Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-06-2022 13:25
Static task
static1
Behavioral task
behavioral1
Sample
bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.exe
Resource
win7-20220414-en
General
-
Target
bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.exe
-
Size
766KB
-
MD5
104b98c2cc9cdae9de467cfd94f79240
-
SHA1
cf9621f7933acd38ce5fd5a65e3346570a31e85b
-
SHA256
bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297
-
SHA512
73c721580ee30df8abadbdda2b906db44dc6f4268c6c21d2a8edd27cde5ca4735005e5a56e133480f9f1b67359a342365494c68887018d50392ee947e3139fbd
Malware Config
Extracted
nymaim
45.141.237.3
31.210.20.149
212.192.241.16
Extracted
socelars
https://sa-us-bucket.s3.us-east-2.amazonaws.com/hdherf623/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5592 1884 rundll32.exe -
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\s5no4j3h.xgl\handselfdiy_0.exe family_socelars C:\Users\Admin\AppData\Local\Temp\s5no4j3h.xgl\handselfdiy_0.exe family_socelars -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\is-T25VB.tmp\ApiTool.dll acprotect C:\Users\Admin\AppData\Local\Temp\is-T25VB.tmp\ApiTool.dll acprotect -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Blocklisted process makes network request 54 IoCs
Processes:
MsiExec.exeflow pid process 178 5772 MsiExec.exe 184 5772 MsiExec.exe 186 5772 MsiExec.exe 188 5772 MsiExec.exe 190 5772 MsiExec.exe 191 5772 MsiExec.exe 192 5772 MsiExec.exe 193 5772 MsiExec.exe 197 5772 MsiExec.exe 198 5772 MsiExec.exe 199 5772 MsiExec.exe 199 5772 MsiExec.exe 198 5772 MsiExec.exe 201 5772 MsiExec.exe 203 5772 MsiExec.exe 204 5772 MsiExec.exe 205 5772 MsiExec.exe 206 5772 MsiExec.exe 207 5772 MsiExec.exe 208 5772 MsiExec.exe 209 5772 MsiExec.exe 210 5772 MsiExec.exe 225 5772 MsiExec.exe 226 5772 MsiExec.exe 230 5772 MsiExec.exe 231 5772 MsiExec.exe 232 5772 MsiExec.exe 233 5772 MsiExec.exe 235 5772 MsiExec.exe 236 5772 MsiExec.exe 237 5772 MsiExec.exe 238 5772 MsiExec.exe 239 5772 MsiExec.exe 240 5772 MsiExec.exe 241 5772 MsiExec.exe 242 5772 MsiExec.exe 243 5772 MsiExec.exe 244 5772 MsiExec.exe 245 5772 MsiExec.exe 247 5772 MsiExec.exe 250 5772 MsiExec.exe 251 5772 MsiExec.exe 252 5772 MsiExec.exe 253 5772 MsiExec.exe 258 5772 MsiExec.exe 198 5772 MsiExec.exe 203 5772 MsiExec.exe 205 5772 MsiExec.exe 206 5772 MsiExec.exe 207 5772 MsiExec.exe 190 5772 MsiExec.exe 184 5772 MsiExec.exe 186 5772 MsiExec.exe 188 5772 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 4 IoCs
Processes:
DrvInst.exeSEoMal.exedescription ioc process File created C:\Windows\System32\drivers\SETA1D.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe File opened for modification C:\Windows\system32\drivers\etc\hosts SEoMal.exe File opened for modification C:\Windows\System32\drivers\SETA1D.tmp DrvInst.exe -
Executes dropped EXE 28 IoCs
Processes:
bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.tmpSEoMal.exeCajydaegaerae.exeKesynagiry.exeirecord.exeirecord.tmpinstaller.exegcleaner.exeI-Record.exe161.exe161.tmprandom.exehandselfdiy_0.exeConhost.exejpsilent.exermaa1045.exeinstaller.exeJp_Update.exetapinstall.exeJp_Update.exeJp_Update.exejianpian.exetapinstall.exejpengine.execlient_windows_amd64.exesetup.exemask_svc.exemask_svc.exepid process 2628 bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.tmp 4812 SEoMal.exe 3164 Cajydaegaerae.exe 4624 Kesynagiry.exe 2352 irecord.exe 1576 irecord.tmp 6020 installer.exe 4824 gcleaner.exe 4880 I-Record.exe 2608 161.exe 2228 161.tmp 4572 random.exe 4524 handselfdiy_0.exe 1000 Conhost.exe 5376 jpsilent.exe 5548 rmaa1045.exe 2364 installer.exe 3156 Jp_Update.exe 5484 tapinstall.exe 5308 Jp_Update.exe 3856 Jp_Update.exe 5128 jianpian.exe 5472 tapinstall.exe 5156 jpengine.exe 4004 client_windows_amd64.exe 1360 setup.exe 5460 mask_svc.exe 6104 mask_svc.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F92EA1C2-0B58-4DA3-8528-22F0CA82EEA6}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F92EA1C2-0B58-4DA3-8528-22F0CA82EEA6}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F92EA1C2-0B58-4DA3-8528-22F0CA82EEA6}\InProcServer32\ = "C:\\Program Files (x86)\\jianpian\\jianpianhelp.dll" regsvr32.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\is-T25VB.tmp\ApiTool.dll upx C:\Users\Admin\AppData\Local\Temp\is-T25VB.tmp\ApiTool.dll upx behavioral2/memory/2228-215-0x0000000005BF0000-0x0000000005FF0000-memory.dmp upx -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\azwe4wef.eyi\rmaa1045.exe vmprotect C:\Users\Admin\AppData\Local\Temp\azwe4wef.eyi\rmaa1045.exe vmprotect behavioral2/memory/5548-263-0x0000000140000000-0x000000014067F000-memory.dmp vmprotect -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SEoMal.exeKesynagiry.exegcleaner.exerandom.exe161.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation SEoMal.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation Kesynagiry.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation gcleaner.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation random.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation 161.tmp -
Loads dropped DLL 60 IoCs
Processes:
bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.tmpinstaller.exeI-Record.exe161.tmpjpsilent.exerundll32.exeMsiExec.exeregsvr32.exeregsvr32.exeMsiExec.exejianpian.exejpengine.exeMsiExec.exemask_svc.exepid process 2628 bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.tmp 6020 installer.exe 6020 installer.exe 4880 I-Record.exe 4880 I-Record.exe 4880 I-Record.exe 4880 I-Record.exe 4880 I-Record.exe 4880 I-Record.exe 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 5376 jpsilent.exe 5376 jpsilent.exe 5376 jpsilent.exe 4880 I-Record.exe 4880 I-Record.exe 4880 I-Record.exe 6020 installer.exe 5464 rundll32.exe 5920 MsiExec.exe 5920 MsiExec.exe 5284 regsvr32.exe 4144 regsvr32.exe 5772 MsiExec.exe 5128 jianpian.exe 5128 jianpian.exe 5128 jianpian.exe 5772 MsiExec.exe 5128 jianpian.exe 5772 MsiExec.exe 5128 jianpian.exe 5772 MsiExec.exe 5772 MsiExec.exe 5772 MsiExec.exe 5772 MsiExec.exe 5128 jianpian.exe 5156 jpengine.exe 5772 MsiExec.exe 5772 MsiExec.exe 5772 MsiExec.exe 6020 installer.exe 5772 MsiExec.exe 5772 MsiExec.exe 5772 MsiExec.exe 5172 MsiExec.exe 5772 MsiExec.exe 6104 mask_svc.exe 6104 mask_svc.exe 6104 mask_svc.exe 6104 mask_svc.exe 6104 mask_svc.exe 6104 mask_svc.exe 2228 161.tmp 2228 161.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
SEoMal.exejpsilent.exemsedge.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Sidebar\\Wulalalele.exe\"" SEoMal.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run jpsilent.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JIANPIAN = "C:\\Program Files (x86)\\jianpian\\jianpian.exe --windowstate=hide source=autorun" jpsilent.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
installer.exemsiexec.exedescription ioc process File opened (read-only) \??\I: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\L: installer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 107 ip-api.com -
Drops file in System32 directory 16 IoCs
Processes:
DrvInst.exetapinstall.exedescription ioc process File created C:\Windows\System32\DriverStore\Temp\{31309049-6582-2048-8776-ccc03044d7c2}\SETFBA6.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{31309049-6582-2048-8776-ccc03044d7c2}\SETFBA7.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{31309049-6582-2048-8776-ccc03044d7c2}\SETFBA7.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{31309049-6582-2048-8776-ccc03044d7c2}\SETFBA8.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF tapinstall.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{31309049-6582-2048-8776-ccc03044d7c2}\oemvista.inf DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{31309049-6582-2048-8776-ccc03044d7c2}\SETFBA8.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{31309049-6582-2048-8776-ccc03044d7c2} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{31309049-6582-2048-8776-ccc03044d7c2}\SETFBA6.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{31309049-6582-2048-8776-ccc03044d7c2}\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{31309049-6582-2048-8776-ccc03044d7c2}\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf DrvInst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
