Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2022 08:35
Static task
static1
Behavioral task
behavioral1
Sample
566e9b735f5b0c644a29c22260a003d9a2fc29939807cb23ee34fc33e7beee9b.exe
Resource
win10v2004-20220812-en
General
-
Target
566e9b735f5b0c644a29c22260a003d9a2fc29939807cb23ee34fc33e7beee9b.exe
-
Size
244KB
-
MD5
e2a8b2851b1b7ec84eade5c32073a481
-
SHA1
a98ecfa96f887f82b41b6384cd0c1e939eee707e
-
SHA256
566e9b735f5b0c644a29c22260a003d9a2fc29939807cb23ee34fc33e7beee9b
-
SHA512
75ff30800c1868bc0636d3fdcf76b1c5d45e9807c623ea1edebf9d0584640f6542d4631188fb4c73a47c0463f7e549bd5771bca833bd6999ac1c95e36239f013
-
SSDEEP
6144:W4neVAhDR9xI3MnR0tcLLHpkBvmSDV8Onf4wT/iFt/9z:W4yAhtiMnaVHf48iFlB
Malware Config
Extracted
redline
mario_new
176.122.23.55:11768
-
auth_value
eeee8d5fcc3ba3a42094ef260c5bdcb4
Extracted
djvu
http://acacaca.org/lancer/get.php
-
extension
.mmdt
-
offline_id
yd6oYv6aBN90yFzTWdZ34sXSXtXiauzOLXZyWht1
-
payload_url
http://rgyui.top/dl/build2.exe
http://acacaca.org/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-xuPJqoyzQE Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0557Jhyjd
Extracted
socelars
https://hueduy.s3.eu-west-1.amazonaws.com/dhfry901/
Extracted
redline
1337
78.153.144.6:2510
-
auth_value
b0447922bcbc2eda83260a9e7a638f45
Extracted
redline
nam5
103.89.90.61:34589
-
auth_value
f23be8e9063fe5d0c6fc3ee8e7d565bd
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detected Djvu ransomware 10 IoCs
Processes:
resource yara_rule behavioral1/memory/3980-181-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3980-183-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3980-186-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/101812-185-0x00000000049A0000-0x0000000004ABB000-memory.dmp family_djvu behavioral1/memory/3980-191-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3980-195-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1016-199-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1016-201-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1016-206-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1016-230-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects Smokeloader packer 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1748-133-0x00000000008C0000-0x00000000008C9000-memory.dmp family_smokeloader behavioral1/memory/102032-162-0x0000000002BB0000-0x0000000002BB9000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7536 1516 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8000 1516 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/101740-140-0x0000000000400000-0x0000000000460000-memory.dmp family_redline behavioral1/memory/4592-235-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/4804-246-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/536-213-0x0000000000400000-0x000000000058E000-memory.dmp family_socelars behavioral1/memory/536-244-0x0000000000400000-0x000000000058E000-memory.dmp family_socelars -
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
Processes:
svchost.exedescription pid process target process PID 7884 created 7628 7884 svchost.exe 361A.exe PID 7884 created 8308 7884 svchost.exe csrss.exe PID 7884 created 8308 7884 svchost.exe csrss.exe PID 7884 created 8308 7884 svchost.exe csrss.exe PID 7884 created 9576 7884 svchost.exe 7BC1.exe -
Downloads MZ/PE file
-
Executes dropped EXE 27 IoCs
Processes:
3BF0.exe5DFF.exe62A4.exe937A.exe937A.exe937A.exe937A.exeB7EB.exebuild2.exeCAE7.exebuild2.exeCF0F.exeD346.exeDD59.exe2AED.exe2AED.exe361A.exe3B5B.exe3B5B.exe361A.exe43D7.execsrss.exeinjector.exe7BC1.exetor.exe7BC1.exe8BA0.exepid process 2804 3BF0.exe 101956 5DFF.exe 102032 62A4.exe 101812 937A.exe 3980 937A.exe 4400 937A.exe 1016 937A.exe 536 B7EB.exe 1296 build2.exe 3088 CAE7.exe 3452 build2.exe 5032 CF0F.exe 3588 D346.exe 5132 DD59.exe 7340 2AED.exe 7436 2AED.exe 7628 361A.exe 7660 3B5B.exe 7736 3B5B.exe 7912 361A.exe 7940 43D7.exe 8308 csrss.exe 8508 injector.exe 9576 7BC1.exe 9600 tor.exe 9836 7BC1.exe 9876 8BA0.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\B7EB.exe upx C:\Users\Admin\AppData\Local\Temp\B7EB.exe upx behavioral1/memory/536-213-0x0000000000400000-0x000000000058E000-memory.dmp upx behavioral1/memory/536-244-0x0000000000400000-0x000000000058E000-memory.dmp upx -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
build2.exe2AED.exe3B5B.exe937A.exe937A.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation build2.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 2AED.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 3B5B.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 937A.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 937A.exe -
Loads dropped DLL 18 IoCs
Processes:
regsvr32.exebuild2.exerundll32.exerundll32.exetor.exe8BA0.exepid process 102396 regsvr32.exe 3452 build2.exe 3452 build2.exe 3452 build2.exe 7552 rundll32.exe 8012 rundll32.exe 9600 tor.exe 9600 tor.exe 9600 tor.exe 9600 tor.exe 9600 tor.exe 9600 tor.exe 9600 tor.exe 9600 tor.exe 9600 tor.exe 9876 8BA0.exe 9876 8BA0.exe 9876 8BA0.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
937A.exe361A.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\ccca4610-3070-4d47-b72e-938255b6473b\\937A.exe\" --AutoStart" 937A.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 361A.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 63 api.2ip.ua 64 api.2ip.ua 69 api.2ip.ua -
Suspicious use of SetThreadContext 6 IoCs
Processes:
3BF0.exe937A.exe937A.exebuild2.exeCAE7.exeCF0F.exedescription pid process target process PID 2804 set thread context of 101740 2804 3BF0.exe AppLaunch.exe PID 101812 set thread context of 3980 101812 937A.exe 937A.exe PID 4400 set thread context of 1016 4400 937A.exe 937A.exe PID 1296 set thread context of 3452 1296 build2.exe build2.exe PID 3088 set thread context of 4592 3088 CAE7.exe AppLaunch.exe PID 5032 set thread context of 4804 5032 CF0F.exe AppLaunch.exe -
Drops file in Program Files directory 19 IoCs
Processes:
