc71579ca6315a90e6aa563c32005be7dc7d6.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe"C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\SoCleanInst.exe"C:\Users\Admin\AppData\Local\Temp\SoCleanInst.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Folder.exe"C:\Users\Admin\AppData\Local\Temp\Folder.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Folder.exe"C:\Users\Admin\AppData\Local\Temp\Folder.exe" -a3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Info.exe"C:\Users\Admin\AppData\Local\Temp\Info.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 3683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 3763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 3763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 6043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 6963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 6963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 7283⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 7363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 7523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 7483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 6883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 6883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 8483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 8483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 6043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 9123⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 6963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 8923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 8043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 9043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 8483⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\Info.exe"C:\Users\Admin\AppData\Local\Temp\Info.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 2164⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 3364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 2164⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 6284⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 6284⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 6844⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 7004⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 7084⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 7244⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 7164⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 5724⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 8284⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 8924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 7404⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 8524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 8284⤵
- Program crash
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /94-944⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 3685⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 3725⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 3725⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 6045⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 6965⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 6965⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 7285⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 7405⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 7605⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 8205⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 6565⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 7965⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 8845⤵
- Program crash
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 10005⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 10645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 10005⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Updbdate.exe"C:\Users\Admin\AppData\Local\Temp\Updbdate.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\xWutTQqWYWuD_MVjrYDgMFr6.exe"C:\Users\Admin\Pictures\Adobe Films\xWutTQqWYWuD_MVjrYDgMFr6.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\kATfMtvsx3wTaalPKvoAcxvM.exe"C:\Users\Admin\Pictures\Adobe Films\kATfMtvsx3wTaalPKvoAcxvM.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\akYp8s_987TCNI5qcVWLnJJs.exe"C:\Users\Admin\Pictures\Adobe Films\akYp8s_987TCNI5qcVWLnJJs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 4644⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 4724⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\ZXo6T5S8coL_okjGbUHvsTua.exe"C:\Users\Admin\Pictures\Adobe Films\ZXo6T5S8coL_okjGbUHvsTua.