Resubmissions
14-11-2022 04:15
221114-evjrnshh2t 1017-07-2022 06:05
220717-gtf1hagcf3 1002-07-2022 06:53
220702-hn2kpadhcp 10Analysis
-
max time kernel
197s -
max time network
679s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
02-07-2022 06:53
Static task
static1
General
-
Target
File.exe
-
Size
275KB
-
MD5
bdc781f3ff4937a9f53d0af613d00002
-
SHA1
0e1a3279035daa3d0681fd24e2a7c1d446882054
-
SHA256
bbf8dbb3ca59a60f20438cabbb16449bdecbfa4c6347172a6e20c3639dd4e2fd
-
SHA512
c7311fc23ca7d6552dcf759aed5bd000df04ac78d672d6cab2ee7976301714a96773dda7c0b76e6abc26f4852318a02218e549cd1e392fbbd59bf56a5e28e145
Malware Config
Extracted
privateloader
http://212.193.30.45/proxies.txt
http://85.202.169.116/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
85.202.169.116
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
http://212.193.30.29/server.txt
212.193.30.21
-
payload_url
http://193.233.185.125/download/NiceProcessX64.bmp
http://193.233.185.125/download/NiceProcessX32.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931507465563045909/dingo_20220114120058.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://193.56.146.76/Proxytest.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://privacy-tools-for-you-780.com/downloads/toolspab3.exe
http://luminati-china.xyz/aman/casper2.exe
https://innovicservice.net/assets/vendor/counterup/RobCleanerInstlr95038215.exe
http://tg8.cllgxx.com/hp8/g1/yrpp1047.exe
https://cdn.discordapp.com/attachments/910842184708792331/930849718240698368/Roll.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930850766787330068/real1201.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930882959131693096/Installer.bmp
http://185.215.113.208/ferrari.exe
https://cdn.discordapp.com/attachments/910842184708792331/931233371110141962/LingeringsAntiphon.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931285223709225071/russ.bmp
https://cdn.discordapp.com/attachments/910842184708792331/932720393201016842/filinnn.bmp
https://cdn.discordapp.com/attachments/910842184708792331/933436611427979305/build20k.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://mnbuiy.pw/adsli/note8876.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://luminati-china.xyz/aman/casper2.exe
https://suprimax.vet.br/css/fonts/OneCleanerInst942914.exe
http://tg8.cllgxx.com/hp8/g1/ssaa1047.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_64_bit_4.3.0_Setup.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_32_bit_4.3.0_Setup.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516400005296219/anyname.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516894660530226/PBsecond.exe
https://cdn.discordapp.com/attachments/910842184708792331/914047763304550410/Xpadder.bmp
Extracted
nymaim
45.141.237.3
31.210.20.149
212.192.241.16
Extracted
djvu
http://acacaca.org/test3/get.php
-
extension
.eiur
-
offline_id
JPKXWc5eWNjIicWmQyJxv6NCjbH02qrKi0af9Zt1
-
payload_url
http://rgyui.top/dl/build2.exe
http://acacaca.org/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-aMsnHoiJcO Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@bestyourmail.ch Reserve e-mail address to contact us: supportsys@airmail.cc Your personal ID: 0510Usjdjs
Extracted
vidar
53
1448
https://t.me/ch_inagroup
https://mastodon.social/@olegf9844e
-
profile_id
1448
Extracted
redline
Mount2
ushatamaiet.xyz:80
adinoreiver.xyz:80
qulyneanica.com:80
-
auth_value
041a7c36d4c8d195af1a8b950182ee96
Extracted
vidar
53
937
https://t.me/ch_inagroup
https://mastodon.social/@olegf9844e
-
profile_id
937
Extracted
vidar
52.7
517
https://t.me/tg_superch
https://climatejustice.social/@olegf9844
-
profile_id
517
Signatures
-
DcRat 10 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeiVQM0xMW6hzwPHNWW0vYsxOO.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeFile.exeschtasks.exepid process 5796 schtasks.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\71372fc4-7460-482f-8839-218ea6fcb8f2\\iVQM0xMW6hzwPHNWW0vYsxOO.exe\" --AutoStart" iVQM0xMW6hzwPHNWW0vYsxOO.exe 5856 schtasks.exe 5944 schtasks.exe 2004 schtasks.exe 4624 schtasks.exe 1556 schtasks.exe 1596 schtasks.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\Root File.exe 460 schtasks.exe -
Detected Djvu ransomware 9 IoCs
Processes:
resource yara_rule behavioral1/memory/4676-232-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4676-234-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/908-241-0x0000000002250000-0x000000000236B000-memory.dmp family_djvu behavioral1/memory/4676-237-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4676-258-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4676-279-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4676-290-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4404-304-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4404-308-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Processes:
File.exee45FA1pVhoN9KLpoCUw0wmUg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection File.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" File.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection e45FA1pVhoN9KLpoCUw0wmUg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e45FA1pVhoN9KLpoCUw0wmUg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" File.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e45FA1pVhoN9KLpoCUw0wmUg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" File.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e45FA1pVhoN9KLpoCUw0wmUg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e45FA1pVhoN9KLpoCUw0wmUg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" e45FA1pVhoN9KLpoCUw0wmUg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" File.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" File.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" File.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e45FA1pVhoN9KLpoCUw0wmUg.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2124 4228 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1888-226-0x0000000000510000-0x0000000000530000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
Processes:
svchost.exedescription pid process target process PID 5316 created 1608 5316 svchost.exe ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe PID 5316 created 5668 5316 svchost.exe csrss.exe PID 5316 created 5668 5316 svchost.exe csrss.exe PID 5316 created 5668 5316 svchost.exe csrss.exe PID 5316 created 5668 5316 svchost.exe csrss.exe -
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Amadey CnC Check-In
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved
suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved
-
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
-
suricata: ET MALWARE Win32/Filecoder.STOP Variant Public Key Download
suricata: ET MALWARE Win32/Filecoder.STOP Variant Public Key Download
-
suricata: ET MALWARE Win32/Filecoder.STOP Variant Request for Public Key
suricata: ET MALWARE Win32/Filecoder.STOP Variant Request for Public Key
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
suricata: ET MALWARE Win32/Vodkagats Loader Requesting Payload
suricata: ET MALWARE Win32/Vodkagats Loader Requesting Payload
-
Vidar Stealer 9 IoCs
Processes:
resource yara_rule behavioral1/memory/2384-244-0x0000000000400000-0x0000000000A93000-memory.dmp family_vidar behavioral1/memory/2384-240-0x0000000000BF0000-0x0000000000C3D000-memory.dmp family_vidar behavioral1/memory/4884-247-0x0000000000BA0000-0x0000000000BED000-memory.dmp family_vidar behavioral1/memory/4884-248-0x0000000000400000-0x0000000000B55000-memory.dmp family_vidar behavioral1/memory/2384-274-0x0000000000400000-0x0000000000A93000-memory.dmp family_vidar behavioral1/memory/4884-275-0x0000000000400000-0x0000000000B55000-memory.dmp family_vidar behavioral1/memory/3144-383-0x0000000000400000-0x000000000045D000-memory.dmp family_vidar behavioral1/memory/3144-380-0x0000000000400000-0x000000000045D000-memory.dmp family_vidar behavioral1/memory/3144-387-0x0000000000400000-0x000000000045D000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
3alouch.exereg.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 3alouch.exe File opened for modification C:\Windows\system32\drivers\etc\hosts reg.exe -
Executes dropped EXE 55 IoCs
Processes:
gMSCcxDhzNL6HxnMVXXqmJTm.exerpR1tJFc_HKayyoOL1nqxoTf.exeWTuOmkgS9p7OFBa2ffmGdvpd.exeddD4e2ycv3SboVSm9XdEuAPz.exej7iYfyZBqpehjD5wqHnYaxLi.exeCo69YU3_Wi0ruwVUQzcMvRjV.exe464Kp2er6EuzXaB6O8__Bmh3.exeQW7GgYOEuTcPjNLKdw2BB6tk.exe3P0vEfNdwMEJ8JDIdCIHJXhQ.exekzKYaZZ3A8Z3adLGazacqc5t.exeZWGcYtRUGEhgsgAy6Z1gOtWJ.exe4Tcll0aLHixecbhfywWN_3hE.exeiVQM0xMW6hzwPHNWW0vYsxOO.exeQW7GgYOEuTcPjNLKdw2BB6tk.exewrWAOWereWYNbEYIiIiTIZFY.exeCo69YU3_Wi0ruwVUQzcMvRjV.exewrWAOWereWYNbEYIiIiTIZFY.tmpiVQM0xMW6hzwPHNWW0vYsxOO.exee45FA1pVhoN9KLpoCUw0wmUg.exe3alouch.exeiVQM0xMW6hzwPHNWW0vYsxOO.exeiVQM0xMW6hzwPHNWW0vYsxOO.exeVyshitarosho.exeLipodaevoxy.exebuild2.exeirecord.exeirecord.tmp00617867642241074644.exeI-Record.exebguuwe.exebuild2.exeZWGcYtRUGEhgsgAy6Z1gOtWJ.exeTal.exe.pifcsrss.exeinjector.exetor.exe2lGlTeEtwGzBFxh1FiYVIJjp.exetl2P_EnkKoIRM0HqSvxdk2wr.exebUx8Ck4YdIpnpqxIOlDAZmJ7.exe5F1F.exebmhAq0hcajELIhNjMHZkiAcz.exe0ayuVfZm90nsDXlH27gD56VO.exeWerFault.exeInstall.exeGOTLQpLlIsdyDe4S9owceBHn.exeInstall.exeGOTLQpLlIsdyDe4S9owceBHn.tmpbguuwe.exereg.exe5F1F.exeZHaricalycy.exewindefender.exewindefender.exeTal.exe.pifTal.exe.pifpid process 4892 gMSCcxDhzNL6HxnMVXXqmJTm.exe 392 rpR1tJFc_HKayyoOL1nqxoTf.exe 5088 WTuOmkgS9p7OFBa2ffmGdvpd.exe 780 ddD4e2ycv3SboVSm9XdEuAPz.exe 2384 j7iYfyZBqpehjD5wqHnYaxLi.exe 4936 Co69YU3_Wi0ruwVUQzcMvRjV.exe 4644 464Kp2er6EuzXaB6O8__Bmh3.exe 2456 QW7GgYOEuTcPjNLKdw2BB6tk.exe 2484 3P0vEfNdwMEJ8JDIdCIHJXhQ.exe 4320 kzKYaZZ3A8Z3adLGazacqc5t.exe 1608 ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe 4884 4Tcll0aLHixecbhfywWN_3hE.exe 908 iVQM0xMW6hzwPHNWW0vYsxOO.exe 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 868 wrWAOWereWYNbEYIiIiTIZFY.exe 1888 Co69YU3_Wi0ruwVUQzcMvRjV.exe 1656 wrWAOWereWYNbEYIiIiTIZFY.tmp 4676 iVQM0xMW6hzwPHNWW0vYsxOO.exe 556 e45FA1pVhoN9KLpoCUw0wmUg.exe 2068 3alouch.exe 5020 iVQM0xMW6hzwPHNWW0vYsxOO.exe 4404 iVQM0xMW6hzwPHNWW0vYsxOO.exe 4276 Vyshitarosho.exe 4340 Lipodaevoxy.exe 1600 build2.exe 1140 irecord.exe 784 irecord.tmp 1288 00617867642241074644.exe 2100 I-Record.exe 608 bguuwe.exe 3144 build2.exe 5356 ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe 5604 Tal.exe.pif 5668 csrss.exe 6088 injector.exe 5132 tor.exe 4996 2lGlTeEtwGzBFxh1FiYVIJjp.exe 60 tl2P_EnkKoIRM0HqSvxdk2wr.exe 896 bUx8Ck4YdIpnpqxIOlDAZmJ7.exe 5372 5F1F.exe 5108 bmhAq0hcajELIhNjMHZkiAcz.exe 4528 0ayuVfZm90nsDXlH27gD56VO.exe 3560 WerFault.exe 5612 Install.exe 5432 GOTLQpLlIsdyDe4S9owceBHn.exe 5596 Install.exe 5940 GOTLQpLlIsdyDe4S9owceBHn.tmp 5312 bguuwe.exe 5728 reg.exe 5896 5F1F.exe 3384 ZHaricalycy.exe 4828 windefender.exe 3128 windefender.exe 1004 Tal.exe.pif 3188 Tal.exe.pif -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Processes:
