Overview
overview
10Static
static
10TrashMalwa...in.exe
windows10-2004-x64
8TrashMalwa...er.exe
windows10-2004-x64
8TrashMalwa...nk.exe
windows10-2004-x64
8TrashMalwa...oN.bat
windows10-2004-x64
8TrashMalwa...zz.exe
windows10-2004-x64
6TrashMalwa...de.exe
windows10-2004-x64
8TrashMalwa...20.exe
windows10-2004-x64
7TrashMalwa...ll.exe
windows10-2004-x64
8TrashMalwa...le.exe
windows10-2004-x64
8TrashMalwa...oe.bat
windows10-2004-x64
TrashMalwa....0.exe
windows10-2004-x64
7TrashMalwa....0.exe
windows10-2004-x64
8TrashMalwa....0.exe
windows10-2004-x64
8TrashMalwa...ic.exe
windows10-2004-x64
6TrashMalwa...OD.exe
windows10-2004-x64
10TrashMalwa...um.exe
windows10-2004-x64
6TrashMalwa...er.exe
windows10-2004-x64
8TrashMalwa...MZ.exe
windows10-2004-x64
1TrashMalwa...ch.exe
windows10-2004-x64
8TrashMalwa....5.exe
windows10-2004-x64
8TrashMalwa...ol.exe
windows10-2004-x64
8TrashMalwa...hm.exe
windows10-2004-x64
10TrashMalwa...10.exe
windows10-2004-x64
7TrashMalwa...V6.exe
windows10-2004-x64
7TrashMalwa.../x.exe
windows10-2004-x64
7Analysis
-
max time kernel
300s -
max time network
324s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2022 14:13
Behavioral task
behavioral1
Sample
TrashMalwares-main/AcidRain.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
TrashMalwares-main/Antivirus_Installer.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
TrashMalwares-main/Dro trojan. Virus prank.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
TrashMalwares-main/FaZoN.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
TrashMalwares-main/Fizz.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral6
Sample
TrashMalwares-main/Ginxide.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
TrashMalwares-main/Install Windows20.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral8
Sample
TrashMalwares-main/MS-RickRoll.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
TrashMalwares-main/MercuryXhoffle.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral10
Sample
TrashMalwares-main/NetPakoe.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
TrashMalwares-main/NetPakoe3.0.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral12
Sample
TrashMalwares-main/NoEscape8.0.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
TrashMalwares-main/PC shaking v4.0.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral14
Sample
TrashMalwares-main/Phsyletric.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
TrashMalwares-main/RealBSOD.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral16
Sample
TrashMalwares-main/Sankylium.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
TrashMalwares-main/SuperWacker.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral18
Sample
TrashMalwares-main/TEMZ.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
TrashMalwares-main/ach.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral20
Sample
TrashMalwares-main/even0.5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
TrashMalwares-main/lol.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral22
Sample
TrashMalwares-main/mhm.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
TrashMalwares-main/winnit6.6.6 V10.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral24
Sample
TrashMalwares-main/winnit6.6.6_V6.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
TrashMalwares-main/x.exe
Resource
win10v2004-20220812-en
General
-
Target
TrashMalwares-main/Dro trojan. Virus prank.exe
-
Size
1.8MB
-
MD5
af483a4c67d358dd807194ef89484f1e
-
SHA1
4aefb5884e289fb85af3f5a5bec344b738073603
-
SHA256
480ca2097e13abb1444b69b0d984961702f8ee8122fc0f0acc5bff217d253854
-
SHA512
e5739841097828a7789e7a3317a0efa1ce4c109490df1d1ce62e559fa555affc7aee69d389bb50d5dbb4bf5d1d87d94a22cf4a5b9a0e3d7da3b48813c1c75917
-
SSDEEP
49152:ysNjxEmz1dG6HOMlDTsBQL/difgzGSe5Wa6IQ:yYymicDT2C/EfyuUl
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 15 IoCs
Processes:
START.exeKiller.exeShaking_horizontally.exeR_O_13-27.exeDraw_cursor.exeError_icons.exeInversion_and_oil.exeNew_Names.exeShaking_horizontally.exeShaking_vertically.exeSPAM.exeSPAM.exeGlitch.exeSPAM.exeSPAM.exepid process 4872 START.exe 1500 Killer.exe 2692 Shaking_horizontally.exe 3972 R_O_13-27.exe 2320 Draw_cursor.exe 2036 Error_icons.exe 2616 Inversion_and_oil.exe 4924 New_Names.exe 4764 Shaking_horizontally.exe 2372 Shaking_vertically.exe 3192 SPAM.exe 2232 SPAM.exe 2440 Glitch.exe 744 SPAM.exe 1588 SPAM.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exeWScript.exeR_O_13-27.exeWScript.exeDro trojan. Virus prank.exeSTART.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation R_O_13-27.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Dro trojan. Virus prank.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation START.exe -
Loads dropped DLL 10 IoCs
Processes:
START.exeKiller.exeShaking_horizontally.exeR_O_13-27.exeDraw_cursor.exeError_icons.exeInversion_and_oil.exeShaking_horizontally.exeShaking_vertically.exeGlitch.exepid process 4872 START.exe 1500 Killer.exe 2692 Shaking_horizontally.exe 3972 R_O_13-27.exe 2320 Draw_cursor.exe 2036 Error_icons.exe 2616 Inversion_and_oil.exe 4764 Shaking_horizontally.exe 2372 Shaking_vertically.exe 2440 Glitch.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\5bc40a9c-8f82-4db3-8393-7daa40fd2131.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220918162350.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 9 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 684 timeout.exe 644 timeout.exe 4784 timeout.exe 1452 timeout.exe 1280 timeout.exe 3976 timeout.exe 3180 timeout.exe 1508 timeout.exe 3964 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 10 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 960 taskkill.exe 4324 taskkill.exe 1104 taskkill.exe 2116 taskkill.exe 400 taskkill.exe 1444 taskkill.exe 2068 taskkill.exe 4112 taskkill.exe 772 taskkill.exe 4000 taskkill.exe -
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies registry class 64 IoCs
Processes:
explorer.execontrol.execontrol.execalc.execontrol.execontrol.execalc.execontrol.exemsedge.exeSTART.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\RADCUI.dll,-15301#immutable1 = "Manage your RemoteApp and Desktop Connections" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\systemcpl.dll,-1#immutable1 = "System" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\srchadmin.dll,-601#immutable1 = "Indexing Options" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\netcenter.dll,-2#immutable1 = "Check network status, change network settings and set preferences for sharing files and printers." explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\Vault.dll,-1#immutable1 = "Credential Manager" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\appwiz.cpl,-160#immutable1 = "Uninstall or change programs on your computer." explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings control.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings control.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings calc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\main.cpl,-102#immutable1 = "Keyboard" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\devmgr.dll,-5#immutable1 = "View and update your device hardware settings and driver software." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\fvecpl.dll,-1#immutable1 = "BitLocker Drive Encryption" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\telephon.cpl,-1#immutable1 = "Phone and Modem" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\colorcpl.exe,-7#immutable1 = "Change advanced color management settings for displays, scanners, and printers." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\sdcpl.dll,-100#immutable1 = "Recover copies of your files backed up in Windows 7" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\accessibilitycpl.dll,-10#immutable1 = "Ease of Access Center" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings control.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\powercpl.dll,-1#immutable1 = "Power Options" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\inetcpl.cpl,-4313#immutable1 = "Configure your Internet display and connection settings." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\netcenter.dll,-1#immutable1 = "Network and Sharing Center" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\DeviceCenter.dll,-2000#immutable1 = "View and manage devices, printers, and print jobs" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\DiagCpl.dll,-1#immutable1 = "Troubleshooting" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings control.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\Speech\SpeechUX\speechuxcpl.dll,-1#immutable1 = "Speech Recognition" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\usercpl.dll,-1#immutable1 = "User Accounts" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\main.cpl,-101#immutable1 = "Customize your mouse settings, such as the button configuration, double-click speed, mouse pointers, and motion speed." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\timedate.cpl,-51#immutable1 = "Date and Time" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\mmsys.cpl,-301#immutable1 = "Configure your audio devices or change the sound scheme for your computer." explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings calc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\Vault.dll,-2#immutable1 = "Manage your Windows credentials." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\devmgr.dll,-4#immutable1 = "Device Manager" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\SyncCenter.dll,-3000#immutable1 = "Sync Center" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\Speech\SpeechUX\speechuxcpl.dll,-2#immutable1 = "Configure how speech recognition works on your computer." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\colorcpl.exe,-6#immutable1 = "Color Management" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\sdcpl.dll,-101#immutable1 = "Backup and Restore (Windows 7)" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings control.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\FirewallControlPanel.dll,-12122#immutable1 = "Windows Defender Firewall" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\recovery.dll,-2#immutable1 = "Recovery" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\powercpl.dll,-2#immutable1 = "Conserve energy or maximize performance by choosing how your computer manages power." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\appwiz.cpl,-159#immutable1 = "Programs and Features" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\accessibilitycpl.dll,-45#immutable1 = "Make your computer easier to use." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\timedate.cpl,-52#immutable1 = "Set the date, time, and time zone for your computer." explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\sud.dll,-1#immutable1 = "Default Programs" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\main.cpl,-100#immutable1 = "Mouse" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\recovery.dll,-101#immutable1 = "Recovery" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\DeviceCenter.dll,-1000#immutable1 = "Devices and Printers" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\fvecpl.dll,-2#immutable1 = "Protect your PC using BitLocker Drive Encryption." explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\intl.cpl,-3#immutable1 = "Region" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\srchadmin.dll,-602#immutable1 = "Change how Windows indexes to search faster" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings START.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\RADCUI.dll,-15300#immutable1 = "RemoteApp and Desktop Connections" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\fhcpl.dll,-52#immutable1 = "File History" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\mmsys.cpl,-300#immutable1 = "Sound" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\intl.cpl,-2#immutable1 = "Customize settings for the display of languages, numbers, times, and dates." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\main.cpl,-103#immutable1 = "Customize your keyboard settings, such as the cursor blink rate and the character repeat rate." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\inetcpl.cpl,-4312#immutable1 = "Internet Options" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\DiagCpl.dll,-15#immutable1 = "Troubleshoot and fix common computer problems." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\fhcpl.dll,-2#immutable1 = "Keep a history of your files" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\sud.dll,-10#immutable1 = "Choose which programs you want Windows to use for activities like web browsing, editing photos, sending e-mail, and playing music." explorer.exe -
Runs regedit.exe 2 IoCs
Processes:
regedit.exeregedit.exepid process 2060 regedit.exe 3608 regedit.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
explorer.exepid process 3524 explorer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 1264 msedge.exe 1264 msedge.exe 4024 msedge.exe 4024 msedge.exe 1884 identity_helper.exe 1884 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
regedit.exepid process 2060 regedit.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
msedge.exepid process 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeexplorer.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 4112 taskkill.exe Token: SeDebugPrivilege 1104 taskkill.exe Token: SeDebugPrivilege 2116 taskkill.exe Token: SeDebugPrivilege 400 taskkill.exe Token: SeDebugPrivilege 772 taskkill.exe Token: SeDebugPrivilege 1444 taskkill.exe Token: SeShutdownPrivilege 3524 explorer.exe Token: SeCreatePagefilePrivilege 3524 explorer.exe Token: SeDebugPrivilege 2068 taskkill.exe Token: SeDebugPrivilege 4000 taskkill.exe Token: SeDebugPrivilege 960 taskkill.exe Token: SeDebugPrivilege 4324 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
WScript.exeexplorer.exemsedge.exepid process 3924 WScript.exe 3524 explorer.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
OpenWith.exeOpenWith.exepid process 1884 OpenWith.exe 2268 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Dro trojan. Virus prank.exeSTART.exeWScript.execmd.exeWScript.execmd.exeR_O_13-27.exedescription pid process target process PID 4032 wrote to memory of 4872 4032 Dro trojan. Virus prank.exe START.exe PID 4032 wrote to memory of 4872 4032 Dro trojan. Virus prank.exe START.exe PID 4032 wrote to memory of 4872 4032 Dro trojan. Virus prank.exe START.exe PID 4872 wrote to memory of 5012 4872 START.exe WScript.exe PID 4872 wrote to memory of 5012 4872 START.exe WScript.exe PID 4872 wrote to memory of 5012 4872 START.exe WScript.exe PID 4872 wrote to memory of 1500 4872 START.exe Killer.exe PID 4872 wrote to memory of 1500 4872 START.exe Killer.exe PID 4872 wrote to memory of 1500 4872 START.exe Killer.exe PID 5012 wrote to memory of 2716 5012 WScript.exe cmd.exe PID 5012 wrote to memory of 2716 5012 WScript.exe cmd.exe PID 5012 wrote to memory of 2716 5012 WScript.exe cmd.exe PID 2716 wrote to memory of 1960 2716 cmd.exe reg.exe PID 2716 wrote to memory of 1960 2716 cmd.exe reg.exe PID 2716 wrote to memory of 1960 2716 cmd.exe reg.exe PID 2716 wrote to memory of 4112 2716 cmd.exe taskkill.exe PID 2716 wrote to memory of 4112 2716 cmd.exe taskkill.exe PID 2716 wrote to memory of 4112 2716 cmd.exe taskkill.exe PID 2716 wrote to memory of 1104 2716 cmd.exe taskkill.exe PID 2716 wrote to memory of 1104 2716 cmd.exe taskkill.exe PID 2716 wrote to memory of 1104 2716 cmd.exe taskkill.exe PID 2716 wrote to memory of 2116 2716 cmd.exe taskkill.exe PID 2716 wrote to memory of 2116 2716 cmd.exe taskkill.exe PID 2716 wrote to memory of 2116 2716 cmd.exe taskkill.exe PID 2716 wrote to memory of 400 2716 cmd.exe taskkill.exe PID 2716 wrote to memory of 400 2716 cmd.exe taskkill.exe PID 2716 wrote to memory of 400 2716 cmd.exe taskkill.exe PID 2716 wrote to memory of 772 2716 cmd.exe taskkill.exe PID 2716 wrote to memory of 772 2716 cmd.exe taskkill.exe PID 2716 wrote to memory of 772 2716 cmd.exe taskkill.exe PID 2716 wrote to memory of 1100 2716 cmd.exe reg.exe PID 2716 wrote to memory of 1100 2716 cmd.exe reg.exe PID 2716 wrote to memory of 1100 2716 cmd.exe reg.exe PID 4872 wrote to memory of 3924 4872 START.exe WScript.exe PID 4872 wrote to memory of 3924 4872 START.exe WScript.exe PID 4872 wrote to memory of 3924 4872 START.exe WScript.exe PID 4872 wrote to memory of 760 4872 START.exe WScript.exe PID 4872 wrote to memory of 760 4872 START.exe WScript.exe PID 4872 wrote to memory of 760 4872 START.exe WScript.exe PID 760 wrote to memory of 1828 760 WScript.exe cmd.exe PID 760 wrote to memory of 1828 760 WScript.exe cmd.exe PID 760 wrote to memory of 1828 760 WScript.exe cmd.exe PID 1828 wrote to memory of 2692 1828 cmd.exe Shaking_horizontally.exe PID 1828 wrote to memory of 2692 1828 cmd.exe Shaking_horizontally.exe PID 1828 wrote to memory of 2692 1828 cmd.exe Shaking_horizontally.exe PID 1828 wrote to memory of 1452 1828 cmd.exe timeout.exe PID 1828 wrote to memory of 1452 1828 cmd.exe timeout.exe PID 1828 wrote to memory of 1452 1828 cmd.exe timeout.exe PID 1828 wrote to memory of 1444 1828 cmd.exe taskkill.exe PID 1828 wrote to memory of 1444 1828 cmd.exe taskkill.exe PID 1828 wrote to memory of 1444 1828 cmd.exe taskkill.exe PID 4872 wrote to memory of 3972 4872 START.exe R_O_13-27.exe PID 4872 wrote to memory of 3972 4872 START.exe R_O_13-27.exe PID 4872 wrote to memory of 3972 4872 START.exe R_O_13-27.exe PID 3972 wrote to memory of 2824 3972 R_O_13-27.exe control.exe PID 3972 wrote to memory of 2824 3972 R_O_13-27.exe control.exe PID 3972 wrote to memory of 2824 3972 R_O_13-27.exe control.exe PID 3972 wrote to memory of 2060 3972 R_O_13-27.exe regedit.exe PID 3972 wrote to memory of 2060 3972 R_O_13-27.exe regedit.exe PID 3972 wrote to memory of 2060 3972 R_O_13-27.exe regedit.exe PID 4872 wrote to memory of 2320 4872 START.exe Draw_cursor.exe PID 4872 wrote to memory of 2320 4872 START.exe Draw_cursor.exe PID 4872 wrote to memory of 2320 4872 START.exe Draw_cursor.exe PID 3972 wrote to memory of 2456 3972 R_O_13-27.exe control.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TrashMalwares-main\Dro trojan. Virus prank.exe"C:\Users\Admin\AppData\Local\Temp\TrashMalwares-main\Dro trojan. Virus prank.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\START.exe"C:\Users\Admin\AppData\Local\Temp\START.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ZbDz.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZbDz.bat" "4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /f /v "DisableTaskMgr" /t REG_DWORD /d 15⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM Taskmgr.exe /F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM Taskmgr.exe /F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM Taskmgr.exe /F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM Taskmgr.exe /F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM Taskmgr.exe /F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /f /v "DisableTaskMgr" /t REG_DWORD /d 15⤵
-
C:\Users\Admin\AppData\Local\Temp\Killer.exe"C:\Users\Admin\AppData\Local\Temp\Killer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Collapse_all.js"3⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\SHK.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SHK.bat" "4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Shaking_horizontally.exeShaking_horizontally.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\timeout.exetimeout /t 15⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM Shaking_horizontally.exe /F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\R_O_13-27.exe"C:\Users\Admin\AppData\Local\Temp\R_O_13-27.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe"4⤵
- Modifies registry class
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe"4⤵
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe"4⤵
- Modifies registry class
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe"4⤵
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe"4⤵
- Modifies registry class
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe"4⤵
- Modifies registry class
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe"4⤵
- Runs regedit.exe
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe"4⤵
- Modifies registry class
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe"4⤵
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"4⤵
- Modifies registry class
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"4⤵
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://neave.tv/4⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcce7546f8,0x7ffcce754708,0x7ffcce7547185⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:25⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3740 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5304 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3344 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5308 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6524 /prefetch:85⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings5⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff72e685460,0x7ff72e685470,0x7ff72e6854806⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6524 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:15⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://neave.tv/4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcce7546f8,0x7ffcce754708,0x7ffcce7547185⤵
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\Draw_cursor.exe"C:\Users\Admin\AppData\Local\Temp\Draw_cursor.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\Error_icons.exe"C:\Users\Admin\AppData\Local\Temp\Error_icons.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\Inversion_and_oil.exe"C:\Users\Admin\AppData\Local\Temp\Inversion_and_oil.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\New_Names.exe"C:\Users\Admin\AppData\Local\Temp\New_Names.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Shaking_horizontally.exe"C:\Users\Admin\AppData\Local\Temp\Shaking_horizontally.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\Shaking_vertically.exe"C:\Users\Admin\AppData\Local\Temp\Shaking_vertically.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\SPZ.vbs"3⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SPZ.bat" "4⤵
-
C:\Users\Admin\AppData\Local\Temp\SPAM.exeSPAM.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\timeout.exetimeout /t 135⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM SPAM.exe /F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exetimeout /t 135⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\SPAM.exeSPAM.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\timeout.exetimeout /t 135⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM SPAM.exe /F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exetimeout /t 135⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\SPAM.exeSPAM.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\timeout.exetimeout /t 135⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM SPAM.exe /F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exetimeout /t 135⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\SPAM.exeSPAM.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\timeout.exetimeout /t 135⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM SPAM.exe /F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exetimeout /t 135⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\Glitch.exe"C:\Users\Admin\AppData\Local\Temp\Glitch.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x244 0x5181⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5f647a9024e00f209b4882586b48a6d1c
SHA1825a1e51260086c4261315dbc9704e1848fe5ff7
SHA25677614c9d1cb42c41c0ce0415aecc9a20823ba79bdcdb8a27e90be7a16c57229b
SHA51284961cc97defa398b0053b40453db58198b3e5bd2ad59770707ed11eb282eff479664253e616427826b40377e6486cdc1676369324617e5b5b0262b904f2ca9a
-
C:\Users\Admin\AppData\Local\Temp\Collapse_all.jsFilesize
58B
MD5f60e1a46f1e7301a7eb36f723cdec4b3
SHA15e46742927659e3fb0cef6c67542cb5ec2b0926d
SHA2565fdab6a87288b929290f603f813a254efa019d8fe6c73d8757ebc543ba6949eb
SHA512945f7f053700cf18a80553e09c3d64c8481aeb70d871dd00106bf66fcb33b4360b4412cb4bf9391e4dfd8e6df92d11ffe896bee6f864bdbdddedc1877714ee16
-
C:\Users\Admin\AppData\Local\Temp\Draw_cursor.exeFilesize
27KB
MD54f5d56501b68860d79846d1c4a567459
SHA1548a514797c85e982a0f636030a18566895efaaa
SHA2560df880855797fb52bcaac0e11074869ed409b9daaabfe8939ecd4039962292cd
SHA5125efc549dcef528f0f5b09758ce18686106781788c0e78467d02fb12b7b138c0ca301d68e81305e7053f5471fa6c9c192d6bad81067fe70803e237b8dbf7d1f41
-
C:\Users\Admin\AppData\Local\Temp\Draw_cursor.exeFilesize
27KB
MD54f5d56501b68860d79846d1c4a567459
SHA1548a514797c85e982a0f636030a18566895efaaa
SHA2560df880855797fb52bcaac0e11074869ed409b9daaabfe8939ecd4039962292cd
SHA5125efc549dcef528f0f5b09758ce18686106781788c0e78467d02fb12b7b138c0ca301d68e81305e7053f5471fa6c9c192d6bad81067fe70803e237b8dbf7d1f41
-
C:\Users\Admin\AppData\Local\Temp\Error_icons.exeFilesize
27KB
MD5d9c07b7bc1a4df56ecb73941aafa2d78
SHA19d64ca9262852e3ee4b5e098e2762401364e80e8
SHA256506b80e8f8551e29fa1e93082fefc99ce6613ad7abae895d61bdda92f4dce8c3
SHA512ca282eedf7851df48e0ae001684ca4400b6a43e14893610972496e7c4c7002c508b95278896176ef4d49d371d95b6cc759609313a833bcdbc010a064cb28170f
-
C:\Users\Admin\AppData\Local\Temp\Error_icons.exeFilesize
27KB
MD5d9c07b7bc1a4df56ecb73941aafa2d78
SHA19d64ca9262852e3ee4b5e098e2762401364e80e8
SHA256506b80e8f8551e29fa1e93082fefc99ce6613ad7abae895d61bdda92f4dce8c3
SHA512ca282eedf7851df48e0ae001684ca4400b6a43e14893610972496e7c4c7002c508b95278896176ef4d49d371d95b6cc759609313a833bcdbc010a064cb28170f
-
C:\Users\Admin\AppData\Local\Temp\Glitch.exeFilesize
27KB
MD5b36c78f38d93bc656f2bed0a42e23abf
SHA125622233b69ec6319d7ae9fa69874503f6c6a561
SHA2564aa85f00bce73794e4190bf29cd3cd09959f2ade6bb4e0b56f6c733fcc6008c7
SHA512f723c96a3a4800c935a584ce5f8a0c26118c96331649ed8ce439c826f03caecbb4c75be25645cd202e6fce88f1f482fd3f818593d766547b6da750576444b84c
-
C:\Users\Admin\AppData\Local\Temp\Glitch.exeFilesize
27KB
MD5b36c78f38d93bc656f2bed0a42e23abf
SHA125622233b69ec6319d7ae9fa69874503f6c6a561
SHA2564aa85f00bce73794e4190bf29cd3cd09959f2ade6bb4e0b56f6c733fcc6008c7
SHA512f723c96a3a4800c935a584ce5f8a0c26118c96331649ed8ce439c826f03caecbb4c75be25645cd202e6fce88f1f482fd3f818593d766547b6da750576444b84c
-
C:\Users\Admin\AppData\Local\Temp\Inversion_and_oil.exeFilesize
27KB
MD57cfd733ea3aedb94f04013881f8a9f14
SHA194642432fd416ec32f1cd17dfd9b23922432dcea
SHA256fceb50190c036057c6386387ed115b83a9fec153332b80be4d891cb9ef8f624a
SHA5128c2b83a6aa96bed630e950cb66cd3a50e4789f303b9f2f3f2f6043f16a3a26d7dc9a56aa43cb3af0e548b207d5a228b88eaacb0b1872fc8abd4e1191f465e323
-
C:\Users\Admin\AppData\Local\Temp\Inversion_and_oil.exeFilesize
27KB
MD57cfd733ea3aedb94f04013881f8a9f14
SHA194642432fd416ec32f1cd17dfd9b23922432dcea
SHA256fceb50190c036057c6386387ed115b83a9fec153332b80be4d891cb9ef8f624a
SHA5128c2b83a6aa96bed630e950cb66cd3a50e4789f303b9f2f3f2f6043f16a3a26d7dc9a56aa43cb3af0e548b207d5a228b88eaacb0b1872fc8abd4e1191f465e323
-
C:\Users\Admin\AppData\Local\Temp\Killer.exeFilesize
186KB
MD532c1a77891071523637345563fcda855
SHA1d582fa0290b7c04c99ded56c8ebc6e45df981300
SHA256c8cb8941b2ebe27ba69600b8cb5725b9630fb631bd7c7e88dea9eebd8bd3bef3
SHA51261c6e7eddb5d8e880952c0fec6382082cbd33d0463ac556527598aaa6cf9bdb3755f395639d28be1a0cf4efa9f699cfdae06ecb5068b5f43b08b65354580704a
-
C:\Users\Admin\AppData\Local\Temp\Killer.exeFilesize
186KB
MD532c1a77891071523637345563fcda855
SHA1d582fa0290b7c04c99ded56c8ebc6e45df981300
SHA256c8cb8941b2ebe27ba69600b8cb5725b9630fb631bd7c7e88dea9eebd8bd3bef3
SHA51261c6e7eddb5d8e880952c0fec6382082cbd33d0463ac556527598aaa6cf9bdb3755f395639d28be1a0cf4efa9f699cfdae06ecb5068b5f43b08b65354580704a
-
C:\Users\Admin\AppData\Local\Temp\MSVCR100D.dllFilesize
1.4MB
MD5440e9fd9824b8e97d3ca2f34bd1bfbd1
SHA16852b2c592b3794da114d6ac5ea9d083317bf5af
SHA256eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396
SHA512b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8
-
C:\Users\Admin\AppData\Local\Temp\New_Names.exeFilesize
389KB
MD5dd799cfa99ea38299f32a744b4a9864c
SHA1850457eea90f64bb760d078008f17799f8eb4843
SHA256f9f469026252b2c7084755430c9b0d8939a8547b23a5bb32371102d7a3578ed1
SHA5129c74976ea217276bf5b291d629aa21ace989a45697748cb449eeba8d8c846e77e7ab66c1b701243ceb207db364d1abc376950c6b5f4cb92db068922ae41dcef3
-
C:\Users\Admin\AppData\Local\Temp\New_Names.exeFilesize
389KB
MD5dd799cfa99ea38299f32a744b4a9864c
SHA1850457eea90f64bb760d078008f17799f8eb4843
SHA256f9f469026252b2c7084755430c9b0d8939a8547b23a5bb32371102d7a3578ed1
SHA5129c74976ea217276bf5b291d629aa21ace989a45697748cb449eeba8d8c846e77e7ab66c1b701243ceb207db364d1abc376950c6b5f4cb92db068922ae41dcef3
-
C:\Users\Admin\AppData\Local\Temp\R_O_13-27.exeFilesize
27KB
MD57c3647e86215919ec06437d9a5fce95d
SHA17bc1a0582e03bd9d7ee5ba1d66268d800d66c596
SHA25639e30df6628702de8a548ff031383c360dfc63a9399169bb93838f7eef57a6ed
SHA512d0a4991ad1cff73dbd0425e9f7190101f27811daa622c0fa5ba620566a9f95caae4430b0386a6ea9a7575a56931a45ca821f5274f8d2798c73d5154c8fe7e33d
-
C:\Users\Admin\AppData\Local\Temp\R_O_13-27.exeFilesize
27KB
MD57c3647e86215919ec06437d9a5fce95d
SHA17bc1a0582e03bd9d7ee5ba1d66268d800d66c596
SHA25639e30df6628702de8a548ff031383c360dfc63a9399169bb93838f7eef57a6ed
SHA512d0a4991ad1cff73dbd0425e9f7190101f27811daa622c0fa5ba620566a9f95caae4430b0386a6ea9a7575a56931a45ca821f5274f8d2798c73d5154c8fe7e33d
-
C:\Users\Admin\AppData\Local\Temp\SHK.batFilesize
94B
MD5ab921b5b6a2b7232c8d2fd2f0dc78790
SHA1fe0c9c4e5255f903bf9b006f27a913f39a115a54
SHA256dfd827c3e9bb39c84ca90001a7718c55458145fcf035b4dba1001b201422a8da
SHA51247d8ded63fd55f4490d0cd64c8f688fc5bb5814018a09e46f1eae0e36228589f4097f88f2f42e92d02cc068fd3e807aae219a4c4162474a561b3767331e8f98e
-
C:\Users\Admin\AppData\Local\Temp\SHK.vbsFilesize
115B
MD52643272752b857cbc69d843d92ff4879
SHA110f1f87652b5747dd37ed141734e5af39af19ef2
SHA25653c3cd2ed0f6184b2cf0304acfbef726c3415528c903c69a86f3f9405b52179c
SHA5123e7d2548ccbe96599b94a585c6a02e2ee2820ac6a8aec1ede270c8089623c3c41fd779fdf5a93b2cd1b9fca3ef2d2b915703f3438c7abd6e27f5a59626f01282
-
C:\Users\Admin\AppData\Local\Temp\SPAM.exeFilesize
565KB
MD58b7abf004b09373f29c365315db3477c
SHA12512819f1e484c2905cc9d942cb775d27338a26b
SHA2568d274444be0243541cfbd9963072fccfea6f0f62282360f1ad21ddf43b9b3cde
SHA5127815e21468c265e35300a9e7b7fdd2d5596361977d0710f4dacc50b519e8d172854307993f573b9a287d859b15c8d6a0eb18a9622f8cda7f54be2a8f11a2d80b
-
C:\Users\Admin\AppData\Local\Temp\SPAM.exeFilesize
565KB
MD58b7abf004b09373f29c365315db3477c
SHA12512819f1e484c2905cc9d942cb775d27338a26b
SHA2568d274444be0243541cfbd9963072fccfea6f0f62282360f1ad21ddf43b9b3cde
SHA5127815e21468c265e35300a9e7b7fdd2d5596361977d0710f4dacc50b519e8d172854307993f573b9a287d859b15c8d6a0eb18a9622f8cda7f54be2a8f11a2d80b
-
C:\Users\Admin\AppData\Local\Temp\SPAM.exeFilesize
565KB
MD58b7abf004b09373f29c365315db3477c
SHA12512819f1e484c2905cc9d942cb775d27338a26b
SHA2568d274444be0243541cfbd9963072fccfea6f0f62282360f1ad21ddf43b9b3cde
SHA5127815e21468c265e35300a9e7b7fdd2d5596361977d0710f4dacc50b519e8d172854307993f573b9a287d859b15c8d6a0eb18a9622f8cda7f54be2a8f11a2d80b
-
C:\Users\Admin\AppData\Local\Temp\SPAM.exeFilesize
565KB
MD58b7abf004b09373f29c365315db3477c
SHA12512819f1e484c2905cc9d942cb775d27338a26b
SHA2568d274444be0243541cfbd9963072fccfea6f0f62282360f1ad21ddf43b9b3cde
SHA5127815e21468c265e35300a9e7b7fdd2d5596361977d0710f4dacc50b519e8d172854307993f573b9a287d859b15c8d6a0eb18a9622f8cda7f54be2a8f11a2d80b
-
C:\Users\Admin\AppData\Local\Temp\SPAM.exeFilesize
565KB
MD58b7abf004b09373f29c365315db3477c
SHA12512819f1e484c2905cc9d942cb775d27338a26b
SHA2568d274444be0243541cfbd9963072fccfea6f0f62282360f1ad21ddf43b9b3cde
SHA5127815e21468c265e35300a9e7b7fdd2d5596361977d0710f4dacc50b519e8d172854307993f573b9a287d859b15c8d6a0eb18a9622f8cda7f54be2a8f11a2d80b
-
C:\Users\Admin\AppData\Local\Temp\SPZ.batFilesize
90B
MD572fdcbc57acce1d733feebde846ce457
SHA11a818906359777c17444293be5e2123265d1bff0
SHA2567335bb83ba8494862d059321b889a54cfee91d3caa74381fb860c0c1ed13359e
SHA512731ca25a5e2fce23232c9b1ca09206114d1ea072b754b35179059533bf81fa2e39e989cc6a7247b3e064dd4554933add38c00a820f2a47599f8b7336bb6de67b
-
C:\Users\Admin\AppData\Local\Temp\SPZ.vbsFilesize
115B
MD525c44f1d280cb45e218d5490a8dffe5a
SHA13f9244d0c5a4b235fceadd88be739987548f1e1a
SHA256161c7668eef47e1d319a8d9fde6b7796a59ff3901f64960cdc038044914b339d
SHA51229e23925a8df5e7cc48f61741dac696a8fa114985794cf9ec413af1b25e3bb20d74f7d2eb5d3253cf1f46470ab0de1dad7f34209f90072c122dc3533f6b9626d
-
C:\Users\Admin\AppData\Local\Temp\START.exeFilesize
28KB
MD5b9e9b7fbd019b7e09e77bdec78ade264
SHA10cdeda0e10d1f754d2171596d82e97e347089e01
SHA256227e8953a11d22ea948fe3b2426753a435993336ae1f49a6fe3c1dd0b70bf3b7
SHA512d2e5dadb63d0ff75e48504720186483877ecde0354fe56d88255a079c116eef5b5c59eaef6ccc99217acce5d5755fd0a50fcf93b115f9408962535a572960a85
-
C:\Users\Admin\AppData\Local\Temp\START.exeFilesize
28KB
MD5b9e9b7fbd019b7e09e77bdec78ade264
SHA10cdeda0e10d1f754d2171596d82e97e347089e01
SHA256227e8953a11d22ea948fe3b2426753a435993336ae1f49a6fe3c1dd0b70bf3b7
SHA512d2e5dadb63d0ff75e48504720186483877ecde0354fe56d88255a079c116eef5b5c59eaef6ccc99217acce5d5755fd0a50fcf93b115f9408962535a572960a85
-
C:\Users\Admin\AppData\Local\Temp\Shaking_horizontally.exeFilesize
27KB
MD5d2404ad25ee623edb58a175d4bb0c7a1
SHA14ca3589e630abebffe46782f5941f6253001bea9
SHA25635ee2069ddde1c079b1890eafd7041f59eb5170063f3f308b0b808dcc24623ce
SHA51226758e01881ccbfa5f124fb8fa15e1712d228ea1aa9e552dd5020436f55e4e83d450128e799aff829e6215eacfcb284133fdf3ca952696cadfe061477b8d0b8c
-
C:\Users\Admin\AppData\Local\Temp\Shaking_horizontally.exeFilesize
27KB
MD5d2404ad25ee623edb58a175d4bb0c7a1
SHA14ca3589e630abebffe46782f5941f6253001bea9
SHA25635ee2069ddde1c079b1890eafd7041f59eb5170063f3f308b0b808dcc24623ce
SHA51226758e01881ccbfa5f124fb8fa15e1712d228ea1aa9e552dd5020436f55e4e83d450128e799aff829e6215eacfcb284133fdf3ca952696cadfe061477b8d0b8c
-
C:\Users\Admin\AppData\Local\Temp\Shaking_horizontally.exeFilesize
27KB
MD5d2404ad25ee623edb58a175d4bb0c7a1
SHA14ca3589e630abebffe46782f5941f6253001bea9
SHA25635ee2069ddde1c079b1890eafd7041f59eb5170063f3f308b0b808dcc24623ce
SHA51226758e01881ccbfa5f124fb8fa15e1712d228ea1aa9e552dd5020436f55e4e83d450128e799aff829e6215eacfcb284133fdf3ca952696cadfe061477b8d0b8c
-
C:\Users\Admin\AppData\Local\Temp\Shaking_vertically.exeFilesize
27KB
MD5a6514b796f59e3441e8f803855a008ff
SHA11653dcd267cecc5b502cec702bed045d5929e8f8
SHA25637f603c8f75ce68ab6dd0b182ee98e32e6c0815a7e168c6d76493c6eb4c67818
SHA512181341ae81033256eb9738a0f7b909652da7a5126c4d90349c5feb1d05ff0d8cb77f721d5fe4f3be0877b899fddf2a6b58ac7b400d05af02d261f77286dffbc7
-
C:\Users\Admin\AppData\Local\Temp\Shaking_vertically.exeFilesize
27KB
MD5a6514b796f59e3441e8f803855a008ff
SHA11653dcd267cecc5b502cec702bed045d5929e8f8
SHA25637f603c8f75ce68ab6dd0b182ee98e32e6c0815a7e168c6d76493c6eb4c67818
SHA512181341ae81033256eb9738a0f7b909652da7a5126c4d90349c5feb1d05ff0d8cb77f721d5fe4f3be0877b899fddf2a6b58ac7b400d05af02d261f77286dffbc7
-
C:\Users\Admin\AppData\Local\Temp\ZbDz.batFilesize
375B
MD590716ec6d805a3e478c0a26477138efd
SHA1ceae2264e1c3c6a0bf715cf54237c3f763cd5799
SHA256f185b92c729b011a051d2d8775eee998da9e71ba6156a8da81b0fc1b25c90a77
SHA512fbda3613b691e83299077b1378aa845ab59befd61bc177e54b950f55c857c8e2b208012c026c24489f354c88404172ba25d7584f1b825ccd6880598bcc65cc56
-
C:\Users\Admin\AppData\Local\Temp\ZbDz.vbsFilesize
116B
MD58a25126b21c1f849b719999cb5d85e11
SHA1714fb5a246721c3117868c2229e7598ef7dfb2eb
SHA2568ee9f21dd968d66fb71be502c6f2b96f3e0ee1954a4bcf2e7fffa45477fb7f38
SHA5128ea3d56e58410e369c42f6e16381ee802c8df58ee7f60ab937a19417e9a86f6877241ee7472df898bb85765d0bd3a5df2a58f97c717f5da8d32e7c8acf638c84
-
C:\Users\Admin\AppData\Local\Temp\msvcr100d.dllFilesize
1.4MB
MD5440e9fd9824b8e97d3ca2f34bd1bfbd1
SHA16852b2c592b3794da114d6ac5ea9d083317bf5af
SHA256eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396
SHA512b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8
-
C:\Users\Admin\AppData\Local\Temp\msvcr100d.dllFilesize
1.4MB
MD5440e9fd9824b8e97d3ca2f34bd1bfbd1
SHA16852b2c592b3794da114d6ac5ea9d083317bf5af
SHA256eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396
SHA512b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8
-
C:\Users\Admin\AppData\Local\Temp\msvcr100d.dllFilesize
1.4MB
MD5440e9fd9824b8e97d3ca2f34bd1bfbd1
SHA16852b2c592b3794da114d6ac5ea9d083317bf5af
SHA256eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396
SHA512b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8
-
C:\Users\Admin\AppData\Local\Temp\msvcr100d.dllFilesize
1.4MB
MD5440e9fd9824b8e97d3ca2f34bd1bfbd1
SHA16852b2c592b3794da114d6ac5ea9d083317bf5af
SHA256eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396
SHA512b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8
-
C:\Users\Admin\AppData\Local\Temp\msvcr100d.dllFilesize
1.4MB
MD5440e9fd9824b8e97d3ca2f34bd1bfbd1
SHA16852b2c592b3794da114d6ac5ea9d083317bf5af
SHA256eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396
SHA512b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8
-
C:\Users\Admin\AppData\Local\Temp\msvcr100d.dllFilesize
1.4MB
MD5440e9fd9824b8e97d3ca2f34bd1bfbd1