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\yv0lTacURSjC6C6EYAaS4y3k.exe"C:\Users\Admin\Pictures\Adobe Films\yv0lTacURSjC6C6EYAaS4y3k.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\KeVFnUVah4Dt4kq5rllnp5Xi.exe"C:\Users\Admin\Pictures\Adobe Films\KeVFnUVah4Dt4kq5rllnp5Xi.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\wan1R7TQ2mLQAeJFG8zvxKbg.exe"C:\Users\Admin\Pictures\Adobe Films\wan1R7TQ2mLQAeJFG8zvxKbg.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\pdrMk24l1OAtyXj2dapn3nCT.exe"C:\Users\Admin\Pictures\Adobe Films\pdrMk24l1OAtyXj2dapn3nCT.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\yRWrqtm606H6upc_M2XeZO_V.exe"C:\Users\Admin\Pictures\Adobe Films\yRWrqtm606H6upc_M2XeZO_V.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\yRWrqtm606H6upc_M2XeZO_V.exe"C:\Users\Admin\Pictures\Adobe Films\yRWrqtm606H6upc_M2XeZO_V.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\U9jdj6HzHQBc1yoytxu94sMd.exe"C:\Users\Admin\Pictures\Adobe Films\U9jdj6HzHQBc1yoytxu94sMd.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\I5RY1ztuWRES9ICqj1XbrOUk.exe"C:\Users\Admin\Pictures\Adobe Films\I5RY1ztuWRES9ICqj1XbrOUk.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 6364⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\yy_BkeEzmCGqhSOvciO32pgv.exe"C:\Users\Admin\Pictures\Adobe Films\yy_BkeEzmCGqhSOvciO32pgv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\KTua4yTuXa2dTw8UgYaiu0lG.exe"C:\Users\Admin\Pictures\Adobe Films\KTua4yTuXa2dTw8UgYaiu0lG.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\JrC1zC9AywfbekfFb4sJvmKP.exe"C:\Users\Admin\Pictures\Adobe Films\JrC1zC9AywfbekfFb4sJvmKP.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\1GWbk3mRPAv2fBIYn8CXkoSe.exe"C:\Users\Admin\Pictures\Adobe Films\1GWbk3mRPAv2fBIYn8CXkoSe.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Documents\EZ7k5hn07sqlDWCR84uG6kjR.exe"C:\Users\Admin\Documents\EZ7k5hn07sqlDWCR84uG6kjR.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\FmMf_auFungmbJ4009DeY0HS.exe"C:\Users\Admin\Pictures\Adobe Films\FmMf_auFungmbJ4009DeY0HS.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\YrCjvldFtaHKRSkzns8dt29c.exe"C:\Users\Admin\Pictures\Adobe Films\YrCjvldFtaHKRSkzns8dt29c.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\slPtV4DEdVUaz3s7U7wmBZQh.exe"C:\Users\Admin\Pictures\Adobe Films\slPtV4DEdVUaz3s7U7wmBZQh.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\slPtV4DEdVUaz3s7U7wmBZQh.exe"C:\Users\Admin\Pictures\Adobe Films\slPtV4DEdVUaz3s7U7wmBZQh.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\geVu_wAoUbI1PuQKJ6bVd7VJ.exe"C:\Users\Admin\Pictures\Adobe Films\geVu_wAoUbI1PuQKJ6bVd7VJ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 4644⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\xcLWLvltuz7QcXnN9lgtqjWI.exe"C:\Users\Admin\Pictures\Adobe Films\xcLWLvltuz7QcXnN9lgtqjWI.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\7ad1ub0OGnVDMRADt5iwyqSe.exe"C:\Users\Admin\Pictures\Adobe Films\7ad1ub0OGnVDMRADt5iwyqSe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\LTUPgJG9jEJ99QexChjfvceS.exe"C:\Users\Admin\Pictures\Adobe Films\LTUPgJG9jEJ99QexChjfvceS.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\TwNbMOClgncA8o1Mhyy11dUy.exe"C:\Users\Admin\Pictures\Adobe Films\TwNbMOClgncA8o1Mhyy11dUy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5204 -s 4724⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\lVSghfaLLSn5nVylEfLmiWgz.exe"C:\Users\Admin\Pictures\Adobe Films\lVSghfaLLSn5nVylEfLmiWgz.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5172 -s 4724⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\Pictures\Adobe Films\NWJLaZfldSRZdJ8glmj57d_s.exe"C:\Users\Admin\Pictures\Adobe Films\NWJLaZfldSRZdJ8glmj57d_s.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\pub2.exe"C:\Users\Admin\AppData\Local\Temp\pub2.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\Files.exe"C:\Users\Admin\AppData\Local\Temp\Files.