setup.exemask_svc.exemask_svc.exepid process 1360 setup.exe 5460 mask_svc.exe 6104 mask_svc.exe -
Drops file in Program Files directory 64 IoCs
Processes:
jpsilent.exeirecord.tmphandselfdiy_0.exe161.tmpsetup.exemsiexec.exedescription ioc process File opened for modification C:\Program Files (x86)\jianpian\LAVFilters\IntelQuickSyncDecoder.dll jpsilent.exe File opened for modification C:\Program Files (x86)\i-record\avfilter-2.dll irecord.tmp File created C:\Program Files (x86)\i-record\is-OCKMS.tmp irecord.tmp File opened for modification C:\Program Files (x86)\jianpian\icon\mpeg4.ico jpsilent.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\background.html handselfdiy_0.exe File opened for modification C:\Program Files (x86)\jianpian\LAVFilters\sanear.ax jpsilent.exe File created C:\Program Files (x86)\jianpian\BrowserSDK.dll jpsilent.exe File opened for modification C:\Program Files (x86)\jianpian\jianpianMovie.dll jpsilent.exe File created C:\Program Files (x86)\i-record\is-DM2GI.tmp irecord.tmp File opened for modification C:\Program Files (x86)\jianpian\icon\m2p.ico jpsilent.exe File created C:\Program Files (x86)\MaskVPN\is-9L5EC.tmp 161.tmp File created C:\Program Files (x86)\jianpian\icon\3gp.ico jpsilent.exe File opened for modification C:\Program Files (x86)\jianpian\icon\mp2v.ico jpsilent.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\aes.js handselfdiy_0.exe File opened for modification C:\Program Files (x86)\jianpian\BrowserSDK.dll jpsilent.exe File created C:\Program Files (x86)\MaskVPN\is-M83IN.tmp 161.tmp File created C:\Program Files (x86)\jianpian\Jp_Update.exe jpsilent.exe File created C:\Program Files (x86)\jianpian\icon\mpeg4.ico jpsilent.exe File opened for modification C:\Program Files (x86)\jianpian\icon\ts.ico jpsilent.exe File opened for modification C:\Program Files (x86)\jianpian\LAVFilters\libbluray.dll jpsilent.exe File opened for modification C:\Program Files (x86)\jianpian\FileSuite.exe jpsilent.exe File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp64\devcon.exe 161.tmp File created C:\Program Files (x86)\MaskVPN\is-6ODR1.tmp 161.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-FIKD1.tmp 161.tmp File opened for modification C:\Program Files (x86)\jianpian\icon\mod.ico jpsilent.exe File opened for modification C:\Program Files (x86)\jianpian\LAVFilters\LAVFilters.Dependencies.manifest jpsilent.exe File created C:\Program Files (x86)\i-record\is-F1TEE.tmp irecord.tmp File created C:\Program Files (x86)\MaskVPN\is-K6NBF.tmp 161.tmp File opened for modification C:\Program Files (x86)\jianpian\icon\wma.ico jpsilent.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\f1add2f8-f7cb-4377-82be-3b2bb534b7e6.tmp setup.exe File created C:\Program Files (x86)\MaskVPN\is-U7HLE.tmp 161.tmp File opened for modification C:\Program Files (x86)\jianpian\data\error.png jpsilent.exe File opened for modification C:\Program Files (x86)\jianpian\icon\bsed.ico jpsilent.exe File created C:\Program Files (x86)\jianpian\icon\dat.ico jpsilent.exe File opened for modification C:\Program Files (x86)\jianpian\data\loading.gif jpsilent.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\icon.png handselfdiy_0.exe File created C:\Program Files (x86)\jianpian\LAVFilters\avformat-lav-58.dll jpsilent.exe File opened for modification C:\Program Files (x86)\jianpian\jianpian.exe jpsilent.exe File created C:\Program Files (x86)\jianpian\stophelp.bat jpsilent.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Privacy.url msiexec.exe File opened for modification C:\Program Files (x86)\i-record\unins000.dat irecord.tmp File opened for modification C:\Program Files (x86)\jianpian\Repair.dll jpsilent.exe File opened for modification C:\Program Files (x86)\jianpian\icon\avi.ico jpsilent.exe File created C:\Program Files (x86)\jianpian\jianpian.exe jpsilent.exe File opened for modification C:\Program Files (x86)\i-record\swresample-0.dll irecord.tmp File created C:\Program Files (x86)\i-record\is-M2TU9.tmp irecord.tmp File created C:\Program Files (x86)\jianpian\icon\mov.ico jpsilent.exe File opened for modification C:\Program Files (x86)\jianpian\icon\rmvb.ico jpsilent.exe File created C:\Program Files (x86)\jianpian\libcurl.dll jpsilent.exe File created C:\Program Files (x86)\jianpian\Web.url jpsilent.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220630152722.pma setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\libMaskVPN.dll 161.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.dll 161.tmp File opened for modification C:\Program Files (x86)\jianpian\icon\dat.ico jpsilent.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\content.js handselfdiy_0.exe File opened for modification C:\Program Files (x86)\jianpian\Web.url jpsilent.exe File opened for modification C:\Program Files (x86)\jianpian\icon\webm.ico jpsilent.exe File created C:\Program Files (x86)\jianpian\LAVFilters\LAVAudio.ax jpsilent.exe File created C:\Program Files (x86)\MaskVPN\driver\win732\is-9TH7H.tmp 161.tmp File created C:\Program Files (x86)\jianpian\icon\swf.ico jpsilent.exe File opened for modification C:\Program Files (x86)\jianpian\icon\m4v.ico jpsilent.exe File created C:\Program Files (x86)\jianpian\LAVFilters\LAVSplitter.ax jpsilent.exe File opened for modification C:\Program Files (x86)\jianpian\stophelp.js jpsilent.exe File opened for modification C:\Program Files (x86)\jianpian\icon\f4v.ico jpsilent.exe -
Drops file in Windows directory 33 IoCs
Processes:
msiexec.exeDrvInst.exetapinstall.exeDrvInst.exesvchost.exedescription ioc process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSID19.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\e57df92.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIE53F.tmp msiexec.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSIF449.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFC69.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\Installer\MSIF08C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFD06.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1AC.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI1344.tmp msiexec.exe File created C:\Windows\Installer\e57df92.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIFA55.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\e57df95.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIF187.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF243.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF419.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\Installer\MSI8E2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF02D.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\MSI893.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5168 4824 WerFault.exe gcleaner.exe 5360 5548 WerFault.exe rmaa1045.exe 5172 5464 WerFault.exe rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 38 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
DrvInst.exeDrvInst.exetapinstall.exesvchost.exetapinstall.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 5424 taskkill.exe 5340 taskkill.exe 2468 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
mask_svc.exeDrvInst.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-3052 = "Qyzylorda Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-2322 = "Sakhalin Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-1832 = "Russia TZ 2 Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-122 = "SA Pacific Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-441 = "Arabian Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-511 = "Central Asia Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-2791 = "Novosibirsk Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-2432 = "Cuba Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-2792 = "Novosibirsk Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-2161 = "Altai Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-752 = "Tonga Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-722 = "Central Pacific Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-2371 = "Easter Island Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-542 = "Myanmar Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-372 = "Jerusalem Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-742 = "New Zealand Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-451 = "Caucasus Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-2771 = "Omsk Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-341 = "Egypt Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-2872 = "Magallanes Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-32 = "Mid-Atlantic Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-541 = "Myanmar Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-911 = "Mauritius Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-2141 = "Transbaikal Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@tzres.dll,-2612 = "Bougainville Standard Time" mask_svc.exe -