B7EB.exe43D7.exedescription ioc process File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\icon.png B7EB.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\jquery-3.3.1.min.js B7EB.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js B7EB.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js 43D7.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js B7EB.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\pad-nopadding.js B7EB.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\manifest.json B7EB.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\icon.png 43D7.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\manifest.json 43D7.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\background.html B7EB.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\content.js B7EB.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\background.html 43D7.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\aes.js 43D7.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\content.js 43D7.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\jquery-3.3.1.min.js 43D7.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\mode-ecb.js 43D7.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\aes.js B7EB.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\mode-ecb.js B7EB.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\pad-nopadding.js 43D7.exe -
Drops file in Windows directory 2 IoCs
Processes:
361A.exedescription ioc process File opened for modification C:\Windows\rss 361A.exe File created C:\Windows\rss\csrss.exe 361A.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 9728 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 101860 2804 WerFault.exe 3BF0.exe 102208 101956 WerFault.exe 5DFF.exe 6096 5132 WerFault.exe DD59.exe 7596 7552 WerFault.exe rundll32.exe 8056 8012 WerFault.exe rundll32.exe 10096 9876 WerFault.exe 8BA0.exe 10200 10148 WerFault.exe explorer.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
566e9b735f5b0c644a29c22260a003d9a2fc29939807cb23ee34fc33e7beee9b.exe62A4.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 566e9b735f5b0c644a29c22260a003d9a2fc29939807cb23ee34fc33e7beee9b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 566e9b735f5b0c644a29c22260a003d9a2fc29939807cb23ee34fc33e7beee9b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 566e9b735f5b0c644a29c22260a003d9a2fc29939807cb23ee34fc33e7beee9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 62A4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 62A4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 62A4.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
build2.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 8400 schtasks.exe 9512 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 5512 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
chrome.exechrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 4880 taskkill.exe 5476 taskkill.exe 8144 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
361A.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 361A.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 361A.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 239 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 228 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
566e9b735f5b0c644a29c22260a003d9a2fc29939807cb23ee34fc33e7beee9b.exepid process 1748 566e9b735f5b0c644a29c22260a003d9a2fc29939807cb23ee34fc33e7beee9b.exe 1748 566e9b735f5b0c644a29c22260a003d9a2fc29939807cb23ee34fc33e7beee9b.exe 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 2576 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2576 -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
566e9b735f5b0c644a29c22260a003d9a2fc29939807cb23ee34fc33e7beee9b.exe62A4.exeexplorer.exeexplorer.exepid process 1748 566e9b735f5b0c644a29c22260a003d9a2fc29939807cb23ee34fc33e7beee9b.exe 102032 62A4.exe 2576 2576 2576 2576 5904 explorer.exe 5904 explorer.exe 5904 explorer.exe 5904 explorer.exe 2576 2576 5904 explorer.exe 5904 explorer.exe 5904 explorer.exe 5904 explorer.exe 2576 2576 6340 explorer.exe 6340 explorer.exe 5904 explorer.exe 5904 explorer.exe 5904 explorer.exe 5904 explorer.exe 2576 2576 5904 explorer.exe 5904 explorer.exe 5904 explorer.exe 5904 explorer.exe 2576 2576 5904 explorer.exe 5904 explorer.exe 2576 2576 6340 explorer.exe 6340 explorer.exe 5904 explorer.exe 5904 explorer.exe 6340 explorer.exe 6340 explorer.exe 2576 2576 6340 explorer.exe 6340 explorer.exe 6340 explorer.exe 6340 explorer.exe 2576 2576 6340 explorer.exe 6340 explorer.exe 6340 explorer.exe 6340 explorer.exe 6340 explorer.exe 6340 explorer.exe 6340 explorer.exe 6340 explorer.exe 6340 explorer.exe 6340 explorer.exe 5904 explorer.exe 5904 explorer.exe 6340 explorer.exe 6340 explorer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
chrome.exechrome.exepid process 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
AppLaunch.exeB7EB.exetaskkill.exedescription pid process Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeDebugPrivilege 101740 AppLaunch.exe Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeCreateTokenPrivilege 536 B7EB.exe Token: SeAssignPrimaryTokenPrivilege 536 B7EB.exe Token: SeLockMemoryPrivilege 536 B7EB.exe Token: SeIncreaseQuotaPrivilege 536 B7EB.exe Token: SeMachineAccountPrivilege 536 B7EB.exe Token: SeTcbPrivilege 536 B7EB.exe Token: SeSecurityPrivilege 536 B7EB.exe Token: SeTakeOwnershipPrivilege 536 B7EB.exe Token: SeLoadDriverPrivilege 536 B7EB.exe Token: SeSystemProfilePrivilege 536 B7EB.exe Token: SeSystemtimePrivilege 536 B7EB.exe Token: SeProfSingleProcessPrivilege 536 B7EB.exe Token: SeIncBasePriorityPrivilege 536 B7EB.exe Token: SeCreatePagefilePrivilege 536 B7EB.exe Token: SeCreatePermanentPrivilege 536 B7EB.exe Token: SeBackupPrivilege 536 B7EB.exe Token: SeRestorePrivilege 536 B7EB.exe Token: SeShutdownPrivilege 536 B7EB.exe Token: SeDebugPrivilege 536 B7EB.exe Token: SeAuditPrivilege 536 B7EB.exe Token: SeSystemEnvironmentPrivilege 536 B7EB.exe Token: SeChangeNotifyPrivilege 536 B7EB.exe Token: SeRemoteShutdownPrivilege 536 B7EB.exe Token: SeUndockPrivilege 536 B7EB.exe Token: SeSyncAgentPrivilege 536 B7EB.exe Token: SeEnableDelegationPrivilege 536 B7EB.exe Token: SeManageVolumePrivilege 536 B7EB.exe Token: SeImpersonatePrivilege 536 B7EB.exe Token: SeCreateGlobalPrivilege 536 B7EB.exe Token: 31 536 B7EB.exe Token: 32 536 B7EB.exe Token: 33 536 B7EB.exe Token: 34 536 B7EB.exe Token: 35 536 B7EB.exe Token: SeDebugPrivilege 4880 taskkill.exe Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 Token: SeShutdownPrivilege 2576 Token: SeCreatePagefilePrivilege 2576 -