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 6003⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4176 -ip 41761⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1344 -ip 13441⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1864 -ip 18641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3308 -ip 33081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4892 -ip 48921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1552 -ip 15521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 5204 -ip 52041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5212 -ip 52121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 1864 -ip 18641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 4892 -ip 48921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3308 -ip 33081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5172 -ip 51721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4952 -ip 49521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5204 -ip 52041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 5172 -ip 51721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 5212 -ip 52121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 764 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 1256 -ip 12561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 1256 -ip 12561⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Modify Registry
3Disabling Security Tools
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\File.exeMD5
ffa10b8f567a3594efeb6bafe7d10dde
SHA188248fa822a13bffdb51aafb160df3aed75b8e3d
SHA256fd4c09eb1e21efd0c49f12f68a77aa91051a7e272bc819c13094c52c3fe27ef0
SHA512b3c7c71c0ffd17e9bf0e575016e96243d25d4a696a5e3236f564d6c27aaef1a91b68d82ccdafcb5b429e354a9656da309be1a9e0049dc966d40b990efc7d3f82
-
C:\Users\Admin\AppData\Local\Temp\File.exeMD5
ffa10b8f567a3594efeb6bafe7d10dde
SHA188248fa822a13bffdb51aafb160df3aed75b8e3d
SHA256fd4c09eb1e21efd0c49f12f68a77aa91051a7e272bc819c13094c52c3fe27ef0
SHA512b3c7c71c0ffd17e9bf0e575016e96243d25d4a696a5e3236f564d6c27aaef1a91b68d82ccdafcb5b429e354a9656da309be1a9e0049dc966d40b990efc7d3f82
-
C:\Users\Admin\AppData\Local\Temp\Files.exeMD5
2d0217e0c70440d8c82883eadea517b9
SHA1f3b7dd6dbb43b895ba26f67370af99952b7d83cb
SHA256d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01
SHA5126d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d
-
C:\Users\Admin\AppData\Local\Temp\Files.exeMD5
2d0217e0c70440d8c82883eadea517b9
SHA1f3b7dd6dbb43b895ba26f67370af99952b7d83cb
SHA256d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01
SHA5126d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d
-
C:\Users\Admin\AppData\Local\Temp\Folder.exeMD5
b89068659ca07ab9b39f1c580a6f9d39
SHA17e3e246fcf920d1ada06900889d099784fe06aa5
SHA2569d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c
SHA512940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52
-
C:\Users\Admin\AppData\Local\Temp\Folder.exeMD5
b89068659ca07ab9b39f1c580a6f9d39
SHA17e3e246fcf920d1ada06900889d099784fe06aa5
SHA2569d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c
SHA512940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52
-
C:\Users\Admin\AppData\Local\Temp\Folder.exeMD5
b89068659ca07ab9b39f1c580a6f9d39
SHA17e3e246fcf920d1ada06900889d099784fe06aa5
SHA2569d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c
SHA512940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52
-
C:\Users\Admin\AppData\Local\Temp\Info.exeMD5
165c8d385e0af406deb1089b621c28db
SHA13d7b93f834a08a9bc790290a20aaf835aaaf9c5c
SHA2567dc6c82e185577088f88e349a6d315138cdbed3956cbb6be5af1f9c098642a33
SHA5120bbc83a67cfb0ca2f4976b04e84ba60d708ffb7f66050da73cd0a0f28cde09dfde9b762ff5ceca35c22f5461576c47e190342470c470c6360bfb4edad8e34e14
-
C:\Users\Admin\AppData\Local\Temp\Info.exeMD5
165c8d385e0af406deb1089b621c28db
SHA13d7b93f834a08a9bc790290a20aaf835aaaf9c5c
SHA2567dc6c82e185577088f88e349a6d315138cdbed3956cbb6be5af1f9c098642a33
SHA5120bbc83a67cfb0ca2f4976b04e84ba60d708ffb7f66050da73cd0a0f28cde09dfde9b762ff5ceca35c22f5461576c47e190342470c470c6360bfb4edad8e34e14
-
C:\Users\Admin\AppData\Local\Temp\Info.exeMD5
165c8d385e0af406deb1089b621c28db
SHA13d7b93f834a08a9bc790290a20aaf835aaaf9c5c
SHA2567dc6c82e185577088f88e349a6d315138cdbed3956cbb6be5af1f9c098642a33
SHA5120bbc83a67cfb0ca2f4976b04e84ba60d708ffb7f66050da73cd0a0f28cde09dfde9b762ff5ceca35c22f5461576c47e190342470c470c6360bfb4edad8e34e14
-
C:\Users\Admin\AppData\Local\Temp\Install.exeMD5
2d8ae85a8155eb6e73a00b731bf54927
SHA131321387579b747a8524aee33f3ed666a11c59b8
SHA256b09541e6950cabd94ea006c019fbd732529bcad74e90c8e2c033dc5856eb93a0
SHA51229cc708326e636800d82d7239ac627b85b8dbcde3be3265a664d1be4798268b7ff170b26c31c3232229e44e9a08db56bd90e24f1910c419587230bd4e8b4ce3b
-
C:\Users\Admin\AppData\Local\Temp\Install.exeMD5
2d8ae85a8155eb6e73a00b731bf54927
SHA131321387579b747a8524aee33f3ed666a11c59b8
SHA256b09541e6950cabd94ea006c019fbd732529bcad74e90c8e2c033dc5856eb93a0
SHA51229cc708326e636800d82d7239ac627b85b8dbcde3be3265a664d1be4798268b7ff170b26c31c3232229e44e9a08db56bd90e24f1910c419587230bd4e8b4ce3b
-
C:\Users\Admin\AppData\Local\Temp\SoCleanInst.exeMD5
ef11eb43d9a2a7c19a88710851ce7245
SHA1d7747af6c7c1f149afeea7cff4e77a9bb4c6b790
SHA2568e2aacc0889c17e1dc499f64b7772a93cc8bdd0bf4813a7c2a2605e68d0c01a2