SHA16852b2c592b3794da114d6ac5ea9d083317bf5af
SHA256eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396
SHA512b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8
-
C:\Users\Admin\AppData\Local\Temp\msvcr100d.dllFilesize
1.4MB
MD5440e9fd9824b8e97d3ca2f34bd1bfbd1
SHA16852b2c592b3794da114d6ac5ea9d083317bf5af
SHA256eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396
SHA512b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8
-
C:\Users\Admin\AppData\Local\Temp\msvcr100d.dllFilesize
1.4MB
MD5440e9fd9824b8e97d3ca2f34bd1bfbd1
SHA16852b2c592b3794da114d6ac5ea9d083317bf5af
SHA256eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396
SHA512b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8
-
C:\Users\Admin\AppData\Local\Temp\msvcr100d.dllFilesize
1.4MB
MD5440e9fd9824b8e97d3ca2f34bd1bfbd1
SHA16852b2c592b3794da114d6ac5ea9d083317bf5af
SHA256eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396
SHA512b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8
-
C:\Users\Admin\AppData\Local\Temp\msvcr100d.dllFilesize
1.4MB
MD5440e9fd9824b8e97d3ca2f34bd1bfbd1
SHA16852b2c592b3794da114d6ac5ea9d083317bf5af
SHA256eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396
SHA512b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8
-
\??\pipe\LOCAL\crashpad_4024_VYQMLXOLNBUQEOMYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/400-151-0x0000000000000000-mapping.dmp
-
memory/516-245-0x0000000000000000-mapping.dmp
-
memory/644-222-0x0000000000000000-mapping.dmp
-
memory/684-215-0x0000000000000000-mapping.dmp
-
memory/684-249-0x0000000000000000-mapping.dmp
-
memory/744-231-0x0000000000000000-mapping.dmp
-
memory/760-157-0x0000000000000000-mapping.dmp
-
memory/772-152-0x0000000000000000-mapping.dmp
-
memory/908-253-0x0000000000000000-mapping.dmp
-
memory/960-256-0x0000000000000000-mapping.dmp
-
memory/1060-243-0x0000000000000000-mapping.dmp
-
memory/1100-153-0x0000000000000000-mapping.dmp
-
memory/1104-149-0x0000000000000000-mapping.dmp
-
memory/1112-251-0x0000000000000000-mapping.dmp
-
memory/1184-247-0x0000000000000000-mapping.dmp
-
memory/1264-238-0x0000000000000000-mapping.dmp
-
memory/1280-219-0x0000000000000000-mapping.dmp
-
memory/1444-166-0x0000000000000000-mapping.dmp
-
memory/1452-162-0x0000000000000000-mapping.dmp
-
memory/1500-148-0x0000000000370000-0x00000000003B2000-memory.dmpFilesize
264KB
-
memory/1500-141-0x0000000000000000-mapping.dmp
-
memory/1508-257-0x0000000000000000-mapping.dmp
-
memory/1520-196-0x0000000000000000-mapping.dmp
-
memory/1644-223-0x0000000000000000-mapping.dmp
-
memory/1828-159-0x0000000000000000-mapping.dmp
-
memory/1880-217-0x0000000000000000-mapping.dmp
-
memory/1960-146-0x0000000000000000-mapping.dmp
-
memory/2036-185-0x0000000000960000-0x000000000097B000-memory.dmpFilesize
108KB
-
memory/2036-182-0x0000000000000000-mapping.dmp
-
memory/2060-173-0x0000000000000000-mapping.dmp
-
memory/2068-218-0x0000000000000000-mapping.dmp
-
memory/2116-150-0x0000000000000000-mapping.dmp
-
memory/2232-220-0x0000000000000000-mapping.dmp
-
memory/2320-177-0x0000000000EB0000-0x0000000000ECB000-memory.dmpFilesize
108KB
-
memory/2320-175-0x0000000000000000-mapping.dmp
-
memory/2320-179-0x0000000000EB0000-0x0000000000ECB000-memory.dmpFilesize
108KB
-
memory/2328-212-0x0000000000000000-mapping.dmp
-
memory/2372-206-0x0000000000DB0000-0x0000000000DCB000-memory.dmpFilesize
108KB
-
memory/2372-203-0x0000000000000000-mapping.dmp
-
memory/2440-227-0x0000000000000000-mapping.dmp
-
memory/2440-230-0x0000000000710000-0x000000000072B000-memory.dmpFilesize
108KB
-
memory/2456-180-0x0000000000000000-mapping.dmp
-
memory/2532-255-0x0000000000000000-mapping.dmp
-
memory/2616-191-0x0000000000F20000-0x0000000000F3B000-memory.dmpFilesize
108KB
-
memory/2616-188-0x0000000000000000-mapping.dmp
-
memory/2692-165-0x0000000000CD0000-0x0000000000CEB000-memory.dmpFilesize
108KB
-
memory/2692-160-0x0000000000000000-mapping.dmp
-
memory/2716-145-0x0000000000000000-mapping.dmp
-
memory/2824-171-0x0000000000000000-mapping.dmp
-
memory/3016-207-0x0000000000000000-mapping.dmp
-
memory/3100-258-0x0000000000000000-mapping.dmp
-
memory/3180-233-0x0000000000000000-mapping.dmp
-
memory/3192-213-0x0000000000000000-mapping.dmp
-
memory/3608-201-0x0000000000000000-mapping.dmp
-
memory/3832-210-0x0000000000000000-mapping.dmp
-
memory/3912-208-0x0000000000000000-mapping.dmp
-
memory/3916-235-0x0000000000000000-mapping.dmp
-
memory/3924-155-0x0000000000000000-mapping.dmp
-
memory/3972-172-0x00000000009C0000-0x00000000009DB000-memory.dmpFilesize
108KB
-
memory/3972-168-0x0000000000000000-mapping.dmp
-
memory/3976-225-0x0000000000000000-mapping.dmp
-
memory/4000-224-0x0000000000000000-mapping.dmp
-
memory/4024-234-0x0000000000000000-mapping.dmp
-
memory/4024-192-0x0000000000000000-mapping.dmp
-
memory/4076-237-0x0000000000000000-mapping.dmp
-
memory/4112-147-0x0000000000000000-mapping.dmp
-
memory/4148-241-0x0000000000000000-mapping.dmp
-
memory/4608-259-0x0000000000000000-mapping.dmp
-
memory/4716-186-0x0000000000000000-mapping.dmp
-
memory/4764-197-0x0000000000000000-mapping.dmp
-
memory/4764-200-0x0000000000CD0000-0x0000000000CEB000-memory.dmpFilesize
108KB
-
memory/4872-132-0x0000000000000000-mapping.dmp
-
memory/4872-137-0x0000000000110000-0x000000000012B000-memory.dmpFilesize
108KB
-
memory/4924-194-0x0000000000000000-mapping.dmp
-
memory/5012-139-0x0000000000000000-mapping.dmp