Suspicious use of FindShellTrayWindow 52 IoCs
Processes:
chrome.exechrome.exepid process 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
Processes:
chrome.exechrome.exepid process 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe 8556 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3BF0.exeregsvr32.exe937A.exe937A.exe937A.exe937A.exeB7EB.execmd.exebuild2.exedescription pid process target process PID 2576 wrote to memory of 2804 2576 3BF0.exe PID 2576 wrote to memory of 2804 2576 3BF0.exe PID 2576 wrote to memory of 2804 2576 3BF0.exe PID 2804 wrote to memory of 101740 2804 3BF0.exe AppLaunch.exe PID 2804 wrote to memory of 101740 2804 3BF0.exe AppLaunch.exe PID 2804 wrote to memory of 101740 2804 3BF0.exe AppLaunch.exe PID 2804 wrote to memory of 101740 2804 3BF0.exe AppLaunch.exe PID 2804 wrote to memory of 101740 2804 3BF0.exe AppLaunch.exe PID 2576 wrote to memory of 101956 2576 5DFF.exe PID 2576 wrote to memory of 101956 2576 5DFF.exe PID 2576 wrote to memory of 101956 2576 5DFF.exe PID 2576 wrote to memory of 102032 2576 62A4.exe PID 2576 wrote to memory of 102032 2576 62A4.exe PID 2576 wrote to memory of 102032 2576 62A4.exe PID 2576 wrote to memory of 102372 2576 regsvr32.exe PID 2576 wrote to memory of 102372 2576 regsvr32.exe PID 102372 wrote to memory of 102396 102372 regsvr32.exe regsvr32.exe PID 102372 wrote to memory of 102396 102372 regsvr32.exe regsvr32.exe PID 102372 wrote to memory of 102396 102372 regsvr32.exe regsvr32.exe PID 2576 wrote to memory of 101812 2576 937A.exe PID 2576 wrote to memory of 101812 2576 937A.exe PID 2576 wrote to memory of 101812 2576 937A.exe PID 101812 wrote to memory of 3980 101812 937A.exe 937A.exe PID 101812 wrote to memory of 3980 101812 937A.exe 937A.exe PID 101812 wrote to memory of 3980 101812 937A.exe 937A.exe PID 101812 wrote to memory of 3980 101812 937A.exe 937A.exe PID 101812 wrote to memory of 3980 101812 937A.exe 937A.exe PID 101812 wrote to memory of 3980 101812 937A.exe 937A.exe PID 101812 wrote to memory of 3980 101812 937A.exe 937A.exe PID 101812 wrote to memory of 3980 101812 937A.exe 937A.exe PID 101812 wrote to memory of 3980 101812 937A.exe 937A.exe PID 101812 wrote to memory of 3980 101812 937A.exe 937A.exe PID 3980 wrote to memory of 3316 3980 937A.exe icacls.exe PID 3980 wrote to memory of 3316 3980 937A.exe icacls.exe PID 3980 wrote to memory of 3316 3980 937A.exe icacls.exe PID 3980 wrote to memory of 4400 3980 937A.exe 937A.exe PID 3980 wrote to memory of 4400 3980 937A.exe 937A.exe PID 3980 wrote to memory of 4400 3980 937A.exe 937A.exe PID 4400 wrote to memory of 1016 4400 937A.exe 937A.exe PID 4400 wrote to memory of 1016 4400 937A.exe 937A.exe PID 4400 wrote to memory of 1016 4400 937A.exe 937A.exe PID 4400 wrote to memory of 1016 4400 937A.exe 937A.exe PID 4400 wrote to memory of 1016 4400 937A.exe 937A.exe PID 4400 wrote to memory of 1016 4400 937A.exe 937A.exe PID 4400 wrote to memory of 1016 4400 937A.exe 937A.exe PID 4400 wrote to memory of 1016 4400 937A.exe 937A.exe PID 4400 wrote to memory of 1016 4400 937A.exe 937A.exe PID 4400 wrote to memory of 1016 4400 937A.exe 937A.exe PID 2576 wrote to memory of 536 2576 B7EB.exe PID 2576 wrote to memory of 536 2576 B7EB.exe PID 2576 wrote to memory of 536 2576 B7EB.exe PID 1016 wrote to memory of 1296 1016 937A.exe build2.exe PID 1016 wrote to memory of 1296 1016 937A.exe build2.exe PID 1016 wrote to memory of 1296 1016 937A.exe build2.exe PID 536 wrote to memory of 3516 536 B7EB.exe cmd.exe PID 536 wrote to memory of 3516 536 B7EB.exe cmd.exe PID 536 wrote to memory of 3516 536 B7EB.exe cmd.exe PID 3516 wrote to memory of 4880 3516 cmd.exe taskkill.exe PID 3516 wrote to memory of 4880 3516 cmd.exe taskkill.exe PID 3516 wrote to memory of 4880 3516 cmd.exe taskkill.exe PID 2576 wrote to memory of 3088 2576 CAE7.exe PID 2576 wrote to memory of 3088 2576 CAE7.exe PID 2576 wrote to memory of 3088 2576 CAE7.exe PID 1296 wrote to memory of 3452 1296 build2.exe build2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\566e9b735f5b0c644a29c22260a003d9a2fc29939807cb23ee34fc33e7beee9b.exe"C:\Users\Admin\AppData\Local\Temp\566e9b735f5b0c644a29c22260a003d9a2fc29939807cb23ee34fc33e7beee9b.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\3BF0.exeC:\Users\Admin\AppData\Local\Temp\3BF0.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 984202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 212 -p 2804 -ip 28041⤵
-
C:\Users\Admin\AppData\Local\Temp\5DFF.exeC:\Users\Admin\AppData\Local\Temp\5DFF.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 101956 -s 3402⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\62A4.exeC:\Users\Admin\AppData\Local\Temp\62A4.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 101956 -ip 1019561⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8BF7.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\8BF7.dll2⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\937A.exeC:\Users\Admin\AppData\Local\Temp\937A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\937A.exeC:\Users\Admin\AppData\Local\Temp\937A.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\ccca4610-3070-4d47-b72e-938255b6473b" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\937A.exe"C:\Users\Admin\AppData\Local\Temp\937A.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\937A.exe"C:\Users\Admin\AppData\Local\Temp\937A.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\77a322fa-d9e6-43e4-a311-1047c1ba8ce3\build2.exe"C:\Users\Admin\AppData\Local\77a322fa-d9e6-43e4-a311-1047c1ba8ce3\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\77a322fa-d9e6-43e4-a311-1047c1ba8ce3\build2.exe"C:\Users\Admin\AppData\Local\77a322fa-d9e6-43e4-a311-1047c1ba8ce3\build2.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\77a322fa-d9e6-43e4-a311-1047c1ba8ce3\build2.exe" & del C:\PrograData\*.dll & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\B7EB.exeC:\Users\Admin\AppData\Local\Temp\B7EB.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8151b4f50,0x7ff8151b4f60,0x7ff8151b4f703⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1696 /prefetch:23⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1924 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2332 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3012 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2876 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4700 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4764 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5012 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4724 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5832 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5244 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5472 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,773061162929864292,8260973399924444007,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:13⤵
-
C:\Users\Admin\AppData\Local\Temp\CAE7.exeC:\Users\Admin\AppData\Local\Temp\CAE7.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\CF0F.exeC:\Users\Admin\AppData\Local\Temp\CF0F.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\D346.exeC:\Users\Admin\AppData\Local\Temp\D346.exe1⤵
- Executes dropped EXE
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\DD59.exeC:\Users\Admin\AppData\Local\Temp\DD59.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5132 -s 2722⤵
- Program crash
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5132 -ip 51321⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\2AED.exeC:\Users\Admin\AppData\Local\Temp\2AED.exe1⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\2AED.exe"C:\Users\Admin\AppData\Local\Temp\2AED.exe" -h2⤵
- Executes dropped EXE
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7552 -s 6083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 192 -p 7552 -ip 75521⤵
-
C:\Users\Admin\AppData\Local\Temp\361A.exeC:\Users\Admin\AppData\Local\Temp\361A.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\361A.exe"C:\Users\Admin\AppData\Local\Temp\361A.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)4⤵
-
C:\Windows\SysWOW64\sc.exesc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Local\Temp\3B5B.exeC:\Users\Admin\AppData\Local\Temp\3B5B.exe1⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\3B5B.exe"C:\Users\Admin\AppData\Local\Temp\3B5B.exe" -h2⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
-
C:\Users\Admin\AppData\Local\Temp\43D7.exeC:\Users\Admin\AppData\Local\Temp\43D7.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff8151b4f50,0x7ff8151b4f60,0x7ff8151b4f703⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1660,3706869727894597319,6756648041178447964,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1764 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1660,3706869727894597319,6756648041178447964,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1716 /prefetch:23⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1660,3706869727894597319,6756648041178447964,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3016 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,3706869727894597319,6756648041178447964,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2652 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,3706869727894597319,6756648041178447964,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2644 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,3706869727894597319,6756648041178447964,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2040 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1660,3706869727894597319,6756648041178447964,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1660,3706869727894597319,6756648041178447964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1660,3706869727894597319,6756648041178447964,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5216 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1660,3706869727894597319,6756648041178447964,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5260 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1660,3706869727894597319,6756648041178447964,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5252 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1660,3706869727894597319,6756648041178447964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:83⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8012 -s 6083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 8012 -ip 80121⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\7BC1.exeC:\Users\Admin\AppData\Local\Temp\7BC1.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7BC1.exe"C:\Users\Admin\AppData\Local\Temp\7BC1.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe"C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe" --nt-service -f "C:\Users\Admin\AppData\Local\Temp\csrss\tor\torrc" --Log "notice file C:\Users\Admin\AppData\Local\Temp\csrss\tor\log.txt"1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\8BA0.exeC:\Users\Admin\AppData\Local\Temp\8BA0.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9876 -s 7602⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 9876 -ip 98761⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10148 -s 8722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 10148 -ip 101481⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\background.htmlFilesize
786B
MD59ffe618d587a0685d80e9f8bb7d89d39
SHA18e9cae42c911027aafae56f9b1a16eb8dd7a739c
SHA256a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e
SHA512a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\icon.pngFilesize
6KB
MD5c8d8c174df68910527edabe6b5278f06
SHA18ac53b3605fea693b59027b9b471202d150f266f
SHA2569434dd7008059a60d6d5ced8c8a63ab5cae407e7152da98ca4dda408510f08f5
SHA512d439e5124399d1901934319535b7156c0ca8d76b5aa4ddf1dd0b598d43582f6d23c16f96be74d3cd5fe764396da55ca51811d08695f356f12f7a8a71bcc7e45c
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\aes.jsFilesize
13KB
MD54ff108e4584780dce15d610c142c3e62
SHA177e4519962e2f6a9fc93342137dbb31c33b76b04
SHA256fc7e184beeda61bf6427938a84560f52348976bb55e807b224eb53930e97ef6a
SHA512d6eee0fc02205a3422c16ad120cad8d871563d8fcd4bde924654eac5a37026726328f9a47240cf89ed6c9e93ba5f89c833e84e65eee7db2b4d7d1b4240deaef2
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.jsFilesize
19KB
MD50d3f3433dbce2df1c3e7087e343e962c
SHA16017eff323f9e59c8f048765d7060c187c34841a
SHA256772c9b0bfbcd7764d1dcbedd9161de27397aec147d1d2e06e996026f8807ca4e
SHA512ba6dbffdd01947b9d31a76846906a09c192984a5eb7ef1fda616b33667be0f4e28fbe48d2eb17c07c5bbd9a550c262568d81994249c26798603d736bcefe3995
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\content.jsFilesize
3KB
MD5f79618c53614380c5fdc545699afe890
SHA17804a4621cd9405b6def471f3ebedb07fb17e90a
SHA256f3f30c5c271f80b0a3a329b11d8e72eb404d0c0dc9c66fa162ca97ccaa1e963c
SHA512c4e0c4df6ac92351591859a7c4358b3dcd342e00051bf561e68e3fcc2c94fdd8d14bd0a042d88dca33f6c7e952938786378d804f56e84b4eab99e2a5fee96a4c
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\jquery-3.3.1.min.jsFilesize
84KB
MD5a09e13ee94d51c524b7e2a728c7d4039
SHA10dc32db4aa9c5f03f3b38c47d883dbd4fed13aae
SHA256160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
SHA512f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\mode-ecb.jsFilesize
604B
MD523231681d1c6f85fa32e725d6d63b19b
SHA1f69315530b49ac743b0e012652a3a5efaed94f17
SHA25603164b1ac43853fecdbf988ce900016fb174cf65b03e41c0a9a7bf3a95e8c26a
SHA51236860113871707a08401f29ab2828545932e57a4ae99e727d8ca2a9f85518d3db3a4e5e4d46ac2b6ba09494fa9727c033d77c36c4bdc376ae048541222724bc2
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\pad-nopadding.jsFilesize
268B
MD50f26002ee3b4b4440e5949a969ea7503
SHA131fc518828fe4894e8077ec5686dce7b1ed281d7
SHA256282308ebc3702c44129438f8299839ca4d392a0a09fdf0737f08ef1e4aff937d
SHA5124290a1aee5601fcbf1eb2beec9b4924c30cd218e94ae099b87ba72c9a4fa077e39d218fc723b8465d259028a6961cc07c0cd6896aa2f67e83f833ca023a80b11
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\manifest.jsonFilesize
1KB
MD56da6b303170ccfdca9d9e75abbfb59f3
SHA11a8070080f50a303f73eba253ba49c1e6d400df6
SHA25666f5620e3bfe4692b14f62baad60e3269327327565ff8b2438e98ce8ed021333
SHA512872957b63e8a0d10791877e5d204022c08c8e8101807d7ebe6fd537d812ad09e14d8555ccf53dc00525a22c02773aa45b8fa643c05247fb0ce6012382855a89a
-
C:\ProgramData\mozglue.dllFilesize
133KB
MD58f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
C:\ProgramData\nss3.dllFilesize
1.2MB
MD5bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
C:\ProgramData\sqlite3.dllFilesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
2KB
MD5215064dd8b4566627489319b46e9ca43
SHA17fa698eef5f02a961b5862df135d7ebfd8a12292
SHA256390f76fdb79029603900524df2f0fbfd05bf18a3bbc74b9b05b2a6dc5938393c
SHA5122a5b12b41d728ce30f1712d23226bbefe73111b786156b97126d6497ef234e78feaf6db08c7412eaa336c869b93ab239cd46b33cc31ff2c8497214cba5927753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
1KB
MD57c27ffae0cbd6d55b86f387667635294
SHA16df10a537a970852086711da85ae84f7355bff72
SHA256b6a9400010fea1af51104c2b48fdd4383d8b7a81bd62a22c188db3cdb7413503
SHA512140752fd448ed5cd01c5463d67b7dd2c5c111fd4256d3686b792bc0ff788bed49fdfe901402fdb080b9a6c0789725dda6256280120fadc5aca1f127a552e13d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
488B
MD55157233536fda441b95750e51e0bc93d
SHA13417451385ad7bdfa4ddd55da7ea03105dce0824
SHA256c99397c673230c51c7b2b190200c7cd288eb5e26299248f4f3b826229ec06bf1
SHA512d83c0137b4b41133532877dd1d38f6552b93f2b0759a7d28865cbebabf9017b3a471c8bf6b9f7c665b6ccda401e4ec5abd6927b2540b7dbed0c7a1454035a2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
482B
MD5a844b02be0bd334b92188c9d53da7964
SHA1df0cf772c454d33e2cba2dd768feb14d79389f31
SHA25681a3472f89905a4ed919ea75262c208d0d485c9d3a1ef29f445e26a994cbd76d
SHA5124f0c00ed3c936f64e9e050aa6237ab8222af818a0f7ec7dcb1d1bed860c079713cec571cc8ba015478f26d28db26058029f86dcea2852cfe615941a261031a46
-
C:\Users\Admin\AppData\Local\77a322fa-d9e6-43e4-a311-1047c1ba8ce3\build2.exeFilesize
383KB
MD58d7db6982df46c3b0f0cc879d892c08a
SHA164e3d7ab4793aeb05d18a82159c579e05c45fd71
SHA256116e15e94d70dde65f91f155580bd9b34ff1956b9ebe1a53b6bce912b281c1f6
SHA5120eeb242e6e1356a2a9e3183f12439ef36fac40e27ac8c0df5f591c7b3c1324145627c92c3fee15aedee2c1e8cc3b966152af73a33196166c2c1bfbbd979bdb5b
-
C:\Users\Admin\AppData\Local\77a322fa-d9e6-43e4-a311-1047c1ba8ce3\build2.exeFilesize
383KB
MD58d7db6982df46c3b0f0cc879d892c08a
SHA164e3d7ab4793aeb05d18a82159c579e05c45fd71
SHA256116e15e94d70dde65f91f155580bd9b34ff1956b9ebe1a53b6bce912b281c1f6
SHA5120eeb242e6e1356a2a9e3183f12439ef36fac40e27ac8c0df5f591c7b3c1324145627c92c3fee15aedee2c1e8cc3b966152af73a33196166c2c1bfbbd979bdb5b
-
C:\Users\Admin\AppData\Local\77a322fa-d9e6-43e4-a311-1047c1ba8ce3\build2.exeFilesize
383KB
MD58d7db6982df46c3b0f0cc879d892c08a
SHA164e3d7ab4793aeb05d18a82159c579e05c45fd71
SHA256116e15e94d70dde65f91f155580bd9b34ff1956b9ebe1a53b6bce912b281c1f6
SHA5120eeb242e6e1356a2a9e3183f12439ef36fac40e27ac8c0df5f591c7b3c1324145627c92c3fee15aedee2c1e8cc3b966152af73a33196166c2c1bfbbd979bdb5b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5eb12b384d6265240ddbf17207687c61c
SHA122b1587468fb41647d620cc4b0a14cc051a1ecc6
SHA256c86a931924fbfc684cd0d1d34a29bb0a636f8019a7bf349b2f70ab493db89540
SHA512a714b887b9931b04eefc2d7c6dd3b34d98c26d5bfd0818f07c68c518cd2a8684f138fa128bc83773b48051f86252bc971b74bbd8be188a5f9cfc9ea39ac799ca
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
92KB
MD544340a4d9c41cd020237781daa541459
SHA123026406f4ddad80360dbfb7a92cc656fcd10dea
SHA256afa4ce85db0c6ff0536993cc0d0accb06962400dc1032e929c2bca66c09fb76e
SHA512ca6abe0e66c056f8ca8d407cf6517357b5864b0fdc3653e581b8411ceb4695fd16dca2e9c48437a8e2e365c5d9064ce3533376d994cff8e3b018394aae95eb72
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.logFilesize
2KB
MD597666365f5a60c0019db21bea991eec0
SHA10d348c08d1a58f6e3bb6c62b60cb6e968cafbf78
SHA2560fd5cabf357b48d0cfa6c24dfc5ed92fffeae10f4cbb970ec63d806bd5c3f243
SHA512007524ebc2e430e75bc56111069c72ee3f32bb67fcd7ac36cf9cd0fcfe422f0ec76df6f2350a64cf3da4b194fd9ae40369705711faa52b27d385c536ba0d22cb
-
C:\Users\Admin\AppData\Local\Temp\2AED.exeFilesize
84KB
MD52f60ef19334491b0800f818fe87c42f9
SHA1a54541d84ffdd10c71053a4da5d2635129c1a5fa
SHA2562b29136f3622d331c86855ab5298b22a996d7f894bd45c4d4a61a9460dfe2095
SHA51297459e126e789b9425e8c6ea4afbc1f61732f98bad1539af6455e7154c72affd2b5ee2a6ad258a0da0fd19fd6b332c797be06aa2a757c0df90eed4f4426d5fe4
-
C:\Users\Admin\AppData\Local\Temp\2AED.exeFilesize
84KB
MD52f60ef19334491b0800f818fe87c42f9
SHA1a54541d84ffdd10c71053a4da5d2635129c1a5fa
SHA2562b29136f3622d331c86855ab5298b22a996d7f894bd45c4d4a61a9460dfe2095
SHA51297459e126e789b9425e8c6ea4afbc1f61732f98bad1539af6455e7154c72affd2b5ee2a6ad258a0da0fd19fd6b332c797be06aa2a757c0df90eed4f4426d5fe4
-
C:\Users\Admin\AppData\Local\Temp\3BF0.exeFilesize
671KB
MD5b5217bb7be0e5f48d7a63d86ed10d79e
SHA18eda656c588396f74c1abeb019992015ec134a0c
SHA256f1127c9264936045acc1c0f3d10d8683d78c865171a7ef485ecdf5d8aa2704f5
SHA5121b2ad5d7af43702d065493accd7416df2c258996642d8b472ac54af96a8282c87baf22ae4155a0a490f4ec70498bf6846b364ef6a00cd99a6de2c4e45b7c6144
-
C:\Users\Admin\AppData\Local\Temp\3BF0.exeFilesize
671KB
MD5b5217bb7be0e5f48d7a63d86ed10d79e
SHA18eda656c588396f74c1abeb019992015ec134a0c
SHA256f1127c9264936045acc1c0f3d10d8683d78c865171a7ef485ecdf5d8aa2704f5
SHA5121b2ad5d7af43702d065493accd7416df2c258996642d8b472ac54af96a8282c87baf22ae4155a0a490f4ec70498bf6846b364ef6a00cd99a6de2c4e45b7c6144
-
C:\Users\Admin\AppData\Local\Temp\5DFF.exeFilesize
243KB
MD5e217d6bc93ea9a438bcb2de790e28b8c
SHA18f8e486908f85f3d79e7b046761737cae7cdb1b5
SHA2560ad21ef01587dcaf115b17d5050fa6d3ee9d26c927d9e94af285b728e151c163
SHA512091cd0635f287edad984c47d42f0866f4cd110f9d945662b2ae70c92bf2fa3c093b391526c5d3f137acf3f1b8e12acf0dd1ea954054f1b37c9c960ead109074f
-
C:\Users\Admin\AppData\Local\Temp\5DFF.exeFilesize
243KB
MD5e217d6bc93ea9a438bcb2de790e28b8c
SHA18f8e486908f85f3d79e7b046761737cae7cdb1b5
SHA2560ad21ef01587dcaf115b17d5050fa6d3ee9d26c927d9e94af285b728e151c163
SHA512091cd0635f287edad984c47d42f0866f4cd110f9d945662b2ae70c92bf2fa3c093b391526c5d3f137acf3f1b8e12acf0dd1ea954054f1b37c9c960ead109074f
-
C:\Users\Admin\AppData\Local\Temp\62A4.exeFilesize
210KB
MD5250f7a54f9bbd18c111ecf63ac226909
SHA1db63b9a8bb1edf6f42a4fdbd8369060c66a5d6d8
SHA2560811b6b50d68c34e17270aa6829d5ade57f52d35852ad798626964b96d671584
SHA512b2edb82fca10ee4de2c844e0d8d9917beb33594e0915a3120383c75d2036419ee71b3847aaf0e8c46a94fff1e958b079495af8de42d2887ef866bf2a09ee3342
-
C:\Users\Admin\AppData\Local\Temp\62A4.exeFilesize
210KB
MD5250f7a54f9bbd18c111ecf63ac226909
SHA1db63b9a8bb1edf6f42a4fdbd8369060c66a5d6d8
SHA2560811b6b50d68c34e17270aa6829d5ade57f52d35852ad798626964b96d671584
SHA512b2edb82fca10ee4de2c844e0d8d9917beb33594e0915a3120383c75d2036419ee71b3847aaf0e8c46a94fff1e958b079495af8de42d2887ef866bf2a09ee3342
-
C:\Users\Admin\AppData\Local\Temp\8BF7.dllFilesize
1.7MB
MD5e62500fbfcf2ca07201bec90256359ed
SHA102a4db1e53e6805d6b9e4492692b654f853a7b42
SHA2562dedf7d9eac9537569c6ab778b6386b2d7df3d0441238dde5452c2ed7ecb88ca
SHA5124ab423221e78c64672f1865e58f53cd1ed0a6dd40eafb00e1e29702288231ed4e28575213601c00ca765177b6c9105590ddefd68b99dad975739e88f136a9735
-
C:\Users\Admin\AppData\Local\Temp\8BF7.dllFilesize
1.7MB
MD5e62500fbfcf2ca07201bec90256359ed
SHA102a4db1e53e6805d6b9e4492692b654f853a7b42
SHA2562dedf7d9eac9537569c6ab778b6386b2d7df3d0441238dde5452c2ed7ecb88ca
SHA5124ab423221e78c64672f1865e58f53cd1ed0a6dd40eafb00e1e29702288231ed4e28575213601c00ca765177b6c9105590ddefd68b99dad975739e88f136a9735
-
C:\Users\Admin\AppData\Local\Temp\937A.exeFilesize
718KB
MD5025ad42411f9cdade15865b6f919e088
SHA16e232fb741de630efe4ff7300f82358abfebc3e6
SHA2562bbf6f031519e3a719c717075fa6e95349913c4279be2a6e69ce6d7760f8e5e2
SHA512df36f5731739565df5a18b36499cc4fbfdeee4388f891d53719af8eee0c44c473046a934cd8338337c0ed138d69444f520f18dd0181f8ad83b4cc404e256e5d9
-
C:\Users\Admin\AppData\Local\Temp\937A.exeFilesize
718KB
MD5025ad42411f9cdade15865b6f919e088
SHA16e232fb741de630efe4ff7300f82358abfebc3e6
SHA2562bbf6f031519e3a719c717075fa6e95349913c4279be2a6e69ce6d7760f8e5e2
SHA512df36f5731739565df5a18b36499cc4fbfdeee4388f891d53719af8eee0c44c473046a934cd8338337c0ed138d69444f520f18dd0181f8ad83b4cc404e256e5d9
-
C:\Users\Admin\AppData\Local\Temp\937A.exeFilesize
718KB
MD5025ad42411f9cdade15865b6f919e088
SHA16e232fb741de630efe4ff7300f82358abfebc3e6
SHA2562bbf6f031519e3a719c717075fa6e95349913c4279be2a6e69ce6d7760f8e5e2
SHA512df36f5731739565df5a18b36499cc4fbfdeee4388f891d53719af8eee0c44c473046a934cd8338337c0ed138d69444f520f18dd0181f8ad83b4cc404e256e5d9
-
C:\Users\Admin\AppData\Local\Temp\937A.exeFilesize
718KB
MD5025ad42411f9cdade15865b6f919e088
SHA16e232fb741de630efe4ff7300f82358abfebc3e6
SHA2562bbf6f031519e3a719c717075fa6e95349913c4279be2a6e69ce6d7760f8e5e2
SHA512df36f5731739565df5a18b36499cc4fbfdeee4388f891d53719af8eee0c44c473046a934cd8338337c0ed138d69444f520f18dd0181f8ad83b4cc404e256e5d9
-
C:\Users\Admin\AppData\Local\Temp\937A.exeFilesize
718KB
MD5025ad42411f9cdade15865b6f919e088
SHA16e232fb741de630efe4ff7300f82358abfebc3e6
SHA2562bbf6f031519e3a719c717075fa6e95349913c4279be2a6e69ce6d7760f8e5e2
SHA512df36f5731739565df5a18b36499cc4fbfdeee4388f891d53719af8eee0c44c473046a934cd8338337c0ed138d69444f520f18dd0181f8ad83b4cc404e256e5d9
-
C:\Users\Admin\AppData\Local\Temp\B7EB.exeFilesize
675KB
MD51209eb5280434f121fa888e5d9665bef
SHA1d85f7e6ab0486f32bc51c772215488dcfb299941
SHA25630a2d83678b8e9a39debd957bf3e4dea8d97423fe19ca7b21a87ff1434f9b3d3
SHA51279cdf89289871b1a89b65bb36353437d4c2fa11fb0bc6a4c60affc43ad1eab6d836c17a9a0bccdbaff365713b508b130af9eda338acb08d03af8fad0a1fa5c9b
-
C:\Users\Admin\AppData\Local\Temp\B7EB.exeFilesize
675KB
MD51209eb5280434f121fa888e5d9665bef
SHA1d85f7e6ab0486f32bc51c772215488dcfb299941
SHA25630a2d83678b8e9a39debd957bf3e4dea8d97423fe19ca7b21a87ff1434f9b3d3
SHA51279cdf89289871b1a89b65bb36353437d4c2fa11fb0bc6a4c60affc43ad1eab6d836c17a9a0bccdbaff365713b508b130af9eda338acb08d03af8fad0a1fa5c9b
-
C:\Users\Admin\AppData\Local\Temp\CAE7.exeFilesize
466KB
MD5d25181138b1295651d9440faa881a5e8
SHA1bf0a5ce2bfc3a6d235f1a6c328d3246b6484b432
SHA256a002edc2b66f33a02c1292cc95567d487b3ef5c76acc6146b25c8ad7c4d7bf93
SHA5126ed0a3e9299d10c28c59630bb153b299fc9479667da0cc17be5f55eacd12a7e20651dc2bf69c7e6c69e2e09011720f6c738fa991e3c3670e5f05a1a29885e2bc
-
C:\Users\Admin\AppData\Local\Temp\CAE7.exeFilesize
466KB
MD5d25181138b1295651d9440faa881a5e8
SHA1bf0a5ce2bfc3a6d235f1a6c328d3246b6484b432
SHA256a002edc2b66f33a02c1292cc95567d487b3ef5c76acc6146b25c8ad7c4d7bf93
SHA5126ed0a3e9299d10c28c59630bb153b299fc9479667da0cc17be5f55eacd12a7e20651dc2bf69c7e6c69e2e09011720f6c738fa991e3c3670e5f05a1a29885e2bc
-
C:\Users\Admin\AppData\Local\Temp\CF0F.exeFilesize
436KB
MD5626f70b80df56306653bf1fa4bbe2f0f
SHA1da47e5a88190eefee1e37a1d78152bafd32bb176
SHA2562cfc599ed129c7805a74b57c6b4361e02e5f5f442ecacb2bde327791154575f5
SHA512ccbb5d4104fcddf545ab34c93cc4223fc153e4659b3862f4fbfb5e01ae57ba00538f8187660ffea8002a2d0e18b41a1f8a18a43dc48926b7c9bf61bb089b4af4
-
C:\Users\Admin\AppData\Local\Temp\CF0F.exeFilesize
436KB
MD5626f70b80df56306653bf1fa4bbe2f0f
SHA1da47e5a88190eefee1e37a1d78152bafd32bb176
SHA2562cfc599ed129c7805a74b57c6b4361e02e5f5f442ecacb2bde327791154575f5
SHA512ccbb5d4104fcddf545ab34c93cc4223fc153e4659b3862f4fbfb5e01ae57ba00538f8187660ffea8002a2d0e18b41a1f8a18a43dc48926b7c9bf61bb089b4af4
-
C:\Users\Admin\AppData\Local\Temp\D346.exeFilesize
615KB
MD5bd40b5f8ae13c2a8b23376a86fc44180
SHA1acc29144ac656c9c6b23a5edf87162d6b3d9e355
SHA256002d0341d1c38f40a8b28fba9fdc37146cff0fc81c7850400a31da1d7a5ded9b
SHA5125457e2c0977abb9308169402881d2bca60a535c6cfabaa4e4910cd9122722d8341c6e1b375a2a23cf25a4a4e9a3174f1525c8579a7f2357ec1e8953e987eea62
-
C:\Users\Admin\AppData\Local\Temp\D346.exeFilesize
615KB
MD5bd40b5f8ae13c2a8b23376a86fc44180
SHA1acc29144ac656c9c6b23a5edf87162d6b3d9e355
SHA256002d0341d1c38f40a8b28fba9fdc37146cff0fc81c7850400a31da1d7a5ded9b
SHA5125457e2c0977abb9308169402881d2bca60a535c6cfabaa4e4910cd9122722d8341c6e1b375a2a23cf25a4a4e9a3174f1525c8579a7f2357ec1e8953e987eea62
-
C:\Users\Admin\AppData\Local\Temp\DD59.exeFilesize
768KB
MD51ed1a6c53ec37af6a2df99a410159174
SHA1e18361a961757ae7c494ea885cec219193fa1373
SHA256b1a104adf3ad1846195ffb5213106fc76a29b4d5edcfd9bf1c4a142cceeb13b4
SHA5127d45162a5d704853b3fca3116d7fabb759419ef4647cd699173e29ca0b489b4463d480f5f4956744fee77af6e9e3c8677ca530d325f6c8e5a9d3639aa3db3a25
-
C:\Users\Admin\AppData\Local\Temp\DD59.exeFilesize
768KB
MD51ed1a6c53ec37af6a2df99a410159174
SHA1e18361a961757ae7c494ea885cec219193fa1373
SHA256b1a104adf3ad1846195ffb5213106fc76a29b4d5edcfd9bf1c4a142cceeb13b4
SHA5127d45162a5d704853b3fca3116d7fabb759419ef4647cd699173e29ca0b489b4463d480f5f4956744fee77af6e9e3c8677ca530d325f6c8e5a9d3639aa3db3a25
-
C:\Users\Admin\AppData\Local\ccca4610-3070-4d47-b72e-938255b6473b\937A.exeFilesize
718KB
MD5025ad42411f9cdade15865b6f919e088
SHA16e232fb741de630efe4ff7300f82358abfebc3e6
SHA2562bbf6f031519e3a719c717075fa6e95349913c4279be2a6e69ce6d7760f8e5e2
SHA512df36f5731739565df5a18b36499cc4fbfdeee4388f891d53719af8eee0c44c473046a934cd8338337c0ed138d69444f520f18dd0181f8ad83b4cc404e256e5d9
-
\??\pipe\crashpad_1408_HUYHNRAUDXVZHTWAMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/536-213-0x0000000000400000-0x000000000058E000-memory.dmpFilesize
1.6MB
-
memory/536-207-0x0000000000000000-mapping.dmp
-
memory/536-244-0x0000000000400000-0x000000000058E000-memory.dmpFilesize
1.6MB
-
memory/1016-230-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1016-196-0x0000000000000000-mapping.dmp
-
memory/1016-199-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1016-201-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1016-206-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1296-210-0x0000000000000000-mapping.dmp
-
memory/1296-223-0x0000000000BC8000-0x0000000000BF4000-memory.dmpFilesize
176KB
-
memory/1296-225-0x00000000009B0000-0x00000000009F9000-memory.dmpFilesize
292KB
-
memory/1748-133-0x00000000008C0000-0x00000000008C9000-memory.dmpFilesize
36KB
-
memory/1748-132-0x0000000000908000-0x0000000000919000-memory.dmpFilesize
68KB
-
memory/1748-135-0x0000000000400000-0x0000000000840000-memory.dmpFilesize
4.2MB
-
memory/1748-134-0x0000000000400000-0x0000000000840000-memory.dmpFilesize
4.2MB
-
memory/2804-136-0x0000000000000000-mapping.dmp
-
memory/3088-216-0x0000000000000000-mapping.dmp
-
memory/3316-190-0x0000000000000000-mapping.dmp
-
memory/3452-220-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3452-262-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3452-224-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3452-222-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3452-219-0x0000000000000000-mapping.dmp
-
memory/3452-226-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/3516-214-0x0000000000000000-mapping.dmp
-
memory/3588-231-0x0000000000000000-mapping.dmp
-
memory/3980-191-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3980-183-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3980-180-0x0000000000000000-mapping.dmp
-
memory/3980-181-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3980-195-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3980-186-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4400-200-0x000000000478F000-0x0000000004820000-memory.dmpFilesize
580KB
-
memory/4400-193-0x0000000000000000-mapping.dmp
-
memory/4592-235-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4592-281-0x0000000006DE0000-0x0000000006E30000-memory.dmpFilesize
320KB
-
memory/4592-234-0x0000000000000000-mapping.dmp
-
memory/4804-272-0x0000000006EF0000-0x0000000006F66000-memory.dmpFilesize
472KB
-
memory/4804-274-0x0000000006E30000-0x0000000006E4E000-memory.dmpFilesize
120KB
-
memory/4804-246-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4804-245-0x0000000000000000-mapping.dmp
-
memory/4880-215-0x0000000000000000-mapping.dmp
-
memory/5032-227-0x0000000000000000-mapping.dmp
-
memory/5132-278-0x00000000025A0000-0x00000000026A4000-memory.dmpFilesize
1.0MB
-
memory/5132-279-0x0000000000400000-0x00000000008C3000-memory.dmpFilesize
4.8MB
-
memory/5132-277-0x00000000023C1000-0x0000000002454000-memory.dmpFilesize
588KB
-
memory/5132-257-0x0000000000000000-mapping.dmp
-
memory/5392-261-0x0000000000000000-mapping.dmp
-
memory/5476-267-0x0000000000000000-mapping.dmp
-
memory/5512-268-0x0000000000000000-mapping.dmp
-
memory/5812-269-0x0000000000000000-mapping.dmp
-
memory/5812-271-0x0000000000620000-0x000000000062B000-memory.dmpFilesize
44KB
-
memory/5812-270-0x0000000000630000-0x0000000000637000-memory.dmpFilesize
28KB
-
memory/5812-303-0x0000000000630000-0x0000000000637000-memory.dmpFilesize
28KB
-
memory/5904-304-0x0000000000D30000-0x0000000000D39000-memory.dmpFilesize
36KB
-
memory/5904-275-0x0000000000D30000-0x0000000000D39000-memory.dmpFilesize
36KB
-
memory/5904-273-0x0000000000000000-mapping.dmp
-
memory/5904-276-0x0000000000D20000-0x0000000000D2F000-memory.dmpFilesize
60KB
-
memory/6156-282-0x00000000008E0000-0x00000000008E5000-memory.dmpFilesize
20KB
-
memory/6156-305-0x00000000008E0000-0x00000000008E5000-memory.dmpFilesize
20KB
-
memory/6156-283-0x00000000008D0000-0x00000000008D9000-memory.dmpFilesize
36KB
-
memory/6156-280-0x0000000000000000-mapping.dmp
-
memory/6340-308-0x00000000007A0000-0x00000000007A6000-memory.dmpFilesize
24KB
-
memory/6340-286-0x0000000000790000-0x000000000079C000-memory.dmpFilesize
48KB
-
memory/6340-285-0x00000000007A0000-0x00000000007A6000-memory.dmpFilesize
24KB
-
memory/6340-284-0x0000000000000000-mapping.dmp
-
memory/6604-287-0x0000000000000000-mapping.dmp
-
memory/6604-311-0x00000000010F0000-0x0000000001112000-memory.dmpFilesize
136KB
-
memory/6604-288-0x00000000010F0000-0x0000000001112000-memory.dmpFilesize
136KB
-
memory/6604-289-0x00000000010C0000-0x00000000010E7000-memory.dmpFilesize
156KB
-
memory/6784-292-0x0000000000600000-0x0000000000609000-memory.dmpFilesize
36KB
-
memory/6784-290-0x0000000000000000-mapping.dmp
-
memory/6784-291-0x0000000000610000-0x0000000000615000-memory.dmpFilesize
20KB
-
memory/7112-314-0x0000000000460000-0x0000000000466000-memory.dmpFilesize
24KB
-
memory/7112-295-0x0000000000450000-0x000000000045B000-memory.dmpFilesize
44KB
-
memory/7112-294-0x0000000000460000-0x0000000000466000-memory.dmpFilesize
24KB
-
memory/7112-293-0x0000000000000000-mapping.dmp
-
memory/7220-315-0x0000000000CB0000-0x0000000000CB7000-memory.dmpFilesize
28KB
-
memory/7220-299-0x0000000000CA0000-0x0000000000CAD000-memory.dmpFilesize
52KB
-
memory/7220-298-0x0000000000CB0000-0x0000000000CB7000-memory.dmpFilesize
28KB
-
memory/7220-296-0x0000000000000000-mapping.dmp
-
memory/7264-301-0x00000000010D0000-0x00000000010D8000-memory.dmpFilesize
32KB
-
memory/7264-300-0x0000000000000000-mapping.dmp
-
memory/7264-302-0x00000000010C0000-0x00000000010CB000-memory.dmpFilesize
44KB
-
memory/7340-306-0x0000000000000000-mapping.dmp
-
memory/7436-310-0x0000000000000000-mapping.dmp
-
memory/7552-312-0x0000000000000000-mapping.dmp
-
memory/7628-313-0x0000000000000000-mapping.dmp
-
memory/7660-316-0x0000000000000000-mapping.dmp
-
memory/7736-317-0x0000000000000000-mapping.dmp
-
memory/7912-322-0x0000000000000000-mapping.dmp
-
memory/7940-324-0x0000000000000000-mapping.dmp
-
memory/8012-326-0x0000000000000000-mapping.dmp
-
memory/8096-327-0x0000000000000000-mapping.dmp
-
memory/8144-328-0x0000000000000000-mapping.dmp
-
memory/8212-329-0x0000000000000000-mapping.dmp
-
memory/8264-330-0x0000000000000000-mapping.dmp
-
memory/8308-332-0x0000000000000000-mapping.dmp
-
memory/8400-335-0x0000000000000000-mapping.dmp
-
memory/8432-337-0x0000000000000000-mapping.dmp
-
memory/8508-339-0x0000000000000000-mapping.dmp
-
memory/9512-341-0x0000000000000000-mapping.dmp
-
memory/9576-342-0x0000000000000000-mapping.dmp
-
memory/9600-344-0x0000000073700000-0x000000007372A000-memory.dmpFilesize
168KB
-
memory/9600-343-0x0000000073120000-0x00000000731E1000-memory.dmpFilesize
772KB
-
memory/9600-345-0x00000000008D0000-0x0000000000D1C000-memory.dmpFilesize
4.3MB
-
memory/9648-346-0x0000000000000000-mapping.dmp
-
memory/9728-352-0x0000000000000000-mapping.dmp
-
memory/9836-355-0x0000000000000000-mapping.dmp
-
memory/9876-358-0x0000000000000000-mapping.dmp
-
memory/10148-371-0x0000000000000000-mapping.dmp
-
memory/10228-374-0x0000000000000000-mapping.dmp
-
memory/101740-154-0x0000000006640000-0x00000000066D2000-memory.dmpFilesize
584KB
-
memory/101740-139-0x0000000000000000-mapping.dmp
-
memory/101740-140-0x0000000000400000-0x0000000000460000-memory.dmpFilesize
384KB
-
memory/101740-145-0x0000000005B30000-0x0000000006148000-memory.dmpFilesize
6.1MB
-
memory/101740-146-0x0000000005650000-0x000000000575A000-memory.dmpFilesize
1.0MB
-
memory/101740-147-0x0000000005580000-0x0000000005592000-memory.dmpFilesize
72KB
-
memory/101740-148-0x00000000055E0000-0x000000000561C000-memory.dmpFilesize
240KB
-
memory/101740-160-0x0000000008DC0000-0x00000000092EC000-memory.dmpFilesize
5.2MB
-
memory/101740-152-0x00000000058F0000-0x0000000005956000-memory.dmpFilesize
408KB
-
memory/101740-153-0x0000000006BF0000-0x0000000007194000-memory.dmpFilesize
5.6MB
-
memory/101740-159-0x00000000069B0000-0x0000000006B72000-memory.dmpFilesize
1.8MB
-
memory/101812-184-0x00000000046D9000-0x000000000476A000-memory.dmpFilesize
580KB
-
memory/101812-185-0x00000000049A0000-0x0000000004ABB000-memory.dmpFilesize
1.1MB
-
memory/101812-176-0x0000000000000000-mapping.dmp
-
memory/101956-149-0x0000000000000000-mapping.dmp
-
memory/101956-164-0x00000000008A9000-0x00000000008B9000-memory.dmpFilesize
64KB
-
memory/101956-165-0x0000000000400000-0x0000000000840000-memory.dmpFilesize
4.2MB
-
memory/102032-161-0x0000000002BD0000-0x0000000002CD0000-memory.dmpFilesize
1024KB
-
memory/102032-163-0x0000000000400000-0x0000000002B7F000-memory.dmpFilesize
39.5MB
-
memory/102032-166-0x0000000000400000-0x0000000002B7F000-memory.dmpFilesize
39.5MB
-
memory/102032-162-0x0000000002BB0000-0x0000000002BB9000-memory.dmpFilesize
36KB
-
memory/102032-155-0x0000000000000000-mapping.dmp
-
memory/102372-167-0x0000000000000000-mapping.dmp
-
memory/102396-169-0x0000000000000000-mapping.dmp
-
memory/102396-171-0x0000000000400000-0x00000000005A8000-memory.dmpFilesize
1.7MB
-
memory/102396-175-0x0000000002910000-0x0000000002916000-memory.dmpFilesize
24KB
-
memory/102396-179-0x0000000002BB0000-0x0000000002C6F000-memory.dmpFilesize
764KB
-
memory/102396-187-0x0000000002C70000-0x0000000002D19000-memory.dmpFilesize
676KB