resource yara_rule behavioral1/memory/2456-168-0x00000000006B0000-0x0000000000709000-memory.dmp upx C:\Users\Admin\Pictures\Adobe Films\QW7GgYOEuTcPjNLKdw2BB6tk.exe upx behavioral1/memory/1608-185-0x0000000000400000-0x0000000000C96000-memory.dmp upx behavioral1/memory/3624-199-0x00000000006B0000-0x0000000000709000-memory.dmp upx C:\Users\Admin\Pictures\Adobe Films\QW7GgYOEuTcPjNLKdw2BB6tk.exe upx C:\Users\Admin\Pictures\Adobe Films\ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe upx \??\c:\users\admin\pictures\adobe films\zwgcytrugehgsgay6z1gotwj.exe upx \??\c:\users\admin\pictures\adobe films\qw7ggyoeutcpjnlkdw2bb6tk.exe upx behavioral1/memory/2456-267-0x00000000006B0000-0x0000000000709000-memory.dmp upx behavioral1/memory/1608-268-0x0000000000400000-0x0000000000C96000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WTuOmkgS9p7OFBa2ffmGdvpd.exe00617867642241074644.exe5F1F.exe3alouch.exebguuwe.exe4Tcll0aLHixecbhfywWN_3hE.exe2lGlTeEtwGzBFxh1FiYVIJjp.exetl2P_EnkKoIRM0HqSvxdk2wr.exeFile.exee45FA1pVhoN9KLpoCUw0wmUg.exeiVQM0xMW6hzwPHNWW0vYsxOO.exeiVQM0xMW6hzwPHNWW0vYsxOO.exeInstall.exe464Kp2er6EuzXaB6O8__Bmh3.exeddD4e2ycv3SboVSm9XdEuAPz.exej7iYfyZBqpehjD5wqHnYaxLi.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WTuOmkgS9p7OFBa2ffmGdvpd.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 00617867642241074644.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 5F1F.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 3alouch.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation bguuwe.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 4Tcll0aLHixecbhfywWN_3hE.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 2lGlTeEtwGzBFxh1FiYVIJjp.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation tl2P_EnkKoIRM0HqSvxdk2wr.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation File.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation e45FA1pVhoN9KLpoCUw0wmUg.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation iVQM0xMW6hzwPHNWW0vYsxOO.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation iVQM0xMW6hzwPHNWW0vYsxOO.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 464Kp2er6EuzXaB6O8__Bmh3.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation ddD4e2ycv3SboVSm9XdEuAPz.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation j7iYfyZBqpehjD5wqHnYaxLi.exe -
Loads dropped DLL 55 IoCs
Processes:
QW7GgYOEuTcPjNLKdw2BB6tk.exewrWAOWereWYNbEYIiIiTIZFY.tmpregsvr32.exej7iYfyZBqpehjD5wqHnYaxLi.exeI-Record.exe4Tcll0aLHixecbhfywWN_3hE.exetaskmgr.exetor.exeGOTLQpLlIsdyDe4S9owceBHn.tmprundll32.exerundll32.exebuild2.exerundll32.exepid process 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 3624 QW7GgYOEuTcPjNLKdw2BB6tk.exe 1656 wrWAOWereWYNbEYIiIiTIZFY.tmp 4624 regsvr32.exe 4624 regsvr32.exe 2384 j7iYfyZBqpehjD5wqHnYaxLi.exe 2384 j7iYfyZBqpehjD5wqHnYaxLi.exe 2100 I-Record.exe 2100 I-Record.exe 2100 I-Record.exe 2100 I-Record.exe 2100 I-Record.exe 2100 I-Record.exe 2100 I-Record.exe 2100 I-Record.exe 2100 I-Record.exe 4884 4Tcll0aLHixecbhfywWN_3hE.exe 4884 4Tcll0aLHixecbhfywWN_3hE.exe 2196 taskmgr.exe 5132 tor.exe 5132 tor.exe 5132 tor.exe 5132 tor.exe 5132 tor.exe 5132 tor.exe 5132 tor.exe 5132 tor.exe 5132 tor.exe 5940 GOTLQpLlIsdyDe4S9owceBHn.tmp 5176 rundll32.exe 5232 rundll32.exe 5232 rundll32.exe 3144 build2.exe 3144 build2.exe 5604 5604 5604 4560 rundll32.exe 4560 rundll32.exe 5604 5604 5604 -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
kzKYaZZ3A8Z3adLGazacqc5t.exeiVQM0xMW6hzwPHNWW0vYsxOO.exe3alouch.exemsedge.exebUx8Ck4YdIpnpqxIOlDAZmJ7.exeZWGcYtRUGEhgsgAy6Z1gOtWJ.execsrss.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kzKYaZZ3A8Z3adLGazacqc5t.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\71372fc4-7460-482f-8839-218ea6fcb8f2\\iVQM0xMW6hzwPHNWW0vYsxOO.exe\" --AutoStart" iVQM0xMW6hzwPHNWW0vYsxOO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Sidebar\\Waenagoshomi.exe\"" 3alouch.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" bUx8Ck4YdIpnpqxIOlDAZmJ7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" kzKYaZZ3A8Z3adLGazacqc5t.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bUx8Ck4YdIpnpqxIOlDAZmJ7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 149 ipinfo.io 334 ip-api.com 391 api.2ip.ua 111 checkip.amazonaws.com 116 ipinfo.io 117 ipinfo.io 123 api.2ip.ua 393 api.2ip.ua 397 api.2ip.ua 22 ipinfo.io 23 ipinfo.io 125 api.2ip.ua 159 api.2ip.ua -
Drops file in System32 directory 1 IoCs
Processes:
Install.exedescription ioc process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
Co69YU3_Wi0ruwVUQzcMvRjV.exeiVQM0xMW6hzwPHNWW0vYsxOO.exeiVQM0xMW6hzwPHNWW0vYsxOO.exebuild2.exedescription pid process target process PID 4936 set thread context of 1888 4936 Co69YU3_Wi0ruwVUQzcMvRjV.exe Co69YU3_Wi0ruwVUQzcMvRjV.exe PID 908 set thread context of 4676 908 iVQM0xMW6hzwPHNWW0vYsxOO.exe iVQM0xMW6hzwPHNWW0vYsxOO.exe PID 5020 set thread context of 4404 5020 iVQM0xMW6hzwPHNWW0vYsxOO.exe iVQM0xMW6hzwPHNWW0vYsxOO.exe PID 1600 set thread context of 3144 1600 build2.exe build2.exe PID 5604 set thread context of 1004 5604 Tal.exe.pif -
Drops file in Program Files directory 34 IoCs
Processes:
irecord.tmp3alouch.exesetup.exeWTuOmkgS9p7OFBa2ffmGdvpd.exedescription ioc process File created C:\Program Files (x86)\i-record\is-8BOHS.tmp irecord.tmp File created C:\Program Files (x86)\i-record\is-KU547.tmp irecord.tmp File created C:\Program Files (x86)\i-record\is-JPAT4.tmp irecord.tmp File created C:\Program Files\7-Zip\ZSTXEAQAQM\irecord.exe.config 3alouch.exe File opened for modification C:\Program Files (x86)\i-record\avcodec-53.dll irecord.tmp File created C:\Program Files (x86)\i-record\is-HTC1J.tmp irecord.tmp File opened for modification C:\Program Files (x86)\i-record\postproc-52.dll irecord.tmp File opened for modification C:\Program Files (x86)\i-record\unins000.dat irecord.tmp File opened for modification C:\Program Files (x86)\i-record\AForge.Video.FFMPEG.dll irecord.tmp File created C:\Program Files (x86)\i-record\is-DGBBP.tmp irecord.tmp File opened for modification C:\Program Files (x86)\i-record\avfilter-2.dll irecord.tmp File created C:\Program Files (x86)\i-record\unins000.dat irecord.tmp File created C:\Program Files (x86)\i-record\is-R3FRC.tmp irecord.tmp File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\1928521d-2ec6-43fe-8879-d5719a2ec505.tmp setup.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe WTuOmkgS9p7OFBa2ffmGdvpd.exe File created C:\Program Files (x86)\Windows Sidebar\Waenagoshomi.exe 3alouch.exe File created C:\Program Files (x86)\i-record\is-SJ1PH.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220702085647.pma setup.exe File opened for modification C:\Program Files (x86)\i-record\I-Record.exe irecord.tmp File opened for modification C:\Program Files (x86)\i-record\avformat-53.dll irecord.tmp File created C:\Program Files (x86)\i-record\is-N6GCL.tmp irecord.tmp File opened for modification C:\Program Files (x86)\i-record\swresample-0.dll irecord.tmp File opened for modification C:\Program Files (x86)\i-record\swscale-2.dll irecord.tmp File created C:\Program Files (x86)\i-record\is-EA4DA.tmp irecord.tmp File created C:\Program Files (x86)\i-record\is-PA161.tmp irecord.tmp File created C:\Program Files (x86)\i-record\is-IDD39.tmp irecord.tmp File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe WTuOmkgS9p7OFBa2ffmGdvpd.exe File created C:\Program Files\7-Zip\ZSTXEAQAQM\irecord.exe 3alouch.exe File opened for modification C:\Program Files (x86)\i-record\AForge.Video.dll irecord.tmp File created C:\Program Files (x86)\i-record\is-3D5FQ.tmp irecord.tmp File created C:\Program Files (x86)\i-record\is-R1CJI.tmp irecord.tmp File created C:\Program Files (x86)\Windows Sidebar\Waenagoshomi.exe.config 3alouch.exe File opened for modification C:\Program Files (x86)\i-record\avdevice-53.dll irecord.tmp File opened for modification C:\Program Files (x86)\i-record\avutil-51.dll irecord.tmp -
Drops file in Windows directory 9 IoCs
Processes:
csrss.exeZHaricalycy.exeLipodaevoxy.exeZWGcYtRUGEhgsgAy6Z1gOtWJ.exeschtasks.exedescription ioc process File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new ZHaricalycy.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new Lipodaevoxy.exe File opened for modification C:\Windows\rss ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe File created C:\Windows\rss\csrss.exe ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe File created C:\Windows\windefender.exe csrss.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new Lipodaevoxy.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new ZHaricalycy.exe File created C:\Windows\Tasks\bamNpdvhtkzLwlCraC.job schtasks.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 1412 sc.exe 4064 sc.exe -
Detects Pyinstaller 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\QW7GgYOEuTcPjNLKdw2BB6tk.exe pyinstaller C:\Users\Admin\Pictures\Adobe Films\QW7GgYOEuTcPjNLKdw2BB6tk.exe pyinstaller \??\c:\users\admin\pictures\adobe films\qw7ggyoeutcpjnlkdw2bb6tk.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4224 4644 WerFault.exe 464Kp2er6EuzXaB6O8__Bmh3.exe 1908 2440 WerFault.exe File.exe 4248 392 WerFault.exe rpR1tJFc_HKayyoOL1nqxoTf.exe 2236 4892 WerFault.exe gMSCcxDhzNL6HxnMVXXqmJTm.exe 2512 2384 WerFault.exe j7iYfyZBqpehjD5wqHnYaxLi.exe 3916 1288 WerFault.exe 00617867642241074644.exe 896 4884 WerFault.exe 4Tcll0aLHixecbhfywWN_3hE.exe 3792 5176 WerFault.exe rundll32.exe 2024 60 WerFault.exe tl2P_EnkKoIRM0HqSvxdk2wr.exe 2372 5896 WerFault.exe dRLlEJrfrNQ46LI8Zt0exfpg.exe 5532 5312 WerFault.exe bguuwe.exe 5808 3316 WerFault.exe 8064.exe 3632 388 WerFault.exe explorer.exe 2492 5132 WerFault.exe tor.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exe0ayuVfZm90nsDXlH27gD56VO.exe3P0vEfNdwMEJ8JDIdCIHJXhQ.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0ayuVfZm90nsDXlH27gD56VO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3P0vEfNdwMEJ8JDIdCIHJXhQ.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3P0vEfNdwMEJ8JDIdCIHJXhQ.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3P0vEfNdwMEJ8JDIdCIHJXhQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0ayuVfZm90nsDXlH27gD56VO.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0ayuVfZm90nsDXlH27gD56VO.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