Modifies registry class 37 IoCs
Processes:
regsvr32.exemsiexec.exe161.tmpmsedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F92EA1C2-0B58-4DA3-8528-22F0CA82EEA6} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\ProductName = "Windows Manager" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A} 161.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F92EA1C2-0B58-4DA3-8528-22F0CA82EEA6}\ = "Jianpianplayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F92EA1C2-0B58-4DA3-8528-22F0CA82EEA6}\InProcServer32\ = "C:\\Program Files (x86)\\jianpian\\jianpianhelp.dll" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\5785CBDF4ABB5AD409841A692AF14EA9 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface 161.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A}\ProxyStubClsid32\ = "{94512587-22D8-4197-B757-6BA2F3DE6DEC}" 161.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C414548CC3098124D97E31A29BF7FD26\MainFeature msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\5785CBDF4ABB5AD409841A692AF14EA9\C414548CC3098124D97E31A29BF7FD26 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 161.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A}\ProxyStubClsid32 161.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Background\shellex\ContextMenuHandlers\Jianpianplayer regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\ProductIcon = "C:\\Windows\\Installer\\{C845414C-903C-4218-9DE7-132AB97FDF62}\\logo.exe" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F92EA1C2-0B58-4DA3-8528-22F0CA82EEA6}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\background\shellex\ContextMenuHandlers\Jianpianplayer\ = "{F92EA1C2-0B58-4DA3-8528-22F0CA82EEA6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\PackageName = "Windows Manager - Postback Yonatan.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F92EA1C2-0B58-4DA3-8528-22F0CA82EEA6}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C414548CC3098124D97E31A29BF7FD26 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\PackageCode = "B4475F7B84C01E149A118600075FE4C1" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Clients = 3a0000000000 msiexec.exe -
Processes:
tapinstall.exeinstaller.exehandselfdiy_0.exe161.tmpdescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 handselfdiy_0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA 161.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 161.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 161.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 handselfdiy_0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC 161.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 70 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
irecord.tmpKesynagiry.exepid process 1576 irecord.tmp 1576 irecord.tmp 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe 4624 Kesynagiry.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
msedge.exepid process 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
SEoMal.exeCajydaegaerae.exeKesynagiry.exe161.tmphandselfdiy_0.exemsiexec.exeinstaller.exedescription pid process Token: SeDebugPrivilege 4812 SEoMal.exe Token: SeDebugPrivilege 3164 Cajydaegaerae.exe Token: SeDebugPrivilege 4624 Kesynagiry.exe Token: SeDebugPrivilege 2228 161.tmp Token: SeDebugPrivilege 2228 161.tmp Token: SeCreateTokenPrivilege 4524 handselfdiy_0.exe Token: SeAssignPrimaryTokenPrivilege 4524 handselfdiy_0.exe Token: SeLockMemoryPrivilege 4524 handselfdiy_0.exe Token: SeIncreaseQuotaPrivilege 4524 handselfdiy_0.exe Token: SeMachineAccountPrivilege 4524 handselfdiy_0.exe Token: SeTcbPrivilege 4524 handselfdiy_0.exe Token: SeSecurityPrivilege 4524 handselfdiy_0.exe Token: SeTakeOwnershipPrivilege 4524 handselfdiy_0.exe Token: SeLoadDriverPrivilege 4524 handselfdiy_0.exe Token: SeSystemProfilePrivilege 4524 handselfdiy_0.exe Token: SeSystemtimePrivilege 4524 handselfdiy_0.exe Token: SeProfSingleProcessPrivilege 4524 handselfdiy_0.exe Token: SeIncBasePriorityPrivilege 4524 handselfdiy_0.exe Token: SeCreatePagefilePrivilege 4524 handselfdiy_0.exe Token: SeCreatePermanentPrivilege 4524 handselfdiy_0.exe Token: SeBackupPrivilege 4524 handselfdiy_0.exe Token: SeRestorePrivilege 4524 handselfdiy_0.exe Token: SeShutdownPrivilege 4524 handselfdiy_0.exe Token: SeDebugPrivilege 4524 handselfdiy_0.exe Token: SeAuditPrivilege 4524 handselfdiy_0.exe Token: SeSystemEnvironmentPrivilege 4524 handselfdiy_0.exe Token: SeChangeNotifyPrivilege 4524 handselfdiy_0.exe Token: SeRemoteShutdownPrivilege 4524 handselfdiy_0.exe Token: SeUndockPrivilege 4524 handselfdiy_0.exe Token: SeSyncAgentPrivilege 4524 handselfdiy_0.exe Token: SeEnableDelegationPrivilege 4524 handselfdiy_0.exe Token: SeManageVolumePrivilege 4524 handselfdiy_0.exe Token: SeImpersonatePrivilege 4524 handselfdiy_0.exe Token: SeCreateGlobalPrivilege 4524 handselfdiy_0.exe Token: 31 4524 handselfdiy_0.exe Token: 32 4524 handselfdiy_0.exe Token: 33 4524 handselfdiy_0.exe Token: 34 4524 handselfdiy_0.exe Token: 35 4524 handselfdiy_0.exe Token: SeSecurityPrivilege 5344 msiexec.exe Token: SeCreateTokenPrivilege 6020 installer.exe Token: SeAssignPrimaryTokenPrivilege 6020 installer.exe Token: SeLockMemoryPrivilege 6020 installer.exe Token: SeIncreaseQuotaPrivilege 6020 installer.exe Token: SeMachineAccountPrivilege 6020 installer.exe Token: SeTcbPrivilege 6020 installer.exe Token: SeSecurityPrivilege 6020 installer.exe Token: SeTakeOwnershipPrivilege 6020 installer.exe Token: SeLoadDriverPrivilege 6020 installer.exe Token: SeSystemProfilePrivilege 6020 installer.exe Token: SeSystemtimePrivilege 6020 installer.exe Token: SeProfSingleProcessPrivilege 6020 installer.exe Token: SeIncBasePriorityPrivilege 6020 installer.exe Token: SeCreatePagefilePrivilege 6020 installer.exe Token: SeCreatePermanentPrivilege 6020 installer.exe Token: SeBackupPrivilege 6020 installer.exe Token: SeRestorePrivilege 6020 installer.exe Token: SeShutdownPrivilege 6020 installer.exe Token: SeDebugPrivilege 6020 installer.exe Token: SeAuditPrivilege 6020 installer.exe Token: SeSystemEnvironmentPrivilege 6020 installer.exe Token: SeChangeNotifyPrivilege 6020 installer.exe Token: SeRemoteShutdownPrivilege 6020 installer.exe Token: SeUndockPrivilege 6020 installer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
irecord.tmpinstaller.exe161.tmpmsedge.exepid process 1576 irecord.tmp 6020 installer.exe 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2824 msedge.exe 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp 2228 161.tmp -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
jianpian.exepid process 5128 jianpian.exe 5128 jianpian.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