SHA512269c84c964fc2106be2842afc666f659dada44b9d7439be8e5d2b4b4605b87850aca83fab8730cb886aba8b2e3b9df5f2140389481802657e8382477e53a0089
-
C:\Users\Admin\AppData\Local\Temp\SoCleanInst.exeMD5
ef11eb43d9a2a7c19a88710851ce7245
SHA1d7747af6c7c1f149afeea7cff4e77a9bb4c6b790
SHA2568e2aacc0889c17e1dc499f64b7772a93cc8bdd0bf4813a7c2a2605e68d0c01a2
SHA512269c84c964fc2106be2842afc666f659dada44b9d7439be8e5d2b4b4605b87850aca83fab8730cb886aba8b2e3b9df5f2140389481802657e8382477e53a0089
-
C:\Users\Admin\AppData\Local\Temp\Updbdate.exeMD5
a1aa92514ce7b4333ae24ee436bb1f9e
SHA10b62cbf66c80a8972ccad005b3321a22bc86f2aa
SHA256b7e1af7d5710e5402489ad91151ba363a8f6f70bb25f937f906efa35dae7e5da
SHA51241ddcf05dac05bcecc0e46832da93235d8104501a62b38e164bbf2a53bd0f817f433ae5d867df5131932968679eba49ae342ec27cdb036a89a7099d6ad6a9809
-
C:\Users\Admin\AppData\Local\Temp\Updbdate.exeMD5
a1aa92514ce7b4333ae24ee436bb1f9e
SHA10b62cbf66c80a8972ccad005b3321a22bc86f2aa
SHA256b7e1af7d5710e5402489ad91151ba363a8f6f70bb25f937f906efa35dae7e5da
SHA51241ddcf05dac05bcecc0e46832da93235d8104501a62b38e164bbf2a53bd0f817f433ae5d867df5131932968679eba49ae342ec27cdb036a89a7099d6ad6a9809
-
C:\Users\Admin\AppData\Local\Temp\axhub.datMD5
5fd2eba6df44d23c9e662763009d7f84
SHA143530574f8ac455ae263c70cc99550bc60bfa4f1
SHA2562991e2231855661e94ef80a4202487a9d7dc7bebccab9a0b2a786cf0783a051f
SHA512321a86725e533dedb5b74e17218e6e53a49fa6ffc87d7f7da0f0b8441a081fe785f7846a76f67ef03ec3abddacbe8906b20a2f3ce8178896ec57090ef7ab0eb7
-
C:\Users\Admin\AppData\Local\Temp\axhub.dllMD5
1c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e
-
C:\Users\Admin\AppData\Local\Temp\axhub.dllMD5
1c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e
-
C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txtMD5
b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txtMD5
9e306b5e8b5b8fdb9a4ee5ea97d8389e
SHA1c3c046d6162866539c94d052913ced09b368d9ff
SHA256f749dc9daa53c794da6d63175757987653302a2f81fe0ded12810c6fa7f7ceb6
SHA51295cf2788b003348e0d06762b3fd21cecdd699e5db9ce0e0b2b5c4590e487aa9110c27a6f109ff00260fe289487a05aae598d137668fcb3be82e1b5b09ed87900
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exeMD5
68737ab1a037878a37f0b3e114edaaf8
SHA10ba735d99c77cb69937f8fcf89c6a9e3bc495512
SHA2567bf16a22ac10e1dc50dc302c7d1c196dff361ee5c8e830ddb0cec90b548b483a
SHA512f30fa001c604fe4aee324fc4af5b784feae262a62983bd2364721f83ad2522b714c0286b97569b927da5741339d8a0633cbd6abcae3e45f943d5f4ae9168b271
-
C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exeMD5
68737ab1a037878a37f0b3e114edaaf8
SHA10ba735d99c77cb69937f8fcf89c6a9e3bc495512
SHA2567bf16a22ac10e1dc50dc302c7d1c196dff361ee5c8e830ddb0cec90b548b483a
SHA512f30fa001c604fe4aee324fc4af5b784feae262a62983bd2364721f83ad2522b714c0286b97569b927da5741339d8a0633cbd6abcae3e45f943d5f4ae9168b271
-
C:\Users\Admin\AppData\Local\Temp\pub2.exeMD5
56de2ee01318b998f9623f18f83847b7
SHA10848aad50d1a4c5633ab1d233ee8068570ec4810
SHA2562ab633d90e2184cbc3b6d68d772524dd658d7b8f1ca6264371e9cd1384797c81
SHA5121f0bcb3a493ebdec6e38a2f65a57a4695c4b298a8928fc02e882822c66315138b71fcf9922512b9ecdd806a0c38a8eff1152cefc1f403789c80eabd5686a7c13
-
C:\Users\Admin\AppData\Local\Temp\pub2.exeMD5
56de2ee01318b998f9623f18f83847b7
SHA10848aad50d1a4c5633ab1d233ee8068570ec4810
SHA2562ab633d90e2184cbc3b6d68d772524dd658d7b8f1ca6264371e9cd1384797c81
SHA5121f0bcb3a493ebdec6e38a2f65a57a4695c4b298a8928fc02e882822c66315138b71fcf9922512b9ecdd806a0c38a8eff1152cefc1f403789c80eabd5686a7c13
-
C:\Users\Admin\Pictures\Adobe Films\1GWbk3mRPAv2fBIYn8CXkoSe.exeMD5
dabae535097a94f593d5afad04acd5ea
SHA1389a64c4e8c1601fba56576ee261fc953b53ae96
SHA256e0a33241f5c4ac8f304af0387ddc54da264c0a5101c822d0fc71b10af947b391
SHA5129846f4529b94b251ed21c9ae0e47ab19814973f62fbf082db845c9c484e79cd9de2523a4471426e721b698ba4a296eb233544035d66ef373c14bdda718730d05
-
C:\Users\Admin\Pictures\Adobe Films\1GWbk3mRPAv2fBIYn8CXkoSe.exeMD5
dabae535097a94f593d5afad04acd5ea
SHA1389a64c4e8c1601fba56576ee261fc953b53ae96
SHA256e0a33241f5c4ac8f304af0387ddc54da264c0a5101c822d0fc71b10af947b391
SHA5129846f4529b94b251ed21c9ae0e47ab19814973f62fbf082db845c9c484e79cd9de2523a4471426e721b698ba4a296eb233544035d66ef373c14bdda718730d05
-
C:\Users\Admin\Pictures\Adobe Films\I5RY1ztuWRES9ICqj1XbrOUk.exeMD5
1c98778c8a84ccff1e053e8ca3b5d07c
SHA16271555b2e5afdea9b34c4a57503d7e6f140deb0
SHA256261568b0fc903d0ee4cbe7db03549f8bd4d5c3e8f4704dd41d2d58a0ea8b19f0
SHA512584aeb46e933c38211203a211f88c6a44bada3e3cc938dc61fe1704b049216efdad2524868a9bdd01561c345f6667ec03b3b82188fe8dddecef22dc53eb2c3aa
-
C:\Users\Admin\Pictures\Adobe Films\I5RY1ztuWRES9ICqj1XbrOUk.exeMD5
1c98778c8a84ccff1e053e8ca3b5d07c
SHA16271555b2e5afdea9b34c4a57503d7e6f140deb0