j7iYfyZBqpehjD5wqHnYaxLi.exe4Tcll0aLHixecbhfywWN_3hE.exebuild2.exetaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString j7iYfyZBqpehjD5wqHnYaxLi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4Tcll0aLHixecbhfywWN_3hE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4Tcll0aLHixecbhfywWN_3hE.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 j7iYfyZBqpehjD5wqHnYaxLi.exe -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2004 schtasks.exe 1556 schtasks.exe 5856 schtasks.exe 5944 schtasks.exe 1596 schtasks.exe 5796 schtasks.exe 4624 schtasks.exe 460 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 2404 timeout.exe 6008 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 5452 tasklist.exe 232 tasklist.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
msedge.exeInstall.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 6008 taskkill.exe 1860 taskkill.exe 3144 taskkill.exe 5896 taskkill.exe 3436 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
ZWGcYtRUGEhgsgAy6Z1gOtWJ.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe -
Modifies registry class 5 IoCs
Processes:
2lGlTeEtwGzBFxh1FiYVIJjp.exemsedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings 2lGlTeEtwGzBFxh1FiYVIJjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Processes:
iVQM0xMW6hzwPHNWW0vYsxOO.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 iVQM0xMW6hzwPHNWW0vYsxOO.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 iVQM0xMW6hzwPHNWW0vYsxOO.exe -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 5632 PING.EXE 5760 PING.EXE 4532 PING.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 325 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
File.exetaskmgr.exepid process 2440 File.exe 2440 File.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
taskmgr.exepid process 2196 taskmgr.exe 1060 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
3P0vEfNdwMEJ8JDIdCIHJXhQ.exe0ayuVfZm90nsDXlH27gD56VO.exepid process 2484 3P0vEfNdwMEJ8JDIdCIHJXhQ.exe 4528 0ayuVfZm90nsDXlH27gD56VO.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
msedge.exepid process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
taskmgr.exeCo69YU3_Wi0ruwVUQzcMvRjV.exerpR1tJFc_HKayyoOL1nqxoTf.exegMSCcxDhzNL6HxnMVXXqmJTm.exeCo69YU3_Wi0ruwVUQzcMvRjV.exetaskkill.exe3alouch.exeVyshitarosho.exeLipodaevoxy.exedescription pid process Token: SeDebugPrivilege 2196 taskmgr.exe Token: SeSystemProfilePrivilege 2196 taskmgr.exe Token: SeCreateGlobalPrivilege 2196 taskmgr.exe Token: SeDebugPrivilege 4936 Co69YU3_Wi0ruwVUQzcMvRjV.exe Token: SeDebugPrivilege 392 rpR1tJFc_HKayyoOL1nqxoTf.exe Token: SeDebugPrivilege 4892 gMSCcxDhzNL6HxnMVXXqmJTm.exe Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeDebugPrivilege 1888 Co69YU3_Wi0ruwVUQzcMvRjV.exe Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeDebugPrivilege 1860 taskkill.exe Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeDebugPrivilege 2068 3alouch.exe Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeDebugPrivilege 4276 Vyshitarosho.exe Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeDebugPrivilege 4340 Lipodaevoxy.exe Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 Token: SeCreatePagefilePrivilege 1060 Token: SeShutdownPrivilege 1060 -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe 2196 taskmgr.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
5F1F.exeWerFault.exepid process 1060 5372 5F1F.exe 5372 5F1F.exe 3560 WerFault.exe 3560 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
File.exekzKYaZZ3A8Z3adLGazacqc5t.exeQW7GgYOEuTcPjNLKdw2BB6tk.exeCo69YU3_Wi0ruwVUQzcMvRjV.exewrWAOWereWYNbEYIiIiTIZFY.exeiVQM0xMW6hzwPHNWW0vYsxOO.exedescription pid process target process PID 2440 wrote to memory of 5088 2440 File.exe WTuOmkgS9p7OFBa2ffmGdvpd.exe PID 2440 wrote to memory of 5088 2440 File.exe WTuOmkgS9p7OFBa2ffmGdvpd.exe PID 2440 wrote to memory of 5088 2440 File.exe WTuOmkgS9p7OFBa2ffmGdvpd.exe PID 2440 wrote to memory of 392 2440 File.exe rpR1tJFc_HKayyoOL1nqxoTf.exe PID 2440 wrote to memory of 392 2440 File.exe rpR1tJFc_HKayyoOL1nqxoTf.exe PID 2440 wrote to memory of 392 2440 File.exe rpR1tJFc_HKayyoOL1nqxoTf.exe PID 2440 wrote to memory of 4892 2440 File.exe gMSCcxDhzNL6HxnMVXXqmJTm.exe PID 2440 wrote to memory of 4892 2440 File.exe gMSCcxDhzNL6HxnMVXXqmJTm.exe PID 2440 wrote to memory of 4892 2440 File.exe gMSCcxDhzNL6HxnMVXXqmJTm.exe PID 2440 wrote to memory of 780 2440 File.exe ddD4e2ycv3SboVSm9XdEuAPz.exe PID 2440 wrote to memory of 780 2440 File.exe ddD4e2ycv3SboVSm9XdEuAPz.exe PID 2440 wrote to memory of 780 2440 File.exe ddD4e2ycv3SboVSm9XdEuAPz.exe PID 2440 wrote to memory of 2384 2440 File.exe j7iYfyZBqpehjD5wqHnYaxLi.exe PID 2440 wrote to memory of 2384 2440 File.exe j7iYfyZBqpehjD5wqHnYaxLi.exe PID 2440 wrote to memory of 2384 2440 File.exe j7iYfyZBqpehjD5wqHnYaxLi.exe PID 2440 wrote to memory of 4936 2440 File.exe Co69YU3_Wi0ruwVUQzcMvRjV.exe PID 2440 wrote to memory of 4936 2440 File.exe Co69YU3_Wi0ruwVUQzcMvRjV.exe PID 2440 wrote to memory of 4936 2440 File.exe Co69YU3_Wi0ruwVUQzcMvRjV.exe PID 2440 wrote to memory of 4644 2440 File.exe 464Kp2er6EuzXaB6O8__Bmh3.exe PID 2440 wrote to memory of 4644 2440 File.exe 464Kp2er6EuzXaB6O8__Bmh3.exe PID 2440 wrote to memory of 4644 2440 File.exe 464Kp2er6EuzXaB6O8__Bmh3.exe PID 2440 wrote to memory of 2456 2440 File.exe QW7GgYOEuTcPjNLKdw2BB6tk.exe PID 2440 wrote to memory of 2456 2440 File.exe QW7GgYOEuTcPjNLKdw2BB6tk.exe PID 2440 wrote to memory of 2456 2440 File.exe QW7GgYOEuTcPjNLKdw2BB6tk.exe PID 2440 wrote to memory of 2484 2440 File.exe 3P0vEfNdwMEJ8JDIdCIHJXhQ.exe PID 2440 wrote to memory of 2484 2440 File.exe 3P0vEfNdwMEJ8JDIdCIHJXhQ.exe PID 2440 wrote to memory of 2484 2440 File.exe 3P0vEfNdwMEJ8JDIdCIHJXhQ.exe PID 2440 wrote to memory of 4320 2440 File.exe kzKYaZZ3A8Z3adLGazacqc5t.exe PID 2440 wrote to memory of 4320 2440 File.exe kzKYaZZ3A8Z3adLGazacqc5t.exe PID 2440 wrote to memory of 4320 2440 File.exe kzKYaZZ3A8Z3adLGazacqc5t.exe PID 2440 wrote to memory of 1608 2440 File.exe ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe PID 2440 wrote to memory of 1608 2440 File.exe ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe PID 2440 wrote to memory of 1608 2440 File.exe ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe PID 2440 wrote to memory of 4884 2440 File.exe 4Tcll0aLHixecbhfywWN_3hE.exe PID 2440 wrote to memory of 4884 2440 File.exe 4Tcll0aLHixecbhfywWN_3hE.exe PID 2440 wrote to memory of 4884 2440 File.exe 4Tcll0aLHixecbhfywWN_3hE.exe PID 2440 wrote to memory of 908 2440 File.exe iVQM0xMW6hzwPHNWW0vYsxOO.exe PID 2440 wrote to memory of 908 2440 File.exe iVQM0xMW6hzwPHNWW0vYsxOO.exe PID 2440 wrote to memory of 908 2440 File.exe iVQM0xMW6hzwPHNWW0vYsxOO.exe PID 4320 wrote to memory of 4108 4320 kzKYaZZ3A8Z3adLGazacqc5t.exe attrib.exe PID 4320 wrote to memory of 4108 4320 kzKYaZZ3A8Z3adLGazacqc5t.exe attrib.exe PID 4320 wrote to memory of 4108 4320 kzKYaZZ3A8Z3adLGazacqc5t.exe attrib.exe PID 2456 wrote to memory of 3624 2456 QW7GgYOEuTcPjNLKdw2BB6tk.exe QW7GgYOEuTcPjNLKdw2BB6tk.exe PID 2456 wrote to memory of 3624 2456 QW7GgYOEuTcPjNLKdw2BB6tk.exe QW7GgYOEuTcPjNLKdw2BB6tk.exe PID 2456 wrote to memory of 3624 2456 QW7GgYOEuTcPjNLKdw2BB6tk.exe QW7GgYOEuTcPjNLKdw2BB6tk.exe PID 2440 wrote to memory of 868 2440 File.exe wrWAOWereWYNbEYIiIiTIZFY.exe PID 2440 wrote to memory of 868 2440 File.exe wrWAOWereWYNbEYIiIiTIZFY.exe PID 2440 wrote to memory of 868 2440 File.exe wrWAOWereWYNbEYIiIiTIZFY.exe PID 4936 wrote to memory of 1888 4936 Co69YU3_Wi0ruwVUQzcMvRjV.exe Co69YU3_Wi0ruwVUQzcMvRjV.exe PID 4936 wrote to memory of 1888 4936 Co69YU3_Wi0ruwVUQzcMvRjV.exe Co69YU3_Wi0ruwVUQzcMvRjV.exe PID 4936 wrote to memory of 1888 4936 Co69YU3_Wi0ruwVUQzcMvRjV.exe Co69YU3_Wi0ruwVUQzcMvRjV.exe PID 4936 wrote to memory of 1888 4936 Co69YU3_Wi0ruwVUQzcMvRjV.exe Co69YU3_Wi0ruwVUQzcMvRjV.exe PID 4936 wrote to memory of 1888 4936 Co69YU3_Wi0ruwVUQzcMvRjV.exe Co69YU3_Wi0ruwVUQzcMvRjV.exe PID 4936 wrote to memory of 1888 4936 Co69YU3_Wi0ruwVUQzcMvRjV.exe Co69YU3_Wi0ruwVUQzcMvRjV.exe PID 4936 wrote to memory of 1888 4936 Co69YU3_Wi0ruwVUQzcMvRjV.exe Co69YU3_Wi0ruwVUQzcMvRjV.exe PID 4936 wrote to memory of 1888 4936 Co69YU3_Wi0ruwVUQzcMvRjV.exe Co69YU3_Wi0ruwVUQzcMvRjV.exe PID 868 wrote to memory of 1656 868 wrWAOWereWYNbEYIiIiTIZFY.exe wrWAOWereWYNbEYIiIiTIZFY.tmp PID 868 wrote to memory of 1656 868 wrWAOWereWYNbEYIiIiTIZFY.exe wrWAOWereWYNbEYIiIiTIZFY.tmp PID 868 wrote to memory of 1656 868 wrWAOWereWYNbEYIiIiTIZFY.exe wrWAOWereWYNbEYIiIiTIZFY.tmp PID 908 wrote to memory of 4676 908 iVQM0xMW6hzwPHNWW0vYsxOO.exe iVQM0xMW6hzwPHNWW0vYsxOO.exe PID 908 wrote to memory of 4676 908 iVQM0xMW6hzwPHNWW0vYsxOO.exe iVQM0xMW6hzwPHNWW0vYsxOO.exe PID 908 wrote to memory of 4676 908 iVQM0xMW6hzwPHNWW0vYsxOO.exe iVQM0xMW6hzwPHNWW0vYsxOO.exe PID 908 wrote to memory of 4676 908 iVQM0xMW6hzwPHNWW0vYsxOO.exe iVQM0xMW6hzwPHNWW0vYsxOO.exe PID 908 wrote to memory of 4676 908 iVQM0xMW6hzwPHNWW0vYsxOO.exe iVQM0xMW6hzwPHNWW0vYsxOO.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 4108 attrib.exe 3992 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"1⤵
- DcRat
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\ddD4e2ycv3SboVSm9XdEuAPz.exe"C:\Users\Admin\Pictures\Adobe Films\ddD4e2ycv3SboVSm9XdEuAPz.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" rXmW34KJ.LRS -S3⤵
- Loads dropped DLL
-
C:\Users\Admin\Pictures\Adobe Films\gMSCcxDhzNL6HxnMVXXqmJTm.exe"C:\Users\Admin\Pictures\Adobe Films\gMSCcxDhzNL6HxnMVXXqmJTm.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 13043⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\rpR1tJFc_HKayyoOL1nqxoTf.exe"C:\Users\Admin\Pictures\Adobe Films\rpR1tJFc_HKayyoOL1nqxoTf.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 12963⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\WTuOmkgS9p7OFBa2ffmGdvpd.exe"C:\Users\Admin\Pictures\Adobe Films\WTuOmkgS9p7OFBa2ffmGdvpd.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
-
C:\Users\Admin\Documents\e45FA1pVhoN9KLpoCUw0wmUg.exe"C:\Users\Admin\Documents\e45FA1pVhoN9KLpoCUw0wmUg.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\2lGlTeEtwGzBFxh1FiYVIJjp.exe"C:\Users\Admin\Pictures\Adobe Films\2lGlTeEtwGzBFxh1FiYVIJjp.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\I6r04HRT.CPL",5⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\I6r04HRT.CPL",6⤵
- Loads dropped DLL
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\I6r04HRT.CPL",7⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\I6r04HRT.CPL",8⤵
- Loads dropped DLL
-
C:\Users\Admin\Pictures\Adobe Films\1R4CefygFrnARhCHGX6nRh4m.exe"C:\Users\Admin\Pictures\Adobe Films\1R4CefygFrnARhCHGX6nRh4m.exe"4⤵
-
