Analysis
-
max time kernel
156s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
11-03-2022 00:23
Static task
static1
Behavioral task
behavioral1
Sample
3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe
Resource
win10v2004-20220310-en
General
-
Target
3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe
-
Size
7.8MB
-
MD5
c1cf691b09e84a5975b59ceebe4fcd8f
-
SHA1
f990a2d00840c8d334f48948c34854a26fa700d2
-
SHA256
3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787
-
SHA512
276cf73fe577bf3060589ba38cea2cc3ee445bd4c44366972e1e87f652b410e7886ad745107141a024ac549aad06f3a9a59cbe0fe478b11119185135fa5fa4c9
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
Glupteba Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/964-172-0x00000000052A0000-0x0000000005BC6000-memory.dmp family_glupteba behavioral2/memory/964-173-0x0000000000400000-0x00000000030E8000-memory.dmp family_glupteba behavioral2/memory/1488-180-0x0000000000400000-0x00000000030E8000-memory.dmp family_glupteba behavioral2/memory/1768-195-0x0000000000400000-0x00000000030E8000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rUNdlL32.eXedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1260 3836 rUNdlL32.eXe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Install.exe family_socelars C:\Users\Admin\AppData\Local\Temp\Install.exe family_socelars -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
svchost.exedescription pid process target process PID 2448 created 964 2448 svchost.exe Info.exe PID 2448 created 1768 2448 svchost.exe csrss.exe -
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
Downloads MZ/PE file
-
Executes dropped EXE 16 IoCs
Processes:
Updbdate.exeInfo.exeFolder.exemd9_1sjm.exeKRSetp.exeInstall.exeFolder.exeFile.exepub2.exeFiles.exejfiag3g_gg.exejfiag3g_gg.exeInfo.execsrss.exeQ4k9jICxp6ihXOsNAf61CQuS.exeinjector.exepid process 1188 Updbdate.exe 964 Info.exe 1128 Folder.exe 2008 md9_1sjm.exe 3432 KRSetp.exe 3940 Install.exe 1952 Folder.exe 4048 File.exe 3968 pub2.exe 4120 Files.exe 1360 jfiag3g_gg.exe 4440 jfiag3g_gg.exe 1488 Info.exe 1768 csrss.exe 3076 Q4k9jICxp6ihXOsNAf61CQuS.exe 528 injector.exe -
Modifies Windows Firewall 1 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
File.exe3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exeFolder.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation File.exe Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation Folder.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4016 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Info.exeFiles.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WitheredMoon = "\"C:\\Windows\\rss\\csrss.exe\"" Info.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.ex" Files.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
md9_1sjm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md9_1sjm.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 ip-api.com 75 ipinfo.io 76 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in Windows directory 2 IoCs
Processes:
Info.exedescription ioc process File opened for modification C:\Windows\rss Info.exe File created C:\Windows\rss\csrss.exe Info.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4848 4016 WerFault.exe rundll32.exe 4928 964 WerFault.exe Info.exe 4616 964 WerFault.exe Info.exe 1504 964 WerFault.exe Info.exe 1544 964 WerFault.exe Info.exe 1740 964 WerFault.exe Info.exe 4988 964 WerFault.exe Info.exe 4380 964 WerFault.exe Info.exe 4496 964 WerFault.exe Info.exe 3056 964 WerFault.exe Info.exe 2280 964 WerFault.exe Info.exe 3092 964 WerFault.exe Info.exe 4512 964 WerFault.exe Info.exe 528 964 WerFault.exe Info.exe 1276 964 WerFault.exe Info.exe 2012 964 WerFault.exe Info.exe 3708 964 WerFault.exe Info.exe 3432 964 WerFault.exe Info.exe 3816 964 WerFault.exe Info.exe 3968 964 WerFault.exe Info.exe 1788 964 WerFault.exe Info.exe 4080 964 WerFault.exe Info.exe 3516 1488 WerFault.exe Info.exe 4736 1488 WerFault.exe Info.exe 3200 1488 WerFault.exe Info.exe 4000 1488 WerFault.exe Info.exe 944 1488 WerFault.exe Info.exe 3732 1488 WerFault.exe Info.exe 1552 1488 WerFault.exe Info.exe 3428 1488 WerFault.exe Info.exe 4424 1488 WerFault.exe Info.exe 1180 1488 WerFault.exe Info.exe 3356 1488 WerFault.exe Info.exe 4688 1488 WerFault.exe Info.exe 4480 1488 WerFault.exe Info.exe 4804 1488 WerFault.exe Info.exe 2300 1488 WerFault.exe Info.exe 2268 1488 WerFault.exe Info.exe 2932 1488 WerFault.exe Info.exe 4004 4048 WerFault.exe File.exe 5072 1768 WerFault.exe csrss.exe 1280 1768 WerFault.exe csrss.exe 1216 1768 WerFault.exe csrss.exe 4000 1768 WerFault.exe csrss.exe 944 1768 WerFault.exe csrss.exe 3732 1768 WerFault.exe csrss.exe 2644 1768 WerFault.exe csrss.exe 4744 1768 WerFault.exe csrss.exe 1096 1768 WerFault.exe csrss.exe 2244 1768 WerFault.exe csrss.exe 3356 1768 WerFault.exe csrss.exe 5052 1768 WerFault.exe csrss.exe 5036 1768 WerFault.exe csrss.exe 4804 1768 WerFault.exe csrss.exe 1796 1768 WerFault.exe csrss.exe 704 1768 WerFault.exe csrss.exe 3484 1768 WerFault.exe csrss.exe 392 1768 WerFault.exe csrss.exe 4272 1768 WerFault.exe csrss.exe 1736 1768 WerFault.exe csrss.exe 2504 1768 WerFault.exe csrss.exe 2784 1768 WerFault.exe csrss.exe 1460 1768 WerFault.exe csrss.exe 4640 1768 WerFault.exe csrss.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
pub2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3960 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
Info.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" Info.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
pub2.exejfiag3g_gg.exepid process 3968 pub2.exe 3968 pub2.exe 4440 jfiag3g_gg.exe 4440 jfiag3g_gg.exe 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 2772 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2772 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
pub2.exepid process 3968 pub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Install.exeKRSetp.exetaskkill.exemd9_1sjm.exedescription pid process Token: SeCreateTokenPrivilege 3940 Install.exe Token: SeAssignPrimaryTokenPrivilege 3940 Install.exe Token: SeLockMemoryPrivilege 3940 Install.exe Token: SeIncreaseQuotaPrivilege 3940 Install.exe Token: SeMachineAccountPrivilege 3940 Install.exe Token: SeTcbPrivilege 3940 Install.exe Token: SeSecurityPrivilege 3940 Install.exe Token: SeTakeOwnershipPrivilege 3940 Install.exe Token: SeLoadDriverPrivilege 3940 Install.exe Token: SeSystemProfilePrivilege 3940 Install.exe Token: SeSystemtimePrivilege 3940 Install.exe Token: SeProfSingleProcessPrivilege 3940 Install.exe Token: SeIncBasePriorityPrivilege 3940 Install.exe Token: SeCreatePagefilePrivilege 3940 Install.exe Token: SeCreatePermanentPrivilege 3940 Install.exe Token: SeBackupPrivilege 3940 Install.exe Token: SeRestorePrivilege 3940 Install.exe Token: SeShutdownPrivilege 3940 Install.exe Token: SeDebugPrivilege 3940 Install.exe Token: SeAuditPrivilege 3940 Install.exe Token: SeSystemEnvironmentPrivilege 3940 Install.exe Token: SeChangeNotifyPrivilege 3940 Install.exe Token: SeRemoteShutdownPrivilege 3940 Install.exe Token: SeUndockPrivilege 3940 Install.exe Token: SeSyncAgentPrivilege 3940 Install.exe Token: SeEnableDelegationPrivilege 3940 Install.exe Token: SeManageVolumePrivilege 3940 Install.exe Token: SeImpersonatePrivilege 3940 Install.exe Token: SeCreateGlobalPrivilege 3940 Install.exe Token: 31 3940 Install.exe Token: 32 3940 Install.exe Token: 33 3940 Install.exe Token: 34 3940 Install.exe Token: 35 3940 Install.exe Token: SeDebugPrivilege 3432 KRSetp.exe Token: SeDebugPrivilege 3960 taskkill.exe Token: SeManageVolumePrivilege 2008 md9_1sjm.exe Token: SeShutdownPrivilege 2772 Token: SeCreatePagefilePrivilege 2772 Token: SeShutdownPrivilege 2772 Token: SeCreatePagefilePrivilege 2772 Token: SeShutdownPrivilege 2772 Token: SeCreatePagefilePrivilege 2772 Token: SeShutdownPrivilege 2772 Token: SeCreatePagefilePrivilege 2772 Token: SeShutdownPrivilege 2772 Token: SeCreatePagefilePrivilege 2772 Token: SeShutdownPrivilege 2772 Token: SeCreatePagefilePrivilege 2772 Token: SeShutdownPrivilege 2772 Token: SeCreatePagefilePrivilege 2772 Token: SeShutdownPrivilege 2772 Token: SeCreatePagefilePrivilege 2772 Token: SeShutdownPrivilege 2772 Token: SeCreatePagefilePrivilege 2772 Token: SeShutdownPrivilege 2772 Token: SeCreatePagefilePrivilege 2772 Token: SeShutdownPrivilege 2772 Token: SeCreatePagefilePrivilege 2772 Token: SeShutdownPrivilege 2772 Token: SeCreatePagefilePrivilege 2772 Token: SeShutdownPrivilege 2772 Token: SeCreatePagefilePrivilege 2772 Token: SeManageVolumePrivilege 2008 md9_1sjm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
File.exepid process 4048 File.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exeFolder.exeInstall.execmd.exerUNdlL32.eXeFiles.exesvchost.exeInfo.execmd.exeFile.execsrss.exedescription pid process target process PID 4172 wrote to memory of 1188 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Updbdate.exe PID 4172 wrote to memory of 1188 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Updbdate.exe PID 4172 wrote to memory of 1188 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Updbdate.exe PID 4172 wrote to memory of 964 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Info.exe PID 4172 wrote to memory of 964 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Info.exe PID 4172 wrote to memory of 964 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Info.exe PID 4172 wrote to memory of 1128 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Folder.exe PID 4172 wrote to memory of 1128 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Folder.exe PID 4172 wrote to memory of 1128 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Folder.exe PID 4172 wrote to memory of 2008 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe md9_1sjm.exe PID 4172 wrote to memory of 2008 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe md9_1sjm.exe PID 4172 wrote to memory of 2008 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe md9_1sjm.exe PID 4172 wrote to memory of 3432 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe KRSetp.exe PID 4172 wrote to memory of 3432 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe KRSetp.exe PID 4172 wrote to memory of 3940 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Install.exe PID 4172 wrote to memory of 3940 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Install.exe PID 4172 wrote to memory of 3940 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Install.exe PID 1128 wrote to memory of 1952 1128 Folder.exe Folder.exe PID 1128 wrote to memory of 1952 1128 Folder.exe Folder.exe PID 1128 wrote to memory of 1952 1128 Folder.exe Folder.exe PID 4172 wrote to memory of 4048 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe File.exe PID 4172 wrote to memory of 4048 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe File.exe PID 4172 wrote to memory of 4048 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe File.exe PID 3940 wrote to memory of 4576 3940 Install.exe cmd.exe PID 3940 wrote to memory of 4576 3940 Install.exe cmd.exe PID 3940 wrote to memory of 4576 3940 Install.exe cmd.exe PID 4172 wrote to memory of 3968 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe pub2.exe PID 4172 wrote to memory of 3968 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe pub2.exe PID 4172 wrote to memory of 3968 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe pub2.exe PID 4172 wrote to memory of 4120 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Files.exe PID 4172 wrote to memory of 4120 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Files.exe PID 4172 wrote to memory of 4120 4172 3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe Files.exe PID 4576 wrote to memory of 3960 4576 cmd.exe taskkill.exe PID 4576 wrote to memory of 3960 4576 cmd.exe taskkill.exe PID 4576 wrote to memory of 3960 4576 cmd.exe taskkill.exe PID 1260 wrote to memory of 4016 1260 rUNdlL32.eXe rundll32.exe PID 1260 wrote to memory of 4016 1260 rUNdlL32.eXe rundll32.exe PID 1260 wrote to memory of 4016 1260 rUNdlL32.eXe rundll32.exe PID 4120 wrote to memory of 1360 4120 Files.exe jfiag3g_gg.exe PID 4120 wrote to memory of 1360 4120 Files.exe jfiag3g_gg.exe PID 4120 wrote to memory of 1360 4120 Files.exe jfiag3g_gg.exe PID 4120 wrote to memory of 4440 4120 Files.exe jfiag3g_gg.exe PID 4120 wrote to memory of 4440 4120 Files.exe jfiag3g_gg.exe PID 4120 wrote to memory of 4440 4120 Files.exe jfiag3g_gg.exe PID 2448 wrote to memory of 1488 2448 svchost.exe Info.exe PID 2448 wrote to memory of 1488 2448 svchost.exe Info.exe PID 2448 wrote to memory of 1488 2448 svchost.exe Info.exe PID 1488 wrote to memory of 1896 1488 Info.exe cmd.exe PID 1488 wrote to memory of 1896 1488 Info.exe cmd.exe PID 1896 wrote to memory of 4540 1896 cmd.exe netsh.exe PID 1896 wrote to memory of 4540 1896 cmd.exe netsh.exe PID 1488 wrote to memory of 1768 1488 Info.exe csrss.exe PID 1488 wrote to memory of 1768 1488 Info.exe csrss.exe PID 1488 wrote to memory of 1768 1488 Info.exe csrss.exe PID 4048 wrote to memory of 3076 4048 File.exe Q4k9jICxp6ihXOsNAf61CQuS.exe PID 4048 wrote to memory of 3076 4048 File.exe Q4k9jICxp6ihXOsNAf61CQuS.exe PID 2448 wrote to memory of 1916 2448 svchost.exe schtasks.exe PID 2448 wrote to memory of 1916 2448 svchost.exe schtasks.exe PID 1768 wrote to memory of 528 1768 csrss.exe injector.exe PID 1768 wrote to memory of 528 1768 csrss.exe injector.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe"C:\Users\Admin\AppData\Local\Temp\3d76585487bec639bb39a96139986f50b2e5af83263fec6b754ccc1cf400d787.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Updbdate.exe"C:\Users\Admin\AppData\Local\Temp\Updbdate.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Info.exe"C:\Users\Admin\AppData\Local\Temp\Info.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 2723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 3723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 3723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 6643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 6643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 6643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 6643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 7283⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 7523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 8123⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 6763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 7763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 8763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 8563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 6963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 8883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 7683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 8723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 8363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 7243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 9203⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\Info.exe"C:\Users\Admin\AppData\Local\Temp\Info.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 3324⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 3364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 3604⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 6364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 6364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 6364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 6364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 7084⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 7244⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 6684⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 5764⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 8244⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 7364⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 5764⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 7164⤵
- Program crash
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 6604⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 9084⤵
- Program crash
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /94-944⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 3605⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 3685⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 3685⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 6645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 7245⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 7245⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 7045⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 7565⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 7765⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 8165⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 8245⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 6445⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 9045⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 9045⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 9245⤵
- Program crash
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 9765⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 9925⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 9045⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 9645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 9365⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 11165⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 10205⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 11085⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 9565⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 11325⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Folder.exe"C:\Users\Admin\AppData\Local\Temp\Folder.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Folder.exe"C:\Users\Admin\AppData\Local\Temp\Folder.exe" -a3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe"C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\KRSetp.exe"C:\Users\Admin\AppData\Local\Temp\KRSetp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\Q4k9jICxp6ihXOsNAf61CQuS.exe"C:\Users\Admin\Pictures\Adobe Films\Q4k9jICxp6ihXOsNAf61CQuS.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 19003⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\pub2.exe"C:\Users\Admin\AppData\Local\Temp\pub2.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\Files.exe"C:\Users\Admin\AppData\Local\Temp\Files.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 6043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4016 -ip 40161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 964 -ip 9641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 964 -ip 9641⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4048 -ip 40481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1768 -ip 17681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1768 -ip 17681⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\File.exeMD5
cbafd60beffb18c666ff85f1517a76f9
SHA19e015cba7168b610969bfc299a4ffe4763f4fd5f
SHA256d31f2d2d991acee74d9be732c8180f37cea12aceaba324804fbcf2d0d2891a3d
SHA512ba61ac5f49827b0fba2c72f4b19540b91f8bceb8b441a713b7de00317059955ad592c88af8f9c94093077503ab3b4c4c522b0e577599ca5020ad1b0f254066ce
-
C:\Users\Admin\AppData\Local\Temp\File.exeMD5
cbafd60beffb18c666ff85f1517a76f9
SHA19e015cba7168b610969bfc299a4ffe4763f4fd5f
SHA256d31f2d2d991acee74d9be732c8180f37cea12aceaba324804fbcf2d0d2891a3d
SHA512ba61ac5f49827b0fba2c72f4b19540b91f8bceb8b441a713b7de00317059955ad592c88af8f9c94093077503ab3b4c4c522b0e577599ca5020ad1b0f254066ce
-
C:\Users\Admin\AppData\Local\Temp\Files.exeMD5
2d0217e0c70440d8c82883eadea517b9
SHA1f3b7dd6dbb43b895ba26f67370af99952b7d83cb
SHA256d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01
SHA5126d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d
-
C:\Users\Admin\AppData\Local\Temp\Files.exeMD5
2d0217e0c70440d8c82883eadea517b9
SHA1f3b7dd6dbb43b895ba26f67370af99952b7d83cb
SHA256d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01
SHA5126d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d
-
C:\Users\Admin\AppData\Local\Temp\Folder.exeMD5
b89068659ca07ab9b39f1c580a6f9d39
SHA17e3e246fcf920d1ada06900889d099784fe06aa5
SHA2569d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c
SHA512940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52
-
C:\Users\Admin\AppData\Local\Temp\Folder.exeMD5
b89068659ca07ab9b39f1c580a6f9d39
SHA17e3e246fcf920d1ada06900889d099784fe06aa5
SHA2569d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c
SHA512940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52
-
C:\Users\Admin\AppData\Local\Temp\Folder.exeMD5
b89068659ca07ab9b39f1c580a6f9d39
SHA17e3e246fcf920d1ada06900889d099784fe06aa5
SHA2569d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c
SHA512940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52
-
C:\Users\Admin\AppData\Local\Temp\Info.exeMD5
f01d6fa9b172453c4538847d8fba92fd
SHA15c8bce1505107101bf28151fc073c71fca6ca7ba
SHA2567ce5bfd458b3a8064b078a41fa9ecdd777f8be28d04e1fc1a0fe508a77e43660
SHA5127127a48dffa23c79a07137fd8030510769b3a27db7555cea5b562945b62588243862b8c06bafeaeeed2237dcb0d56dbcfc2cf1b8e3108fd64a47b5e13a980324
-
C:\Users\Admin\AppData\Local\Temp\Info.exeMD5
f01d6fa9b172453c4538847d8fba92fd
SHA15c8bce1505107101bf28151fc073c71fca6ca7ba
SHA2567ce5bfd458b3a8064b078a41fa9ecdd777f8be28d04e1fc1a0fe508a77e43660
SHA5127127a48dffa23c79a07137fd8030510769b3a27db7555cea5b562945b62588243862b8c06bafeaeeed2237dcb0d56dbcfc2cf1b8e3108fd64a47b5e13a980324
-
C:\Users\Admin\AppData\Local\Temp\Info.exeMD5
f01d6fa9b172453c4538847d8fba92fd
SHA15c8bce1505107101bf28151fc073c71fca6ca7ba
SHA2567ce5bfd458b3a8064b078a41fa9ecdd777f8be28d04e1fc1a0fe508a77e43660
SHA5127127a48dffa23c79a07137fd8030510769b3a27db7555cea5b562945b62588243862b8c06bafeaeeed2237dcb0d56dbcfc2cf1b8e3108fd64a47b5e13a980324
-
C:\Users\Admin\AppData\Local\Temp\Install.exeMD5
992a30dec0b76e19f0644cab152e0888
SHA138b13055600cbd801666377630cdc196d806ece8
SHA256a63201ba5d88041eb789ddba10d28b79afa40325350f2833c67e655e5964d1c6
SHA51284f75a40d426e93a0f337cbe216abc333c5da9556bb283a7a4aed7d2b4a27176ce439668069c71c69d0ace86a94f72512dc0eb2f56dd9a8930f004dd960133cb
-
C:\Users\Admin\AppData\Local\Temp\Install.exeMD5
992a30dec0b76e19f0644cab152e0888
SHA138b13055600cbd801666377630cdc196d806ece8
SHA256a63201ba5d88041eb789ddba10d28b79afa40325350f2833c67e655e5964d1c6
SHA51284f75a40d426e93a0f337cbe216abc333c5da9556bb283a7a4aed7d2b4a27176ce439668069c71c69d0ace86a94f72512dc0eb2f56dd9a8930f004dd960133cb
-
C:\Users\Admin\AppData\Local\Temp\KRSetp.exeMD5
fb87a8d964a90ae94c0be5de3d25bb01
SHA18ddada78923059a0373598495fe4efbb125e795c
SHA25649b033d90c561256dbe38618a71c2b61d3872c0e0029ab30fc3f5a509105770f
SHA5125488ccf896547a434902637f132e2a0b1522d3250497cb2b65208a6baf14aa2a5ac6e6ef27d25aa95405bf6c96aedb636d9376eb6e98cc6f88734ecc23342c37
-
C:\Users\Admin\AppData\Local\Temp\KRSetp.exeMD5
fb87a8d964a90ae94c0be5de3d25bb01
SHA18ddada78923059a0373598495fe4efbb125e795c
SHA25649b033d90c561256dbe38618a71c2b61d3872c0e0029ab30fc3f5a509105770f
SHA5125488ccf896547a434902637f132e2a0b1522d3250497cb2b65208a6baf14aa2a5ac6e6ef27d25aa95405bf6c96aedb636d9376eb6e98cc6f88734ecc23342c37
-
C:\Users\Admin\AppData\Local\Temp\Updbdate.exeMD5
e0d7a00d5d1d17d549330622d5efbc57
SHA1e3abe1626a305c75b223bc17a9de9245290c1571
SHA256aae3cdeedc940844c30f81a0df1c1da150fc890c604fc81f0f81da729831e51f
SHA5128931fd7e2b00fe4fc3386eaaf8bfd0d30005e5fda3795d105a866505c83e3c5aca59725a5d8dd6369cc43a426920f6eab1f9fc62e40755ea7c905ec9d27464da
-
C:\Users\Admin\AppData\Local\Temp\Updbdate.exeMD5
e0d7a00d5d1d17d549330622d5efbc57
SHA1e3abe1626a305c75b223bc17a9de9245290c1571
SHA256aae3cdeedc940844c30f81a0df1c1da150fc890c604fc81f0f81da729831e51f
SHA5128931fd7e2b00fe4fc3386eaaf8bfd0d30005e5fda3795d105a866505c83e3c5aca59725a5d8dd6369cc43a426920f6eab1f9fc62e40755ea7c905ec9d27464da
-
C:\Users\Admin\AppData\Local\Temp\axhub.datMD5
5fd2eba6df44d23c9e662763009d7f84
SHA143530574f8ac455ae263c70cc99550bc60bfa4f1
SHA2562991e2231855661e94ef80a4202487a9d7dc7bebccab9a0b2a786cf0783a051f
SHA512321a86725e533dedb5b74e17218e6e53a49fa6ffc87d7f7da0f0b8441a081fe785f7846a76f67ef03ec3abddacbe8906b20a2f3ce8178896ec57090ef7ab0eb7
-
C:\Users\Admin\AppData\Local\Temp\axhub.dllMD5
1c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e
-
C:\Users\Admin\AppData\Local\Temp\axhub.dllMD5
1c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeMD5
d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeMD5
d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txtMD5
b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txtMD5
c47c42b0ee7caf1cc6b7e6ab8939bf69
SHA1824945fcdbcc11ca51568808f83d42bb6103fd08
SHA2567f379ea8fee1c2fe3f11d48d8508a52558de98ba6a2cbc9bf231301e658a827b
SHA5128aa4dd0d6c785201b094006b3112ef872fdf4fd961b3f71f8b8e608c9f57d22b7b6dc6fcf6519d3e04048fe1f185a8cbedaece7e8a3da3246dbb5f90cf193255
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exeMD5
ecd7365422db60cf4f55f3c6f4ed49bf
SHA1e4b914e366e854fc076b0faa955d4f52ae6f840d
SHA25677041a33e4f52b86a78b12d80a21e48ba25e4d4c430090f33ba69a08f12a83a7
SHA512a6a3b539765c31957564ee166dd8f2539ff4cfb73e76eda3cae1120f15abea410cc735bd8b0e759d69971ed788e58191b8d1c6f18081236aa7a431c8f88b0a24
-
C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exeMD5
ecd7365422db60cf4f55f3c6f4ed49bf
SHA1e4b914e366e854fc076b0faa955d4f52ae6f840d
SHA25677041a33e4f52b86a78b12d80a21e48ba25e4d4c430090f33ba69a08f12a83a7
SHA512a6a3b539765c31957564ee166dd8f2539ff4cfb73e76eda3cae1120f15abea410cc735bd8b0e759d69971ed788e58191b8d1c6f18081236aa7a431c8f88b0a24
-
C:\Users\Admin\AppData\Local\Temp\pub2.exeMD5
8097f49e3facdb9c8b0c99cd99f3066e
SHA1077ffc21b8e60ebfc8c8df770db25e39a84e466a
SHA256435dc414c613b77700a07c401e0c63acac66b31ea37c6fea63e37178c02b74a5
