Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
14-03-2022 13:28
Static task
static1
Behavioral task
behavioral1
Sample
c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe
Resource
win10v2004-en-20220113
General
-
Target
c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe
-
Size
7.8MB
-
MD5
b07300703c909f867a9857fb7c62d42f
-
SHA1
a99a207c7e3421f6844aa6f6a227307adf9db5cb
-
SHA256
c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3
-
SHA512
f5b8206056607f253265057a2be5b2f078f4a9ffbd81765b1b46a9d12ff4f047a9fbc3bfe5fefc2c46ad6fb50cf77221e0f48d072003fb65842dd3285746011d
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
Glupteba Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4872-179-0x0000000003000000-0x0000000003926000-memory.dmp family_glupteba behavioral2/memory/4872-182-0x0000000000400000-0x00000000027D8000-memory.dmp family_glupteba behavioral2/memory/2804-195-0x0000000000400000-0x00000000027D8000-memory.dmp family_glupteba behavioral2/memory/400-202-0x0000000000400000-0x00000000027D8000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rUNdlL32.eXedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1392 1868 rUNdlL32.eXe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Install.exe family_socelars C:\Users\Admin\AppData\Local\Temp\Install.exe family_socelars -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
svchost.exedescription pid process target process PID 4512 created 4872 4512 svchost.exe Info.exe PID 4512 created 400 4512 svchost.exe csrss.exe -
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
Downloads MZ/PE file
-
Executes dropped EXE 17 IoCs
Processes:
Updbdate.exeInfo.exeFolder.exemd9_1sjm.exeKRSetp.exeInstall.exeFile.exepub2.exeFolder.exeFiles.exejfiag3g_gg.exejfiag3g_gg.exeInfo.execsrss.exeinjector.exeA6WzCrSeQAlNjwIEGn4cQNbX.exeddubhchpid process 3764 Updbdate.exe 4872 Info.exe 3716 Folder.exe 4136 md9_1sjm.exe 1312 KRSetp.exe 2696 Install.exe 1944 File.exe 4220 pub2.exe 1748 Folder.exe 4732 Files.exe 4984 jfiag3g_gg.exe 3288 jfiag3g_gg.exe 2804 Info.exe 400 csrss.exe 992 injector.exe 4492 A6WzCrSeQAlNjwIEGn4cQNbX.exe 1272 ddubhch -
Modifies Windows Firewall 1 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
File.exec63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exeFolder.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation File.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Folder.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1888 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
Files.exeInfo.exemsedge.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.ex" Files.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FragrantViolet = "\"C:\\Windows\\rss\\csrss.exe\"" Info.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
md9_1sjm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md9_1sjm.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 ip-api.com 164 ipinfo.io 165 ipinfo.io 169 api.db-ip.com 170 api.db-ip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\f4f49267-2789-4ac7-85ef-a134e12962aa.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220129010632.pma setup.exe -
Drops file in Windows directory 2 IoCs
Processes:
Info.exedescription ioc process File opened for modification C:\Windows\rss Info.exe File created C:\Windows\rss\csrss.exe Info.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3820 1888 WerFault.exe rundll32.exe 4540 1944 WerFault.exe File.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
pub2.exeddubhchdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ddubhch Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ddubhch Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ddubhch -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1352 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
Info.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" Info.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" Info.exe -
Modifies registry class 4 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
msedge.exejfiag3g_gg.exeInfo.exemsedge.exepub2.exeInfo.exepid process 1960 msedge.exe 1960 msedge.exe 3288 jfiag3g_gg.exe 3288 jfiag3g_gg.exe 4872 Info.exe 4872 Info.exe 4656 msedge.exe 4656 msedge.exe 4220 pub2.exe 4220 pub2.exe 2804 Info.exe 2804 Info.exe 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
pub2.exeddubhchpid process 4220 pub2.exe 1272 ddubhch -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
msedge.exepid process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Install.exeKRSetp.exemd9_1sjm.exeUpdbdate.exetaskkill.exeInfo.exesvchost.exeInfo.execsrss.exesvchost.exedescription pid process Token: SeCreateTokenPrivilege 2696 Install.exe Token: SeAssignPrimaryTokenPrivilege 2696 Install.exe Token: SeLockMemoryPrivilege 2696 Install.exe Token: SeIncreaseQuotaPrivilege 2696 Install.exe Token: SeMachineAccountPrivilege 2696 Install.exe Token: SeTcbPrivilege 2696 Install.exe Token: SeSecurityPrivilege 2696 Install.exe Token: SeTakeOwnershipPrivilege 2696 Install.exe Token: SeLoadDriverPrivilege 2696 Install.exe Token: SeSystemProfilePrivilege 2696 Install.exe Token: SeSystemtimePrivilege 2696 Install.exe Token: SeProfSingleProcessPrivilege 2696 Install.exe Token: SeIncBasePriorityPrivilege 2696 Install.exe Token: SeCreatePagefilePrivilege 2696 Install.exe Token: SeCreatePermanentPrivilege 2696 Install.exe Token: SeBackupPrivilege 2696 Install.exe Token: SeRestorePrivilege 2696 Install.exe Token: SeShutdownPrivilege 2696 Install.exe Token: SeDebugPrivilege 2696 Install.exe Token: SeAuditPrivilege 2696 Install.exe Token: SeSystemEnvironmentPrivilege 2696 Install.exe Token: SeChangeNotifyPrivilege 2696 Install.exe Token: SeRemoteShutdownPrivilege 2696 Install.exe Token: SeUndockPrivilege 2696 Install.exe Token: SeSyncAgentPrivilege 2696 Install.exe Token: SeEnableDelegationPrivilege 2696 Install.exe Token: SeManageVolumePrivilege 2696 Install.exe Token: SeImpersonatePrivilege 2696 Install.exe Token: SeCreateGlobalPrivilege 2696 Install.exe Token: 31 2696 Install.exe Token: 32 2696 Install.exe Token: 33 2696 Install.exe Token: 34 2696 Install.exe Token: 35 2696 Install.exe Token: SeDebugPrivilege 1312 KRSetp.exe Token: SeManageVolumePrivilege 4136 md9_1sjm.exe Token: SeDebugPrivilege 3764 Updbdate.exe Token: SeDebugPrivilege 1352 taskkill.exe Token: SeManageVolumePrivilege 4136 md9_1sjm.exe Token: SeDebugPrivilege 4872 Info.exe Token: SeImpersonatePrivilege 4872 Info.exe Token: SeTcbPrivilege 4512 svchost.exe Token: SeTcbPrivilege 4512 svchost.exe Token: SeSystemEnvironmentPrivilege 2804 Info.exe Token: SeManageVolumePrivilege 4136 md9_1sjm.exe Token: SeManageVolumePrivilege 4136 md9_1sjm.exe Token: SeBackupPrivilege 4512 svchost.exe Token: SeRestorePrivilege 4512 svchost.exe Token: SeSystemEnvironmentPrivilege 400 csrss.exe Token: SeBackupPrivilege 4512 svchost.exe Token: SeRestorePrivilege 4512 svchost.exe Token: SeManageVolumePrivilege 4136 md9_1sjm.exe Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeTcbPrivilege 3860 svchost.exe Token: SeTcbPrivilege 3860 svchost.exe Token: SeTcbPrivilege 3860 svchost.exe Token: SeTcbPrivilege 3860 svchost.exe Token: SeTcbPrivilege 3860 svchost.exe Token: SeShutdownPrivilege 3028 -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
msedge.exepid process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 3028 3028 3028 3028 -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
File.exepid process 1944 File.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exeFolder.exemsedge.exeFiles.exeInstall.execmd.exerUNdlL32.eXedescription pid process target process PID 2560 wrote to memory of 3764 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Updbdate.exe PID 2560 wrote to memory of 3764 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Updbdate.exe PID 2560 wrote to memory of 3764 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Updbdate.exe PID 2560 wrote to memory of 4872 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Info.exe PID 2560 wrote to memory of 4872 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Info.exe PID 2560 wrote to memory of 4872 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Info.exe PID 2560 wrote to memory of 3716 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Folder.exe PID 2560 wrote to memory of 3716 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Folder.exe PID 2560 wrote to memory of 3716 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Folder.exe PID 2560 wrote to memory of 4136 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe md9_1sjm.exe PID 2560 wrote to memory of 4136 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe md9_1sjm.exe PID 2560 wrote to memory of 4136 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe md9_1sjm.exe PID 2560 wrote to memory of 1312 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe KRSetp.exe PID 2560 wrote to memory of 1312 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe KRSetp.exe PID 2560 wrote to memory of 2696 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Install.exe PID 2560 wrote to memory of 2696 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Install.exe PID 2560 wrote to memory of 2696 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Install.exe PID 2560 wrote to memory of 1944 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe File.exe PID 2560 wrote to memory of 1944 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe File.exe PID 2560 wrote to memory of 1944 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe File.exe PID 2560 wrote to memory of 4220 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe pub2.exe PID 2560 wrote to memory of 4220 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe pub2.exe PID 2560 wrote to memory of 4220 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe pub2.exe PID 3716 wrote to memory of 1748 3716 Folder.exe Folder.exe PID 3716 wrote to memory of 1748 3716 Folder.exe Folder.exe PID 3716 wrote to memory of 1748 3716 Folder.exe Folder.exe PID 2560 wrote to memory of 4732 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Files.exe PID 2560 wrote to memory of 4732 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Files.exe PID 2560 wrote to memory of 4732 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe Files.exe PID 2560 wrote to memory of 4656 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe msedge.exe PID 2560 wrote to memory of 4656 2560 c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe msedge.exe PID 4656 wrote to memory of 2332 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 2332 4656 msedge.exe msedge.exe PID 4732 wrote to memory of 4984 4732 Files.exe jfiag3g_gg.exe PID 4732 wrote to memory of 4984 4732 Files.exe jfiag3g_gg.exe PID 4732 wrote to memory of 4984 4732 Files.exe jfiag3g_gg.exe PID 2696 wrote to memory of 5020 2696 Install.exe cmd.exe PID 2696 wrote to memory of 5020 2696 Install.exe cmd.exe PID 2696 wrote to memory of 5020 2696 Install.exe cmd.exe PID 5020 wrote to memory of 1352 5020 cmd.exe taskkill.exe PID 5020 wrote to memory of 1352 5020 cmd.exe taskkill.exe PID 5020 wrote to memory of 1352 5020 cmd.exe taskkill.exe PID 1392 wrote to memory of 1888 1392 rUNdlL32.eXe rundll32.exe PID 1392 wrote to memory of 1888 1392 rUNdlL32.eXe rundll32.exe PID 1392 wrote to memory of 1888 1392 rUNdlL32.eXe rundll32.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe PID 4656 wrote to memory of 4852 4656 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe"C:\Users\Admin\AppData\Local\Temp\c63fd4d2a1f9622013ef4ca60fa208b0c6748c8d1cce737b9c583cf1576aa6f3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Updbdate.exe"C:\Users\Admin\AppData\Local\Temp\Updbdate.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Info.exe"C:\Users\Admin\AppData\Local\Temp\Info.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Info.exe"C:\Users\Admin\AppData\Local\Temp\Info.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /94-944⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Folder.exe"C:\Users\Admin\AppData\Local\Temp\Folder.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Folder.exe"C:\Users\Admin\AppData\Local\Temp\Folder.exe" -a3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe"C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\KRSetp.exe"C:\Users\Admin\AppData\Local\Temp\KRSetp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\A6WzCrSeQAlNjwIEGn4cQNbX.exe"C:\Users\Admin\Pictures\Adobe Films\A6WzCrSeQAlNjwIEGn4cQNbX.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 23603⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\pub2.exe"C:\Users\Admin\AppData\Local\Temp\pub2.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\Files.exe"C:\Users\Admin\AppData\Local\Temp\Files.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1rPS672⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbf3b546f8,0x7ffbf3b54708,0x7ffbf3b547183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8299956124792085165,18200376839861900283,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,8299956124792085165,18200376839861900283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,8299956124792085165,18200376839861900283,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3084 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8299956124792085165,18200376839861900283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3844 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8299956124792085165,18200376839861900283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,8299956124792085165,18200376839861900283,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5252 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8299956124792085165,18200376839861900283,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8299956124792085165,18200376839861900283,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8299956124792085165,18200376839861900283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff79a7f5460,0x7ff79a7f5470,0x7ff79a7f54804⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8299956124792085165,18200376839861900283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,8299956124792085165,18200376839861900283,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6872 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,8299956124792085165,18200376839861900283,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1044 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8299956124792085165,18200376839861900283,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2644 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,8299956124792085165,18200376839861900283,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2148 /prefetch:83⤵
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1888 -ip 18881⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1944 -ip 19441⤵
-
C:\Users\Admin\AppData\Roaming\ddubhchC:\Users\Admin\AppData\Roaming\ddubhch1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
f2b563525918f53987bd6c0ea10574be
SHA1dcd8c042f44424388e70023ccdb684c8a24e030a
SHA256c7f164601a82283eb7dda3d1098e6e8d2e8fc33281e01359d863edd98bac71cd
SHA512c5434b8bcc04ecf9398826f73f790fe90e080228ad2406acf4de674922c9a03994200c3b6d575578f0684e37868fb9b9081f60bee4022c535a07a2d56dbfd841
-
C:\Users\Admin\AppData\Local\Temp\File.exeMD5
cbafd60beffb18c666ff85f1517a76f9
SHA19e015cba7168b610969bfc299a4ffe4763f4fd5f
SHA256d31f2d2d991acee74d9be732c8180f37cea12aceaba324804fbcf2d0d2891a3d
SHA512ba61ac5f49827b0fba2c72f4b19540b91f8bceb8b441a713b7de00317059955ad592c88af8f9c94093077503ab3b4c4c522b0e577599ca5020ad1b0f254066ce
-
C:\Users\Admin\AppData\Local\Temp\File.exeMD5
cbafd60beffb18c666ff85f1517a76f9
SHA19e015cba7168b610969bfc299a4ffe4763f4fd5f
SHA256d31f2d2d991acee74d9be732c8180f37cea12aceaba324804fbcf2d0d2891a3d
SHA512ba61ac5f49827b0fba2c72f4b19540b91f8bceb8b441a713b7de00317059955ad592c88af8f9c94093077503ab3b4c4c522b0e577599ca5020ad1b0f254066ce
-
C:\Users\Admin\AppData\Local\Temp\Files.exeMD5
2d0217e0c70440d8c82883eadea517b9
SHA1f3b7dd6dbb43b895ba26f67370af99952b7d83cb
SHA256d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01
SHA5126d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d
-
C:\Users\Admin\AppData\Local\Temp\Files.exeMD5
2d0217e0c70440d8c82883eadea517b9
SHA1f3b7dd6dbb43b895ba26f67370af99952b7d83cb
SHA256d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01
SHA5126d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d
-
C:\Users\Admin\AppData\Local\Temp\Folder.exeMD5
b89068659ca07ab9b39f1c580a6f9d39
SHA17e3e246fcf920d1ada06900889d099784fe06aa5
SHA2569d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c
SHA512940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52
-
C:\Users\Admin\AppData\Local\Temp\Folder.exeMD5
b89068659ca07ab9b39f1c580a6f9d39
SHA17e3e246fcf920d1ada06900889d099784fe06aa5
SHA2569d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c
SHA512940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52
-
C:\Users\Admin\AppData\Local\Temp\Folder.exeMD5
b89068659ca07ab9b39f1c580a6f9d39
SHA17e3e246fcf920d1ada06900889d099784fe06aa5
SHA2569d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c
SHA512940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52
-
C:\Users\Admin\AppData\Local\Temp\Info.exeMD5
03eacd4a6d86245c56f6f0d516e49e2d
SHA1621a57e5936d8a21ed7bfcdbe9193fc13899ea98
SHA2567a616f2fe1f3277d313fbd84a09028e0eb89b09fcf72472907fd510900fd0974
SHA512b0a78b979a5f161c3155030fa06a0138b57b6fd183aa80d4171057dd43ebe1b53fcd18c0d7f8d7624802c0cdc47a70a8a47e9b8b7ecd0e0d6564fad2c30e8461
-
C:\Users\Admin\AppData\Local\Temp\Info.exeMD5
03eacd4a6d86245c56f6f0d516e49e2d
SHA1621a57e5936d8a21ed7bfcdbe9193fc13899ea98
SHA2567a616f2fe1f3277d313fbd84a09028e0eb89b09fcf72472907fd510900fd0974
SHA512b0a78b979a5f161c3155030fa06a0138b57b6fd183aa80d4171057dd43ebe1b53fcd18c0d7f8d7624802c0cdc47a70a8a47e9b8b7ecd0e0d6564fad2c30e8461
-
C:\Users\Admin\AppData\Local\Temp\Info.exeMD5
03eacd4a6d86245c56f6f0d516e49e2d
SHA1621a57e5936d8a21ed7bfcdbe9193fc13899ea98
SHA2567a616f2fe1f3277d313fbd84a09028e0eb89b09fcf72472907fd510900fd0974
SHA512b0a78b979a5f161c3155030fa06a0138b57b6fd183aa80d4171057dd43ebe1b53fcd18c0d7f8d7624802c0cdc47a70a8a47e9b8b7ecd0e0d6564fad2c30e8461
-
C:\Users\Admin\AppData\Local\Temp\Install.exeMD5
992a30dec0b76e19f0644cab152e0888
SHA138b13055600cbd801666377630cdc196d806ece8
SHA256a63201ba5d88041eb789ddba10d28b79afa40325350f2833c67e655e5964d1c6
SHA51284f75a40d426e93a0f337cbe216abc333c5da9556bb283a7a4aed7d2b4a27176ce439668069c71c69d0ace86a94f72512dc0eb2f56dd9a8930f004dd960133cb
-
C:\Users\Admin\AppData\Local\Temp\Install.exeMD5
992a30dec0b76e19f0644cab152e0888
SHA138b13055600cbd801666377630cdc196d806ece8
SHA256a63201ba5d88041eb789ddba10d28b79afa40325350f2833c67e655e5964d1c6
SHA51284f75a40d426e93a0f337cbe216abc333c5da9556bb283a7a4aed7d2b4a27176ce439668069c71c69d0ace86a94f72512dc0eb2f56dd9a8930f004dd960133cb
-
C:\Users\Admin\AppData\Local\Temp\KRSetp.exeMD5
10056300408ddb4f5b0476be0b4e8606
SHA173837992df260595e953dfd2f28a3b7df9308bdd
SHA2563fe30a9e5bdd2ce8deee66d198a0da43bc2f098433406325f2cecb4644eb742b
SHA51264fc6f56d32bae7e78af77a4867f9e173a9c7b6947e999b41f3a12ccafc1c9edc6b74a68bffea1ef2edd15a75cb2d8950254d6a8dd19df73d084c44b114be124
-
C:\Users\Admin\AppData\Local\Temp\KRSetp.exeMD5
10056300408ddb4f5b0476be0b4e8606
SHA173837992df260595e953dfd2f28a3b7df9308bdd
SHA2563fe30a9e5bdd2ce8deee66d198a0da43bc2f098433406325f2cecb4644eb742b
SHA51264fc6f56d32bae7e78af77a4867f9e173a9c7b6947e999b41f3a12ccafc1c9edc6b74a68bffea1ef2edd15a75cb2d8950254d6a8dd19df73d084c44b114be124
-
C:\Users\Admin\AppData\Local\Temp\Updbdate.exeMD5
e0d7a00d5d1d17d549330622d5efbc57
SHA1e3abe1626a305c75b223bc17a9de9245290c1571
SHA256aae3cdeedc940844c30f81a0df1c1da150fc890c604fc81f0f81da729831e51f
SHA5128931fd7e2b00fe4fc3386eaaf8bfd0d30005e5fda3795d105a866505c83e3c5aca59725a5d8dd6369cc43a426920f6eab1f9fc62e40755ea7c905ec9d27464da
-
C:\Users\Admin\AppData\Local\Temp\Updbdate.exeMD5
e0d7a00d5d1d17d549330622d5efbc57
SHA1e3abe1626a305c75b223bc17a9de9245290c1571
SHA256aae3cdeedc940844c30f81a0df1c1da150fc890c604fc81f0f81da729831e51f
SHA5128931fd7e2b00fe4fc3386eaaf8bfd0d30005e5fda3795d105a866505c83e3c5aca59725a5d8dd6369cc43a426920f6eab1f9fc62e40755ea7c905ec9d27464da
-
C:\Users\Admin\AppData\Local\Temp\axhub.datMD5
5fd2eba6df44d23c9e662763009d7f84
SHA143530574f8ac455ae263c70cc99550bc60bfa4f1
SHA2562991e2231855661e94ef80a4202487a9d7dc7bebccab9a0b2a786cf0783a051f
SHA512321a86725e533dedb5b74e17218e6e53a49fa6ffc87d7f7da0f0b8441a081fe785f7846a76f67ef03ec3abddacbe8906b20a2f3ce8178896ec57090ef7ab0eb7
-
C:\Users\Admin\AppData\Local\Temp\axhub.dllMD5
1c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e
-
C:\Users\Admin\AppData\Local\Temp\axhub.dllMD5
1c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeMD5
d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeMD5
d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txtMD5
b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txtMD5
eed40acf4703986a80f00ec41c6949fe
SHA13184a7c0fb0b705a9607d5a0b9b2beb80f6b60fc
SHA256d6a9f4d0e28e490da5dddaa597518fc0d8fefca03932c94457785aec4f3ddbf5
SHA512ec49b4eeff25d8c58d47aadcc6f560c353c5bd0dee6f49be71587432c9c1b560664abc9d23496e6a08e657a5a2d802f663373e4004299672b283b5de028610ba
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exeMD5
ecd7365422db60cf4f55f3c6f4ed49bf
SHA1e4b914e366e854fc076b0faa955d4f52ae6f840d
SHA25677041a33e4f52b86a78b12d80a21e48ba25e4d4c430090f33ba69a08f12a83a7
SHA512a6a3b539765c31957564ee166dd8f2539ff4cfb73e76eda3cae1120f15abea410cc735bd8b0e759d69971ed788e58191b8d1c6f18081236aa7a431c8f88b0a24
-
C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exeMD5
ecd7365422db60cf4f55f3c6f4ed49bf
SHA1e4b914e366e854fc076b0faa955d4f52ae6f840d
SHA25677041a33e4f52b86a78b12d80a21e48ba25e4d4c430090f33ba69a08f12a83a7
SHA512a6a3b539765c31957564ee166dd8f2539ff4cfb73e76eda3cae1120f15abea410cc735bd8b0e759d69971ed788e58191b8d1c6f18081236aa7a431c8f88b0a24
-
C:\Users\Admin\AppData\Local\Temp\pub2.exeMD5
5ec8db81122920ba467c966772140098
SHA1087326e8ded992c4aad13210c6b47475e4f11a85
SHA256249454671e83eadb62b1ce49634c3ea520166426fb1097b0d75a537f8e779919
SHA51240302153ad4bda82a9853d975859f361df638778c3855fb68b82f30d3308a78d149d3e1db67cee8f9241b9d95236a141de8600d3d9783e4255c161a1665e0819
-
C:\Users\Admin\AppData\Local\Temp\pub2.exeMD5
5ec8db81122920ba467c966772140098
SHA1087326e8ded992c4aad13210c6b47475e4f11a85
SHA256249454671e83eadb62b1ce49634c3ea520166426fb1097b0d75a537f8e779919
SHA51240302153ad4bda82a9853d975859f361df638778c3855fb68b82f30d3308a78d149d3e1db67cee8f9241b9d95236a141de8600d3d9783e4255c161a1665e0819
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnkMD5
5b1fbea95be5f6c81b91a76446eb405a
SHA1d793117d50fcac6a8d87bfaa9fde93749e60ad35
SHA256f9a317e879cb4483d7a9781b12ad218797cc37319983459f6bb4e3f3a3f2e187
SHA512850017abd06115702d1ae7abacfcf72975e9afeb7976809ee27cde9697dfe32ff88d973b857b66076b2012dc59ba1e66f353330b852e9ab3e44578ede5812bc8
-
C:\Users\Admin\AppData\Roaming\ddubhchMD5
5ec8db81122920ba467c966772140098
SHA1087326e8ded992c4aad13210c6b47475e4f11a85
SHA256249454671e83eadb62b1ce49634c3ea520166426fb1097b0d75a537f8e779919
SHA51240302153ad4bda82a9853d975859f361df638778c3855fb68b82f30d3308a78d149d3e1db67cee8f9241b9d95236a141de8600d3d9783e4255c161a1665e0819
-
C:\Users\Admin\AppData\Roaming\ddubhchMD5
5ec8db81122920ba467c966772140098
SHA1087326e8ded992c4aad13210c6b47475e4f11a85
SHA256249454671e83eadb62b1ce49634c3ea520166426fb1097b0d75a537f8e779919
SHA51240302153ad4bda82a9853d975859f361df638778c3855fb68b82f30d3308a78d149d3e1db67cee8f9241b9d95236a141de8600d3d9783e4255c161a1665e0819
-
C:\Users\Admin\Desktop\Microsoft Edge.lnkMD5
2898ec8c6cf06a56c223d6154c6c6553
SHA1018a9d9f161db09381d80251f834f4e12ed13340
SHA256827e8e96ef183c515cc2ac5f5c9bca6fa39747cefece389f717b7034c20f469f
SHA51207649db8f74aa44ac9aaa74b3e7c1add6a3acec2592b4c5b3ed86004c67c709fbd04cfed91b11dddf0c4f42f4eb018412c0ccd6357ef3b0e828196cf66c6ab97
-
C:\Users\Admin\Pictures\Adobe Films\A6WzCrSeQAlNjwIEGn4cQNbX.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\A6WzCrSeQAlNjwIEGn4cQNbX.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Windows\rss\csrss.exeMD5
03eacd4a6d86245c56f6f0d516e49e2d
SHA1621a57e5936d8a21ed7bfcdbe9193fc13899ea98
SHA2567a616f2fe1f3277d313fbd84a09028e0eb89b09fcf72472907fd510900fd0974
SHA512b0a78b979a5f161c3155030fa06a0138b57b6fd183aa80d4171057dd43ebe1b53fcd18c0d7f8d7624802c0cdc47a70a8a47e9b8b7ecd0e0d6564fad2c30e8461
-
C:\Windows\rss\csrss.exeMD5
03eacd4a6d86245c56f6f0d516e49e2d
SHA1621a57e5936d8a21ed7bfcdbe9193fc13899ea98
SHA2567a616f2fe1f3277d313fbd84a09028e0eb89b09fcf72472907fd510900fd0974
SHA512b0a78b979a5f161c3155030fa06a0138b57b6fd183aa80d4171057dd43ebe1b53fcd18c0d7f8d7624802c0cdc47a70a8a47e9b8b7ecd0e0d6564fad2c30e8461
-
\??\c:\users\admin\appdata\local\microsoft\edge\user data\default\edge profile.icoMD5
e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
\??\pipe\LOCAL\crashpad_4656_QLLQHPMKODBPIKFOMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/400-200-0x0000000003000000-0x000000000343C000-memory.dmpFilesize
4.2MB
-
memory/400-202-0x0000000000400000-0x00000000027D8000-memory.dmpFilesize
35.8MB
-
memory/1272-220-0x0000000002E5E000-0x0000000002E67000-memory.dmpFilesize
36KB
-
memory/1272-221-0x0000000002E5E000-0x0000000002E67000-memory.dmpFilesize
36KB
-
memory/1272-222-0x0000000000400000-0x0000000002CB7000-memory.dmpFilesize
40.7MB
-
memory/1312-161-0x00007FFBF69B0000-0x00007FFBF7471000-memory.dmpFilesize
10.8MB
-
memory/1312-141-0x0000000000B70000-0x0000000000B9C000-memory.dmpFilesize
176KB
-
memory/1944-213-0x0000000003DB0000-0x0000000003F6E000-memory.dmpFilesize
1.7MB
-
memory/2804-192-0x0000000002B87000-0x0000000002FC3000-memory.dmpFilesize
4.2MB
-
memory/2804-195-0x0000000000400000-0x00000000027D8000-memory.dmpFilesize
35.8MB
-
memory/3028-209-0x0000000000FA0000-0x0000000000FB6000-memory.dmpFilesize
88KB
-
memory/3028-225-0x0000000000E10000-0x0000000000E26000-memory.dmpFilesize
88KB
-
memory/3764-206-0x0000000006982000-0x0000000006983000-memory.dmpFilesize
4KB
-
memory/3764-207-0x0000000006983000-0x0000000006984000-memory.dmpFilesize
4KB
-
memory/3764-197-0x00000000023C0000-0x00000000024C0000-memory.dmpFilesize
1024KB
-
memory/3764-153-0x0000000006F40000-0x0000000007558000-memory.dmpFilesize
6.1MB
-
memory/3764-203-0x0000000000400000-0x00000000023BE000-memory.dmpFilesize
31.7MB
-
memory/3764-204-0x0000000072350000-0x0000000072B00000-memory.dmpFilesize
7.7MB
-
memory/3764-205-0x0000000006980000-0x0000000006981000-memory.dmpFilesize
4KB
-
memory/3764-152-0x0000000006990000-0x0000000006F34000-memory.dmpFilesize
5.6MB
-
memory/3764-155-0x00000000075D0000-0x000000000760C000-memory.dmpFilesize
240KB
-
memory/3764-208-0x0000000006984000-0x0000000006986000-memory.dmpFilesize
8KB
-
memory/3764-160-0x00000000077C0000-0x00000000078CA000-memory.dmpFilesize
1.0MB
-
memory/3764-198-0x00000000001C0000-0x00000000001EF000-memory.dmpFilesize
188KB
-
memory/3764-154-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4136-196-0x0000000000400000-0x0000000000661000-memory.dmpFilesize
2.4MB
-
memory/4136-163-0x0000000004C50000-0x0000000004C58000-memory.dmpFilesize
32KB
-
memory/4220-191-0x0000000002EBE000-0x0000000002EC7000-memory.dmpFilesize
36KB
-
memory/4220-148-0x0000000002EBE000-0x0000000002EC7000-memory.dmpFilesize
36KB
-
memory/4220-193-0x0000000002E10000-0x0000000002E19000-memory.dmpFilesize
36KB
-
memory/4220-194-0x0000000000400000-0x0000000002CB7000-memory.dmpFilesize
40.7MB
-
memory/4852-166-0x00007FFC14B60000-0x00007FFC14B61000-memory.dmpFilesize
4KB
-
memory/4872-178-0x0000000002BB7000-0x0000000002FF3000-memory.dmpFilesize
4.2MB
-
memory/4872-179-0x0000000003000000-0x0000000003926000-memory.dmpFilesize
9.1MB
-
memory/4872-182-0x0000000000400000-0x00000000027D8000-memory.dmpFilesize
35.8MB