SHA256261568b0fc903d0ee4cbe7db03549f8bd4d5c3e8f4704dd41d2d58a0ea8b19f0
SHA512584aeb46e933c38211203a211f88c6a44bada3e3cc938dc61fe1704b049216efdad2524868a9bdd01561c345f6667ec03b3b82188fe8dddecef22dc53eb2c3aa
-
C:\Users\Admin\Pictures\Adobe Films\JrC1zC9AywfbekfFb4sJvmKP.exeMD5
89d23a186c49efb69750227d23674b48
SHA1221e7b4682805e23cbb54c2d9d687408467f164b
SHA256605e1096b60089c456e10be716364cf051d6409ac82d69f128594eb92b66d0db
SHA5123cbcb52e9be11997c33cd5065705ecb35a8557f930cac0057648055958b0020b3f6edd45af6b878cca7191d5ebfbbfeaafa1b72427d5566a8bd47dc437d9cd64
-
C:\Users\Admin\Pictures\Adobe Films\JrC1zC9AywfbekfFb4sJvmKP.exeMD5
89d23a186c49efb69750227d23674b48
SHA1221e7b4682805e23cbb54c2d9d687408467f164b
SHA256605e1096b60089c456e10be716364cf051d6409ac82d69f128594eb92b66d0db
SHA5123cbcb52e9be11997c33cd5065705ecb35a8557f930cac0057648055958b0020b3f6edd45af6b878cca7191d5ebfbbfeaafa1b72427d5566a8bd47dc437d9cd64
-
C:\Users\Admin\Pictures\Adobe Films\KTua4yTuXa2dTw8UgYaiu0lG.exeMD5
c4729b22af5fddb503601f0819709e32
SHA10d27d046eb78c188c1eccfd1d0654a8262d97aab
SHA256fb2b6caaeb56477df79dc728f7e4f5547f2c29d9bbf1d4c230da23c5603f22b4
SHA51283d434b1e6265097462807536811dae19f9fb7c3760bff11e6da7715208846f4d06c5aec6434ff9159be7e8ec8b0bebac8de9d58a490fe13312ab1f81aaef4c0
-
C:\Users\Admin\Pictures\Adobe Films\KTua4yTuXa2dTw8UgYaiu0lG.exeMD5
c4729b22af5fddb503601f0819709e32
SHA10d27d046eb78c188c1eccfd1d0654a8262d97aab
SHA256fb2b6caaeb56477df79dc728f7e4f5547f2c29d9bbf1d4c230da23c5603f22b4
SHA51283d434b1e6265097462807536811dae19f9fb7c3760bff11e6da7715208846f4d06c5aec6434ff9159be7e8ec8b0bebac8de9d58a490fe13312ab1f81aaef4c0
-
C:\Users\Admin\Pictures\Adobe Films\KeVFnUVah4Dt4kq5rllnp5Xi.exeMD5
613cf9e8955a522cc9eee171aa81310c
SHA137919abbe562bf8b58cebe092cd1751558b7aa6e
SHA256c2750e33c59443a863e07031379ea0af5bc966c586646eeb182f290aa0ce21c3
SHA512ce883660d638bb12ee8534e8c7a1a5d5545d250c547430fe0182c0332ec6aed6e97363c307fe12f83c2349938bf81f35820951a638a153bef4407400a9a78688
-
C:\Users\Admin\Pictures\Adobe Films\KeVFnUVah4Dt4kq5rllnp5Xi.exeMD5
613cf9e8955a522cc9eee171aa81310c
SHA137919abbe562bf8b58cebe092cd1751558b7aa6e
SHA256c2750e33c59443a863e07031379ea0af5bc966c586646eeb182f290aa0ce21c3
SHA512ce883660d638bb12ee8534e8c7a1a5d5545d250c547430fe0182c0332ec6aed6e97363c307fe12f83c2349938bf81f35820951a638a153bef4407400a9a78688
-
C:\Users\Admin\Pictures\Adobe Films\U9jdj6HzHQBc1yoytxu94sMd.exeMD5
c0fe94a584c658026552ae848edbfd84
SHA1507c9ae16bb5bebd5b072f09aa097807bb5665ff
SHA2565340c47a07719d1db92de4786679247876e2aa0197b14fc24a9f7292d0c38880
SHA5128d9f1976ede385f1b51664c9e9b31cbcf1a7f3347ca7794038d88c7d274ee50aa1513f5bd9c0c1974bca2f6982df860bb36886c60a3f59297fe97086d5c3a620
-
C:\Users\Admin\Pictures\Adobe Films\U9jdj6HzHQBc1yoytxu94sMd.exeMD5
c0fe94a584c658026552ae848edbfd84
SHA1507c9ae16bb5bebd5b072f09aa097807bb5665ff
SHA2565340c47a07719d1db92de4786679247876e2aa0197b14fc24a9f7292d0c38880
SHA5128d9f1976ede385f1b51664c9e9b31cbcf1a7f3347ca7794038d88c7d274ee50aa1513f5bd9c0c1974bca2f6982df860bb36886c60a3f59297fe97086d5c3a620
-
C:\Users\Admin\Pictures\Adobe Films\YrCjvldFtaHKRSkzns8dt29c.exeMD5
266a1335f73ff12584a5d1d2e65b8be7
SHA135a6d1593a0ff74f209de0f294cd7b7cd067c14c
SHA256316a7cea264e8cc29efe6dc3def98eeff7c42138ceba126127dc8228a119cfee
SHA51235bdc71211656abaf05cde978594b5d0ad11d154851d90adc80fb96e1c737682561e82615024453bf6f483cb7bf451bd604993343e3bfb2d369deef25d1e4361
-
C:\Users\Admin\Pictures\Adobe Films\YrCjvldFtaHKRSkzns8dt29c.exeMD5
266a1335f73ff12584a5d1d2e65b8be7
SHA135a6d1593a0ff74f209de0f294cd7b7cd067c14c
SHA256316a7cea264e8cc29efe6dc3def98eeff7c42138ceba126127dc8228a119cfee
SHA51235bdc71211656abaf05cde978594b5d0ad11d154851d90adc80fb96e1c737682561e82615024453bf6f483cb7bf451bd604993343e3bfb2d369deef25d1e4361
-
C:\Users\Admin\Pictures\Adobe Films\ZXo6T5S8coL_okjGbUHvsTua.exeMD5
a1c4d1ce68ceaffa84728ed0f5196fd0
SHA1f6941f577550a6ecf5309582968ea2c4c12fa7d7
SHA256b940e318153e9cb75af0195676bbaeb136804963eba07ab277b0f7238e426b9a
SHA5120854320417e360b23bb0f49ac3367e1853fbfdf6f0c87ae9614de46dd466090fea8849b177f6bfba5e1865cc0b4450b6fb13b58377cef1018da364f9aec93766
-
C:\Users\Admin\Pictures\Adobe Films\ZXo6T5S8coL_okjGbUHvsTua.exeMD5
a1c4d1ce68ceaffa84728ed0f5196fd0
SHA1f6941f577550a6ecf5309582968ea2c4c12fa7d7
SHA256b940e318153e9cb75af0195676bbaeb136804963eba07ab277b0f7238e426b9a
SHA5120854320417e360b23bb0f49ac3367e1853fbfdf6f0c87ae9614de46dd466090fea8849b177f6bfba5e1865cc0b4450b6fb13b58377cef1018da364f9aec93766
-
C:\Users\Admin\Pictures\Adobe Films\akYp8s_987TCNI5qcVWLnJJs.exeMD5
08d32a3760c694870d4853a1967bdb2a
SHA18ef9383dd9cd0f682591856f6b1faaaecfcd0f68