SHA51291853360fc25ed589e8cba0ae22c3e01947ac0065d1474fb7a840b56f4ebe9923490ffb197714ce9f378f902cb5a6f9a201494f71344f8808dee1308e5a8a088
-
C:\Users\Admin\AppData\Local\Temp\pub2.exeMD5
8097f49e3facdb9c8b0c99cd99f3066e
SHA1077ffc21b8e60ebfc8c8df770db25e39a84e466a
SHA256435dc414c613b77700a07c401e0c63acac66b31ea37c6fea63e37178c02b74a5
SHA51291853360fc25ed589e8cba0ae22c3e01947ac0065d1474fb7a840b56f4ebe9923490ffb197714ce9f378f902cb5a6f9a201494f71344f8808dee1308e5a8a088
-
C:\Users\Admin\Pictures\Adobe Films\Q4k9jICxp6ihXOsNAf61CQuS.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\Q4k9jICxp6ihXOsNAf61CQuS.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Windows\rss\csrss.exeMD5
f01d6fa9b172453c4538847d8fba92fd
SHA15c8bce1505107101bf28151fc073c71fca6ca7ba
SHA2567ce5bfd458b3a8064b078a41fa9ecdd777f8be28d04e1fc1a0fe508a77e43660
SHA5127127a48dffa23c79a07137fd8030510769b3a27db7555cea5b562945b62588243862b8c06bafeaeeed2237dcb0d56dbcfc2cf1b8e3108fd64a47b5e13a980324
-
C:\Windows\rss\csrss.exeMD5
f01d6fa9b172453c4538847d8fba92fd
SHA15c8bce1505107101bf28151fc073c71fca6ca7ba
SHA2567ce5bfd458b3a8064b078a41fa9ecdd777f8be28d04e1fc1a0fe508a77e43660
SHA5127127a48dffa23c79a07137fd8030510769b3a27db7555cea5b562945b62588243862b8c06bafeaeeed2237dcb0d56dbcfc2cf1b8e3108fd64a47b5e13a980324
-
memory/964-173-0x0000000000400000-0x00000000030E8000-memory.dmpFilesize
44.9MB
-
memory/964-170-0x0000000004E57000-0x0000000005293000-memory.dmpFilesize
4.2MB
-
memory/964-172-0x00000000052A0000-0x0000000005BC6000-memory.dmpFilesize
9.1MB
-
memory/1188-193-0x0000000006B03000-0x0000000006B04000-memory.dmpFilesize
4KB
-
memory/1188-171-0x0000000006B10000-0x00000000070B4000-memory.dmpFilesize
5.6MB
-
memory/1188-174-0x00000000076E0000-0x0000000007CF8000-memory.dmpFilesize
6.1MB
-
memory/1188-175-0x0000000007350000-0x0000000007362000-memory.dmpFilesize
72KB
-
memory/1188-176-0x0000000007370000-0x00000000073AC000-memory.dmpFilesize
240KB
-
memory/1188-198-0x0000000007420000-0x000000000752A000-memory.dmpFilesize
1.0MB
-
memory/1188-191-0x0000000006B00000-0x0000000006B01000-memory.dmpFilesize
4KB
-
memory/1188-186-0x00000000001C0000-0x00000000001EF000-memory.dmpFilesize
188KB
-
memory/1188-192-0x0000000006B02000-0x0000000006B03000-memory.dmpFilesize
4KB
-
memory/1188-189-0x0000000006B04000-0x0000000006B06000-memory.dmpFilesize
8KB
-
memory/1188-146-0x0000000002413000-0x0000000002435000-memory.dmpFilesize
136KB
-
memory/1188-188-0x0000000000400000-0x00000000023BE000-memory.dmpFilesize
31.7MB
-
memory/1188-184-0x0000000071950000-0x0000000072100000-memory.dmpFilesize
7.7MB
-
memory/1188-185-0x0000000002413000-0x0000000002435000-memory.dmpFilesize
136KB
-
memory/1488-178-0x0000000004CFD000-0x0000000005139000-memory.dmpFilesize
4.2MB
-
memory/1488-180-0x0000000000400000-0x00000000030E8000-memory.dmpFilesize
44.9MB
-
memory/1768-190-0x0000000005200000-0x000000000563C000-memory.dmpFilesize
4.2MB
-
memory/1768-195-0x0000000000400000-0x00000000030E8000-memory.dmpFilesize
44.9MB
-
memory/2008-183-0x0000000000400000-0x0000000000661000-memory.dmpFilesize
2.4MB
-
memory/2772-187-0x0000000002A60000-0x0000000002A76000-memory.dmpFilesize
88KB
-
memory/3432-162-0x00007FFFED500000-0x00007FFFEDFC1000-memory.dmpFilesize
10.8MB
-
memory/3432-147-0x0000000000580000-0x00000000005A4000-memory.dmpFilesize
144KB
-
memory/3968-166-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/3968-167-0x0000000000400000-0x00000000023AF000-memory.dmpFilesize
31.7MB
-
memory/3968-155-0x0000000002483000-0x0000000002493000-memory.dmpFilesize
64KB
-
memory/3968-165-0x0000000002483000-0x0000000002493000-memory.dmpFilesize
64KB
-
memory/4048-194-0x00000000038E0000-0x0000000003A9E000-memory.dmpFilesize
1.7MB