C:\Users\Admin\Pictures\Adobe Films\1R4CefygFrnARhCHGX6nRh4m.exe"C:\Users\Admin\Pictures\Adobe Films\1R4CefygFrnARhCHGX6nRh4m.exe" H5⤵
-
C:\Users\Admin\Pictures\Adobe Films\bUx8Ck4YdIpnpqxIOlDAZmJ7.exe"C:\Users\Admin\Pictures\Adobe Films\bUx8Ck4YdIpnpqxIOlDAZmJ7.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\attrib.exeattrib -?5⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Inebriarti.htm & ping -n 5 localhost5⤵
-
C:\Windows\SysWOW64\cmd.execmd6⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"7⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"7⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^DPPUlpMDoxxhVrUIPtlDSFKoNmARJTULbxHxsooLczeCBvhhRbTNaFvXtGiKJUTgAJQAcAsHWmomCiGsjjZjquaSYKfKqbwAmNeS$" Strette.htm7⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Tal.exe.pifTal.exe.pif H7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Tal.exe.pifC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Tal.exe.pif8⤵
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 57⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\Pictures\Adobe Films\tl2P_EnkKoIRM0HqSvxdk2wr.exe"C:\Users\Admin\Pictures\Adobe Films\tl2P_EnkKoIRM0HqSvxdk2wr.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "tl2P_EnkKoIRM0HqSvxdk2wr.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\tl2P_EnkKoIRM0HqSvxdk2wr.exe" & exit5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "tl2P_EnkKoIRM0HqSvxdk2wr.exe" /f6⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 60 -s 13605⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\bmhAq0hcajELIhNjMHZkiAcz.exe"C:\Users\Admin\Pictures\Adobe Films\bmhAq0hcajELIhNjMHZkiAcz.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSCEC5.tmp\Install.exe.\Install.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSD433.tmp\Install.exe.\Install.exe /S /site_id "525403"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"7⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&8⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:329⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:649⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"7⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&8⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:329⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:649⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gzxiFBJTW" /SC once /ST 05:45:19 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="7⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gzxiFBJTW"7⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gzxiFBJTW"7⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bamNpdvhtkzLwlCraC" /SC once /ST 08:58:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\XPKruKcwkyRJuFApW\EdLqPAaTytMGRMX\yDetIJX.exe\" bH /site_id 525403 /S" /V1 /F7⤵
- DcRat
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\0ayuVfZm90nsDXlH27gD56VO.exe"C:\Users\Admin\Pictures\Adobe Films\0ayuVfZm90nsDXlH27gD56VO.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\GOTLQpLlIsdyDe4S9owceBHn.exe"C:\Users\Admin\Pictures\Adobe Films\GOTLQpLlIsdyDe4S9owceBHn.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-D7RQ4.tmp\GOTLQpLlIsdyDe4S9owceBHn.tmp"C:\Users\Admin\AppData\Local\Temp\is-D7RQ4.tmp\GOTLQpLlIsdyDe4S9owceBHn.tmp" /SL5="$70246,140559,56832,C:\Users\Admin\Pictures\Adobe Films\GOTLQpLlIsdyDe4S9owceBHn.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-6E88M.tmp\3alouch.exe"C:\Users\Admin\AppData\Local\Temp\is-6E88M.tmp\3alouch.exe" /S /UID=Irecch46⤵
-
C:\Users\Admin\AppData\Local\Temp\0c-16694-4fa-3728b-28c57a1f20529\ZHaricalycy.exe"C:\Users\Admin\AppData\Local\Temp\0c-16694-4fa-3728b-28c57a1f20529\ZHaricalycy.exe"7⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\Pictures\Adobe Films\dRLlEJrfrNQ46LI8Zt0exfpg.exe"C:\Users\Admin\Pictures\Adobe Films\dRLlEJrfrNQ46LI8Zt0exfpg.exe"4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5896 -s 6965⤵
- Program crash
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- DcRat
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\Co69YU3_Wi0ruwVUQzcMvRjV.exe"C:\Users\Admin\Pictures\Adobe Films\Co69YU3_Wi0ruwVUQzcMvRjV.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\Co69YU3_Wi0ruwVUQzcMvRjV.exe"C:\Users\Admin\Pictures\Adobe Films\Co69YU3_Wi0ruwVUQzcMvRjV.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\j7iYfyZBqpehjD5wqHnYaxLi.exe"C:\Users\Admin\Pictures\Adobe Films\j7iYfyZBqpehjD5wqHnYaxLi.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
-
C:\ProgramData\00617867642241074644.exe"C:\ProgramData\00617867642241074644.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\62eca45584\bguuwe.exe"C:\Users\Admin\AppData\Local\Temp\62eca45584\bguuwe.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\62eca45584\5⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\62eca45584\6⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bguuwe.exe /TR "C:\Users\Admin\AppData\Local\Temp\62eca45584\bguuwe.exe" /F5⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\110809d565579c\cred.dll, Main5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 12284⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im j7iYfyZBqpehjD5wqHnYaxLi.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\j7iYfyZBqpehjD5wqHnYaxLi.exe" & del C:\ProgramData\*.dll & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im j7iYfyZBqpehjD5wqHnYaxLi.exe /f4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 16523⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\4Tcll0aLHixecbhfywWN_3hE.exe"C:\Users\Admin\Pictures\Adobe Films\4Tcll0aLHixecbhfywWN_3hE.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 4Tcll0aLHixecbhfywWN_3hE.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\4Tcll0aLHixecbhfywWN_3hE.exe" & del C:\ProgramData\*.dll & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 4Tcll0aLHixecbhfywWN_3hE.exe /f4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 17883⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe"C:\Users\Admin\Pictures\Adobe Films\ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe"C:\Users\Admin\Pictures\Adobe Films\ZWGcYtRUGEhgsgAy6Z1gOtWJ.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
-
C:\Windows\SysWOW64\sc.exesc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe5⤵
-
C:\Users\Admin\Pictures\Adobe Films\kzKYaZZ3A8Z3adLGazacqc5t.exe"C:\Users\Admin\Pictures\Adobe Films\kzKYaZZ3A8Z3adLGazacqc5t.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib -?3⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Inebriarti.htm & ping -n 5 localhost3⤵
-
C:\Windows\SysWOW64\cmd.execmd4⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"5⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"5⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^DPPUlpMDoxxhVrUIPtlDSFKoNmARJTULbxHxsooLczeCBvhhRbTNaFvXtGiKJUTgAJQAcAsHWmomCiGsjjZjquaSYKfKqbwAmNeS$" Strette.htm5⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tal.exe.pifTal.exe.pif H5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tal.exe.pifC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tal.exe.pif6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\Pictures\Adobe Films\QW7GgYOEuTcPjNLKdw2BB6tk.exe"C:\Users\Admin\Pictures\Adobe Films\QW7GgYOEuTcPjNLKdw2BB6tk.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\QW7GgYOEuTcPjNLKdw2BB6tk.exe"C:\Users\Admin\Pictures\Adobe Films\QW7GgYOEuTcPjNLKdw2BB6tk.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\Pictures\Adobe Films\3P0vEfNdwMEJ8JDIdCIHJXhQ.exe"C:\Users\Admin\Pictures\Adobe Films\3P0vEfNdwMEJ8JDIdCIHJXhQ.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\464Kp2er6EuzXaB6O8__Bmh3.exe"C:\Users\Admin\Pictures\Adobe Films\464Kp2er6EuzXaB6O8__Bmh3.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "464Kp2er6EuzXaB6O8__Bmh3.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\464Kp2er6EuzXaB6O8__Bmh3.exe" & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "464Kp2er6EuzXaB6O8__Bmh3.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 13643⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\iVQM0xMW6hzwPHNWW0vYsxOO.exe"C:\Users\Admin\Pictures\Adobe Films\iVQM0xMW6hzwPHNWW0vYsxOO.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\iVQM0xMW6hzwPHNWW0vYsxOO.exe"C:\Users\Admin\Pictures\Adobe Films\iVQM0xMW6hzwPHNWW0vYsxOO.exe"3⤵
- DcRat
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies system certificate store
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\71372fc4-7460-482f-8839-218ea6fcb8f2" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
-
C:\Users\Admin\Pictures\Adobe Films\iVQM0xMW6hzwPHNWW0vYsxOO.exe"C:\Users\Admin\Pictures\Adobe Films\iVQM0xMW6hzwPHNWW0vYsxOO.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\iVQM0xMW6hzwPHNWW0vYsxOO.exe"C:\Users\Admin\Pictures\Adobe Films\iVQM0xMW6hzwPHNWW0vYsxOO.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\1efc2567-da65-4d62-a150-83707035f44f\build2.exe"C:\Users\Admin\AppData\Local\1efc2567-da65-4d62-a150-83707035f44f\build2.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\1efc2567-da65-4d62-a150-83707035f44f\build2.exe"C:\Users\Admin\AppData\Local\1efc2567-da65-4d62-a150-83707035f44f\build2.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Users\Admin\Pictures\Adobe Films\wrWAOWereWYNbEYIiIiTIZFY.exe"C:\Users\Admin\Pictures\Adobe Films\wrWAOWereWYNbEYIiIiTIZFY.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-PUOP7.tmp\wrWAOWereWYNbEYIiIiTIZFY.tmp"C:\Users\Admin\AppData\Local\Temp\is-PUOP7.tmp\wrWAOWereWYNbEYIiIiTIZFY.tmp" /SL5="$20440,140559,56832,C:\Users\Admin\Pictures\Adobe Films\wrWAOWereWYNbEYIiIiTIZFY.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-E07MG.tmp\3alouch.exe"C:\Users\Admin\AppData\Local\Temp\is-E07MG.tmp\3alouch.exe" /S /UID=Irecch44⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\4d-d8e63-7e1-9dc88-13e852a90f1b5\Vyshitarosho.exe"C:\Users\Admin\AppData\Local\Temp\4d-d8e63-7e1-9dc88-13e852a90f1b5\Vyshitarosho.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e66⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9b3446f8,0x7fff9b344708,0x7fff9b3447187⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:27⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:37⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:87⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:17⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:17⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5124 /prefetch:87⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:17⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5232 /prefetch:87⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:17⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:17⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:87⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings7⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7703e5460,0x7ff7703e5470,0x7ff7703e54808⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:87⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:17⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:17⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2640 /prefetch:17⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6396340708683334275,17805182005758140119,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:17⤵