SHA2569b65ce07b17ab7946646d3801d12b163ce5493304c321f7c54e70d00dd00adba
SHA5123d5b1472b432fb1a555253d6ded2d77e49969a80049e56a12500a315b4d12a67b65ba2eb93825864432713f46a5c98bd9d5f6d103b82e867c5410df3ab696381
-
C:\Users\Admin\Pictures\Adobe Films\akYp8s_987TCNI5qcVWLnJJs.exeMD5
08d32a3760c694870d4853a1967bdb2a
SHA18ef9383dd9cd0f682591856f6b1faaaecfcd0f68
SHA2569b65ce07b17ab7946646d3801d12b163ce5493304c321f7c54e70d00dd00adba
SHA5123d5b1472b432fb1a555253d6ded2d77e49969a80049e56a12500a315b4d12a67b65ba2eb93825864432713f46a5c98bd9d5f6d103b82e867c5410df3ab696381
-
C:\Users\Admin\Pictures\Adobe Films\geVu_wAoUbI1PuQKJ6bVd7VJ.exeMD5
4bd02b59d8c0ae8ba82c88b2dc5b86f5
SHA155d00605704a7443fa34990a9f1bcea8de76dfc8
SHA25696815822baf21cb960841f8578f28fc8a04eaf53b66e9042f95738cf287411b1
SHA5122ff11d821cd5ee7183ed08a265a7f0746cf204aee1de7d03aa2e2cf51353cafef3a91040ac609d1b017ce9e4253b9ebc2ced366c5e5ba2b98df1a05283b8b679
-
C:\Users\Admin\Pictures\Adobe Films\kATfMtvsx3wTaalPKvoAcxvM.exeMD5
eb2f1ba27d4ae055595e5d7c173b02ea
SHA195489360dc43f942b755f053565866ab4d0f0c7b
SHA256fa88c86ff21e12477257ab657bd85c6dfa38982bff1493e5e162a5cc518c4440
SHA512776ce93c19e3affa21f830b30035049c9e2bfe59b62b88a3607b46221a36d39dcc8a5d2a4637ff2d2b91efe4e8530d492d51ab1eafd34d38ad5ffaa67aa9df39
-
C:\Users\Admin\Pictures\Adobe Films\kATfMtvsx3wTaalPKvoAcxvM.exeMD5
eb2f1ba27d4ae055595e5d7c173b02ea
SHA195489360dc43f942b755f053565866ab4d0f0c7b
SHA256fa88c86ff21e12477257ab657bd85c6dfa38982bff1493e5e162a5cc518c4440
SHA512776ce93c19e3affa21f830b30035049c9e2bfe59b62b88a3607b46221a36d39dcc8a5d2a4637ff2d2b91efe4e8530d492d51ab1eafd34d38ad5ffaa67aa9df39
-
C:\Users\Admin\Pictures\Adobe Films\pdrMk24l1OAtyXj2dapn3nCT.exeMD5
b9b15774905815d1ab124662adbaca9f
SHA121becde5109bac48f3efd8b4fea7043c47daf563
SHA256655c8da705475f8326a43a382036964a2ecb3d39923154a2db8a0ac18e191934
SHA512b9b9bbe177aac7b261c9632bc30338e747acf38bc4b7b74d8db0d3f0ccfe7f4bc44182bf660f94fdc88ee542a7d595b10f44d9ad1eb22c12d255369281a77e31
-
C:\Users\Admin\Pictures\Adobe Films\pdrMk24l1OAtyXj2dapn3nCT.exeMD5
b9b15774905815d1ab124662adbaca9f
SHA121becde5109bac48f3efd8b4fea7043c47daf563
SHA256655c8da705475f8326a43a382036964a2ecb3d39923154a2db8a0ac18e191934
SHA512b9b9bbe177aac7b261c9632bc30338e747acf38bc4b7b74d8db0d3f0ccfe7f4bc44182bf660f94fdc88ee542a7d595b10f44d9ad1eb22c12d255369281a77e31
-
C:\Users\Admin\Pictures\Adobe Films\wan1R7TQ2mLQAeJFG8zvxKbg.exeMD5
6817e893a00b534fb3d936a2a16da2b1
SHA1b91f5ff23a27cfda0f57e788913942183ce45772
SHA256e53845a73c55f86fe6fc276f97bfeb8b366bf1e7b8cb72e55fc8472362ab7c5c
SHA512c174e4b31f4742c764a9fd25bad12ed35aa941d6ac0ece9bfb90767f890d9520eebf78e83c40a68274ca0f8987fd0574856b8975aab8160ec3fb4690f78b54db
-
C:\Users\Admin\Pictures\Adobe Films\wan1R7TQ2mLQAeJFG8zvxKbg.exeMD5
6817e893a00b534fb3d936a2a16da2b1
SHA1b91f5ff23a27cfda0f57e788913942183ce45772
SHA256e53845a73c55f86fe6fc276f97bfeb8b366bf1e7b8cb72e55fc8472362ab7c5c
SHA512c174e4b31f4742c764a9fd25bad12ed35aa941d6ac0ece9bfb90767f890d9520eebf78e83c40a68274ca0f8987fd0574856b8975aab8160ec3fb4690f78b54db
-
C:\Users\Admin\Pictures\Adobe Films\xWutTQqWYWuD_MVjrYDgMFr6.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\xWutTQqWYWuD_MVjrYDgMFr6.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\yRWrqtm606H6upc_M2XeZO_V.exeMD5
e2c619e4df9efae139aa54bf735a56e5
SHA1b068c39af839d36de8bd2dbf20e88911040a71d1
SHA256d846b8869c379e9f433aebb045f30e371db74878724a811bf47293d967f09924
SHA512ab753ac0a5ab87170cd21aabe8284b62fa14bac0ad4dcb550ffe8b860bd3d964eb71846f53ceaf97ec231587b91a23b99c1ecc311cf83309d9fd2ec4ab523598
-
C:\Users\Admin\Pictures\Adobe Films\yRWrqtm606H6upc_M2XeZO_V.exeMD5
e2c619e4df9efae139aa54bf735a56e5
SHA1b068c39af839d36de8bd2dbf20e88911040a71d1
SHA256d846b8869c379e9f433aebb045f30e371db74878724a811bf47293d967f09924
SHA512ab753ac0a5ab87170cd21aabe8284b62fa14bac0ad4dcb550ffe8b860bd3d964eb71846f53ceaf97ec231587b91a23b99c1ecc311cf83309d9fd2ec4ab523598
-
C:\Users\Admin\Pictures\Adobe Films\yv0lTacURSjC6C6EYAaS4y3k.exeMD5
d7f42fad55e84ab59664980f6c196ae8
SHA18923443c74e7973e7738f9b402c8e6e75707663a
SHA2567cf4f598e7262f55aadece6df8bed6656cbfa97274ca2f2ab4b6cb961c809fc6
SHA5129d3956a8f01f27c7e43d61f767b1edaf103884eab14ada7bd5d7c73218aa7b5b63e085e90a3d33bbf3d63f04da322fa0ca4ba5373b0aa9ac8e21709361f01a4f
-
C:\Users\Admin\Pictures\Adobe Films\yv0lTacURSjC6C6EYAaS4y3k.exeMD5
d7f42fad55e84ab59664980f6c196ae8
SHA18923443c74e7973e7738f9b402c8e6e75707663a
SHA2567cf4f598e7262f55aadece6df8bed6656cbfa97274ca2f2ab4b6cb961c809fc6
SHA5129d3956a8f01f27c7e43d61f767b1edaf103884eab14ada7bd5d7c73218aa7b5b63e085e90a3d33bbf3d63f04da322fa0ca4ba5373b0aa9ac8e21709361f01a4f
-