random.exeConhost.exejianpian.exepid process 4572 random.exe 4572 random.exe 1000 Conhost.exe 1000 Conhost.exe 5128 jianpian.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.exebc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.tmpSEoMal.exeirecord.exeCajydaegaerae.exemsedge.exeKesynagiry.execmd.execmd.exeirecord.tmpcmd.exe161.execmd.execmd.exerandom.exegcleaner.exedescription pid process target process PID 3236 wrote to memory of 2628 3236 bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.exe bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.tmp PID 3236 wrote to memory of 2628 3236 bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.exe bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.tmp PID 3236 wrote to memory of 2628 3236 bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.exe bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.tmp PID 2628 wrote to memory of 4812 2628 bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.tmp SEoMal.exe PID 2628 wrote to memory of 4812 2628 bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.tmp SEoMal.exe PID 4812 wrote to memory of 3164 4812 SEoMal.exe Cajydaegaerae.exe PID 4812 wrote to memory of 3164 4812 SEoMal.exe Cajydaegaerae.exe PID 4812 wrote to memory of 4624 4812 SEoMal.exe Kesynagiry.exe PID 4812 wrote to memory of 4624 4812 SEoMal.exe Kesynagiry.exe PID 4812 wrote to memory of 2352 4812 SEoMal.exe irecord.exe PID 4812 wrote to memory of 2352 4812 SEoMal.exe irecord.exe PID 4812 wrote to memory of 2352 4812 SEoMal.exe irecord.exe PID 2352 wrote to memory of 1576 2352 irecord.exe irecord.tmp PID 2352 wrote to memory of 1576 2352 irecord.exe irecord.tmp PID 2352 wrote to memory of 1576 2352 irecord.exe irecord.tmp PID 3164 wrote to memory of 2824 3164 Cajydaegaerae.exe msedge.exe PID 3164 wrote to memory of 2824 3164 Cajydaegaerae.exe msedge.exe PID 2824 wrote to memory of 1840 2824 msedge.exe msedge.exe PID 2824 wrote to memory of 1840 2824 msedge.exe msedge.exe PID 4624 wrote to memory of 5828 4624 Kesynagiry.exe cmd.exe PID 4624 wrote to memory of 5828 4624 Kesynagiry.exe cmd.exe PID 5828 wrote to memory of 6020 5828 cmd.exe installer.exe PID 5828 wrote to memory of 6020 5828 cmd.exe installer.exe PID 5828 wrote to memory of 6020 5828 cmd.exe installer.exe PID 4624 wrote to memory of 6076 4624 Kesynagiry.exe cmd.exe PID 4624 wrote to memory of 6076 4624 Kesynagiry.exe cmd.exe PID 4624 wrote to memory of 6136 4624 Kesynagiry.exe cmd.exe PID 4624 wrote to memory of 6136 4624 Kesynagiry.exe cmd.exe PID 6136 wrote to memory of 4824 6136 cmd.exe gcleaner.exe PID 6136 wrote to memory of 4824 6136 cmd.exe gcleaner.exe PID 6136 wrote to memory of 4824 6136 cmd.exe gcleaner.exe PID 1576 wrote to memory of 4880 1576 irecord.tmp I-Record.exe PID 1576 wrote to memory of 4880 1576 irecord.tmp I-Record.exe PID 1576 wrote to memory of 4880 1576 irecord.tmp I-Record.exe PID 4624 wrote to memory of 4016 4624 Kesynagiry.exe cmd.exe PID 4624 wrote to memory of 4016 4624 Kesynagiry.exe cmd.exe PID 6076 wrote to memory of 2608 6076 cmd.exe 161.exe PID 6076 wrote to memory of 2608 6076 cmd.exe 161.exe PID 6076 wrote to memory of 2608 6076 cmd.exe 161.exe PID 2608 wrote to memory of 2228 2608 161.exe 161.tmp PID 2608 wrote to memory of 2228 2608 161.exe 161.tmp PID 2608 wrote to memory of 2228 2608 161.exe 161.tmp PID 4624 wrote to memory of 3748 4624 Kesynagiry.exe cmd.exe PID 4624 wrote to memory of 3748 4624 Kesynagiry.exe cmd.exe PID 4016 wrote to memory of 4572 4016 cmd.exe random.exe PID 4016 wrote to memory of 4572 4016 cmd.exe random.exe PID 4016 wrote to memory of 4572 4016 cmd.exe random.exe PID 4624 wrote to memory of 4168 4624 Kesynagiry.exe cmd.exe PID 4624 wrote to memory of 4168 4624 Kesynagiry.exe cmd.exe PID 3748 wrote to memory of 4524 3748 cmd.exe handselfdiy_0.exe PID 3748 wrote to memory of 4524 3748 cmd.exe handselfdiy_0.exe PID 3748 wrote to memory of 4524 3748 cmd.exe handselfdiy_0.exe PID 4572 wrote to memory of 1000 4572 random.exe Conhost.exe PID 4572 wrote to memory of 1000 4572 random.exe Conhost.exe PID 4572 wrote to memory of 1000 4572 random.exe Conhost.exe PID 4824 wrote to memory of 4828 4824 gcleaner.exe msedge.exe PID 4824 wrote to memory of 4828 4824 gcleaner.exe msedge.exe PID 4824 wrote to memory of 4828 4824 gcleaner.exe msedge.exe PID 4624 wrote to memory of 5124 4624 Kesynagiry.exe cmd.exe PID 4624 wrote to memory of 5124 4624 Kesynagiry.exe cmd.exe PID 4624 wrote to memory of 5260 4624 Kesynagiry.exe cmd.exe PID 4624 wrote to memory of 5260 4624 Kesynagiry.exe cmd.exe PID 2824 wrote to memory of 5292 2824 msedge.exe msedge.exe PID 2824 wrote to memory of 5292 2824 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.exe"C:\Users\Admin\AppData\Local\Temp\bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-KBGM2.tmp\bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.tmp"C:\Users\Admin\AppData\Local\Temp\is-KBGM2.tmp\bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.tmp" /SL5="$D0050,506127,422400,C:\Users\Admin\AppData\Local\Temp\bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-FR2T4.tmp\SEoMal.exe"C:\Users\Admin\AppData\Local\Temp\is-FR2T4.tmp\SEoMal.exe" /S /UID=lylal2203⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\10-226c9-840-574b9-788dae865f89f\Cajydaegaerae.exe"C:\Users\Admin\AppData\Local\Temp\10-226c9-840-574b9-788dae865f89f\Cajydaegaerae.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e65⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8d4b946f8,0x7ff8d4b94708,0x7ff8d4b947186⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9015210128200241133,5800994801576086190,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:26⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,9015210128200241133,5800994801576086190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:36⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,9015210128200241133,5800994801576086190,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:86⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9015210128200241133,5800994801576086190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9015210128200241133,5800994801576086190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2100,9015210128200241133,5800994801576086190,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4660 /prefetch:86⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9015210128200241133,5800994801576086190,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2100,9015210128200241133,5800994801576086190,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5348 /prefetch:86⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9015210128200241133,5800994801576086190,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9015210128200241133,5800994801576086190,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9015210128200241133,5800994801576086190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3300 /prefetch:86⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings6⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff6047c5460,0x7ff6047c5470,0x7ff6047c54807⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9015210128200241133,5800994801576086190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3300 /prefetch:86⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,9015210128200241133,5800994801576086190,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3584 /prefetch:86⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2100,9015210128200241133,5800994801576086190,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5476 /prefetch:86⤵
-
C:\Users\Admin\AppData\Local\Temp\ee-3e438-567-b14a9-2f1c75da46b4f\Kesynagiry.exe"C:\Users\Admin\AppData\Local\Temp\ee-3e438-567-b14a9-2f1c75da46b4f\Kesynagiry.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\n4jgb4ws.5u1\installer.exe /qn CAMPAIGN= & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\n4jgb4ws.5u1\installer.exeC:\Users\Admin\AppData\Local\Temp\n4jgb4ws.5u1\installer.exe /qn CAMPAIGN=6⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Yonatan.msi" /qn CAMPAIGN="" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\n4jgb4ws.5u1\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\n4jgb4ws.5u1\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1656362172 /qn CAMPAIGN= " CAMPAIGN=""7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2cc0szg1.umk\161.exe /silent /subid=798 & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2cc0szg1.umk\161.exeC:\Users\Admin\AppData\Local\Temp\2cc0szg1.umk\161.exe /silent /subid=7986⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-52TRM.tmp\161.tmp"C:\Users\Admin\AppData\Local\Temp\is-52TRM.tmp\161.tmp" /SL5="$30230,15170975,270336,C:\Users\Admin\AppData\Local\Temp\2cc0szg1.umk\161.exe" /silent /subid=7987⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "8⤵
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09019⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "8⤵