-
C:\Users\Admin\AppData\Local\Temp\0f-791f7-d65-9bc8b-a0ac435e4e1a9\Lipodaevoxy.exe"C:\Users\Admin\AppData\Local\Temp\0f-791f7-d65-9bc8b-a0ac435e4e1a9\Lipodaevoxy.exe"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\7-Zip\ZSTXEAQAQM\irecord.exe"C:\Program Files\7-Zip\ZSTXEAQAQM\irecord.exe" /VERYSILENT5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-A9D3C.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-A9D3C.tmp\irecord.tmp" /SL5="$104BE,5808768,66560,C:\Program Files\7-Zip\ZSTXEAQAQM\irecord.exe" /VERYSILENT6⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\i-record\I-Record.exe"C:\Program Files (x86)\i-record\I-Record.exe" -silent -desktopShortcut -programMenu7⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 21242⤵
- Program crash
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2440 -ip 24401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4644 -ip 46441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 392 -ip 3921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4892 -ip 48921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2384 -ip 23841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1288 -ip 12881⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4884 -ip 48841⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe"C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe" --nt-service -f "C:\Users\Admin\AppData\Local\Temp\csrss\tor\torrc" --Log "notice file C:\Users\Admin\AppData\Local\Temp\csrss\tor\log.txt"1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5132 -s 9722⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\62eca45584\bguuwe.exeC:\Users\Admin\AppData\Local\Temp\62eca45584\bguuwe.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5312 -s 4842⤵
- Program crash
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5176 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5176 -ip 51761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 60 -ip 601⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 424 -p 5896 -ip 58961⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\4F7E.exeC:\Users\Admin\AppData\Local\Temp\4F7E.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 5312 -ip 53121⤵
-
C:\Users\Admin\AppData\Local\Temp\5F1F.exeC:\Users\Admin\AppData\Local\Temp\5F1F.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\5F1F.exeC:\Users\Admin\AppData\Local\Temp\5F1F.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\5F1F.exe"C:\Users\Admin\AppData\Local\Temp\5F1F.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\5F1F.exe"C:\Users\Admin\AppData\Local\Temp\5F1F.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\7a66cbb1-ec7b-45b6-a698-77c790a7c003\build2.exe"C:\Users\Admin\AppData\Local\7a66cbb1-ec7b-45b6-a698-77c790a7c003\build2.exe"5⤵
-
C:\Users\Admin\AppData\Local\7a66cbb1-ec7b-45b6-a698-77c790a7c003\build2.exe"C:\Users\Admin\AppData\Local\7a66cbb1-ec7b-45b6-a698-77c790a7c003\build2.exe"6⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\73FF.dll1⤵
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\73FF.dll2⤵
-
C:\Users\Admin\AppData\Local\Temp\8064.exeC:\Users\Admin\AppData\Local\Temp\8064.exe1⤵
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 5922⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\822A.exeC:\Users\Admin\AppData\Local\Temp\822A.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3316 -ip 33161⤵
-
C:\Users\Admin\AppData\Local\Temp\96EC.exeC:\Users\Admin\AppData\Local\Temp\96EC.exe1⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff81784f50,0x7fff81784f60,0x7fff81784f703⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1700,6551434391176492533,7655211866362565852,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1808 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1700,6551434391176492533,7655211866362565852,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1712 /prefetch:23⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1700,6551434391176492533,7655211866362565852,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2316 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1700,6551434391176492533,7655211866362565852,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2868 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1700,6551434391176492533,7655211866362565852,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2852 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1700,6551434391176492533,7655211866362565852,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1700,6551434391176492533,7655211866362565852,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3732 /prefetch:13⤵
-
C:\Users\Admin\AppData\Local\Temp\A332.exeC:\Users\Admin\AppData\Local\Temp\A332.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\is-3AB92.tmp\A332.tmp"C:\Users\Admin\AppData\Local\Temp\is-3AB92.tmp\A332.tmp" /SL5="$305B0,140559,56832,C:\Users\Admin\AppData\Local\Temp\A332.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-E2SRR.tmp\3alouch.exe"C:\Users\Admin\AppData\Local\Temp\is-E2SRR.tmp\3alouch.exe" /S /UID=lylal2203⤵
-
C:\Users\Admin\AppData\Local\Temp\21-dc743-315-170b3-61b94ab03903b\Walaetycyzhy.exe"C:\Users\Admin\AppData\Local\Temp\21-dc743-315-170b3-61b94ab03903b\Walaetycyzhy.exe"4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e65⤵
-
C:\Users\Admin\AppData\Local\Temp\7a-bcfd4-829-59e98-b1b605784e9d7\Loduhyliwu.exe"C:\Users\Admin\AppData\Local\Temp\7a-bcfd4-829-59e98-b1b605784e9d7\Loduhyliwu.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\GMCYKWUVWA\irecord.exe"C:\Users\Admin\AppData\Local\Temp\GMCYKWUVWA\irecord.exe" /VERYSILENT4⤵
-
C:\Users\Admin\AppData\Local\Temp\is-RVGOT.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-RVGOT.tmp\irecord.tmp" /SL5="$70470,5808768,66560,C:\Users\Admin\AppData\Local\Temp\GMCYKWUVWA\irecord.exe" /VERYSILENT5⤵
-
C:\Program Files (x86)\i-record\I-Record.exe"C:\Program Files (x86)\i-record\I-Record.exe" -silent -desktopShortcut -programMenu6⤵
-
C:\Users\Admin\AppData\Local\Temp\AB8F.exeC:\Users\Admin\AppData\Local\Temp\AB8F.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\AB8F.exeC:\Users\Admin\AppData\Local\Temp\AB8F.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 8842⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\XPKruKcwkyRJuFApW\EdLqPAaTytMGRMX\yDetIJX.exeC:\Users\Admin\AppData\Local\Temp\XPKruKcwkyRJuFApW\EdLqPAaTytMGRMX\yDetIJX.exe bH /site_id 525403 /S1⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QwrkXrSOGBVCC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QwrkXrSOGBVCC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\iNyCImZcmuwfbRRHWCR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\iNyCImZcmuwfbRRHWCR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qtzXYlPxPmUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qtzXYlPxPmUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\uyPuAlXAcIBU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\uyPuAlXAcIBU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wKAtYsCOU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wKAtYsCOU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\OsVMcSWGRXGXAxVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\OsVMcSWGRXGXAxVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\XPKruKcwkyRJuFApW\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\XPKruKcwkyRJuFApW\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\IIxDORIMmvvtwMVt\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\IIxDORIMmvvtwMVt\" /t REG_DWORD /d 0 /reg:64;"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QwrkXrSOGBVCC" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QwrkXrSOGBVCC" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QwrkXrSOGBVCC" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iNyCImZcmuwfbRRHWCR" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iNyCImZcmuwfbRRHWCR" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qtzXYlPxPmUn" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qtzXYlPxPmUn" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uyPuAlXAcIBU2" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uyPuAlXAcIBU2" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wKAtYsCOU" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wKAtYsCOU" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\OsVMcSWGRXGXAxVB /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\OsVMcSWGRXGXAxVB /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\XPKruKcwkyRJuFApW /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\XPKruKcwkyRJuFApW /t REG_DWORD /d 0 /reg:643⤵
- Drops file in Drivers directory
- Executes dropped EXE
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\IIxDORIMmvvtwMVt /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\IIxDORIMmvvtwMVt /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gADVgHUXR" /SC once /ST 04:32:56 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gADVgHUXR"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 388 -ip 3881⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9b3446f8,0x7fff9b344708,0x7fff9b3447181⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa38d7855 /state1:0x41c64e6d1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Hidden Files and Directories
1Defense Evasion
Modify Registry
3Disabling Security Tools
1File Permissions Modification
1Install Root Certificate
1Hidden Files and Directories
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\VCRUNTIME140.dllFilesize
81KB
MD52ebf45da71bd8ef910a7ece7e4647173
SHA14ecc9c2d4abe2180d345f72c65758ef4791d6f06
SHA256cf39e1e81f57f42f4d60abc1d30ecf7d773e576157aa88bbc1d672bf5ad9bb8b
SHA512a5d3626553731f7dc70f63d086bd9367ea2c06ad8671e2578e1340af4c44189ecb46a51c88d64a4b082ce68160390c3f8d580dde3984cd254a408f1ef5b28457
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\VCRUNTIME140.dllFilesize
81KB
MD52ebf45da71bd8ef910a7ece7e4647173
SHA14ecc9c2d4abe2180d345f72c65758ef4791d6f06
SHA256cf39e1e81f57f42f4d60abc1d30ecf7d773e576157aa88bbc1d672bf5ad9bb8b
SHA512a5d3626553731f7dc70f63d086bd9367ea2c06ad8671e2578e1340af4c44189ecb46a51c88d64a4b082ce68160390c3f8d580dde3984cd254a408f1ef5b28457
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_asyncio.pydFilesize
55KB
MD5a2fff5c11f404d795e7d2b4907ed4485
SHA13bf8de6c4870b234bfcaea00098894d85c8545de
SHA256ed7830d504d726ce42b3b7a1321f39c8e29d1ebad7b64632e45b712f0c47e189
SHA5120cd1329989946cfbcad2fd28b355f3bf3a731f5f8da39e3a0ddf160a7aac1bd23046fb902a6b27499026641929ddcef58f80ea3c0bfc58cb25ee10a0b39bdf02
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_asyncio.pydFilesize
55KB
MD5a2fff5c11f404d795e7d2b4907ed4485
SHA13bf8de6c4870b234bfcaea00098894d85c8545de
SHA256ed7830d504d726ce42b3b7a1321f39c8e29d1ebad7b64632e45b712f0c47e189
SHA5120cd1329989946cfbcad2fd28b355f3bf3a731f5f8da39e3a0ddf160a7aac1bd23046fb902a6b27499026641929ddcef58f80ea3c0bfc58cb25ee10a0b39bdf02
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_bz2.pydFilesize
76KB
MD52002b2cc8f20ac05de6de7772e18f6a7
SHA1b24339e18e8fa41f9f33005a328711f0a1f0f42d
SHA256645665cf3338e7665e314f53fbbcb3c5d9174e90f3bf65ddbdc9c0cb24a5d40d
SHA512253d0c005758fcb9e0980a01016a34073e7cdffb6253a2ba3d65a2bb82764638f4bd63d3f91a24effd5db60db59a8d28155e7d6892d5cc77c686f74bf0b05d0a
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_bz2.pydFilesize
76KB
MD52002b2cc8f20ac05de6de7772e18f6a7
SHA1b24339e18e8fa41f9f33005a328711f0a1f0f42d
SHA256645665cf3338e7665e314f53fbbcb3c5d9174e90f3bf65ddbdc9c0cb24a5d40d
SHA512253d0c005758fcb9e0980a01016a34073e7cdffb6253a2ba3d65a2bb82764638f4bd63d3f91a24effd5db60db59a8d28155e7d6892d5cc77c686f74bf0b05d0a
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_ctypes.pydFilesize
113KB
MD5c827a20fc5f1f4e0ef9431f29ebf03b4
SHA1ee36cb853d79b0ba6b4e99b1ef2fbae840c5489d
SHA256d500cff28678eced1fc4b3aeabecc0f3b30de735fdefe90855536bc29fc2cb4d
SHA512d40b816cde6bdf6e46c379674c76f0991268bd1617b96a4e4f944b80e12692ce410e67e006b50b6a8cfaef96aacc6cb806280bac3aa18ee8690669702d01065c
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_ctypes.pydFilesize
113KB
MD5c827a20fc5f1f4e0ef9431f29ebf03b4
SHA1ee36cb853d79b0ba6b4e99b1ef2fbae840c5489d
SHA256d500cff28678eced1fc4b3aeabecc0f3b30de735fdefe90855536bc29fc2cb4d
SHA512d40b816cde6bdf6e46c379674c76f0991268bd1617b96a4e4f944b80e12692ce410e67e006b50b6a8cfaef96aacc6cb806280bac3aa18ee8690669702d01065c
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_hashlib.pydFilesize
37KB
MD5f9799b167c3e4ffee4629b4a4e2606f2
SHA137619858375b684e63bffb1b82cd8218a7b8d93d
SHA25602dd924d4ebfbb8b5b0b66b6e6bb2388fccdad64d0493854a5443018ad5d1543
SHA5121f273bb5d5d61970143b94696b14887faa5ed1d50742eccec32dbd87446d696ff683053542c3be13d6c00597e3631eb1366abb6f145d8cc14d653d542893001b
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_hashlib.pydFilesize
37KB
MD5f9799b167c3e4ffee4629b4a4e2606f2
SHA137619858375b684e63bffb1b82cd8218a7b8d93d
SHA25602dd924d4ebfbb8b5b0b66b6e6bb2388fccdad64d0493854a5443018ad5d1543
SHA5121f273bb5d5d61970143b94696b14887faa5ed1d50742eccec32dbd87446d696ff683053542c3be13d6c00597e3631eb1366abb6f145d8cc14d653d542893001b
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_lzma.pydFilesize
154KB
MD538c434afb2a885a95999903977dc3624
SHA157557e7d8de16d5a83598b00a854c1dde952ca19
SHA256bfe6e288b2d93905f5cbb6d74e9c0fc37145b9225db6d1f00c0f69eb45afd051
SHA5123e59b79c47cb022d7acec0af164c0225cd83588d5e7f8ca3e8a5dfae27510646391a1b08d86d5ee0b39d1b6bf08409d3758488df3c8cc4d458bed9faab7686e8
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_lzma.pydFilesize
154KB
MD538c434afb2a885a95999903977dc3624
SHA157557e7d8de16d5a83598b00a854c1dde952ca19
SHA256bfe6e288b2d93905f5cbb6d74e9c0fc37145b9225db6d1f00c0f69eb45afd051
SHA5123e59b79c47cb022d7acec0af164c0225cd83588d5e7f8ca3e8a5dfae27510646391a1b08d86d5ee0b39d1b6bf08409d3758488df3c8cc4d458bed9faab7686e8
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_overlapped.pydFilesize
38KB
MD509716bce87ed2bf7e5a1f19952305e5c
SHA1e774cb9cbca9f5135728837941e35415d3ae342b
SHA256f4a27f4e242d788fcb1f5dd873608c72cdfc0799358364420ecea1a7e52cc2b0
SHA512070d4e5a3c3c06402f190093db6d30ae55951bff904a4a7bf71db9e467f20bc6302280fb7c26548544c16e46f75ca3fd7e4ad044a21818f2fef19af09ee389a8
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_overlapped.pydFilesize
38KB
MD509716bce87ed2bf7e5a1f19952305e5c
SHA1e774cb9cbca9f5135728837941e35415d3ae342b
SHA256f4a27f4e242d788fcb1f5dd873608c72cdfc0799358364420ecea1a7e52cc2b0
SHA512070d4e5a3c3c06402f190093db6d30ae55951bff904a4a7bf71db9e467f20bc6302280fb7c26548544c16e46f75ca3fd7e4ad044a21818f2fef19af09ee389a8
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_socket.pydFilesize
67KB
MD56b59705d8ac80437dd81260443912532
SHA1d206d9974167eb60fb201f2b5bf9534167f9fb08
SHA25662ed631a6ad09e96b4b6f4566c2afc710b3493795edee4cc14a9c9de88230648
SHA512fa44386b9a305a1221ed79e1ca6d7edf7a8e288836b77cdca8793c82ebf74a0f28a3fc7ae49e14e87029642d81773d960c160c8b3bcb73e8a4ec9a2fd1cdc7fd
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_socket.pydFilesize
67KB
MD56b59705d8ac80437dd81260443912532
SHA1d206d9974167eb60fb201f2b5bf9534167f9fb08
SHA25662ed631a6ad09e96b4b6f4566c2afc710b3493795edee4cc14a9c9de88230648
SHA512fa44386b9a305a1221ed79e1ca6d7edf7a8e288836b77cdca8793c82ebf74a0f28a3fc7ae49e14e87029642d81773d960c160c8b3bcb73e8a4ec9a2fd1cdc7fd
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_ssl.pydFilesize
139KB
MD5e28ee2be9b3a27371685fbe8998e78f1
SHA1fa01c1c07a206082ef7bf637be4ce163ff99e4ac
SHA25680041ce67e372f1b44b501334590c659154870286d423c19f005382039b79476
SHA512708e4069bafa9c5fb0d324e60cc81b1a3a442113f84a4e832a97b4196bee0a4a91f2e13239c91757512e1b42bb23166360ad44a5dce68316799aafc91e5bba04
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\_ssl.pydFilesize
139KB
MD5e28ee2be9b3a27371685fbe8998e78f1
SHA1fa01c1c07a206082ef7bf637be4ce163ff99e4ac
SHA25680041ce67e372f1b44b501334590c659154870286d423c19f005382039b79476
SHA512708e4069bafa9c5fb0d324e60cc81b1a3a442113f84a4e832a97b4196bee0a4a91f2e13239c91757512e1b42bb23166360ad44a5dce68316799aafc91e5bba04
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\base_library.zipFilesize
762KB
MD5bf37929f73fd68293b527c81e9c07783
SHA17a9e3d00d6b8df4ba32da034775fcfdf744f0bd7
SHA2566634df5aa852c0edf0722176c6d0d8b5d589c737189ab50b8f8c3dcfcc4c29a6
SHA512fc38d7e3f1fbe0208a275d7168c4ba3c468945d775169d753e05995e13d7f2b7cd66a5a413fb96c61889ad1e796f3b5b45080396a742ed440ef54303917d22a3
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\libcrypto-1_1.dllFilesize
2.1MB
MD5aad424a6a0ae6d6e7d4c50a1d96a17fc
SHA14336017ae32a48315afe1b10ff14d6159c7923bc
SHA2563a2dba6098e77e36a9d20c647349a478cb0149020f909665d209f548dfa71377
SHA512aa4b74b7971cb774e4ae847a226cae9d125fadc7cde4f997b7564dff4d71b590dcbc06a7103451b72b2afe3517ab46d3be099c3620c3d591ccbd1839f0e8f94a
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\libcrypto-1_1.dllFilesize
2.1MB
MD5aad424a6a0ae6d6e7d4c50a1d96a17fc
SHA14336017ae32a48315afe1b10ff14d6159c7923bc
SHA2563a2dba6098e77e36a9d20c647349a478cb0149020f909665d209f548dfa71377
SHA512aa4b74b7971cb774e4ae847a226cae9d125fadc7cde4f997b7564dff4d71b590dcbc06a7103451b72b2afe3517ab46d3be099c3620c3d591ccbd1839f0e8f94a
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\libffi-7.dllFilesize
28KB
MD5bc20614744ebf4c2b8acd28d1fe54174
SHA1665c0acc404e13a69800fae94efd69a41bdda901
SHA2560c7ec6de19c246a23756b8550e6178ac2394b1093e96d0f43789124149486f57
SHA5120c473e7070c72d85ae098d208b8d128b50574abebba874dda2a7408aea2aabc6c4b9018801416670af91548c471b7dd5a709a7b17e3358b053c37433665d3f6b
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\libffi-7.dllFilesize
28KB
MD5bc20614744ebf4c2b8acd28d1fe54174
SHA1665c0acc404e13a69800fae94efd69a41bdda901
SHA2560c7ec6de19c246a23756b8550e6178ac2394b1093e96d0f43789124149486f57
SHA5120c473e7070c72d85ae098d208b8d128b50574abebba874dda2a7408aea2aabc6c4b9018801416670af91548c471b7dd5a709a7b17e3358b053c37433665d3f6b
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\libssl-1_1.dllFilesize
525KB
MD5697766aba55f44bbd896cbd091a72b55
SHA1d36492be46ea63ce784e4c1b0103ba21214a76fb
SHA25644a228b3646eb3575abd5cbcb079e018de11ca6b838a29e4391893de69e0cf4b
SHA512206957347540f1356d805bf4a2d062927e190481aadc105c3012e69623149850a846503fca30fc38298f74d7f8f69761fddd0aa7f5e31fedb1fa5e5c9de56e9d
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\libssl-1_1.dllFilesize
525KB
MD5697766aba55f44bbd896cbd091a72b55
SHA1d36492be46ea63ce784e4c1b0103ba21214a76fb
SHA25644a228b3646eb3575abd5cbcb079e018de11ca6b838a29e4391893de69e0cf4b
SHA512206957347540f1356d805bf4a2d062927e190481aadc105c3012e69623149850a846503fca30fc38298f74d7f8f69761fddd0aa7f5e31fedb1fa5e5c9de56e9d
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\pyrogram.cp38-win32.pydFilesize
350KB
MD590df5360a7ccaefef170129c641f5351
SHA1389a239eb2f91161b2dc4d879ee834c12cc0054c
SHA256947ef90d8734177baf445eaff7da148b3726ab2e4156bf4a7ae19986e8f5596b
SHA512c7caab04be88e17c20198f70de91e0781e41aed1f6fa2f4af4b74988c7ee9ce91a89cd72e40bda19ca99b15e28dcfdf4edc628e909c004e7e122044a450c3d33
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\pyrogram.cp38-win32.pydFilesize
350KB
MD590df5360a7ccaefef170129c641f5351
SHA1389a239eb2f91161b2dc4d879ee834c12cc0054c
SHA256947ef90d8734177baf445eaff7da148b3726ab2e4156bf4a7ae19986e8f5596b
SHA512c7caab04be88e17c20198f70de91e0781e41aed1f6fa2f4af4b74988c7ee9ce91a89cd72e40bda19ca99b15e28dcfdf4edc628e909c004e7e122044a450c3d33
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\python38.dllFilesize
3.9MB
MD5c512c6ea9f12847d991ceed6d94bc871
SHA152e1ef51674f382263b4d822b8ffa5737755f7e7
SHA25679545f4f3a658865f510ab7df96516f660e6e18fe12cadaaec3002b51fc29ef6
SHA512e023a353d6f0267f367276344df5f2fdbc208f916ca87fa5b4310ea7edcac0a24837c23ab671fb4b15b109915dfd0e57fbe07593a764b3219312ed5737052822
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\python38.dllFilesize
3.9MB
MD5c512c6ea9f12847d991ceed6d94bc871
SHA152e1ef51674f382263b4d822b8ffa5737755f7e7
SHA25679545f4f3a658865f510ab7df96516f660e6e18fe12cadaaec3002b51fc29ef6
SHA512e023a353d6f0267f367276344df5f2fdbc208f916ca87fa5b4310ea7edcac0a24837c23ab671fb4b15b109915dfd0e57fbe07593a764b3219312ed5737052822
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\select.pydFilesize
23KB
MD5441299529d0542d828bafe9ac69c4197
SHA1da31b9afb68ba6e2d40bbc8e1e25980c2afeb1b3
SHA256973f851dfaf98617b3eb6fa38befeb7ede49bd993408917e207dc7ea399de326
SHA5129f0fb359a4291d47b8dc0ec789c319637dde0f09e59408c4d7fd9265e51c978aa3ba7ea51ca9524833814bca9e7978d9817658655ee339191634d4ae5f426ddc
-
C:\Users\Admin\AppData\Local\Temp\_MEI24562\select.pydFilesize
23KB
MD5441299529d0542d828bafe9ac69c4197
SHA1da31b9afb68ba6e2d40bbc8e1e25980c2afeb1b3
SHA256973f851dfaf98617b3eb6fa38befeb7ede49bd993408917e207dc7ea399de326
SHA5129f0fb359a4291d47b8dc0ec789c319637dde0f09e59408c4d7fd9265e51c978aa3ba7ea51ca9524833814bca9e7978d9817658655ee339191634d4ae5f426ddc
-
C:\Users\Admin\AppData\Local\Temp\is-E07MG.tmp\idp.dllFilesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
C:\Users\Admin\AppData\Local\Temp\is-PUOP7.tmp\wrWAOWereWYNbEYIiIiTIZFY.tmpFilesize
694KB
MD5ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\Pictures\Adobe Films\3P0vEfNdwMEJ8JDIdCIHJXhQ.exeFilesize
288KB
MD5ac68b833d2d8b1440080b76972eea8bf
SHA1d02ea6ec0f0dacef96e2c0bd93d28fe55b5a48c4
SHA256237d3850ecee23eda79b8f202eddbae13b547dfca46c98b39f407f55603865f9
SHA5123caadbcd6199d44e144887daa3f8fdc652d6661070a2e7fd8f54fac0a45c7bc23c3924411c3a45b7f01dd462c3976c3761cba870ee13c9a2af1344980612a42a
-
C:\Users\Admin\Pictures\Adobe Films\464Kp2er6EuzXaB6O8__Bmh3.exeFilesize
299KB
MD53a7a4d6c0278461586dfbce1d5bc55b4
SHA165a87734e5467be58a6618ccee0ec11901aa2de0
SHA256c437fd9d9911449350220744693b92a082de5a49b2848b3dec2256ebd911dc88
SHA5124b088e84394f3bc0e89bd48a7d485c1fab7ec3399c30ec8aca61d65232b77803de611c45868b52a6966d141b3007bb4294976fce61b7de436dfe9119d6a54ffe
-
C:\Users\Admin\Pictures\Adobe Films\4Tcll0aLHixecbhfywWN_3hE.exeFilesize
393KB
MD5b0788093ab423639aefac4eb31d8a2d1
SHA135d5bfc9f3ff67a50558fccbe8b2c45eead03661
SHA2566e20db9320c1902cff4324891402a7ab38fdf118131c69a3e47578589efc130d
SHA5127cb35b890646e099fab47b1581e9c2acd5daae29e9b1788a1815496a51983aefacbad360be49be26cdc6787d36c9e5e2032b9571b5be3154ac1995ec456da758
-
C:\Users\Admin\Pictures\Adobe Films\Co69YU3_Wi0ruwVUQzcMvRjV.exeFilesize
312KB
MD5952b06adead5e867b02a9e9eff31983b
SHA11c36f9286f0b1da4bf0cd4c8680bc92a16328ffa
SHA256facb70f03584b9c1c3b28fc79fc62e5862c5eb6ac8b5cea46afa512ad716d878
SHA512e5353860ce3f436b25daaea5ff75adf60f4a585f1d280e436e8d0928618c5f759700c7d2a3d5308c7164f73dd5b2fdc9422a922ad8207ab479ae5991b9479f49
-
C:\Users\Admin\Pictures\Adobe Films\Co69YU3_Wi0ruwVUQzcMvRjV.exeFilesize
312KB
MD5952b06adead5e867b02a9e9eff31983b
SHA11c36f9286f0b1da4bf0cd4c8680bc92a16328ffa
SHA256facb70f03584b9c1c3b28fc79fc62e5862c5eb6ac8b5cea46afa512ad716d878
SHA512e5353860ce3f436b25daaea5ff75adf60f4a585f1d280e436e8d0928618c5f759700c7d2a3d5308c7164f73dd5b2fdc9422a922ad8207ab479ae5991b9479f49
-
C:\Users\Admin\Pictures\Adobe Films\QW7GgYOEuTcPjNLKdw2BB6tk.exeFilesize
10.2MB
MD54aa2ed3cbbc9843b66715959adf53589
SHA1f52474066e53f13ea9eff8144c2c9ed17318ba98
SHA256336c28695850bb8182b8a1baed4c64ca5aff7b35cb8fcbcdb954a9b9c709b640
SHA51298366485496f6f3ce81ada5578ddc7a580e902a75a728f4d14e7c79d15df6b4104f0eed3a09e06e48113666d918abdb1ad78ef5d9595c78ea19c495b9a66b744
-
C:\Users\Admin\Pictures\Adobe Films\QW7GgYOEuTcPjNLKdw2BB6tk.exeFilesize
10.2MB
MD54aa2ed3cbbc9843b66715959adf53589
SHA1f52474066e53f13ea9eff8144c2c9ed17318ba98
SHA256336c28695850bb8182b8a1baed4c64ca5aff7b35cb8fcbcdb954a9b9c709b640
SHA51298366485496f6f3ce81ada5578ddc7a580e902a75a728f4d14e7c79d15df6b4104f0eed3a09e06e48113666d918abdb1ad78ef5d9595c78ea19c495b9a66b744
-
C:\Users\Admin\Pictures\Adobe Films\WTuOmkgS9p7OFBa2ffmGdvpd.exeFilesize
385KB
MD545abb1bedf83daf1f2ebbac86e2fa151
SHA17d9ccba675478ab65707a28fd277a189450fc477
SHA256611479c78035c912dd69e3cfdadbf74649bb1fce6241b7573cfb0c7a2fc2fb2f
SHA5126bf1f7e0800a90666206206c026eadfc7f3d71764d088e2da9ca60bf5a63de92bd90515342e936d02060e1d5f7c92ddec8b0bcc85adfd8a8f4df29bd6f12c25c
-
C:\Users\Admin\Pictures\Adobe Films\ZWGcYtRUGEhgsgAy6Z1gOtWJ.exeFilesize
3.5MB
MD5022300f2f31eb6576f5d92cdc49d8206
SHA1abd01d801f6463b421f038095d2f062806d509da
SHA25659fbf550f9edac6eabae2af8b50c760e9b496b96e68cb8b84d8c745d3bb9ec15
SHA5125ffddbb8a0abb08a69b659d3fb570fde79a0bc8984a835b6699cd13937447ee3aa5228c0b5aaba2ed19fa96509e25bf61830f74cdc07d515de97a7976f75ddfe
-
C:\Users\Admin\Pictures\Adobe Films\ddD4e2ycv3SboVSm9XdEuAPz.exeFilesize
2.4MB
MD505f473151db7496bfdbc79d2da60572a
SHA1b1ea12a1dc641c729932655060236c7c3fe113b2
SHA256a6dbe724ec45e3f4573bb656276a54a54f1bfbe105686e578311772b51297509
SHA512b3cf759628c0b827814081ff0ba6edfbb5ef7026592178793752b2c2c824daad559914f5564bdad064d3f4441417be09a916c201a425a24ec71a987d808212ef
-
C:\Users\Admin\Pictures\Adobe Films\gMSCcxDhzNL6HxnMVXXqmJTm.exeFilesize
399KB
MD5cbe17c61a228c74d2df1e36ad7232ac8
SHA1bec62bcd1cacd592b3197e2ac9265a6943106e08
SHA256653d5351b00090f3574a9e6406cf17b0646887f17c404e3665ec645d1c3e9e68
SHA512e074bcf37ad58f41cf114884b6e08edc0e07fb37fd62009aae2194bc9d8477af373b81bfe6459a293931da61a8446ba3c0f1904cfcce1cc3e6dae89004e7dd92
-
C:\Users\Admin\Pictures\Adobe Films\iVQM0xMW6hzwPHNWW0vYsxOO.exeFilesize
732KB
MD5a7f0db730ffc25346b807b44e22d76e2
SHA12cd65e498430b3a083437bbb004c85194743fcba
SHA2562e7b5d0e19e55b6a2874d14c700d53949ffdbd02f51bf617d1a92dbaf8521f3d
SHA512a101b64f8660c9d9392811c2ba7745863065b8c498955362e7df56de7d1b3ed5a488ec70941baf748095bba2ea85d6fb04ab3901c72ad5742d3d3791380cfb8b
-
C:\Users\Admin\Pictures\Adobe Films\iVQM0xMW6hzwPHNWW0vYsxOO.exeFilesize
732KB
MD5a7f0db730ffc25346b807b44e22d76e2
SHA12cd65e498430b3a083437bbb004c85194743fcba
SHA2562e7b5d0e19e55b6a2874d14c700d53949ffdbd02f51bf617d1a92dbaf8521f3d
SHA512a101b64f8660c9d9392811c2ba7745863065b8c498955362e7df56de7d1b3ed5a488ec70941baf748095bba2ea85d6fb04ab3901c72ad5742d3d3791380cfb8b
-
C:\Users\Admin\Pictures\Adobe Films\j7iYfyZBqpehjD5wqHnYaxLi.exeFilesize
401KB
MD556c8df3ccf0f47afe45960e932c11447
SHA12ab6602483b695abf86d9c71c1221caafe46f574
SHA256691aa70c139236d784e88029276734d85767c1fce1e8fd5cdc6bf7ea82c88d96
SHA512edbb55d3bc54c0ba5e48a1946cd542a75e0df71dabe1ec27f01bee2e03eb542e5dbe457f795ccc6e8ff7327f580e670640c9397b331bd01eed68d3257cfeca8d
-
C:\Users\Admin\Pictures\Adobe Films\kzKYaZZ3A8Z3adLGazacqc5t.exeFilesize
974KB
MD515777ae423417df86584aac2148b5d44
SHA1e5d89fc00ee12af8168b5ff7a947f2718f95ea6c
SHA2563873e8543793c56c72c643a82c64a9c9163ce2e931dc57c14392868bff4fe7f5
SHA5129fedb0be63761c533d010656197c1778d496caadb4c83cb7a32841a11535ff5fd0de51a2c7b59e3c5663ab8367a4ff60f4aa45284421dd553c0efc25f3bb13a1
-
C:\Users\Admin\Pictures\Adobe Films\rpR1tJFc_HKayyoOL1nqxoTf.exeFilesize
391KB
MD52743ac09cc0719e92672d69eace267ad
SHA1883402131e3f9508e7f827fa4d871ca280b557e5
SHA256c8a75fc6a5beea672c8a468409d9be2de6d791e7cb70625b7ba7cb8185072331
SHA5122f12e3a749a8a06b84aa17126003b95dd42a083718c960e66b6d2be8ec2c3c116157a95f607eaa3a11b913be55badcf6ea8165b70949345adb56956810075bae
-
C:\Users\Admin\Pictures\Adobe Films\wrWAOWereWYNbEYIiIiTIZFY.exeFilesize
380KB
MD518b723269c2080f4c6c0bddf22cfd40b
SHA1878c7eb6537a40c1fe62ebcbbd3cc83628690177
SHA25626e71aba14140ea299a940368673c0d323dfe1a799d589268a99d3c98f6028c8
SHA5129f9847e28efba60e2ecd45274270ccb620d02cf5e9de1c5fb0789eaeb285ce609363f6627840cd238d1c95866d6da280d8ac632ada047887b30746cb142cbdc8
-
\??\c:\users\admin\appdata\local\temp\is-puop7.tmp\wrwaowerewynbeyiiiitizfy.tmpFilesize
694KB
MD5ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
\??\c:\users\admin\pictures\adobe films\3p0vefndwmej8jdidcihjxhq.exeFilesize
288KB
MD5ac68b833d2d8b1440080b76972eea8bf
SHA1d02ea6ec0f0dacef96e2c0bd93d28fe55b5a48c4
SHA256237d3850ecee23eda79b8f202eddbae13b547dfca46c98b39f407f55603865f9
SHA5123caadbcd6199d44e144887daa3f8fdc652d6661070a2e7fd8f54fac0a45c7bc23c3924411c3a45b7f01dd462c3976c3761cba870ee13c9a2af1344980612a42a
-
\??\c:\users\admin\pictures\adobe films\464kp2er6euzxab6o8__bmh3.exeFilesize
299KB
MD53a7a4d6c0278461586dfbce1d5bc55b4
SHA165a87734e5467be58a6618ccee0ec11901aa2de0
SHA256c437fd9d9911449350220744693b92a082de5a49b2848b3dec2256ebd911dc88
SHA5124b088e84394f3bc0e89bd48a7d485c1fab7ec3399c30ec8aca61d65232b77803de611c45868b52a6966d141b3007bb4294976fce61b7de436dfe9119d6a54ffe
-
\??\c:\users\admin\pictures\adobe films\4tcll0alhixecbhfywwn_3he.exeFilesize
393KB
MD5b0788093ab423639aefac4eb31d8a2d1
SHA135d5bfc9f3ff67a50558fccbe8b2c45eead03661
SHA2566e20db9320c1902cff4324891402a7ab38fdf118131c69a3e47578589efc130d
SHA5127cb35b890646e099fab47b1581e9c2acd5daae29e9b1788a1815496a51983aefacbad360be49be26cdc6787d36c9e5e2032b9571b5be3154ac1995ec456da758
-
\??\c:\users\admin\pictures\adobe films\co69yu3_wi0ruwvuqzcmvrjv.exeFilesize
312KB
MD5952b06adead5e867b02a9e9eff31983b
SHA11c36f9286f0b1da4bf0cd4c8680bc92a16328ffa
SHA256facb70f03584b9c1c3b28fc79fc62e5862c5eb6ac8b5cea46afa512ad716d878
SHA512e5353860ce3f436b25daaea5ff75adf60f4a585f1d280e436e8d0928618c5f759700c7d2a3d5308c7164f73dd5b2fdc9422a922ad8207ab479ae5991b9479f49
-
\??\c:\users\admin\pictures\adobe films\ddd4e2ycv3sbovsm9xdeuapz.exeFilesize
2.4MB
MD505f473151db7496bfdbc79d2da60572a
SHA1b1ea12a1dc641c729932655060236c7c3fe113b2
SHA256a6dbe724ec45e3f4573bb656276a54a54f1bfbe105686e578311772b51297509
SHA512b3cf759628c0b827814081ff0ba6edfbb5ef7026592178793752b2c2c824daad559914f5564bdad064d3f4441417be09a916c201a425a24ec71a987d808212ef
-
\??\c:\users\admin\pictures\adobe films\gmsccxdhznl6hxnmvxxqmjtm.exeFilesize
399KB
MD5cbe17c61a228c74d2df1e36ad7232ac8
SHA1bec62bcd1cacd592b3197e2ac9265a6943106e08
SHA256653d5351b00090f3574a9e6406cf17b0646887f17c404e3665ec645d1c3e9e68
SHA512e074bcf37ad58f41cf114884b6e08edc0e07fb37fd62009aae2194bc9d8477af373b81bfe6459a293931da61a8446ba3c0f1904cfcce1cc3e6dae89004e7dd92
-
\??\c:\users\admin\pictures\adobe films\j7iyfyzbqpehjd5wqhnyaxli.exeFilesize
401KB
MD556c8df3ccf0f47afe45960e932c11447
SHA12ab6602483b695abf86d9c71c1221caafe46f574
SHA256691aa70c139236d784e88029276734d85767c1fce1e8fd5cdc6bf7ea82c88d96
SHA512edbb55d3bc54c0ba5e48a1946cd542a75e0df71dabe1ec27f01bee2e03eb542e5dbe457f795ccc6e8ff7327f580e670640c9397b331bd01eed68d3257cfeca8d
-
\??\c:\users\admin\pictures\adobe films\kzkyazz3a8z3adlgazacqc5t.exeFilesize
974KB
MD515777ae423417df86584aac2148b5d44
SHA1e5d89fc00ee12af8168b5ff7a947f2718f95ea6c
SHA2563873e8543793c56c72c643a82c64a9c9163ce2e931dc57c14392868bff4fe7f5
SHA5129fedb0be63761c533d010656197c1778d496caadb4c83cb7a32841a11535ff5fd0de51a2c7b59e3c5663ab8367a4ff60f4aa45284421dd553c0efc25f3bb13a1
-
\??\c:\users\admin\pictures\adobe films\qw7ggyoeutcpjnlkdw2bb6tk.exeFilesize
10.2MB
MD54aa2ed3cbbc9843b66715959adf53589
SHA1f52474066e53f13ea9eff8144c2c9ed17318ba98
SHA256336c28695850bb8182b8a1baed4c64ca5aff7b35cb8fcbcdb954a9b9c709b640
SHA51298366485496f6f3ce81ada5578ddc7a580e902a75a728f4d14e7c79d15df6b4104f0eed3a09e06e48113666d918abdb1ad78ef5d9595c78ea19c495b9a66b744
-
\??\c:\users\admin\pictures\adobe films\rpr1tjfc_hkayyool1nqxotf.exeFilesize
391KB
MD52743ac09cc0719e92672d69eace267ad
SHA1883402131e3f9508e7f827fa4d871ca280b557e5
SHA256c8a75fc6a5beea672c8a468409d9be2de6d791e7cb70625b7ba7cb8185072331
SHA5122f12e3a749a8a06b84aa17126003b95dd42a083718c960e66b6d2be8ec2c3c116157a95f607eaa3a11b913be55badcf6ea8165b70949345adb56956810075bae
-
\??\c:\users\admin\pictures\adobe films\wrwaowerewynbeyiiiitizfy.exeFilesize
380KB
MD518b723269c2080f4c6c0bddf22cfd40b
SHA1878c7eb6537a40c1fe62ebcbbd3cc83628690177
SHA25626e71aba14140ea299a940368673c0d323dfe1a799d589268a99d3c98f6028c8
SHA5129f9847e28efba60e2ecd45274270ccb620d02cf5e9de1c5fb0789eaeb285ce609363f6627840cd238d1c95866d6da280d8ac632ada047887b30746cb142cbdc8
-
\??\c:\users\admin\pictures\adobe films\wtuomkgs9p7ofba2ffmgdvpd.exeFilesize
385KB
MD545abb1bedf83daf1f2ebbac86e2fa151
SHA17d9ccba675478ab65707a28fd277a189450fc477
SHA256611479c78035c912dd69e3cfdadbf74649bb1fce6241b7573cfb0c7a2fc2fb2f
SHA5126bf1f7e0800a90666206206c026eadfc7f3d71764d088e2da9ca60bf5a63de92bd90515342e936d02060e1d5f7c92ddec8b0bcc85adfd8a8f4df29bd6f12c25c
-
\??\c:\users\admin\pictures\adobe films\zwgcytrugehgsgay6z1gotwj.exeFilesize
3.5MB
MD5022300f2f31eb6576f5d92cdc49d8206
SHA1abd01d801f6463b421f038095d2f062806d509da
SHA25659fbf550f9edac6eabae2af8b50c760e9b496b96e68cb8b84d8c745d3bb9ec15
SHA5125ffddbb8a0abb08a69b659d3fb570fde79a0bc8984a835b6699cd13937447ee3aa5228c0b5aaba2ed19fa96509e25bf61830f74cdc07d515de97a7976f75ddfe
-
memory/216-372-0x0000000000000000-mapping.dmp
-
memory/392-245-0x0000000000DC0000-0x0000000000DF8000-memory.dmpFilesize
224KB
-
memory/392-260-0x0000000006230000-0x00000000062C2000-memory.dmpFilesize
584KB
-
memory/392-265-0x00000000064D0000-0x0000000006536000-memory.dmpFilesize
408KB
-
memory/392-242-0x0000000000B92000-0x0000000000BBC000-memory.dmpFilesize
168KB
-
memory/392-246-0x0000000000400000-0x0000000000A91000-memory.dmpFilesize
6.6MB
-
memory/392-137-0x0000000000000000-mapping.dmp
-
memory/392-262-0x0000000006470000-0x000000000648E000-memory.dmpFilesize
120KB
-
memory/392-272-0x0000000000B92000-0x0000000000BBC000-memory.dmpFilesize
168KB
-
memory/392-254-0x00000000061B0000-0x0000000006226000-memory.dmpFilesize
472KB
-
memory/460-256-0x0000000000000000-mapping.dmp
-
memory/556-284-0x0000000003D70000-0x0000000003FDB000-memory.dmpFilesize
2.4MB
-
memory/556-253-0x0000000000000000-mapping.dmp
-
memory/608-351-0x0000000000000000-mapping.dmp
-
memory/732-375-0x0000000000000000-mapping.dmp
-
memory/780-142-0x0000000000000000-mapping.dmp
-
memory/784-332-0x0000000000000000-mapping.dmp
-
memory/868-222-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/868-269-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/868-209-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/868-198-0x0000000000000000-mapping.dmp
-
memory/896-393-0x0000000000000000-mapping.dmp
-
memory/908-241-0x0000000002250000-0x000000000236B000-memory.dmpFilesize
1.1MB
-
memory/908-172-0x0000000000000000-mapping.dmp
-
memory/908-238-0x00000000021B1000-0x0000000002243000-memory.dmpFilesize
584KB
-
memory/1140-330-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1140-328-0x0000000000000000-mapping.dmp
-
memory/1288-335-0x0000000000000000-mapping.dmp
-
memory/1556-379-0x0000000000000000-mapping.dmp
-
memory/1600-327-0x0000000000000000-mapping.dmp
-
memory/1608-268-0x0000000000400000-0x0000000000C96000-memory.dmpFilesize
8.6MB
-
memory/1608-161-0x0000000000000000-mapping.dmp
-
memory/1608-185-0x0000000000400000-0x0000000000C96000-memory.dmpFilesize
8.6MB
-
memory/1620-252-0x0000000000000000-mapping.dmp
-
memory/1656-223-0x0000000000000000-mapping.dmp
-
memory/1860-283-0x0000000000000000-mapping.dmp
-
memory/1888-226-0x0000000000510000-0x0000000000530000-memory.dmpFilesize
128KB
-
memory/1888-239-0x0000000004AD0000-0x0000000004BDA000-memory.dmpFilesize
1.0MB
-
memory/1888-220-0x0000000000000000-mapping.dmp
-
memory/1888-235-0x00000000049A0000-0x00000000049B2000-memory.dmpFilesize
72KB
-
memory/1888-233-0x0000000004F30000-0x0000000005548000-memory.dmpFilesize
6.1MB
-
memory/1888-243-0x0000000004A00000-0x0000000004A3C000-memory.dmpFilesize
240KB
-
memory/2004-257-0x0000000000000000-mapping.dmp
-
memory/2040-273-0x0000000000000000-mapping.dmp
-
memory/2064-338-0x0000000000000000-mapping.dmp
-
memory/2068-277-0x0000000000000000-mapping.dmp
-
memory/2068-287-0x00007FFF98800000-0x00007FFF99236000-memory.dmpFilesize
10.2MB
-
memory/2100-348-0x0000000005E70000-0x0000000005EC1000-memory.dmpFilesize
324KB
-
memory/2100-349-0x0000000005E70000-0x0000000005EC1000-memory.dmpFilesize
324KB
-
memory/2100-345-0x0000000000000000-mapping.dmp
-
memory/2212-362-0x0000000000000000-mapping.dmp
-
memory/2268-361-0x0000000000000000-mapping.dmp
-
memory/2384-278-0x0000000000C92000-0x0000000000CBF000-memory.dmpFilesize
180KB
-
memory/2384-147-0x0000000000000000-mapping.dmp
-
memory/2384-240-0x0000000000BF0000-0x0000000000C3D000-memory.dmpFilesize
308KB
-
memory/2384-244-0x0000000000400000-0x0000000000A93000-memory.dmpFilesize
6.6MB
-
memory/2384-255-0x0000000000C92000-0x0000000000CBF000-memory.dmpFilesize
180KB
-
memory/2384-292-0x0000000060900000-0x0000000060992000-memory.dmpFilesize
584KB
-
memory/2384-274-0x0000000000400000-0x0000000000A93000-memory.dmpFilesize
6.6MB
-
memory/2404-366-0x0000000000000000-mapping.dmp
-
memory/2440-318-0x0000000000400000-0x000000000044D000-memory.dmpFilesize
308KB
-
memory/2440-131-0x00000000005C0000-0x00000000005F5000-memory.dmpFilesize
212KB
-
memory/2440-134-0x0000000000400000-0x000000000044D000-memory.dmpFilesize
308KB
-
memory/2440-319-0x0000000003860000-0x0000000003ACB000-memory.dmpFilesize
2.4MB
-
memory/2440-135-0x0000000003860000-0x0000000003ACB000-memory.dmpFilesize
2.4MB
-
memory/2440-133-0x0000000003860000-0x0000000003ACB000-memory.dmpFilesize
2.4MB
-
memory/2440-130-0x000000000066D000-0x000000000068B000-memory.dmpFilesize
120KB
-
memory/2440-132-0x0000000000400000-0x000000000044D000-memory.dmpFilesize
308KB
-
memory/2456-153-0x0000000000000000-mapping.dmp
-
memory/2456-168-0x00000000006B0000-0x0000000000709000-memory.dmpFilesize
356KB
-
memory/2456-267-0x00000000006B0000-0x0000000000709000-memory.dmpFilesize
356KB
-
memory/2484-264-0x0000000000B22000-0x0000000000B32000-memory.dmpFilesize
64KB
-
memory/2484-154-0x0000000000000000-mapping.dmp
-
memory/2484-250-0x0000000000AC0000-0x0000000000AC9000-memory.dmpFilesize
36KB
-
memory/2484-266-0x0000000000400000-0x0000000000A78000-memory.dmpFilesize
6.5MB
-
memory/2484-251-0x0000000000400000-0x0000000000A78000-memory.dmpFilesize
6.5MB
-
memory/2556-337-0x0000000000000000-mapping.dmp
-
memory/3144-387-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3144-377-0x0000000000000000-mapping.dmp
-
memory/3144-350-0x0000000000000000-mapping.dmp
-
memory/3144-380-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3144-383-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3624-199-0x00000000006B0000-0x0000000000709000-memory.dmpFilesize
356KB
-
memory/3624-178-0x0000000000000000-mapping.dmp
-
memory/3764-282-0x0000000000000000-mapping.dmp
-
memory/4056-364-0x0000000000000000-mapping.dmp
-
memory/4068-342-0x0000000000000000-mapping.dmp
-
memory/4108-177-0x0000000000000000-mapping.dmp
-
memory/4208-368-0x0000000000000000-mapping.dmp
-
memory/4276-323-0x0000000000000000-mapping.dmp
-
memory/4276-324-0x00007FFF98800000-0x00007FFF99236000-memory.dmpFilesize
10.2MB
-
memory/4320-155-0x0000000000000000-mapping.dmp
-
memory/4340-325-0x0000000000000000-mapping.dmp
-
memory/4340-326-0x00007FFF98800000-0x00007FFF99236000-memory.dmpFilesize
10.2MB
-
memory/4404-304-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4404-300-0x0000000000000000-mapping.dmp
-
memory/4404-308-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4624-281-0x0000000000000000-mapping.dmp
-
memory/4624-333-0x000000002D360000-0x000000002D418000-memory.dmpFilesize
736KB
-
memory/4624-285-0x0000000002250000-0x0000000003250000-memory.dmpFilesize
16.0MB
-
memory/4624-340-0x000000002D420000-0x000000002D4C3000-memory.dmpFilesize
652KB
-
memory/4644-313-0x0000000000400000-0x0000000000452000-memory.dmpFilesize
328KB
-
memory/4644-227-0x00000000006B0000-0x00000000006EF000-memory.dmpFilesize
252KB
-
memory/4644-270-0x0000000000400000-0x0000000000452000-memory.dmpFilesize
328KB
-
memory/4644-271-0x000000000073D000-0x0000000000763000-memory.dmpFilesize
152KB
-
memory/4644-152-0x0000000000000000-mapping.dmp
-
memory/4644-236-0x000000000073D000-0x0000000000763000-memory.dmpFilesize
152KB
-
memory/4644-228-0x0000000000400000-0x0000000000452000-memory.dmpFilesize
328KB
-
memory/4668-276-0x0000000000000000-mapping.dmp
-
memory/4676-290-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4676-279-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4676-234-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4676-258-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4676-232-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4676-237-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4676-231-0x0000000000000000-mapping.dmp
-
memory/4884-248-0x0000000000400000-0x0000000000B55000-memory.dmpFilesize
7.3MB
-
memory/4884-280-0x0000000000E02000-0x0000000000E2F000-memory.dmpFilesize
180KB
-
memory/4884-247-0x0000000000BA0000-0x0000000000BED000-memory.dmpFilesize
308KB
-
memory/4884-163-0x0000000000000000-mapping.dmp
-
memory/4884-275-0x0000000000400000-0x0000000000B55000-memory.dmpFilesize
7.3MB
-
memory/4884-259-0x0000000000E02000-0x0000000000E2F000-memory.dmpFilesize
180KB
-
memory/4892-138-0x0000000000000000-mapping.dmp
-
memory/4892-291-0x0000000007C20000-0x0000000007C70000-memory.dmpFilesize
320KB
-
memory/4892-261-0x0000000000B92000-0x0000000000BBE000-memory.dmpFilesize
176KB
-
memory/4892-263-0x0000000000400000-0x0000000000A93000-memory.dmpFilesize
6.6MB
-
memory/4892-288-0x0000000006EA0000-0x00000000073CC000-memory.dmpFilesize
5.2MB
-
memory/4892-286-0x0000000006CC0000-0x0000000006E82000-memory.dmpFilesize
1.8MB
-
memory/4892-249-0x00000000025B0000-0x00000000025E9000-memory.dmpFilesize
228KB
-
memory/4936-189-0x0000000005D60000-0x0000000006304000-memory.dmpFilesize
5.6MB
-
memory/4936-200-0x0000000005850000-0x00000000058EC000-memory.dmpFilesize
624KB
-
memory/4936-173-0x0000000000C70000-0x0000000000CC8000-memory.dmpFilesize
352KB
-
memory/4936-149-0x0000000000000000-mapping.dmp
-
memory/5020-289-0x0000000000000000-mapping.dmp
-
memory/5020-306-0x00000000021AC000-0x000000000223E000-memory.dmpFilesize
584KB
-
memory/5088-136-0x0000000000000000-mapping.dmp
-
memory/5132-431-0x0000000073180000-0x00000000731AA000-memory.dmpFilesize
168KB
-
memory/5132-430-0x00000000729F0000-0x0000000072AB1000-memory.dmpFilesize
772KB
-
memory/5192-403-0x0000000000000000-mapping.dmp
-
memory/5356-404-0x0000000000000000-mapping.dmp
-
memory/5428-406-0x0000000000000000-mapping.dmp
-
memory/5452-407-0x0000000000000000-mapping.dmp
-
memory/5472-408-0x0000000000000000-mapping.dmp
-
memory/5532-410-0x0000000000000000-mapping.dmp
-
memory/5552-411-0x0000000000000000-mapping.dmp
-
memory/5572-413-0x0000000000000000-mapping.dmp
-
memory/5604-414-0x0000000000000000-mapping.dmp
-
memory/5632-415-0x0000000000000000-mapping.dmp
-
memory/5668-416-0x0000000000000000-mapping.dmp