C:\Users\Admin\Pictures\Adobe Films\yy_BkeEzmCGqhSOvciO32pgv.exeMD5
b250d4fe49cae3e023fbe7ae1c61a806
SHA155198440aa1e2cba4c6ad11161837507f38ce274
SHA2560bd7f7151c20df4f1848606ca804f63a17f7dd49f9dc0e4365cba64311500000
SHA512f07a9cc781e99743e58cddcddef91ac6bbff39378f5dbd642f83a55cae7f75c1e26bae7b3e1d4013f1f4a3838273650f71c396a3d097679c88b9048cee2e283d
-
C:\Users\Admin\Pictures\Adobe Films\yy_BkeEzmCGqhSOvciO32pgv.exeMD5
b250d4fe49cae3e023fbe7ae1c61a806
SHA155198440aa1e2cba4c6ad11161837507f38ce274
SHA2560bd7f7151c20df4f1848606ca804f63a17f7dd49f9dc0e4365cba64311500000
SHA512f07a9cc781e99743e58cddcddef91ac6bbff39378f5dbd642f83a55cae7f75c1e26bae7b3e1d4013f1f4a3838273650f71c396a3d097679c88b9048cee2e283d
-
C:\Windows\rss\csrss.exeMD5
165c8d385e0af406deb1089b621c28db
SHA13d7b93f834a08a9bc790290a20aaf835aaaf9c5c
SHA2567dc6c82e185577088f88e349a6d315138cdbed3956cbb6be5af1f9c098642a33
SHA5120bbc83a67cfb0ca2f4976b04e84ba60d708ffb7f66050da73cd0a0f28cde09dfde9b762ff5ceca35c22f5461576c47e190342470c470c6360bfb4edad8e34e14
-
C:\Windows\rss\csrss.exeMD5
165c8d385e0af406deb1089b621c28db
SHA13d7b93f834a08a9bc790290a20aaf835aaaf9c5c
SHA2567dc6c82e185577088f88e349a6d315138cdbed3956cbb6be5af1f9c098642a33
SHA5120bbc83a67cfb0ca2f4976b04e84ba60d708ffb7f66050da73cd0a0f28cde09dfde9b762ff5ceca35c22f5461576c47e190342470c470c6360bfb4edad8e34e14
-
memory/1256-213-0x0000000005200000-0x000000000563C000-memory.dmpFilesize
4.2MB
-
memory/1256-215-0x0000000000400000-0x0000000000D41000-memory.dmpFilesize
9.3MB
-
memory/1344-171-0x0000000005300000-0x0000000005C26000-memory.dmpFilesize
9.1MB
-
memory/1344-172-0x0000000000400000-0x0000000000D41000-memory.dmpFilesize
9.3MB
-
memory/1344-170-0x0000000004DBD000-0x00000000051F9000-memory.dmpFilesize
4.2MB
-
memory/1656-247-0x0000000001360000-0x0000000001361000-memory.dmpFilesize
4KB
-
memory/1656-248-0x0000000000DF2000-0x0000000000E25000-memory.dmpFilesize
204KB
-
memory/1656-288-0x0000000074A50000-0x0000000074AD9000-memory.dmpFilesize
548KB
-
memory/1656-365-0x0000000076D20000-0x00000000772D3000-memory.dmpFilesize
5.7MB
-
memory/1656-244-0x0000000000DF0000-0x0000000000EE4000-memory.dmpFilesize
976KB
-
memory/1656-246-0x0000000000DF0000-0x0000000000EE4000-memory.dmpFilesize
976KB
-
memory/1656-280-0x0000000000DF2000-0x0000000000E25000-memory.dmpFilesize
204KB
-
memory/1656-256-0x0000000076150000-0x0000000076365000-memory.dmpFilesize
2.1MB
-
memory/1656-241-0x0000000002E50000-0x0000000002E96000-memory.dmpFilesize
280KB
-
memory/1864-223-0x0000000000DC0000-0x0000000000E20000-memory.dmpFilesize
384KB
-
memory/1968-174-0x0000000004CA1000-0x00000000050DD000-memory.dmpFilesize
4.2MB
-
memory/1968-175-0x0000000000400000-0x0000000000D41000-memory.dmpFilesize
9.3MB
-
memory/2256-237-0x0000000003FB0000-0x000000000416D000-memory.dmpFilesize
1.7MB
-
memory/2616-250-0x00000000007A0000-0x00000000007AD000-memory.dmpFilesize
52KB
-
memory/2616-254-0x00000000007C0000-0x00000000007D3000-memory.dmpFilesize
76KB
-
memory/2616-277-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/2712-294-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-257-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-279-0x0000000002640000-0x0000000002650000-memory.dmpFilesize
64KB
-
memory/2712-290-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-299-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-275-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-274-0x0000000002E40000-0x0000000002E50000-memory.dmpFilesize
64KB
-
memory/2712-273-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-271-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-270-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-267-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-264-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-235-0x0000000000BE0000-0x0000000000BF5000-memory.dmpFilesize
84KB
-
memory/2712-298-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-292-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-291-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-255-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-293-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-297-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-296-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2712-295-0x0000000000C10000-0x0000000000C20000-memory.dmpFilesize
64KB
-
memory/2968-220-0x000000007218E000-0x000000007218F000-memory.dmpFilesize
4KB
-
memory/2968-226-0x00000000008C0000-0x00000000008CC000-memory.dmpFilesize
48KB
-
memory/3136-222-0x0000000000770000-0x000000000083E000-memory.dmpFilesize
824KB
-
memory/3136-217-0x000000007218E000-0x000000007218F000-memory.dmpFilesize