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09019⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies system certificate store
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall8⤵
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install8⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jvvzbuu0.qoq\gcleaner.exe /mixfive & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jvvzbuu0.qoq\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\jvvzbuu0.qoq\gcleaner.exe /mixfive6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "gcleaner.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\jvvzbuu0.qoq\gcleaner.exe" & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "gcleaner.exe" /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 14367⤵
- Program crash
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\545otbn5.ot1\random.exe & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\545otbn5.ot1\random.exeC:\Users\Admin\AppData\Local\Temp\545otbn5.ot1\random.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\545otbn5.ot1\random.exe"C:\Users\Admin\AppData\Local\Temp\545otbn5.ot1\random.exe" H7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\s5no4j3h.xgl\handselfdiy_0.exe & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\s5no4j3h.xgl\handselfdiy_0.exeC:\Users\Admin\AppData\Local\Temp\s5no4j3h.xgl\handselfdiy_0.exe6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"7⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d80d4f50,0x7ff8d80d4f60,0x7ff8d80d4f708⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gnrso0v1.skd\jpsilent.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\gnrso0v1.skd\jpsilent.exeC:\Users\Admin\AppData\Local\Temp\gnrso0v1.skd\jpsilent.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Program Files (x86)\jianpian\Jp_Update.exe"C:\Program Files (x86)\jianpian\Jp_Update.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Program Files (x86)\jianpian\jianpianhelp.dll"7⤵
- Loads dropped DLL
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\jianpian\jianpianhelp.dll"8⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\jianpian\jianpian.exe"C:\Program Files (x86)\jianpian\jianpian.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\jianpian\jpengine.exe"C:\Program Files (x86)\jianpian\jpengine.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\jianpian\client_windows_amd64.exe"C:\Program Files (x86)\jianpian\client_windows_amd64.exe" -r "media.jphwapi.com:33893" -l "127.0.0.1:8000" -crypt "blowfish" -key "11d81e8e9ac7c863f5a38778bea410fd" -mode fast3 -nocomp -autoexpire 420 -sockbuf 16777217 -dscp 468⤵
- Executes dropped EXE
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\azwe4wef.eyi\rmaa1045.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\azwe4wef.eyi\rmaa1045.exeC:\Users\Admin\AppData\Local\Temp\azwe4wef.eyi\rmaa1045.exe6⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5548 -s 6967⤵
- Program crash
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qmju0hp5.rqn\installer.exe /qn CAMPAIGN=654 & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\qmju0hp5.rqn\installer.exeC:\Users\Admin\AppData\Local\Temp\qmju0hp5.rqn\installer.exe /qn CAMPAIGN=6546⤵
- Executes dropped EXE
-
C:\Program Files\7-Zip\FAIYJBMUGR\irecord.exe"C:\Program Files\7-Zip\FAIYJBMUGR\irecord.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-K50OC.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-K50OC.tmp\irecord.tmp" /SL5="$50056,5808768,66560,C:\Program Files\7-Zip\FAIYJBMUGR\irecord.exe" /VERYSILENT5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\i-record\I-Record.exe"C:\Program Files (x86)\i-record\I-Record.exe" -silent -desktopShortcut -programMenu6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4824 -ip 48241⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3400236A886272FDC3D855AFFD291F16 C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 12748C543B9D93AE4E675268A9938E4C2⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0FCABFA46CA00E85564FFBEADB57E63B E Global\MSI00002⤵
- Loads dropped DLL
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 532 -p 5548 -ip 55481⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5464 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5464 -ip 54641⤵
-
C:\Program Files (x86)\jianpian\Jp_Update.exe"C:\Program Files (x86)\jianpian\Jp_Update.exe" -svc1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\jianpian\Jp_Update.exe"C:\Program Files (x86)\jianpian\Jp_Update.exe"2⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{c5d58774-1860-9547-90f0-53f776dc755e}\oemvista.inf" "9" "4d14a44ff" "0000000000000148" "WinSta0\Default" "0000000000000158" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oem2.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000148"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\i-record\AForge.Video.FFMPEG.dllFilesize
60KB
MD55f60669a79e4c4285325284ab662a0c0
SHA15b83f8f2799394df3751799605e9292b21b78504
SHA2563f6aa370d70259dc55241950d669d2bf3dc7b57a0c45c6a2f8dec0d8c8cc35b0
SHA5126ec9fe576daa4fde11a39a929dd23ab44297521c4d23352af1a78716cc3ec7927aa6949d5f7af638148e58e5b6d1d16043ad1a7b0dabb8103acc07d0d4c8a42f
-
C:\Program Files (x86)\i-record\AForge.Video.FFMPEG.dllFilesize
60KB
MD55f60669a79e4c4285325284ab662a0c0
SHA15b83f8f2799394df3751799605e9292b21b78504
SHA2563f6aa370d70259dc55241950d669d2bf3dc7b57a0c45c6a2f8dec0d8c8cc35b0
SHA5126ec9fe576daa4fde11a39a929dd23ab44297521c4d23352af1a78716cc3ec7927aa6949d5f7af638148e58e5b6d1d16043ad1a7b0dabb8103acc07d0d4c8a42f
-
C:\Program Files (x86)\i-record\AForge.Video.FFMPEG.dllFilesize
60KB
MD55f60669a79e4c4285325284ab662a0c0
SHA15b83f8f2799394df3751799605e9292b21b78504
SHA2563f6aa370d70259dc55241950d669d2bf3dc7b57a0c45c6a2f8dec0d8c8cc35b0
SHA5126ec9fe576daa4fde11a39a929dd23ab44297521c4d23352af1a78716cc3ec7927aa6949d5f7af638148e58e5b6d1d16043ad1a7b0dabb8103acc07d0d4c8a42f
-
C:\Program Files (x86)\i-record\AForge.Video.FFMPEG.dllFilesize
60KB
MD55f60669a79e4c4285325284ab662a0c0
SHA15b83f8f2799394df3751799605e9292b21b78504
SHA2563f6aa370d70259dc55241950d669d2bf3dc7b57a0c45c6a2f8dec0d8c8cc35b0
SHA5126ec9fe576daa4fde11a39a929dd23ab44297521c4d23352af1a78716cc3ec7927aa6949d5f7af638148e58e5b6d1d16043ad1a7b0dabb8103acc07d0d4c8a42f
-
C:\Program Files (x86)\i-record\I-Record.exeFilesize
873KB
MD513c3ba689a19b325a19ab62cbe4c313c
SHA18b0ba8fc4eab09e5aa958699411479a1ce201a18
SHA256696822fcdd3382ba02dfcce45ec4784d65ef44adf7d1fac2520b81f8ce007cf9
SHA512387095ec1ccfd7f4e2dac8522fd72b3199447ad750133bf3719810952262321845f6590457ab4c950f5cf9c5fda93377710e7b8d940b04d6c80252f1ccf8033e
-
C:\Program Files (x86)\i-record\I-Record.exeFilesize
873KB
MD513c3ba689a19b325a19ab62cbe4c313c
SHA18b0ba8fc4eab09e5aa958699411479a1ce201a18
SHA256696822fcdd3382ba02dfcce45ec4784d65ef44adf7d1fac2520b81f8ce007cf9
SHA512387095ec1ccfd7f4e2dac8522fd72b3199447ad750133bf3719810952262321845f6590457ab4c950f5cf9c5fda93377710e7b8d940b04d6c80252f1ccf8033e
-
C:\Program Files (x86)\i-record\I-Record.exe.configFilesize
196B
MD5871947926c323ad2f2148248d9a46837
SHA10a70fe7442e14ecfadd2932c2fb46b8ddc04ba7a
SHA256f3d7125a0e0f61c215f80b1d25e66c83cd20ed3166790348a53e0b7faf52550e
SHA51258d9687495c839914d3aa6ae16677f43a0fa9a415dbd8336b0fcacd0c741724867b27d62a640c09828b902c69ac8f5d71c64cdadf87199e7637681a5b87da3b7
-
C:\Program Files (x86)\i-record\avcodec-53.dllFilesize
13.1MB
MD565f639a2eda8db2a1ea40b5ddb5a2ed4
SHA13f32853740928c5e88b15fdc86c95a2ebd8aeb37
SHA256e4e41c0c1c85e2aeaff1bea914880d2cb01b153a1a9ceddccaf05f8b5362210d
SHA512980b6a5511716073d5eeb8b5437c6f23bda300402c64d05d2a54da614e3ef1412743ec5bb4100e54699d7a74f8c437560cb9faa67824cbbabdf1f9399945e21b
-
C:\Program Files (x86)\i-record\avcodec-53.dllFilesize
13.1MB
MD565f639a2eda8db2a1ea40b5ddb5a2ed4
SHA13f32853740928c5e88b15fdc86c95a2ebd8aeb37
SHA256e4e41c0c1c85e2aeaff1bea914880d2cb01b153a1a9ceddccaf05f8b5362210d
SHA512980b6a5511716073d5eeb8b5437c6f23bda300402c64d05d2a54da614e3ef1412743ec5bb4100e54699d7a74f8c437560cb9faa67824cbbabdf1f9399945e21b
-
C:\Program Files (x86)\i-record\avcodec-53.dllFilesize
13.1MB
MD565f639a2eda8db2a1ea40b5ddb5a2ed4
SHA13f32853740928c5e88b15fdc86c95a2ebd8aeb37
SHA256e4e41c0c1c85e2aeaff1bea914880d2cb01b153a1a9ceddccaf05f8b5362210d
SHA512980b6a5511716073d5eeb8b5437c6f23bda300402c64d05d2a54da614e3ef1412743ec5bb4100e54699d7a74f8c437560cb9faa67824cbbabdf1f9399945e21b
-
C:\Program Files (x86)\i-record\avformat-53.dllFilesize
2.4MB
MD511340a55f155a904596bf3a13788a93a
SHA192a2f79717f71696ebde3c400aa52804eda5984e
SHA256b26b2df18537b3df6706aa9e743d1a1e511a6fd21f7f7815f15ef96bb09a85e9
SHA5122dc2bb8b0b4a38ddee62d85fdf7c551b0b77f5b9c7791cf82a00eea847f86006df5139874381dd6db739bb77ec008be9f32185ec71ca8be603f7fe515662c78b
-
C:\Program Files (x86)\i-record\avformat-53.dllFilesize
2.4MB
MD511340a55f155a904596bf3a13788a93a
SHA192a2f79717f71696ebde3c400aa52804eda5984e
SHA256b26b2df18537b3df6706aa9e743d1a1e511a6fd21f7f7815f15ef96bb09a85e9
SHA5122dc2bb8b0b4a38ddee62d85fdf7c551b0b77f5b9c7791cf82a00eea847f86006df5139874381dd6db739bb77ec008be9f32185ec71ca8be603f7fe515662c78b
-
C:\Program Files (x86)\i-record\avutil-51.dllFilesize
136KB
MD578128217a6151041fc8f7f29960bdd2a
SHA1a6fe2fa059334871181f60b626352e8325cbdda8
SHA256678ca4d9f4d4ad1703006026afe3df5490664c05bb958b991c028ce9314757f7
SHA5125f534a8b186797046526cfb29f95e89e90c555cf54cc8e99a801dfe9327433c9c0fd2cb63a335ade606075c9fab5173c1ad805242ceb04bc1fd78f37da166d84
-
C:\Program Files (x86)\i-record\avutil-51.dllFilesize
136KB
MD578128217a6151041fc8f7f29960bdd2a
SHA1a6fe2fa059334871181f60b626352e8325cbdda8
SHA256678ca4d9f4d4ad1703006026afe3df5490664c05bb958b991c028ce9314757f7
SHA5125f534a8b186797046526cfb29f95e89e90c555cf54cc8e99a801dfe9327433c9c0fd2cb63a335ade606075c9fab5173c1ad805242ceb04bc1fd78f37da166d84
-
C:\Program Files (x86)\i-record\swscale-2.dllFilesize
295KB
MD5564dca64680d608517721cdbe324b1d6
SHA1f2683fa13772fc85c3ea4cffa3d896373a603ad3
SHA256f9550ace57ce5b19add143e507179dc601a832b054963d1c3b5c003f1a8149cc
SHA5121d80e9de29320201c988e8b11036c423d83620e99bcadec5142eb14b6513e49d9b41904e92154139e327cd5cc6f058b4bb467ee4fbb342794296e0dfe774dc75
-
C:\Program Files (x86)\i-record\swscale-2.dllFilesize
295KB
MD5564dca64680d608517721cdbe324b1d6
SHA1f2683fa13772fc85c3ea4cffa3d896373a603ad3
SHA256f9550ace57ce5b19add143e507179dc601a832b054963d1c3b5c003f1a8149cc
SHA5121d80e9de29320201c988e8b11036c423d83620e99bcadec5142eb14b6513e49d9b41904e92154139e327cd5cc6f058b4bb467ee4fbb342794296e0dfe774dc75
-
C:\Program Files (x86)\i-record\swscale-2.dllFilesize
295KB
MD5564dca64680d608517721cdbe324b1d6
SHA1f2683fa13772fc85c3ea4cffa3d896373a603ad3
SHA256f9550ace57ce5b19add143e507179dc601a832b054963d1c3b5c003f1a8149cc
SHA5121d80e9de29320201c988e8b11036c423d83620e99bcadec5142eb14b6513e49d9b41904e92154139e327cd5cc6f058b4bb467ee4fbb342794296e0dfe774dc75
-
C:\Program Files\7-Zip\FAIYJBMUGR\irecord.exeFilesize
5.8MB
MD5f3e69396bfcb70ee59a828705593171a
SHA1d4df6a67e0f7af5385613256dbf485e1f2886c55
SHA256c970b8146afbd7347f5488fd821ae6ade4f355dcb29d764b7834ce8a1754105f
SHA5124743b9bf562c1b8616f794493123160de95ba15451affacf286aff6d2af023a07d7942a8753c3fdccf8d294f99b46adee8ac58f6a29d42dea973a9de6a77d22f
-
C:\Program Files\7-Zip\FAIYJBMUGR\irecord.exeFilesize
5.8MB
MD5f3e69396bfcb70ee59a828705593171a
SHA1d4df6a67e0f7af5385613256dbf485e1f2886c55
SHA256c970b8146afbd7347f5488fd821ae6ade4f355dcb29d764b7834ce8a1754105f
SHA5124743b9bf562c1b8616f794493123160de95ba15451affacf286aff6d2af023a07d7942a8753c3fdccf8d294f99b46adee8ac58f6a29d42dea973a9de6a77d22f
-
C:\Users\Admin\AppData\Local\Temp\10-226c9-840-574b9-788dae865f89f\Cajydaegaerae.exeFilesize
459KB
MD5d6faf76ee330710a2312b078d4c39e46
SHA104e37f57c95c19176dd97edb060916473574a5ea
SHA25629669c360ee547d8085f124fb9197f7873b82186cc28686f9186164609573cb5
SHA512d52f86e3d2008e411b6e02db0693f75e9b4211d5ba16f943f39f1faba7707be2b21fd7cfd3ab1248d78f18a03f4924bd623dfdabb0384d1c3573a369c636fe0b
-
C:\Users\Admin\AppData\Local\Temp\10-226c9-840-574b9-788dae865f89f\Cajydaegaerae.exeFilesize
459KB
MD5d6faf76ee330710a2312b078d4c39e46
SHA104e37f57c95c19176dd97edb060916473574a5ea
SHA25629669c360ee547d8085f124fb9197f7873b82186cc28686f9186164609573cb5
SHA512d52f86e3d2008e411b6e02db0693f75e9b4211d5ba16f943f39f1faba7707be2b21fd7cfd3ab1248d78f18a03f4924bd623dfdabb0384d1c3573a369c636fe0b
-
C:\Users\Admin\AppData\Local\Temp\10-226c9-840-574b9-788dae865f89f\Cajydaegaerae.exe.configFilesize
1KB
MD598d2687aec923f98c37f7cda8de0eb19
SHA1f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA2568a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
SHA51295c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590
-
C:\Users\Admin\AppData\Local\Temp\2cc0szg1.umk\161.exeFilesize
15.0MB
MD5506dae4aff7095499752acc332c1d9bc
SHA1407c4e98c78c73279e3debc9d69c1c4c74992ece
SHA256b9bc524275726e0fc277feb685a3c2e47c08f80163744b3acaf305d0d0e2294b
SHA5120fe62a336be2f26016836f45bdf8818c86b6df4be4fdc7586b70982755f7c925d2c9301925544aebbb2b0fb12ae1ed49c30a48351a0408e9a9d48d991a1e5880
-
C:\Users\Admin\AppData\Local\Temp\2cc0szg1.umk\161.exeFilesize
15.0MB
MD5506dae4aff7095499752acc332c1d9bc
SHA1407c4e98c78c73279e3debc9d69c1c4c74992ece
SHA256b9bc524275726e0fc277feb685a3c2e47c08f80163744b3acaf305d0d0e2294b
SHA5120fe62a336be2f26016836f45bdf8818c86b6df4be4fdc7586b70982755f7c925d2c9301925544aebbb2b0fb12ae1ed49c30a48351a0408e9a9d48d991a1e5880
-
C:\Users\Admin\AppData\Local\Temp\545otbn5.ot1\random.exeFilesize
312KB
MD520e7221548068efeb833b1a99e68bcf7
SHA18dc52a14337ed3119602c018d174817cd55f268a
SHA25606d151a9ceae49c6231ac1e1f7a769f9887eb0127f0278d586bc96064278828e
SHA5126bb3f58f726d132321bde785c456bbf56ad7863d9cbbd49cdf05a59cfe29945d90bd84e7e9ef1381996fc4e873a4bbe6b23e28dfe4c1380ad91f75ac9c6fa161
-
C:\Users\Admin\AppData\Local\Temp\545otbn5.ot1\random.exeFilesize
312KB
MD520e7221548068efeb833b1a99e68bcf7
SHA18dc52a14337ed3119602c018d174817cd55f268a
SHA25606d151a9ceae49c6231ac1e1f7a769f9887eb0127f0278d586bc96064278828e
SHA5126bb3f58f726d132321bde785c456bbf56ad7863d9cbbd49cdf05a59cfe29945d90bd84e7e9ef1381996fc4e873a4bbe6b23e28dfe4c1380ad91f75ac9c6fa161
-
C:\Users\Admin\AppData\Local\Temp\545otbn5.ot1\random.exeFilesize
312KB
MD520e7221548068efeb833b1a99e68bcf7
SHA18dc52a14337ed3119602c018d174817cd55f268a
SHA25606d151a9ceae49c6231ac1e1f7a769f9887eb0127f0278d586bc96064278828e
SHA5126bb3f58f726d132321bde785c456bbf56ad7863d9cbbd49cdf05a59cfe29945d90bd84e7e9ef1381996fc4e873a4bbe6b23e28dfe4c1380ad91f75ac9c6fa161
-
C:\Users\Admin\AppData\Local\Temp\azwe4wef.eyi\rmaa1045.exeFilesize
3.7MB
MD5976900d7058a80a20c98d5807fe48e85
SHA1430d6c66e2c3cee0f45847d6d2dfaf923cd93cb5
SHA256631df98194799039573de396f694dd82f36203dc5e5233118a217fbaad023e77
SHA51239c032b27bdbc8ecd359b15c1e9b40a7a3e8f0822fe9290c5a911c7c3bfb2cd44ae1cfe3145f45fa5bcbadfac0f768c08f57f189c9293c71d9d2af46e729eca5
-
C:\Users\Admin\AppData\Local\Temp\azwe4wef.eyi\rmaa1045.exeFilesize
3.7MB
MD5976900d7058a80a20c98d5807fe48e85
SHA1430d6c66e2c3cee0f45847d6d2dfaf923cd93cb5
SHA256631df98194799039573de396f694dd82f36203dc5e5233118a217fbaad023e77
SHA51239c032b27bdbc8ecd359b15c1e9b40a7a3e8f0822fe9290c5a911c7c3bfb2cd44ae1cfe3145f45fa5bcbadfac0f768c08f57f189c9293c71d9d2af46e729eca5
-
C:\Users\Admin\AppData\Local\Temp\ee-3e438-567-b14a9-2f1c75da46b4f\Kenessey.txtFilesize
9B
MD597384261b8bbf966df16e5ad509922db
SHA12fc42d37fee2c81d767e09fb298b70c748940f86
SHA2569c0d294c05fc1d88d698034609bb81c0c69196327594e4c69d2915c80fd9850c
SHA512b77fe2d86fbc5bd116d6a073eb447e76a74add3fa0d0b801f97535963241be3cdce1dbcaed603b78f020d0845b2d4bfc892ceb2a7d1c8f1d98abc4812ef5af21
-
C:\Users\Admin\AppData\Local\Temp\ee-3e438-567-b14a9-2f1c75da46b4f\Kesynagiry.exeFilesize
921KB
MD531fa9f8473c05401503e102627c5b2ef
SHA12e77b77672a31a6009687e896584f464bdc2b17f
SHA256ad654ee89cccbf5cfac59d9dac80e9379e71eca8734d187d64dd912ce66adab1
SHA512e6545b393e403be4ceba30fea2e7bf7e2f6e935e58a3047e1b1cb4a1e7517fcbb15e600c64d3324e225657ab406eee3e58b652d66ee39412f8b38eeb44008c7a
-
C:\Users\Admin\AppData\Local\Temp\ee-3e438-567-b14a9-2f1c75da46b4f\Kesynagiry.exeFilesize
921KB
MD531fa9f8473c05401503e102627c5b2ef
SHA12e77b77672a31a6009687e896584f464bdc2b17f
SHA256ad654ee89cccbf5cfac59d9dac80e9379e71eca8734d187d64dd912ce66adab1
SHA512e6545b393e403be4ceba30fea2e7bf7e2f6e935e58a3047e1b1cb4a1e7517fcbb15e600c64d3324e225657ab406eee3e58b652d66ee39412f8b38eeb44008c7a
-
C:\Users\Admin\AppData\Local\Temp\ee-3e438-567-b14a9-2f1c75da46b4f\Kesynagiry.exe.configFilesize
1KB
MD598d2687aec923f98c37f7cda8de0eb19
SHA1f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA2568a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
SHA51295c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590
-
C:\Users\Admin\AppData\Local\Temp\gentee61\guig.dllFilesize
20KB
MD5ddd4a31094764a9deb6a82c8658fd9c5
SHA14c098a5b44aca27b13222dd64903d3fb286fc274
SHA256624f4c25504ba431f450d8ecee2e2d0a4d87b95f7fa0b72db43f057ca021c328
SHA51245e2b5373ceb9b92dcd1d23a0b2410b5562d2a59c2a0d4dbca1c51f6264bc4659370ae3c170662bb8d316c3dfc0439874b3354ebf1ecd7ea27de125b4975ba6e
-
C:\Users\Admin\AppData\Local\Temp\gentee61\guig.dllFilesize
20KB
MD5ddd4a31094764a9deb6a82c8658fd9c5
SHA14c098a5b44aca27b13222dd64903d3fb286fc274
SHA256624f4c25504ba431f450d8ecee2e2d0a4d87b95f7fa0b72db43f057ca021c328
SHA51245e2b5373ceb9b92dcd1d23a0b2410b5562d2a59c2a0d4dbca1c51f6264bc4659370ae3c170662bb8d316c3dfc0439874b3354ebf1ecd7ea27de125b4975ba6e
-
C:\Users\Admin\AppData\Local\Temp\genteert.dllFilesize
60KB
MD56ce814fd1ad7ae07a9e462c26b3a0f69
SHA115f440c2a8498a4efe2d9ba0c6268fab4fb8e0a7
SHA25654c0da1735bb1cb02b60c321de938488345f8d1d26bf389c8cb2acad5d01b831
SHA512e5cff6bcb063635e5193209b94a9b2f5465f1c82394f23f50bd30bf0a2b117b209f5fca5aa10a7912a94ad88711dcd490aa528a7202f09490acd96cd640a3556
-
C:\Users\Admin\AppData\Local\Temp\gnrso0v1.skd\jpsilent.exeFilesize
24.9MB
MD59c4ff04cf38fc87d9953c3c2b028133a
SHA16fa769cf9501c909b2da744a85d432928f4704b5
SHA256c8feddc59a07784716ce863e16653ca357bf152923b1c8d379e626e397dcd43e
SHA5129ebbbaa57329cc126b8babed099c1bb406a45939a21c3c8a99b35524b7513c792908eb187ff740ebf8fb4d5d13d33fdb2eb3d80d18a62e2ff39d33d0ed4c7a06
-
C:\Users\Admin\AppData\Local\Temp\gnrso0v1.skd\jpsilent.exeFilesize
24.9MB
MD59c4ff04cf38fc87d9953c3c2b028133a
SHA16fa769cf9501c909b2da744a85d432928f4704b5
SHA256c8feddc59a07784716ce863e16653ca357bf152923b1c8d379e626e397dcd43e
SHA5129ebbbaa57329cc126b8babed099c1bb406a45939a21c3c8a99b35524b7513c792908eb187ff740ebf8fb4d5d13d33fdb2eb3d80d18a62e2ff39d33d0ed4c7a06
-
C:\Users\Admin\AppData\Local\Temp\is-52TRM.tmp\161.tmpFilesize
1.7MB
MD5a4ca7e269567926510fa67ea1c7527fe
SHA1c9ba83b5bd45b3cd2f63cc47cec88cbdf16a5194
SHA256f3040291bfe9f3c3c425c03011f7c5ef35dc7bd0cdca6459faa9bf9b8b161433
SHA5120a37b20229af6555e9084f49ccc5cdbe452a07b4a55744504cfcca7f4fcfb5b6c7eae1c484feda0d468e2b2998b3ddd0467640bf3e55184f11a77d92515297e4
-
C:\Users\Admin\AppData\Local\Temp\is-52TRM.tmp\161.tmpFilesize
1.7MB
MD5a4ca7e269567926510fa67ea1c7527fe
SHA1c9ba83b5bd45b3cd2f63cc47cec88cbdf16a5194
SHA256f3040291bfe9f3c3c425c03011f7c5ef35dc7bd0cdca6459faa9bf9b8b161433
SHA5120a37b20229af6555e9084f49ccc5cdbe452a07b4a55744504cfcca7f4fcfb5b6c7eae1c484feda0d468e2b2998b3ddd0467640bf3e55184f11a77d92515297e4
-
C:\Users\Admin\AppData\Local\Temp\is-FR2T4.tmp\SEoMal.exeFilesize
574KB
MD5261a41e9fd5b0aa44f88d889d961e48a
SHA10630d210e2d6ec82ba0050c329954a393269eb07
SHA2566a7481fcfddffff5dd2c57ae730f35fe506d6da1f1789dda7d473ed74051a997
SHA51229526a1e1fa3ea669f778cac507990f08d50bc294dce348f54d29226a922c1f913169a28a17bbc762f503072f8da2f737892d9b9c06706609ff6a8d22425a1bb
-
C:\Users\Admin\AppData\Local\Temp\is-FR2T4.tmp\SEoMal.exeFilesize
574KB
MD5261a41e9fd5b0aa44f88d889d961e48a
SHA10630d210e2d6ec82ba0050c329954a393269eb07
SHA2566a7481fcfddffff5dd2c57ae730f35fe506d6da1f1789dda7d473ed74051a997
SHA51229526a1e1fa3ea669f778cac507990f08d50bc294dce348f54d29226a922c1f913169a28a17bbc762f503072f8da2f737892d9b9c06706609ff6a8d22425a1bb
-
C:\Users\Admin\AppData\Local\Temp\is-FR2T4.tmp\idp.dllFilesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
C:\Users\Admin\AppData\Local\Temp\is-K50OC.tmp\irecord.tmpFilesize
704KB
MD5b5ffb69c517bd2ee5411f7a24845c829
SHA11a470a89a3f03effe401bb77b246ced24f5bc539
SHA256b09d330ec5fce569bc7ce5068ad6cafdb0d947fcc779b3362a424db1a2fa29be
SHA5125a771ad4237a7ec0159bbba2179fadf067e6d09d80e9f1fb701ffd62ed0203192d20adbe9dd4df4bfb0191cdccecadaf71ecec4a52de06f8ef338905cbea3465
-
C:\Users\Admin\AppData\Local\Temp\is-K50OC.tmp\irecord.tmpFilesize
704KB
MD5b5ffb69c517bd2ee5411f7a24845c829
SHA11a470a89a3f03effe401bb77b246ced24f5bc539
SHA256b09d330ec5fce569bc7ce5068ad6cafdb0d947fcc779b3362a424db1a2fa29be
SHA5125a771ad4237a7ec0159bbba2179fadf067e6d09d80e9f1fb701ffd62ed0203192d20adbe9dd4df4bfb0191cdccecadaf71ecec4a52de06f8ef338905cbea3465
-
C:\Users\Admin\AppData\Local\Temp\is-KBGM2.tmp\bc76622dde1409181cc7d5c806760de404ec59bdc1090ee30999fec4f0f00297.tmpFilesize
1.0MB
MD51cfdf3c33f022257ec99354fb628f15b
SHA16a33446e5c3cd676ab6da31fdf2659d997720052
SHA256bb698e512539c47b4886c82e39a41fcd1e53eb51f460bfa27c94850dd7cca73c
SHA51208ea0945d396f61da356eba96c3d8e497c7e38b9b592d771336d2a9823fb0c5bdd960dc3c888dbdbc214869b536f10f5256ebafcfa391e874b6240d1f6e2a49c
-
C:\Users\Admin\AppData\Local\Temp\is-T25VB.tmp\ApiTool.dllFilesize
959KB
MD5b5e330f90e1bab5e5ee8ccb04e679687
SHA13360a68276a528e4b651c9019b6159315c3acca8
SHA2562900d536923740fe530891f481e35e37262db5283a4b98047fe5335eacaf3441
SHA51241ab8f239cfff8e5ddcff95cdf2ae11499d57b2ebe8f0786757a200047fd022bfd6975be95e9cfcc17c405e631f069b9951591cf74faf3e6a548191e63a8439c
-
C:\Users\Admin\AppData\Local\Temp\is-T25VB.tmp\ApiTool.dllFilesize
959KB
MD5b5e330f90e1bab5e5ee8ccb04e679687
SHA13360a68276a528e4b651c9019b6159315c3acca8
SHA2562900d536923740fe530891f481e35e37262db5283a4b98047fe5335eacaf3441
SHA51241ab8f239cfff8e5ddcff95cdf2ae11499d57b2ebe8f0786757a200047fd022bfd6975be95e9cfcc17c405e631f069b9951591cf74faf3e6a548191e63a8439c
-
C:\Users\Admin\AppData\Local\Temp\is-T25VB.tmp\InnoCallback.dllFilesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
C:\Users\Admin\AppData\Local\Temp\is-T25VB.tmp\InnoCallback.dllFilesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
C:\Users\Admin\AppData\Local\Temp\is-T25VB.tmp\botva2.dllFilesize
41KB
MD5ef899fa243c07b7b82b3a45f6ec36771
SHA14a86313cc8766dcad1c2b00c2b8f9bbe0cf8bbbe
SHA256da7d0368712ee419952eb2640a65a7f24e39fb7872442ed4d2ee847ec4cfde77
SHA5123f98b5ad9adfad2111ebd1d8cbab9ae423d624d1668cc64c0bfcdbfedf30c1ce3ea6bc6bcf70f7dd1b01172a4349e7c84fb75d395ee5af73866574c1d734c6e8
-
C:\Users\Admin\AppData\Local\Temp\is-T25VB.tmp\botva2.dllFilesize
41KB
MD5ef899fa243c07b7b82b3a45f6ec36771
SHA14a86313cc8766dcad1c2b00c2b8f9bbe0cf8bbbe
SHA256da7d0368712ee419952eb2640a65a7f24e39fb7872442ed4d2ee847ec4cfde77
SHA5123f98b5ad9adfad2111ebd1d8cbab9ae423d624d1668cc64c0bfcdbfedf30c1ce3ea6bc6bcf70f7dd1b01172a4349e7c84fb75d395ee5af73866574c1d734c6e8
-
C:\Users\Admin\AppData\Local\Temp\is-T25VB.tmp\libMaskVPN.dllFilesize
2.3MB
MD53d88c579199498b224033b6b66638fb8
SHA16f6303288e2206efbf18e4716095059fada96fc4
SHA2565bccb86319fc90210d065648937725b14b43fa0c96f9da56d9984e027adebbc3
SHA5129740c521ed38643201ed4c2574628454723b9213f12e193c11477e64a2c03daa58d2a48e70df1a7e9654c50a80049f3cf213fd01f2b74e585c3a86027db19ec9
-
C:\Users\Admin\AppData\Local\Temp\is-T25VB.tmp\libMaskVPN.dllFilesize
2.3MB
MD53d88c579199498b224033b6b66638fb8
SHA16f6303288e2206efbf18e4716095059fada96fc4
SHA2565bccb86319fc90210d065648937725b14b43fa0c96f9da56d9984e027adebbc3
SHA5129740c521ed38643201ed4c2574628454723b9213f12e193c11477e64a2c03daa58d2a48e70df1a7e9654c50a80049f3cf213fd01f2b74e585c3a86027db19ec9
-
C:\Users\Admin\AppData\Local\Temp\jvvzbuu0.qoq\gcleaner.exeFilesize
299KB
MD599c10928911622e4a210b94dbe832087
SHA1ad600ad655b276648ffff7754de23129f3687cf9
SHA256de4984d0609b7b794668a3c39c9a698fd1ef0d6b0f23414ab2ba0b097ebd093d
SHA512ab889f27a5a0cfb4de3e8622aac430f809faa92312cd92b05493e5513517b3289bb790c6747312b370a898c707fec25e2427365515047bf90eba2692505b1c42
-
C:\Users\Admin\AppData\Local\Temp\jvvzbuu0.qoq\gcleaner.exeFilesize
299KB
MD599c10928911622e4a210b94dbe832087
SHA1ad600ad655b276648ffff7754de23129f3687cf9
SHA256de4984d0609b7b794668a3c39c9a698fd1ef0d6b0f23414ab2ba0b097ebd093d
SHA512ab889f27a5a0cfb4de3e8622aac430f809faa92312cd92b05493e5513517b3289bb790c6747312b370a898c707fec25e2427365515047bf90eba2692505b1c42
-
C:\Users\Admin\AppData\Local\Temp\n4jgb4ws.5u1\installer.exeFilesize
4.5MB
MD54113cbe4628131ffe796cda8314b9d0c
SHA1cf7be74c1ebb054ec30ee39bd4de66aad8e06bd7
SHA2564fd44841e621e1e59bea1e6cd326555bca489440646f6e3e0a6f94ade6b28ade
SHA512870f51a8fbbce701c2f52cb7faaf3633ddbdebca233c57b8330e54f1ce772ad4c0d2df819bf58b96fc57e0faf16253ffcee787c93a5e04b414fde957705a3c42
-
C:\Users\Admin\AppData\Local\Temp\n4jgb4ws.5u1\installer.exeFilesize
4.5MB
MD54113cbe4628131ffe796cda8314b9d0c
SHA1cf7be74c1ebb054ec30ee39bd4de66aad8e06bd7
SHA2564fd44841e621e1e59bea1e6cd326555bca489440646f6e3e0a6f94ade6b28ade
SHA512870f51a8fbbce701c2f52cb7faaf3633ddbdebca233c57b8330e54f1ce772ad4c0d2df819bf58b96fc57e0faf16253ffcee787c93a5e04b414fde957705a3c42
-
C:\Users\Admin\AppData\Local\Temp\s5no4j3h.xgl\handselfdiy_0.exeFilesize
1.4MB
MD56faf396317491689ceccae2fc8d32f5c
SHA126f91ae59f4c6567c823fb0a5c75be8f109255d0
SHA2562643b4a837d0332094a677129e201bcef7681ede3d62e34d2ba3ba2706fea4a8
SHA51279bd220b43ea654ea0c6f1b3427e4b78dc392e1c848c85087e94806afbec6dcb98a4e1d1289e473676882508cc3de7cd69010077b0a15419e368410b64dee7bb
-
C:\Users\Admin\AppData\Local\Temp\s5no4j3h.xgl\handselfdiy_0.exeFilesize
1.4MB
MD56faf396317491689ceccae2fc8d32f5c
SHA126f91ae59f4c6567c823fb0a5c75be8f109255d0
SHA2562643b4a837d0332094a677129e201bcef7681ede3d62e34d2ba3ba2706fea4a8
SHA51279bd220b43ea654ea0c6f1b3427e4b78dc392e1c848c85087e94806afbec6dcb98a4e1d1289e473676882508cc3de7cd69010077b0a15419e368410b64dee7bb
-
C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\decoder.dllFilesize
206KB
MD58a3f1a0da39530dcb8962dd0fadb187f
SHA1d5294f6be549ec1f779da78d903683bab2835d1a
SHA256c6988e36b1e1d6ffc89d9fa77ad35f132f5aa89e680d0155e0b6aee1c524c99f
SHA5121e0d5be3ee164fb16de629a975f3c3da61659b99a0fc766850ffeeddb2d32b7ee0d3b85c77f01d34d9fe2933bd7bd11c6dba7b35d30faed7ce09485fd706d49d
-
C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\decoder.dllFilesize
206KB
MD58a3f1a0da39530dcb8962dd0fadb187f
SHA1d5294f6be549ec1f779da78d903683bab2835d1a
SHA256c6988e36b1e1d6ffc89d9fa77ad35f132f5aa89e680d0155e0b6aee1c524c99f
SHA5121e0d5be3ee164fb16de629a975f3c3da61659b99a0fc766850ffeeddb2d32b7ee0d3b85c77f01d34d9fe2933bd7bd11c6dba7b35d30faed7ce09485fd706d49d
-
\??\pipe\LOCAL\crashpad_2824_DELTGLYGZASYENQNMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/628-299-0x0000000000000000-mapping.dmp
-
memory/1000-228-0x0000000000000000-mapping.dmp
-
memory/1360-317-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/1360-313-0x0000000000000000-mapping.dmp
-
memory/1360-314-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/1360-316-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/1360-318-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/1576-156-0x0000000000000000-mapping.dmp
-
memory/1800-296-0x0000000000000000-mapping.dmp
-
memory/1840-162-0x0000000000000000-mapping.dmp
-
memory/2228-214-0x0000000006140000-0x000000000614F000-memory.dmpFilesize
60KB
-
memory/2228-185-0x0000000000000000-mapping.dmp
-
memory/2228-205-0x0000000003240000-0x0000000003520000-memory.dmpFilesize
2.9MB
-
memory/2228-219-0x00000000064E0000-0x00000000064F5000-memory.dmpFilesize
84KB
-
memory/2228-215-0x0000000005BF0000-0x0000000005FF0000-memory.dmpFilesize
4.0MB
-
memory/2352-151-0x0000000000000000-mapping.dmp
-
memory/2352-158-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/2352-153-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/2364-265-0x0000000000000000-mapping.dmp
-
memory/2468-301-0x0000000000000000-mapping.dmp
-
memory/2472-264-0x0000000000000000-mapping.dmp
-
memory/2548-298-0x0000000000000000-mapping.dmp
-
memory/2608-186-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2608-178-0x0000000000000000-mapping.dmp
-
memory/2608-241-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2608-182-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2608-335-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2628-132-0x0000000000000000-mapping.dmp
-
memory/2824-161-0x0000000000000000-mapping.dmp
-
memory/3096-323-0x0000000000000000-mapping.dmp
-
memory/3156-273-0x0000000000000000-mapping.dmp
-
memory/3164-140-0x0000000000000000-mapping.dmp
-
memory/3164-144-0x00007FF8D5370000-0x00007FF8D5DA6000-memory.dmpFilesize
10.2MB
-
memory/3236-159-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/3236-130-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/3236-150-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/3236-134-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/3364-269-0x0000000000000000-mapping.dmp
-
memory/3748-191-0x0000000000000000-mapping.dmp
-
memory/3776-282-0x0000000000000000-mapping.dmp
-
memory/3804-311-0x0000000000000000-mapping.dmp
-
memory/3856-289-0x0000000000000000-mapping.dmp
-
memory/4004-304-0x0000000000000000-mapping.dmp
-
memory/4016-177-0x0000000000000000-mapping.dmp
-
memory/4144-295-0x0000000000000000-mapping.dmp
-
memory/4164-305-0x0000000000000000-mapping.dmp
-
memory/4168-216-0x0000000000000000-mapping.dmp
-
memory/4176-276-0x0000000000000000-mapping.dmp
-
memory/4316-285-0x0000000000000000-mapping.dmp
-
memory/4524-224-0x0000000000000000-mapping.dmp
-
memory/4572-207-0x0000000000000000-mapping.dmp
-
memory/4624-145-0x0000000000000000-mapping.dmp
-
memory/4624-149-0x00007FF8D5370000-0x00007FF8D5DA6000-memory.dmpFilesize
10.2MB
-
memory/4812-136-0x0000000000000000-mapping.dmp
-
memory/4812-139-0x00007FF8D5370000-0x00007FF8D5DA6000-memory.dmpFilesize
10.2MB
-
memory/4824-261-0x0000000000400000-0x0000000000452000-memory.dmpFilesize
328KB
-
memory/4824-206-0x0000000000400000-0x0000000000452000-memory.dmpFilesize
328KB
-
memory/4824-201-0x00000000005B0000-0x00000000005EF000-memory.dmpFilesize
252KB
-
memory/4824-255-0x000000000081D000-0x0000000000843000-memory.dmpFilesize
152KB
-
memory/4824-169-0x0000000000000000-mapping.dmp
-
memory/4824-193-0x000000000081D000-0x0000000000843000-memory.dmpFilesize
152KB
-
memory/4828-292-0x0000000000000000-mapping.dmp
-
memory/4828-229-0x0000000000000000-mapping.dmp
-
memory/4880-272-0x000000006AB00000-0x000000006AD71000-memory.dmpFilesize
2.4MB
-
memory/4880-172-0x0000000000000000-mapping.dmp
-
memory/4880-270-0x0000000065EC0000-0x0000000067271000-memory.dmpFilesize
19.7MB
-
memory/4880-192-0x0000000072750000-0x0000000072D01000-memory.dmpFilesize
5.7MB
-
memory/4880-254-0x0000000072750000-0x0000000072D01000-memory.dmpFilesize
5.7MB
-
memory/4880-288-0x0000000065EC0000-0x0000000067271000-memory.dmpFilesize
19.7MB
-
memory/4880-274-0x00000000060E0000-0x0000000007491000-memory.dmpFilesize
19.7MB
-
memory/4880-287-0x00000000060E0000-0x0000000007491000-memory.dmpFilesize
19.7MB
-
memory/4880-286-0x000000006AB00000-0x000000006AD71000-memory.dmpFilesize
2.4MB
-
memory/5112-277-0x0000000000000000-mapping.dmp
-
memory/5124-235-0x0000000000000000-mapping.dmp
-
memory/5128-300-0x0000000000000000-mapping.dmp
-
memory/5156-303-0x0000000000000000-mapping.dmp
-
memory/5172-312-0x0000000000000000-mapping.dmp
-
memory/5260-236-0x0000000000000000-mapping.dmp
-
memory/5284-290-0x0000000000000000-mapping.dmp
-
memory/5292-238-0x0000000000000000-mapping.dmp
-
memory/5340-283-0x0000000000000000-mapping.dmp
-
memory/5352-239-0x0000000000000000-mapping.dmp
-
memory/5376-242-0x0000000000000000-mapping.dmp
-
memory/5424-243-0x0000000000000000-mapping.dmp
-
memory/5460-319-0x0000000000000000-mapping.dmp
-
memory/5460-320-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/5460-322-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/5464-278-0x0000000000000000-mapping.dmp
-
memory/5472-302-0x0000000000000000-mapping.dmp
-
memory/5484-284-0x0000000000000000-mapping.dmp
-
memory/5548-249-0x0000000000000000-mapping.dmp
-
memory/5548-263-0x0000000140000000-0x000000014067F000-memory.dmpFilesize
6.5MB
-
memory/5644-253-0x0000000000000000-mapping.dmp
-
memory/5772-293-0x0000000000000000-mapping.dmp
-
memory/5828-164-0x0000000000000000-mapping.dmp
-
memory/5920-280-0x0000000000000000-mapping.dmp
-
memory/5936-279-0x0000000000000000-mapping.dmp
-
memory/6020-165-0x0000000000000000-mapping.dmp
-
memory/6048-324-0x0000000000000000-mapping.dmp
-
memory/6076-167-0x0000000000000000-mapping.dmp
-
memory/6104-325-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/6104-327-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/6104-328-0x0000000033A20000-0x0000000033BE6000-memory.dmpFilesize
1.8MB
-
memory/6104-329-0x00000000343B0000-0x0000000034508000-memory.dmpFilesize
1.3MB
-
memory/6104-331-0x0000000034590000-0x00000000345E8000-memory.dmpFilesize
352KB
-
memory/6104-333-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/6136-168-0x0000000000000000-mapping.dmp