4KB
-
memory/3136-239-0x0000000005110000-0x00000000051A2000-memory.dmpFilesize
584KB
-
memory/3256-230-0x0000000000C30000-0x0000000000C31000-memory.dmpFilesize
4KB
-
memory/3256-243-0x000000007218E000-0x000000007218F000-memory.dmpFilesize
4KB
-
memory/3256-240-0x0000000000040000-0x0000000000271000-memory.dmpFilesize
2.2MB
-
memory/3256-227-0x0000000076150000-0x0000000076365000-memory.dmpFilesize
2.1MB
-
memory/3256-229-0x0000000000042000-0x0000000000078000-memory.dmpFilesize
216KB
-
memory/3256-216-0x0000000002790000-0x00000000027D6000-memory.dmpFilesize
280KB
-
memory/3256-245-0x0000000074A50000-0x0000000074AD9000-memory.dmpFilesize
548KB
-
memory/3256-364-0x0000000076D20000-0x00000000772D3000-memory.dmpFilesize
5.7MB
-
memory/3256-219-0x0000000000042000-0x0000000000078000-memory.dmpFilesize
216KB
-
memory/3256-218-0x0000000000040000-0x0000000000271000-memory.dmpFilesize
2.2MB
-
memory/3256-242-0x0000000000040000-0x0000000000271000-memory.dmpFilesize
2.2MB
-
memory/3256-221-0x0000000000C00000-0x0000000000C01000-memory.dmpFilesize
4KB
-
memory/3276-135-0x0000000000A40000-0x0000000000A70000-memory.dmpFilesize
192KB
-
memory/3308-238-0x0000000002710000-0x0000000002770000-memory.dmpFilesize
384KB
-
memory/3340-208-0x0000000000030000-0x0000000000033000-memory.dmpFilesize
12KB
-
memory/3340-207-0x0000000000400000-0x000000000062C000-memory.dmpFilesize
2.2MB
-
memory/3340-362-0x00000000001C0000-0x00000000001C8000-memory.dmpFilesize
32KB
-
memory/3340-179-0x0000000000780000-0x0000000000788000-memory.dmpFilesize
32KB
-
memory/3400-263-0x0000000002340000-0x00000000023B1000-memory.dmpFilesize
452KB
-
memory/3400-266-0x00000000023C0000-0x0000000002456000-memory.dmpFilesize
600KB
-
memory/3484-211-0x000000000240D000-0x000000000242F000-memory.dmpFilesize
136KB
-
memory/3484-166-0x0000000006B10000-0x0000000006B22000-memory.dmpFilesize
72KB
-
memory/3484-168-0x0000000006B30000-0x0000000006B6C000-memory.dmpFilesize
240KB
-
memory/3484-233-0x0000000006BB2000-0x0000000006BB3000-memory.dmpFilesize
4KB
-
memory/3484-232-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3484-143-0x000000000240D000-0x000000000242F000-memory.dmpFilesize
136KB
-
memory/3484-212-0x0000000003FC0000-0x0000000003FF0000-memory.dmpFilesize
192KB
-
memory/3484-167-0x0000000007790000-0x000000000789A000-memory.dmpFilesize
1.0MB
-
memory/3484-236-0x0000000006BB4000-0x0000000006BB6000-memory.dmpFilesize
8KB
-
memory/3484-209-0x000000007218E000-0x000000007218F000-memory.dmpFilesize
4KB
-
memory/3484-234-0x0000000006BB3000-0x0000000006BB4000-memory.dmpFilesize
4KB
-
memory/3484-165-0x0000000007170000-0x0000000007788000-memory.dmpFilesize
6.1MB
-
memory/3484-164-0x0000000006BC0000-0x0000000007164000-memory.dmpFilesize
5.6MB
-
memory/3484-210-0x0000000006BB0000-0x0000000006BB1000-memory.dmpFilesize
4KB
-
memory/4028-161-0x00000000024F0000-0x00000000024F9000-memory.dmpFilesize
36KB
-
memory/4028-160-0x00000000026FD000-0x000000000270E000-memory.dmpFilesize
68KB
-
memory/4028-162-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4028-148-0x00000000026FD000-0x000000000270E000-memory.dmpFilesize
68KB
-
memory/4212-253-0x0000000002120000-0x0000000002129000-memory.dmpFilesize
36KB
-
memory/4212-252-0x0000000000770000-0x0000000000778000-memory.dmpFilesize
32KB
-
memory/4892-231-0x0000000002790000-0x00000000027F0000-memory.dmpFilesize
384KB
-
memory/4952-276-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/4952-251-0x0000000001AB0000-0x0000000001AF4000-memory.dmpFilesize
272KB
-
memory/4952-249-0x0000000001A80000-0x0000000001AA7000-memory.dmpFilesize
156KB
-
memory/5164-289-0x0000000074A50000-0x0000000074AD9000-memory.dmpFilesize
548KB
-
memory/5164-258-0x00000000001D0000-0x0000000000387000-memory.dmpFilesize
1.7MB
-
memory/5164-261-0x00000000001D0000-0x0000000000387000-memory.dmpFilesize
1.7MB
-
memory/5164-262-0x0000000002A40000-0x0000000002A41000-memory.dmpFilesize
4KB
-
memory/5164-268-0x00000000001D2000-0x0000000000207000-memory.dmpFilesize
212KB
-
memory/5164-366-0x0000000076D20000-0x00000000772D3000-memory.dmpFilesize
5.7MB
-
memory/5164-278-0x00000000010D0000-0x0000000001116000-memory.dmpFilesize
280KB
-
memory/5164-265-0x0000000076150000-0x0000000076365000-memory.dmpFilesize
2.1MB
-
memory/5204-272-0x00000000027F0000-0x0000000002850000-memory.dmpFilesize
384KB
-
memory/5324-259-0x0000000000400000-0x0000000000893000-memory.dmpFilesize
4.6MB
-
memory/5324-285-0x0000000000400000-0x0000000000893000-memory.dmpFilesize
4.6MB
-
memory/5324-283-0x00000000008D1000-0x0000000000921000-memory.dmpFilesize
320KB
-
memory/5352-260-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB