Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 08:21
Static task
static1
Behavioral task
behavioral1
Sample
f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe
Resource
win7-20221111-en
General
-
Target
f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe
-
Size
2.1MB
-
MD5
eeba4724f521e42ff8a0e784f6a1cb24
-
SHA1
6970e09618deea73835519ac8134346f57d38e86
-
SHA256
f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f
-
SHA512
5a405cc970b5a3d8896fe68bb73bd7288ec632f593db839b2969e070a3bef76ae0c29e4a5b170e3bef441a77a72d64c1250b2fb90c40604bd50fefa48dd5e172
-
SSDEEP
49152:rPFyoneU8xiPI9yJqw8Ncgz7jo9+OxycuVckvry:rFyonUxi7YwQI+eQ
Malware Config
Extracted
njrat
0.7.3
Client
dontreachme3.ddns.net:3604
EdgeBrowser.exe
-
reg_key
EdgeBrowser.exe
-
splitter
123
Extracted
nanocore
1.2.2.0
dontreachme3.ddns.net:3603
dontreachme1.ddns.net:3603
19a5c2b0-5593-40da-9945-6c6b53e85d75
-
activate_away_mode
false
-
backup_connection_host
dontreachme1.ddns.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-11-15T15:45:18.745530536Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTE2Ij8+DQo8VGFzayB2ZXJzaW9uPSIxLjIiIHhtbG5zPSJodHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL3dpbmRvd3MvMjAwNC8wMi9taXQvdGFzayI+DQogIDxSZWdpc3RyYXRpb25JbmZvIC8+DQogIDxUcmlnZ2VycyAvPg0KICA8UHJpbmNpcGFscz4NCiAgICA8UHJpbmNpcGFsIGlkPSJBdXRob3IiPg0KICAgICAgPExvZ29uVHlwZT5JbnRlcmFjdGl2ZVRva2VuPC9Mb2dvblR5cGU+DQogICAgICA8UnVuTGV2ZWw+SGlnaGVzdEF2YWlsYWJsZTwvUnVuTGV2ZWw+DQogICAgPC9QcmluY2lwYWw+DQogIDwvUHJpbmNpcGFscz4NCiAgPFNldHRpbmdzPg0KICAgIDxNdWx0aXBsZUluc3RhbmNlc1BvbGljeT5QYXJhbGxlbDwvTXVsdGlwbGVJbnN0YW5jZXNQb2xpY3k+DQogICAgPERpc2FsbG93U3RhcnRJZk9uQmF0dGVyaWVzPmZhbHNlPC9EaXNhbGxvd1N0YXJ0SWZPbkJhdHRlcmllcz4NCiAgICA8U3RvcElmR29pbmdPbkJhdHRlcmllcz5mYWxzZTwvU3RvcElmR29pbmdPbkJhdHRlcmllcz4NCiAgICA8QWxsb3dIYXJkVGVybWluYXRlPnRydWU8L0FsbG93SGFyZFRlcm1pbmF0ZT4NCiAgICA8U3RhcnRXaGVuQXZhaWxhYmxlPmZhbHNlPC9TdGFydFdoZW5BdmFpbGFibGU+DQogICAgPFJ1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+ZmFsc2U8L1J1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+DQogICAgPElkbGVTZXR0aW5ncz4NCiAgICAgIDxTdG9wT25JZGxlRW5kPmZhbHNlPC9TdG9wT25JZGxlRW5kPg0KICAgICAgPFJlc3RhcnRPbklkbGU+ZmFsc2U8L1Jlc3RhcnRPbklkbGU+DQogICAgPC9JZGxlU2V0dGluZ3M+DQogICAgPEFsbG93U3RhcnRPbkRlbWFuZD50cnVlPC9BbGxvd1N0YXJ0T25EZW1hbmQ+DQogICAgPEVuYWJsZWQ+dHJ1ZTwvRW5hYmxlZD4NCiAgICA8SGlkZGVuPmZhbHNlPC9IaWRkZW4+DQogICAgPFJ1bk9ubHlJZklkbGU+ZmFsc2U8L1J1bk9ubHlJZklkbGU+DQogICAgPFdha2VUb1J1bj5mYWxzZTwvV2FrZVRvUnVuPg0KICAgIDxFeGVjdXRpb25UaW1lTGltaXQ+UFQwUzwvRXhlY3V0aW9uVGltZUxpbWl0Pg0KICAgIDxQcmlvcml0eT40PC9Qcmlvcml0eT4NCiAgPC9TZXR0aW5ncz4NCiAgPEFjdGlvbnMgQ29udGV4dD0iQXV0aG9yIj4NCiAgICA8RXhlYz4NCiAgICAgIDxDb21tYW5kPiIjRVhFQ1VUQUJMRVBBVEgiPC9Db21tYW5kPg0KICAgICAgPEFyZ3VtZW50cz4kKEFyZzApPC9Bcmd1bWVudHM+DQogICAgPC9FeGVjPg0KICA8L0FjdGlvbnM+DQo8L1Rhc2s+
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
3603
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
19a5c2b0-5593-40da-9945-6c6b53e85d75
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
dontreachme3.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
false
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
blacknet
v3.7.0 Public
Bot
https://furyx.de/panel
BN[e5decf896675e5ecc7bbef8ebff8a786]
-
antivm
false
-
elevate_uac
false
-
install_name
WindowsUpdate.exe
-
splitter
|BN|
-
start_name
50651597687556f33b7fc75d90350b99
-
startup
false
-
usb_spread
true
Extracted
remcos
1.7 Pro
Host
dontreachme3.ddns.net:3605
dontreachme1.ddns.net:3605
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
explorer.exe
-
copy_folder
explorer
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%SystemDrive%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
RuntimeBroker
-
keylog_path
%AppData%
-
mouse_option
true
-
mutex
remcos_ekuntpjjaa
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
RuntimeBroker
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
asyncrat
0.5.7B
Default
dontreachme3.ddns.net:3601
dontreachme1.ddns.net:3601
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
EpicGames.exe
-
install_folder
%AppData%
Signatures
-
BlackNET payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/6820-247-0x0000000000400000-0x000000000041E000-memory.dmp family_blacknet -
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/6820-247-0x0000000000400000-0x000000000041E000-memory.dmp disable_win_def -
Modifies WinLogon for persistence 2 TTPs 11 IoCs
Processes:
EdgeExplorer.exeNortonInstaller.exeWindowsExplorer.exeEdgeBrowser.exeWinExplorer.exeEpicGames Service.exeFirefoxinstaller.exeexplorer.exeEdgeBrowser.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\Documents\\EdgeExplorer.exe\"" EdgeExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\Documents\\NortonInstaller.exe\"" NortonInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\explorer\\explorer.exe\"" WindowsExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\explorer\\explorer.exe\"" WindowsExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\EdgeBrowser.exe\"" EdgeBrowser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\Documents\\WinExplorer.exe\"" WinExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\Documents\\EpicGames Service.exe\"" EpicGames Service.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\Documents\\Firefoxinstaller.exe\"" Firefoxinstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\explorer\\explorer.exe\"" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\explorer\\explorer.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\EdgeBrowser.exe\"" EdgeBrowser.exe -
Processes:
EpicGames Service.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" EpicGames Service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" EpicGames Service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" EpicGames Service.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection EpicGames Service.exe -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Processes:
WD+UAC.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WD+UAC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Processes:
Firefoxinstaller.exeEpicGames Service.exeWinExplorer.exeNortonInstaller.exeEdgeExplorer.exeEdgeBrowser.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths Firefoxinstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EpicGames Service.exe = "0" EpicGames Service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WinExplorer.exe = "0" WinExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NortonInstaller.exe = "0" NortonInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Documents\EpicGames Service.exe = "0" EpicGames Service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Documents\EdgeExplorer.exe = "0" EdgeExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Documents\NortonInstaller.exe = "0" NortonInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Firefoxinstaller.exe = "0" Firefoxinstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeExplorer.exe = "0" EdgeExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Documents\WinExplorer.exe = "0" WinExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Documents\Firefoxinstaller.exe = "0" Firefoxinstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeBrowser.exe = "0" EdgeBrowser.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\EdgeBrowser.exe = "0" EdgeBrowser.exe -
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/6268-219-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
WindowsExplorer.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WindowsExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RuntimeBroker = "\"C:\\explorer\\explorer.exe\"" WindowsExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RuntimeBroker = "\"C:\\explorer\\explorer.exe\"" explorer.exe -
Executes dropped EXE 22 IoCs
Processes:
Email Checker Pro.exeFirefoxinstaller.exeNortonInstaller.exeWinExplorer.exeEdgeExplorer.exeEpicGames Service.exeWD+UAC.exeKruppelcr.exeEdgeExplorer.exeWinExplorer.exeFirefoxinstaller.exeEpicGames Service.exeFirefoxinstaller.exeNortonInstaller.exeFirefoxinstaller.exeFirefoxinstaller.exeWindowsExplorer.exeEdgeBrowser.exeEdgeBrowser.exeexplorer.exeEdgeBrowser.exeEdgeBrowser.exepid process 4904 Email Checker Pro.exe 2432 Firefoxinstaller.exe 5044 NortonInstaller.exe 3056 WinExplorer.exe 2636 EdgeExplorer.exe 2588 EpicGames Service.exe 4248 WD+UAC.exe 1464 Kruppelcr.exe 6256 EdgeExplorer.exe 6288 WinExplorer.exe 6296 Firefoxinstaller.exe 6268 EpicGames Service.exe 6384 Firefoxinstaller.exe 6316 NortonInstaller.exe 6464 Firefoxinstaller.exe 6820 Firefoxinstaller.exe 7072 WindowsExplorer.exe 1952 EdgeBrowser.exe 4584 EdgeBrowser.exe 6776 explorer.exe 5376 EdgeBrowser.exe 7124 EdgeBrowser.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Email Checker Pro.exe vmprotect C:\Users\Admin\AppData\Local\Temp\Email Checker Pro.exe vmprotect -
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
EdgeBrowser.exeEdgeBrowser.exef57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exeWinExplorer.exeWinExplorer.exeEdgeExplorer.exeWindowsExplorer.exeEdgeExplorer.exeFirefoxinstaller.exeEpicGames Service.exeFirefoxinstaller.exeNortonInstaller.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation EdgeBrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation EdgeBrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WinExplorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WinExplorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation EdgeExplorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WindowsExplorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation EdgeExplorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Firefoxinstaller.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation EpicGames Service.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Firefoxinstaller.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation NortonInstaller.exe -
Drops startup file 12 IoCs
Processes:
EdgeExplorer.exeWinExplorer.exeEdgeBrowser.exeFirefoxinstaller.exeEpicGames Service.exeNortonInstaller.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeExplorer.exe EdgeExplorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WinExplorer.exe WinExplorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeExplorer.exe EdgeExplorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeBrowser.exe EdgeBrowser.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Firefoxinstaller.exe Firefoxinstaller.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Firefoxinstaller.exe Firefoxinstaller.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EpicGames Service.exe EpicGames Service.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EpicGames Service.exe EpicGames Service.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeBrowser.exe EdgeBrowser.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NortonInstaller.exe NortonInstaller.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NortonInstaller.exe NortonInstaller.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WinExplorer.exe WinExplorer.exe -
Processes:
EpicGames Service.exeFirefoxinstaller.exeEdgeExplorer.exeWinExplorer.exeEdgeBrowser.exeNortonInstaller.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" EpicGames Service.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features EpicGames Service.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions Firefoxinstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeExplorer.exe = "0" EdgeExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Documents\Firefoxinstaller.exe = "0" Firefoxinstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Documents\EpicGames Service.exe = "0" EpicGames Service.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection EpicGames Service.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet EpicGames Service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" EpicGames Service.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths Firefoxinstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EpicGames Service.exe = "0" EpicGames Service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Documents\WinExplorer.exe = "0" WinExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" EpicGames Service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\EdgeBrowser.exe = "0" EdgeBrowser.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NortonInstaller.exe = "0" NortonInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Documents\NortonInstaller.exe = "0" NortonInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" EpicGames Service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeBrowser.exe = "0" EdgeBrowser.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Firefoxinstaller.exe = "0" Firefoxinstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WinExplorer.exe = "0" WinExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Documents\EdgeExplorer.exe = "0" EdgeExplorer.exe -
Adds Run key to start application 2 TTPs 23 IoCs
Processes:
EpicGames Service.exeNortonInstaller.exeFirefoxinstaller.exeWindowsExplorer.exeexplorer.exeWinExplorer.exeEdgeExplorer.exeEdgeBrowser.exeFirefoxinstaller.exeEdgeBrowser.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\Documents\\EpicGames Service.exe" EpicGames Service.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NortonInstaller.exe = "C:\\Users\\Admin\\Documents\\NortonInstaller.exe" NortonInstaller.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\Documents\\NortonInstaller.exe" NortonInstaller.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Firefoxinstaller.exe = "C:\\Users\\Admin\\Documents\\Firefoxinstaller.exe" Firefoxinstaller.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ WindowsExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\explorer\\explorer.exe\"" WindowsExplorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\Documents\\WinExplorer.exe" WinExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinExplorer.exe = "C:\\Users\\Admin\\Documents\\WinExplorer.exe" WinExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EpicGames Service.exe = "C:\\Users\\Admin\\Documents\\EpicGames Service.exe" EpicGames Service.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EdgeExplorer.exe = "C:\\Users\\Admin\\Documents\\EdgeExplorer.exe" EdgeExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\EdgeBrowser.exe" EdgeBrowser.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\explorer\\explorer.exe\"" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\explorer\\explorer.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\Documents\\Firefoxinstaller.exe" Firefoxinstaller.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\Documents\\EdgeExplorer.exe" EdgeExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Firefox.exeI nstaller\\Firefox.exe" Firefoxinstaller.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ WindowsExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\explorer\\explorer.exe\"" WindowsExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EdgeBrowser.exe = "C:\\Users\\Admin\\EdgeBrowser.exe" EdgeBrowser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\EdgeBrowser.exe" EdgeBrowser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EdgeBrowser.exe = "C:\\Users\\Admin\\EdgeBrowser.exe" EdgeBrowser.exe -
Processes:
WD+UAC.exeNortonInstaller.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WD+UAC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WD+UAC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NortonInstaller.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
explorer.exeWindowsExplorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ WindowsExplorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
EdgeExplorer.exeNortonInstaller.exeFirefoxinstaller.exeWinExplorer.exeEpicGames Service.exepid process 2636 EdgeExplorer.exe 2636 EdgeExplorer.exe 2636 EdgeExplorer.exe 2636 EdgeExplorer.exe 2636 EdgeExplorer.exe 2636 EdgeExplorer.exe 2636 EdgeExplorer.exe 2636 EdgeExplorer.exe 2636 EdgeExplorer.exe 2636 EdgeExplorer.exe 2636 EdgeExplorer.exe 2636 EdgeExplorer.exe 2636 EdgeExplorer.exe 2636 EdgeExplorer.exe 5044 NortonInstaller.exe 5044 NortonInstaller.exe 5044 NortonInstaller.exe 5044 NortonInstaller.exe 5044 NortonInstaller.exe 5044 NortonInstaller.exe 5044 NortonInstaller.exe 5044 NortonInstaller.exe 5044 NortonInstaller.exe 5044 NortonInstaller.exe 5044 NortonInstaller.exe 5044 NortonInstaller.exe 5044 NortonInstaller.exe 5044 NortonInstaller.exe 2432 Firefoxinstaller.exe 2432 Firefoxinstaller.exe 2432 Firefoxinstaller.exe 2432 Firefoxinstaller.exe 2432 Firefoxinstaller.exe 2432 Firefoxinstaller.exe 2432 Firefoxinstaller.exe 2432 Firefoxinstaller.exe 2432 Firefoxinstaller.exe 2432 Firefoxinstaller.exe 2432 Firefoxinstaller.exe 2432 Firefoxinstaller.exe 2432 Firefoxinstaller.exe 2432 Firefoxinstaller.exe 2432 Firefoxinstaller.exe 3056 WinExplorer.exe 3056 WinExplorer.exe 3056 WinExplorer.exe 3056 WinExplorer.exe 3056 WinExplorer.exe 3056 WinExplorer.exe 3056 WinExplorer.exe 3056 WinExplorer.exe 3056 WinExplorer.exe 3056 WinExplorer.exe 3056 WinExplorer.exe 3056 WinExplorer.exe 3056 WinExplorer.exe 3056 WinExplorer.exe 2588 EpicGames Service.exe 2588 EpicGames Service.exe 2588 EpicGames Service.exe 2588 EpicGames Service.exe 2588 EpicGames Service.exe 2588 EpicGames Service.exe 2588 EpicGames Service.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
EdgeExplorer.exeWinExplorer.exeEpicGames Service.exeNortonInstaller.exeFirefoxinstaller.exeFirefoxinstaller.exeEdgeBrowser.exeEdgeBrowser.exedescription pid process target process PID 2636 set thread context of 6256 2636 EdgeExplorer.exe EdgeExplorer.exe PID 3056 set thread context of 6288 3056 WinExplorer.exe WinExplorer.exe PID 2588 set thread context of 6268 2588 EpicGames Service.exe EpicGames Service.exe PID 5044 set thread context of 6316 5044 NortonInstaller.exe NortonInstaller.exe PID 2432 set thread context of 6464 2432 Firefoxinstaller.exe Firefoxinstaller.exe PID 6464 set thread context of 6820 6464 Firefoxinstaller.exe Firefoxinstaller.exe PID 1952 set thread context of 4584 1952 EdgeBrowser.exe EdgeBrowser.exe PID 5376 set thread context of 7124 5376 EdgeBrowser.exe EdgeBrowser.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4820 4248 WerFault.exe WD+UAC.exe 6648 2636 WerFault.exe EdgeExplorer.exe 6712 3056 WerFault.exe WinExplorer.exe 6912 2588 WerFault.exe EpicGames Service.exe 6960 5044 WerFault.exe NortonInstaller.exe 828 1952 WerFault.exe EdgeBrowser.exe 4776 5376 WerFault.exe EdgeBrowser.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5788 schtasks.exe 6852 schtasks.exe 6324 schtasks.exe 6648 schtasks.exe 3248 schtasks.exe -
Delays execution with timeout.exe 7 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 5480 timeout.exe 6184 timeout.exe 5888 timeout.exe 6052 timeout.exe 3876 timeout.exe 4312 timeout.exe 5156 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe 2100 powershell.exe 2100 powershell.exe 532 powershell.exe 532 powershell.exe 3356 powershell.exe 3356 powershell.exe 4252 powershell.exe 4252 powershell.exe 2536 powershell.exe 2536 powershell.exe 4644 powershell.exe 4644 powershell.exe 4076 powershell.exe 4076 powershell.exe 4156 powershell.exe 4156 powershell.exe 4212 powershell.exe 4212 powershell.exe 976 powershell.exe 976 powershell.exe 2968 powershell.exe 2968 powershell.exe 1252 powershell.exe 1252 powershell.exe 1956 powershell.exe 1956 powershell.exe 3196 powershell.exe 3196 powershell.exe 2908 powershell.exe 2908 powershell.exe 1424 powershell.exe 1424 powershell.exe 3988 powershell.exe 3988 powershell.exe 4040 powershell.exe 4040 powershell.exe 1120 powershell.exe 1120 powershell.exe 2520 powershell.exe 2520 powershell.exe 532 powershell.exe 532 powershell.exe 4252 powershell.exe 4252 powershell.exe 2100 powershell.exe 2100 powershell.exe 4212 powershell.exe 4212 powershell.exe 2536 powershell.exe 2536 powershell.exe 4644 powershell.exe 4644 powershell.exe 3196 powershell.exe 3196 powershell.exe 4156 powershell.exe 4156 powershell.exe 3356 powershell.exe 3356 powershell.exe 1956 powershell.exe 1956 powershell.exe 4076 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
NortonInstaller.exepid process 6316 NortonInstaller.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
Processes:
f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exeKruppelcr.exeWinExplorer.exeEpicGames Service.exeFirefoxinstaller.exeEdgeExplorer.exeNortonInstaller.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedw20.exeWinExplorer.exeNortonInstaller.exeEpicGames Service.exepowershell.exeEdgeBrowser.exepowershell.exepowershell.exepowershell.exeFirefoxinstaller.exeEdgeBrowser.exeEdgeBrowser.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe Token: SeDebugPrivilege 1464 Kruppelcr.exe Token: SeDebugPrivilege 3056 WinExplorer.exe Token: SeDebugPrivilege 2588 EpicGames Service.exe Token: SeDebugPrivilege 2432 Firefoxinstaller.exe Token: SeDebugPrivilege 2636 EdgeExplorer.exe Token: SeDebugPrivilege 5044 NortonInstaller.exe Token: SeDebugPrivilege 2100 powershell.exe Token: SeDebugPrivilege 532 powershell.exe Token: SeDebugPrivilege 4252 powershell.exe Token: SeDebugPrivilege 3196 powershell.exe Token: SeDebugPrivilege 3356 powershell.exe Token: SeDebugPrivilege 2536 powershell.exe Token: SeDebugPrivilege 4644 powershell.exe Token: SeDebugPrivilege 4076 powershell.exe Token: SeDebugPrivilege 4156 powershell.exe Token: SeDebugPrivilege 4212 powershell.exe Token: SeDebugPrivilege 976 powershell.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeDebugPrivilege 1252 powershell.exe Token: SeDebugPrivilege 1956 powershell.exe Token: SeDebugPrivilege 2908 powershell.exe Token: SeDebugPrivilege 1424 powershell.exe Token: SeDebugPrivilege 3988 powershell.exe Token: SeDebugPrivilege 4040 powershell.exe Token: SeDebugPrivilege 1120 powershell.exe Token: SeDebugPrivilege 2520 powershell.exe Token: SeBackupPrivilege 5644 dw20.exe Token: SeBackupPrivilege 5644 dw20.exe Token: SeDebugPrivilege 6288 WinExplorer.exe Token: SeDebugPrivilege 6316 NortonInstaller.exe Token: SeDebugPrivilege 6316 NortonInstaller.exe Token: SeDebugPrivilege 6268 EpicGames Service.exe Token: SeDebugPrivilege 6268 EpicGames Service.exe Token: SeDebugPrivilege 6812 powershell.exe Token: SeDebugPrivilege 1952 EdgeBrowser.exe Token: SeDebugPrivilege 6676 powershell.exe Token: SeDebugPrivilege 7136 powershell.exe Token: SeDebugPrivilege 7152 powershell.exe Token: SeDebugPrivilege 6820 Firefoxinstaller.exe Token: SeDebugPrivilege 4584 EdgeBrowser.exe Token: 33 4584 EdgeBrowser.exe Token: SeIncBasePriorityPrivilege 4584 EdgeBrowser.exe Token: SeDebugPrivilege 5376 EdgeBrowser.exe Token: SeDebugPrivilege 2468 powershell.exe Token: SeDebugPrivilege 7024 powershell.exe Token: SeDebugPrivilege 2752 powershell.exe Token: SeDebugPrivilege 5788 powershell.exe Token: 33 4584 EdgeBrowser.exe Token: SeIncBasePriorityPrivilege 4584 EdgeBrowser.exe Token: 33 4584 EdgeBrowser.exe Token: SeIncBasePriorityPrivilege 4584 EdgeBrowser.exe Token: 33 4584 EdgeBrowser.exe Token: SeIncBasePriorityPrivilege 4584 EdgeBrowser.exe Token: 33 4584 EdgeBrowser.exe Token: SeIncBasePriorityPrivilege 4584 EdgeBrowser.exe Token: 33 4584 EdgeBrowser.exe Token: SeIncBasePriorityPrivilege 4584 EdgeBrowser.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
Firefoxinstaller.exeexplorer.exepid process 6820 Firefoxinstaller.exe 6820 Firefoxinstaller.exe 6776 explorer.exe 6820 Firefoxinstaller.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exeFirefoxinstaller.exeNortonInstaller.exeEdgeExplorer.exeWinExplorer.exeEpicGames Service.exedescription pid process target process PID 336 wrote to memory of 4904 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe Email Checker Pro.exe PID 336 wrote to memory of 4904 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe Email Checker Pro.exe PID 336 wrote to memory of 2432 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe Firefoxinstaller.exe PID 336 wrote to memory of 2432 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe Firefoxinstaller.exe PID 336 wrote to memory of 2432 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe Firefoxinstaller.exe PID 336 wrote to memory of 5044 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe NortonInstaller.exe PID 336 wrote to memory of 5044 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe NortonInstaller.exe PID 336 wrote to memory of 5044 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe NortonInstaller.exe PID 336 wrote to memory of 3056 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe WinExplorer.exe PID 336 wrote to memory of 3056 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe WinExplorer.exe PID 336 wrote to memory of 3056 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe WinExplorer.exe PID 336 wrote to memory of 2636 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe EdgeExplorer.exe PID 336 wrote to memory of 2636 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe EdgeExplorer.exe PID 336 wrote to memory of 2636 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe EdgeExplorer.exe PID 336 wrote to memory of 2588 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe EpicGames Service.exe PID 336 wrote to memory of 2588 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe EpicGames Service.exe PID 336 wrote to memory of 2588 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe EpicGames Service.exe PID 336 wrote to memory of 4248 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe WD+UAC.exe PID 336 wrote to memory of 4248 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe WD+UAC.exe PID 336 wrote to memory of 4248 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe WD+UAC.exe PID 336 wrote to memory of 1464 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe Kruppelcr.exe PID 336 wrote to memory of 1464 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe Kruppelcr.exe PID 336 wrote to memory of 1464 336 f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe Kruppelcr.exe PID 2432 wrote to memory of 4156 2432 Firefoxinstaller.exe powershell.exe PID 2432 wrote to memory of 4156 2432 Firefoxinstaller.exe powershell.exe PID 2432 wrote to memory of 4156 2432 Firefoxinstaller.exe powershell.exe PID 5044 wrote to memory of 532 5044 NortonInstaller.exe powershell.exe PID 5044 wrote to memory of 532 5044 NortonInstaller.exe powershell.exe PID 5044 wrote to memory of 532 5044 NortonInstaller.exe powershell.exe PID 2636 wrote to memory of 4644 2636 EdgeExplorer.exe powershell.exe PID 2636 wrote to memory of 4644 2636 EdgeExplorer.exe powershell.exe PID 2636 wrote to memory of 4644 2636 EdgeExplorer.exe powershell.exe PID 3056 wrote to memory of 4252 3056 WinExplorer.exe powershell.exe PID 3056 wrote to memory of 4252 3056 WinExplorer.exe powershell.exe PID 3056 wrote to memory of 4252 3056 WinExplorer.exe powershell.exe PID 2588 wrote to memory of 2100 2588 EpicGames Service.exe powershell.exe PID 2588 wrote to memory of 2100 2588 EpicGames Service.exe powershell.exe PID 2588 wrote to memory of 2100 2588 EpicGames Service.exe powershell.exe PID 3056 wrote to memory of 4076 3056 WinExplorer.exe powershell.exe PID 3056 wrote to memory of 4076 3056 WinExplorer.exe powershell.exe PID 3056 wrote to memory of 4076 3056 WinExplorer.exe powershell.exe PID 2588 wrote to memory of 3356 2588 EpicGames Service.exe powershell.exe PID 2588 wrote to memory of 3356 2588 EpicGames Service.exe powershell.exe PID 2588 wrote to memory of 3356 2588 EpicGames Service.exe powershell.exe PID 2432 wrote to memory of 3196 2432 Firefoxinstaller.exe powershell.exe PID 2432 wrote to memory of 3196 2432 Firefoxinstaller.exe powershell.exe PID 2432 wrote to memory of 3196 2432 Firefoxinstaller.exe powershell.exe PID 2636 wrote to memory of 2536 2636 EdgeExplorer.exe powershell.exe PID 2636 wrote to memory of 2536 2636 EdgeExplorer.exe powershell.exe PID 2636 wrote to memory of 2536 2636 EdgeExplorer.exe powershell.exe PID 5044 wrote to memory of 1424 5044 NortonInstaller.exe powershell.exe PID 5044 wrote to memory of 1424 5044 NortonInstaller.exe powershell.exe PID 5044 wrote to memory of 1424 5044 NortonInstaller.exe powershell.exe PID 3056 wrote to memory of 2908 3056 WinExplorer.exe powershell.exe PID 3056 wrote to memory of 2908 3056 WinExplorer.exe powershell.exe PID 3056 wrote to memory of 2908 3056 WinExplorer.exe powershell.exe PID 2588 wrote to memory of 2968 2588 EpicGames Service.exe powershell.exe PID 2588 wrote to memory of 2968 2588 EpicGames Service.exe powershell.exe PID 2588 wrote to memory of 2968 2588 EpicGames Service.exe powershell.exe PID 2636 wrote to memory of 4212 2636 EdgeExplorer.exe powershell.exe PID 2636 wrote to memory of 4212 2636 EdgeExplorer.exe powershell.exe PID 2636 wrote to memory of 4212 2636 EdgeExplorer.exe powershell.exe PID 2432 wrote to memory of 1252 2432 Firefoxinstaller.exe powershell.exe PID 2432 wrote to memory of 1252 2432 Firefoxinstaller.exe powershell.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
WD+UAC.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WD+UAC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe"C:\Users\Admin\AppData\Local\Temp\f57da923e5b75ea46065584301fe67aa5f37998630447b53242050397ee93a8f.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Email Checker Pro.exe"C:\Users\Admin\AppData\Local\Temp\Email Checker Pro.exe"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 14803⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\Firefoxinstaller.exe"C:\Users\Admin\Documents\Firefoxinstaller.exe"2⤵
- Modifies WinLogon for persistence
- Windows security bypass
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Firefoxinstaller.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Firefoxinstaller.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Firefoxinstaller.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\Firefoxinstaller.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Documents\Firefoxinstaller.exe"C:\Users\Admin\Documents\Firefoxinstaller.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\Firefoxinstaller.exe"C:\Users\Admin\Documents\Firefoxinstaller.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\Firefoxinstaller.exe"C:\Users\Admin\Documents\Firefoxinstaller.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\Firefoxinstaller.exe"C:\Users\Admin\Documents\Firefoxinstaller.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /delete /tn "WindowsUpdate.exe" /f5⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 1.1.1.1 -n 5 -w 5000 > Nul & Del "C:\Users\Admin\Documents\Firefoxinstaller.exe"5⤵
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 5 -w 50006⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "WindowsUpdate.exe" /sc ONLOGON /tr "C:\Users\Admin\Documents\Firefoxinstaller.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\NortonInstaller.exe"C:\Users\Admin\Documents\NortonInstaller.exe"2⤵
- Modifies WinLogon for persistence
- Windows security bypass
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NortonInstaller.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NortonInstaller.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NortonInstaller.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\NortonInstaller.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Documents\NortonInstaller.exe"C:\Users\Admin\Documents\NortonInstaller.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "AGP Monitor" /xml "C:\Users\Admin\AppData\Local\Temp\tmp2BF2.tmp"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 11643⤵
- Program crash
-
C:\Users\Admin\Documents\WinExplorer.exe"C:\Users\Admin\Documents\WinExplorer.exe"2⤵
- Modifies WinLogon for persistence
- Windows security bypass
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WinExplorer.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WinExplorer.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WinExplorer.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\WinExplorer.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Documents\WinExplorer.exe"C:\Users\Admin\Documents\WinExplorer.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\WindowsExplorer.exe"C:\Users\Admin\Documents\WindowsExplorer.exe"4⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies WinLogon
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "5⤵
-
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 26⤵
- Runs ping.exe
-
C:\explorer\explorer.exe"C:\explorer\explorer.exe"6⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f8⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 23163⤵
- Program crash
-
C:\Users\Admin\Documents\EdgeExplorer.exe"C:\Users\Admin\Documents\EdgeExplorer.exe"2⤵
- Modifies WinLogon for persistence
- Windows security bypass
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeExplorer.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeExplorer.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeExplorer.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\EdgeExplorer.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Documents\EdgeExplorer.exe"C:\Users\Admin\Documents\EdgeExplorer.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F4⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\Documents\EdgeExplorer.exe" /sc minute /mo 14⤵
- Creates scheduled task(s)
-
C:\Users\Admin\EdgeBrowser.exe"C:\Users\Admin\EdgeBrowser.exe"4⤵
- Modifies WinLogon for persistence
- Windows security bypass
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeBrowser.exe" -Force5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeBrowser.exe" -Force5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeBrowser.exe" -Force5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\EdgeBrowser.exe" -Force5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 15⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 16⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\EdgeBrowser.exe"C:\Users\Admin\EdgeBrowser.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\EdgeBrowser.exe" /sc minute /mo 16⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 22645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 23363⤵
- Program crash
-
C:\Users\Admin\Documents\EpicGames Service.exe"C:\Users\Admin\Documents\EpicGames Service.exe"2⤵
- Modifies WinLogon for persistence
- Modifies Windows Defender Real-time Protection settings
- Windows security bypass
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EpicGames Service.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EpicGames Service.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EpicGames Service.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\EpicGames Service.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Documents\EpicGames Service.exe"C:\Users\Admin\Documents\EpicGames Service.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 22883⤵
- Program crash
-
C:\Users\Admin\Documents\Kruppelcr.exe"C:\Users\Admin\Documents\Kruppelcr.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\WD+UAC.exe"C:\Users\Admin\Documents\WD+UAC.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System policy modification
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 9043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4248 -ip 42481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2636 -ip 26361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2432 -ip 24321⤵
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f1⤵
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1464 -ip 14641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5044 -ip 50441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2588 -ip 25881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3056 -ip 30561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1952 -ip 19521⤵
-
C:\Users\Admin\EdgeBrowser.exeC:\Users\Admin\EdgeBrowser.exe1⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeBrowser.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeBrowser.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeBrowser.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\EdgeBrowser.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\EdgeBrowser.exe"C:\Users\Admin\EdgeBrowser.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\EdgeBrowser.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5376 -s 10002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5376 -ip 53761⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
52KB
MD5ebd8f90406c4820902162e3156b1ecb4
SHA1f909f010552a1471b7a2417d3a954d92dcf44833
SHA256414b2bf1e0c76689465539ace0fce226ce6ef8619db64799b2b5c60f78b3cb4b
SHA5127bfe96a23a31e9d089dbf8e945c9f562aed86377bf22da17f0fd6760d99edb4c85b8cbe5d3eedb31619da90f78382738141b4615a1d6519c0085c6ea5396eb98
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
52KB
MD5ebd8f90406c4820902162e3156b1ecb4
SHA1f909f010552a1471b7a2417d3a954d92dcf44833
SHA256414b2bf1e0c76689465539ace0fce226ce6ef8619db64799b2b5c60f78b3cb4b
SHA5127bfe96a23a31e9d089dbf8e945c9f562aed86377bf22da17f0fd6760d99edb4c85b8cbe5d3eedb31619da90f78382738141b4615a1d6519c0085c6ea5396eb98
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
52KB
MD5ebd8f90406c4820902162e3156b1ecb4
SHA1f909f010552a1471b7a2417d3a954d92dcf44833
SHA256414b2bf1e0c76689465539ace0fce226ce6ef8619db64799b2b5c60f78b3cb4b
SHA5127bfe96a23a31e9d089dbf8e945c9f562aed86377bf22da17f0fd6760d99edb4c85b8cbe5d3eedb31619da90f78382738141b4615a1d6519c0085c6ea5396eb98
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
8KB
MD53966ed8ba5fd08f31e7691b5c05eccce
SHA1f0a40ba488ca6130c235c2f84f302eb1f71a7227
SHA256861d56b263bb72957adea15ec9fcb07463d3790701dff12cb8f3845eab003230
SHA512276c3ed431da76e1244f23e797c06c87cca209164e758b2242e38a9b7b377c82ea55d680b9c336ad3d90c29d04ee04ca5a7fd9a3e17e962e17f668ad66afc2f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
52KB
MD5ebd8f90406c4820902162e3156b1ecb4
SHA1f909f010552a1471b7a2417d3a954d92dcf44833
SHA256414b2bf1e0c76689465539ace0fce226ce6ef8619db64799b2b5c60f78b3cb4b
SHA5127bfe96a23a31e9d089dbf8e945c9f562aed86377bf22da17f0fd6760d99edb4c85b8cbe5d3eedb31619da90f78382738141b4615a1d6519c0085c6ea5396eb98
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
52KB
MD5ebd8f90406c4820902162e3156b1ecb4
SHA1f909f010552a1471b7a2417d3a954d92dcf44833
SHA256414b2bf1e0c76689465539ace0fce226ce6ef8619db64799b2b5c60f78b3cb4b
SHA5127bfe96a23a31e9d089dbf8e945c9f562aed86377bf22da17f0fd6760d99edb4c85b8cbe5d3eedb31619da90f78382738141b4615a1d6519c0085c6ea5396eb98
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
52KB
MD5ebd8f90406c4820902162e3156b1ecb4
SHA1f909f010552a1471b7a2417d3a954d92dcf44833
SHA256414b2bf1e0c76689465539ace0fce226ce6ef8619db64799b2b5c60f78b3cb4b
SHA5127bfe96a23a31e9d089dbf8e945c9f562aed86377bf22da17f0fd6760d99edb4c85b8cbe5d3eedb31619da90f78382738141b4615a1d6519c0085c6ea5396eb98
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5a922641d24147db81ea8826948304854
SHA1104194336bac63094dfec5c5f9e1921098a24f54
SHA2565b2db6d2b680b1f8ef631794f2bf4a1161514459b3846fcdc42c75c71840206a
SHA512b31b1c8d9b30955a7d2c31791c288dfab09939935f85a24d650548245a08f23a8223ce0b500d91b6bfa710642f773ea4777e107a5692820167884a900ca3456d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5168e1a8b8799f669f3910d3313138edd
SHA193b66eb38bd9dbdf2511d4e6510a68c8e371d06e
SHA2560b52a3aae9914795976ebad784b2b492c24be5ca2e148f84e75c481a3ce48d27
SHA512b8d2885169a905cd2f49b513d5de0921dd785dbe46b72b1d3dc37160646a72509413e330aaa8a79df41f61d17120a7dc7f1bffb2f54e0293d82e3ec033367392
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5c13bfda853de7feb0aa4198bd7487464
SHA19a18d0546142afc81bf67bdebf11816758540357
SHA256c84a26b09d70d096508dbb70e9e7dc8f9c0af916b2c38318ec2949936908d821
SHA5122d20a94d391d7083b08289b5cc652976bee3bbf57af3ed01bacd9dba18b7b6d4ca91954df5667a713093b96f3925976f82041620751ed575dccd43f1a0968f41
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD546d60b932aeff8beeb6feb3341f521cc
SHA1e52ba0906026dd1bea4f4494a0771957430b118e
SHA256095d1bd680e4844234d00c1943b14654c07e059589f29fb81b9cd9b3c942ccda
SHA512ab2959489957bd957163df3ec56c979d7de6e1d65193d19d2b839db95c65c03a42227e67a44ab771fa0a15e8071eb237dde7e74dc9a1f03cd8c1514ead1853f3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD546d60b932aeff8beeb6feb3341f521cc
SHA1e52ba0906026dd1bea4f4494a0771957430b118e
SHA256095d1bd680e4844234d00c1943b14654c07e059589f29fb81b9cd9b3c942ccda
SHA512ab2959489957bd957163df3ec56c979d7de6e1d65193d19d2b839db95c65c03a42227e67a44ab771fa0a15e8071eb237dde7e74dc9a1f03cd8c1514ead1853f3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5c9bf2a513956b01d61bc7c776a10b916
SHA1d0e91f49f25b82ab055eb75b4e7ca97d59d661fa
SHA256163332e52d72d7b1f3b90a781d44436610bf984c463b285d15f36b59eded7943
SHA5120ed79da4d0ee007a155ea4bfecd8afa30e58da1d21c3f5dd9763ba44298a8fb550c59cd3d665b5e32cf5dce0306414a19077b3a173b24f1a5b029896d9fa51b7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5c9bf2a513956b01d61bc7c776a10b916
SHA1d0e91f49f25b82ab055eb75b4e7ca97d59d661fa
SHA256163332e52d72d7b1f3b90a781d44436610bf984c463b285d15f36b59eded7943
SHA5120ed79da4d0ee007a155ea4bfecd8afa30e58da1d21c3f5dd9763ba44298a8fb550c59cd3d665b5e32cf5dce0306414a19077b3a173b24f1a5b029896d9fa51b7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5c9bf2a513956b01d61bc7c776a10b916
SHA1d0e91f49f25b82ab055eb75b4e7ca97d59d661fa
SHA256163332e52d72d7b1f3b90a781d44436610bf984c463b285d15f36b59eded7943
SHA5120ed79da4d0ee007a155ea4bfecd8afa30e58da1d21c3f5dd9763ba44298a8fb550c59cd3d665b5e32cf5dce0306414a19077b3a173b24f1a5b029896d9fa51b7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5de596cb1b72e5bdc16430fe56f536686
SHA1d0476fb92e9e9a70159b3e15a5cb8bb7b1674cc1
SHA256c01c27e5f2cdcf872661a36b4c393e571e7a389d55b73a2c75603960a57e3dbf
SHA512ba09504a49e9c44a8f6b858ffb8094c7e32b61538de8eb13ec8543b28abed8d54b1c998096353bca22f645c20f7163b7e9d704936375d1f85fbbb89f9d155ce6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5de596cb1b72e5bdc16430fe56f536686
SHA1d0476fb92e9e9a70159b3e15a5cb8bb7b1674cc1
SHA256c01c27e5f2cdcf872661a36b4c393e571e7a389d55b73a2c75603960a57e3dbf
SHA512ba09504a49e9c44a8f6b858ffb8094c7e32b61538de8eb13ec8543b28abed8d54b1c998096353bca22f645c20f7163b7e9d704936375d1f85fbbb89f9d155ce6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5de596cb1b72e5bdc16430fe56f536686
SHA1d0476fb92e9e9a70159b3e15a5cb8bb7b1674cc1
SHA256c01c27e5f2cdcf872661a36b4c393e571e7a389d55b73a2c75603960a57e3dbf
SHA512ba09504a49e9c44a8f6b858ffb8094c7e32b61538de8eb13ec8543b28abed8d54b1c998096353bca22f645c20f7163b7e9d704936375d1f85fbbb89f9d155ce6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5de596cb1b72e5bdc16430fe56f536686
SHA1d0476fb92e9e9a70159b3e15a5cb8bb7b1674cc1
SHA256c01c27e5f2cdcf872661a36b4c393e571e7a389d55b73a2c75603960a57e3dbf
SHA512ba09504a49e9c44a8f6b858ffb8094c7e32b61538de8eb13ec8543b28abed8d54b1c998096353bca22f645c20f7163b7e9d704936375d1f85fbbb89f9d155ce6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5de596cb1b72e5bdc16430fe56f536686
SHA1d0476fb92e9e9a70159b3e15a5cb8bb7b1674cc1
SHA256c01c27e5f2cdcf872661a36b4c393e571e7a389d55b73a2c75603960a57e3dbf
SHA512ba09504a49e9c44a8f6b858ffb8094c7e32b61538de8eb13ec8543b28abed8d54b1c998096353bca22f645c20f7163b7e9d704936375d1f85fbbb89f9d155ce6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5de596cb1b72e5bdc16430fe56f536686
SHA1d0476fb92e9e9a70159b3e15a5cb8bb7b1674cc1
SHA256c01c27e5f2cdcf872661a36b4c393e571e7a389d55b73a2c75603960a57e3dbf
SHA512ba09504a49e9c44a8f6b858ffb8094c7e32b61538de8eb13ec8543b28abed8d54b1c998096353bca22f645c20f7163b7e9d704936375d1f85fbbb89f9d155ce6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5de596cb1b72e5bdc16430fe56f536686
SHA1d0476fb92e9e9a70159b3e15a5cb8bb7b1674cc1
SHA256c01c27e5f2cdcf872661a36b4c393e571e7a389d55b73a2c75603960a57e3dbf
SHA512ba09504a49e9c44a8f6b858ffb8094c7e32b61538de8eb13ec8543b28abed8d54b1c998096353bca22f645c20f7163b7e9d704936375d1f85fbbb89f9d155ce6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5de596cb1b72e5bdc16430fe56f536686
SHA1d0476fb92e9e9a70159b3e15a5cb8bb7b1674cc1
SHA256c01c27e5f2cdcf872661a36b4c393e571e7a389d55b73a2c75603960a57e3dbf
SHA512ba09504a49e9c44a8f6b858ffb8094c7e32b61538de8eb13ec8543b28abed8d54b1c998096353bca22f645c20f7163b7e9d704936375d1f85fbbb89f9d155ce6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5de596cb1b72e5bdc16430fe56f536686
SHA1d0476fb92e9e9a70159b3e15a5cb8bb7b1674cc1
SHA256c01c27e5f2cdcf872661a36b4c393e571e7a389d55b73a2c75603960a57e3dbf
SHA512ba09504a49e9c44a8f6b858ffb8094c7e32b61538de8eb13ec8543b28abed8d54b1c998096353bca22f645c20f7163b7e9d704936375d1f85fbbb89f9d155ce6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5de596cb1b72e5bdc16430fe56f536686
SHA1d0476fb92e9e9a70159b3e15a5cb8bb7b1674cc1
SHA256c01c27e5f2cdcf872661a36b4c393e571e7a389d55b73a2c75603960a57e3dbf
SHA512ba09504a49e9c44a8f6b858ffb8094c7e32b61538de8eb13ec8543b28abed8d54b1c998096353bca22f645c20f7163b7e9d704936375d1f85fbbb89f9d155ce6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5de596cb1b72e5bdc16430fe56f536686
SHA1d0476fb92e9e9a70159b3e15a5cb8bb7b1674cc1
SHA256c01c27e5f2cdcf872661a36b4c393e571e7a389d55b73a2c75603960a57e3dbf
SHA512ba09504a49e9c44a8f6b858ffb8094c7e32b61538de8eb13ec8543b28abed8d54b1c998096353bca22f645c20f7163b7e9d704936375d1f85fbbb89f9d155ce6
-
C:\Users\Admin\AppData\Local\Temp\Email Checker Pro.exeFilesize
955KB
MD51bef91cb37c8f1f62152448f0a5445ac
SHA116585c0de057593fd660c96b896855395cada2f0
SHA25680cdcd9103e4392512038f4bc9299a4e538fd5c42145c6711ae23f58470aa80f
SHA512769fe922e4c92223e878d667c628634632c5a8beef6daace59a95e5fa635d9070f4b8154e858afb8f9f280512be0369920fa04084b2fda3aabe1b9c8c1f08ac7
-
C:\Users\Admin\AppData\Local\Temp\Email Checker Pro.exeFilesize
955KB
MD51bef91cb37c8f1f62152448f0a5445ac
SHA116585c0de057593fd660c96b896855395cada2f0
SHA25680cdcd9103e4392512038f4bc9299a4e538fd5c42145c6711ae23f58470aa80f
SHA512769fe922e4c92223e878d667c628634632c5a8beef6daace59a95e5fa635d9070f4b8154e858afb8f9f280512be0369920fa04084b2fda3aabe1b9c8c1f08ac7
-
C:\Users\Admin\AppData\Local\Temp\install.batFilesize
127B
MD580b32b79bf519fce07cdf7b8b7881067
SHA12fe368e8f5855ef5f08c46f389bf3b5482ace60b
SHA2568ed98d8b82c482aaa79a8ea2f1aaea676c5641d69f2478ba7f241e990d5d99b1
SHA512dc7b986bd5de842d8beb315dea77a424194701b6272cac884dd31cd04586879fa93f3d1f44ec9ca01625b31115b00a2b5fe5028baef7d9ab277881653cab116e
-
C:\Users\Admin\AppData\Local\Temp\tmp2BF2.tmpFilesize
1KB
MD58d64f65d497b498fe88d9f446628e0e6
SHA12c01f76965fa52f717649db191a016b04c296b97
SHA256735f05df747c5fee00b019083ce51cc52bc338382228e43441f1700a8dc3385b
SHA512e9f3df490abd42ca4321a771ee35a54819e37eea99256a398544d94c6ff30f7d021a23d87233e3112a2edb5d5fecef4835b688281e2b29d114af01a90cd6fbf1
-
C:\Users\Admin\Documents\EdgeExplorer.exeFilesize
1.3MB
MD5824438344c636fdd81ff2e0d02577912
SHA1ae288a2cc5bd0cce01615d8d568031c3e84902e2
SHA256eaba5f0fb075665dc6568f05f66a271b0a03046da739d41de5920d78c40deb65
SHA51209f1903c6244af5f191e64e9ff6025af6a1c752096b48d43094e5eb6f92c00a77381b49dd6d0d57fc995d4bc4a8375f0ef13d2a9cbc823e3d91b6b9f418b568b
-
C:\Users\Admin\Documents\EdgeExplorer.exeFilesize
1.3MB
MD5824438344c636fdd81ff2e0d02577912
SHA1ae288a2cc5bd0cce01615d8d568031c3e84902e2
SHA256eaba5f0fb075665dc6568f05f66a271b0a03046da739d41de5920d78c40deb65
SHA51209f1903c6244af5f191e64e9ff6025af6a1c752096b48d43094e5eb6f92c00a77381b49dd6d0d57fc995d4bc4a8375f0ef13d2a9cbc823e3d91b6b9f418b568b
-
C:\Users\Admin\Documents\EdgeExplorer.exeFilesize
1.3MB
MD5824438344c636fdd81ff2e0d02577912
SHA1ae288a2cc5bd0cce01615d8d568031c3e84902e2
SHA256eaba5f0fb075665dc6568f05f66a271b0a03046da739d41de5920d78c40deb65
SHA51209f1903c6244af5f191e64e9ff6025af6a1c752096b48d43094e5eb6f92c00a77381b49dd6d0d57fc995d4bc4a8375f0ef13d2a9cbc823e3d91b6b9f418b568b
-
C:\Users\Admin\Documents\EpicGames Service.exeFilesize
1.1MB
MD5b117965f227519eb5c8d6e86bc2dd2a4
SHA1e1d80bd0958b69cc73eaf1ee26aa816f795aad63
SHA256f8cfedc4ecdfa6a3e14f46968b5a8e6797a448b0d30f12015cd721121470fcfd
SHA512728252062ff056079c811cfd42c52971b55e96771ecbd911c49f01c94927a1259ab96c2079e78aced2cae737302401889a3fda52c91d0eccc3719f24d17c177f
-
C:\Users\Admin\Documents\EpicGames Service.exeFilesize
1.1MB
MD5b117965f227519eb5c8d6e86bc2dd2a4
SHA1e1d80bd0958b69cc73eaf1ee26aa816f795aad63
SHA256f8cfedc4ecdfa6a3e14f46968b5a8e6797a448b0d30f12015cd721121470fcfd
SHA512728252062ff056079c811cfd42c52971b55e96771ecbd911c49f01c94927a1259ab96c2079e78aced2cae737302401889a3fda52c91d0eccc3719f24d17c177f
-
C:\Users\Admin\Documents\EpicGames Service.exeFilesize
1.1MB
MD5b117965f227519eb5c8d6e86bc2dd2a4
SHA1e1d80bd0958b69cc73eaf1ee26aa816f795aad63
SHA256f8cfedc4ecdfa6a3e14f46968b5a8e6797a448b0d30f12015cd721121470fcfd
SHA512728252062ff056079c811cfd42c52971b55e96771ecbd911c49f01c94927a1259ab96c2079e78aced2cae737302401889a3fda52c91d0eccc3719f24d17c177f
-
C:\Users\Admin\Documents\Firefoxinstaller.exeFilesize
1.5MB
MD570d3bb5c6ca4166d190ad265b14f117e
SHA195497e892ee875ef226edf3db059121c2c5284ed
SHA2567d8f13128ef978852b8a1446bba4f9c9dea53cbcd1fcedc08b2054cbe8b0e5d9
SHA5120abff26122a137960f1d4564828b1456d0bdff68c87d120c3514cc2c819038d0c6c34398f67377898058b6e8d08f4676393831c413d80181786e459ef4d01720
-
C:\Users\Admin\Documents\Firefoxinstaller.exeFilesize
1.5MB
MD570d3bb5c6ca4166d190ad265b14f117e
SHA195497e892ee875ef226edf3db059121c2c5284ed
SHA2567d8f13128ef978852b8a1446bba4f9c9dea53cbcd1fcedc08b2054cbe8b0e5d9
SHA5120abff26122a137960f1d4564828b1456d0bdff68c87d120c3514cc2c819038d0c6c34398f67377898058b6e8d08f4676393831c413d80181786e459ef4d01720
-
C:\Users\Admin\Documents\Firefoxinstaller.exeFilesize
1.5MB
MD570d3bb5c6ca4166d190ad265b14f117e
SHA195497e892ee875ef226edf3db059121c2c5284ed
SHA2567d8f13128ef978852b8a1446bba4f9c9dea53cbcd1fcedc08b2054cbe8b0e5d9
SHA5120abff26122a137960f1d4564828b1456d0bdff68c87d120c3514cc2c819038d0c6c34398f67377898058b6e8d08f4676393831c413d80181786e459ef4d01720
-
C:\Users\Admin\Documents\Firefoxinstaller.exeFilesize
1.5MB
MD570d3bb5c6ca4166d190ad265b14f117e
SHA195497e892ee875ef226edf3db059121c2c5284ed
SHA2567d8f13128ef978852b8a1446bba4f9c9dea53cbcd1fcedc08b2054cbe8b0e5d9
SHA5120abff26122a137960f1d4564828b1456d0bdff68c87d120c3514cc2c819038d0c6c34398f67377898058b6e8d08f4676393831c413d80181786e459ef4d01720
-
C:\Users\Admin\Documents\Firefoxinstaller.exeFilesize
1.5MB
MD570d3bb5c6ca4166d190ad265b14f117e
SHA195497e892ee875ef226edf3db059121c2c5284ed
SHA2567d8f13128ef978852b8a1446bba4f9c9dea53cbcd1fcedc08b2054cbe8b0e5d9
SHA5120abff26122a137960f1d4564828b1456d0bdff68c87d120c3514cc2c819038d0c6c34398f67377898058b6e8d08f4676393831c413d80181786e459ef4d01720
-
C:\Users\Admin\Documents\Firefoxinstaller.exeFilesize
1.5MB
MD570d3bb5c6ca4166d190ad265b14f117e
SHA195497e892ee875ef226edf3db059121c2c5284ed
SHA2567d8f13128ef978852b8a1446bba4f9c9dea53cbcd1fcedc08b2054cbe8b0e5d9
SHA5120abff26122a137960f1d4564828b1456d0bdff68c87d120c3514cc2c819038d0c6c34398f67377898058b6e8d08f4676393831c413d80181786e459ef4d01720
-
C:\Users\Admin\Documents\Kruppelcr.exeFilesize
39KB
MD5a3f90c77310f6bae831e96fe73ba58e9
SHA1e9d27043c24e52bb658bb21bd3e2d71bba8e2123
SHA2562d0605c56ec732a4029a00b5688512bf9ce31da5173995326fad16aced2d3292
SHA512e64c4d9592d13b290e30bd8f63df3fa1f647f13cb2b6a4fc6507b10649cd8a41e314537b6b0ac70ec9b08c29c0db47664337dcac877d610078d87039138c3887
-
C:\Users\Admin\Documents\Kruppelcr.exeFilesize
39KB
MD5a3f90c77310f6bae831e96fe73ba58e9
SHA1e9d27043c24e52bb658bb21bd3e2d71bba8e2123
SHA2562d0605c56ec732a4029a00b5688512bf9ce31da5173995326fad16aced2d3292
SHA512e64c4d9592d13b290e30bd8f63df3fa1f647f13cb2b6a4fc6507b10649cd8a41e314537b6b0ac70ec9b08c29c0db47664337dcac877d610078d87039138c3887
-
C:\Users\Admin\Documents\NortonInstaller.exeFilesize
2.1MB
MD5d2fe1a2f73303d37c178250add341b97
SHA1e341e8adaec629d299101bbf1b9a3ca2bfaf7417
SHA25626742bef88539fcb6beb9753293a4fef4044663cfcb0a799e989194fcdfd3456
SHA5120c685c265ed28f7655bf27c1a5c1f735670df40ae6e4b835bac3cc62b63b8fe54af82ab0941ca988b1c3220e740c0b2508103a1736b72a79a27ea17bf9a1bc81
-
C:\Users\Admin\Documents\NortonInstaller.exeFilesize
2.1MB
MD5d2fe1a2f73303d37c178250add341b97
SHA1e341e8adaec629d299101bbf1b9a3ca2bfaf7417
SHA25626742bef88539fcb6beb9753293a4fef4044663cfcb0a799e989194fcdfd3456
SHA5120c685c265ed28f7655bf27c1a5c1f735670df40ae6e4b835bac3cc62b63b8fe54af82ab0941ca988b1c3220e740c0b2508103a1736b72a79a27ea17bf9a1bc81
-
C:\Users\Admin\Documents\NortonInstaller.exeFilesize
2.1MB
MD5d2fe1a2f73303d37c178250add341b97
SHA1e341e8adaec629d299101bbf1b9a3ca2bfaf7417
SHA25626742bef88539fcb6beb9753293a4fef4044663cfcb0a799e989194fcdfd3456
SHA5120c685c265ed28f7655bf27c1a5c1f735670df40ae6e4b835bac3cc62b63b8fe54af82ab0941ca988b1c3220e740c0b2508103a1736b72a79a27ea17bf9a1bc81
-
C:\Users\Admin\Documents\WD+UAC.exeFilesize
97KB
MD577796247470714fe3672f805d5ff6903
SHA11aca720af56f7120cbb923c5bd7ac877bcd834e6
SHA256dfb39aae10f9924bf6658a9c16451968f8f677fde6d66f02269d3a9be106e0c5
SHA51271118f3d837c10f813369203f0a58b9a0861b5981d47860d6f83227e56278f09d00ce8ae8c5c75fa442eeb79c3601eefcee50e91e4009d7902ea7c9be4bc49ae
-
C:\Users\Admin\Documents\WD+UAC.exeFilesize
97KB
MD577796247470714fe3672f805d5ff6903
SHA11aca720af56f7120cbb923c5bd7ac877bcd834e6
SHA256dfb39aae10f9924bf6658a9c16451968f8f677fde6d66f02269d3a9be106e0c5
SHA51271118f3d837c10f813369203f0a58b9a0861b5981d47860d6f83227e56278f09d00ce8ae8c5c75fa442eeb79c3601eefcee50e91e4009d7902ea7c9be4bc49ae
-
C:\Users\Admin\Documents\WinExplorer.exeFilesize
1.0MB
MD53830fb01bdf4b41e2e9551d422caf795
SHA1d63a892fc41d2be82de8d02a04b906a8595dcac9
SHA2566c07127df2ebac66a59a3bc4157a891def20b61d87cf2d206353025893d01422
SHA5125f2c54bd05b2fe4109b66e3721a19cd533899c3c694ca3a51422cb5d4015d536b96d0e16ea1f5ed8a43dc6d3e690a1702351034f3a68765d6dc6b16983c19886
-
C:\Users\Admin\Documents\WinExplorer.exeFilesize
1.0MB
MD53830fb01bdf4b41e2e9551d422caf795
SHA1d63a892fc41d2be82de8d02a04b906a8595dcac9
SHA2566c07127df2ebac66a59a3bc4157a891def20b61d87cf2d206353025893d01422
SHA5125f2c54bd05b2fe4109b66e3721a19cd533899c3c694ca3a51422cb5d4015d536b96d0e16ea1f5ed8a43dc6d3e690a1702351034f3a68765d6dc6b16983c19886
-
C:\Users\Admin\Documents\WinExplorer.exeFilesize
1.0MB
MD53830fb01bdf4b41e2e9551d422caf795
SHA1d63a892fc41d2be82de8d02a04b906a8595dcac9
SHA2566c07127df2ebac66a59a3bc4157a891def20b61d87cf2d206353025893d01422
SHA5125f2c54bd05b2fe4109b66e3721a19cd533899c3c694ca3a51422cb5d4015d536b96d0e16ea1f5ed8a43dc6d3e690a1702351034f3a68765d6dc6b16983c19886
-
C:\Users\Admin\Documents\WindowsExplorer.exeFilesize
92KB
MD501ccde20287004986c0f29ff0df2e3b1
SHA118f9831e3246a08f000b0f4d6f009f2294c7c652
SHA256862e652677b7a597b24efc1bdb16030ed8512a8e262050a4b40a829b58855860
SHA512785545dcb74ca29b405261931be0464e65aadc84ebf51e7ad62af709b3867c3a706c9b4efc1e7f922e90c301ff0944feb2dbe6a790db7ac0ba4215b75fde86ee
-
C:\Users\Admin\Documents\WindowsExplorer.exeFilesize
92KB
MD501ccde20287004986c0f29ff0df2e3b1
SHA118f9831e3246a08f000b0f4d6f009f2294c7c652
SHA256862e652677b7a597b24efc1bdb16030ed8512a8e262050a4b40a829b58855860
SHA512785545dcb74ca29b405261931be0464e65aadc84ebf51e7ad62af709b3867c3a706c9b4efc1e7f922e90c301ff0944feb2dbe6a790db7ac0ba4215b75fde86ee
-
C:\Users\Admin\EdgeBrowser.exeFilesize
1.3MB
MD5824438344c636fdd81ff2e0d02577912
SHA1ae288a2cc5bd0cce01615d8d568031c3e84902e2
SHA256eaba5f0fb075665dc6568f05f66a271b0a03046da739d41de5920d78c40deb65
SHA51209f1903c6244af5f191e64e9ff6025af6a1c752096b48d43094e5eb6f92c00a77381b49dd6d0d57fc995d4bc4a8375f0ef13d2a9cbc823e3d91b6b9f418b568b
-
C:\Users\Admin\EdgeBrowser.exeFilesize
1.3MB
MD5824438344c636fdd81ff2e0d02577912
SHA1ae288a2cc5bd0cce01615d8d568031c3e84902e2
SHA256eaba5f0fb075665dc6568f05f66a271b0a03046da739d41de5920d78c40deb65
SHA51209f1903c6244af5f191e64e9ff6025af6a1c752096b48d43094e5eb6f92c00a77381b49dd6d0d57fc995d4bc4a8375f0ef13d2a9cbc823e3d91b6b9f418b568b
-
C:\Users\Admin\EdgeBrowser.exeFilesize
1.3MB
MD5824438344c636fdd81ff2e0d02577912
SHA1ae288a2cc5bd0cce01615d8d568031c3e84902e2
SHA256eaba5f0fb075665dc6568f05f66a271b0a03046da739d41de5920d78c40deb65
SHA51209f1903c6244af5f191e64e9ff6025af6a1c752096b48d43094e5eb6f92c00a77381b49dd6d0d57fc995d4bc4a8375f0ef13d2a9cbc823e3d91b6b9f418b568b
-
C:\explorer\explorer.exeFilesize
92KB
MD501ccde20287004986c0f29ff0df2e3b1
SHA118f9831e3246a08f000b0f4d6f009f2294c7c652
SHA256862e652677b7a597b24efc1bdb16030ed8512a8e262050a4b40a829b58855860
SHA512785545dcb74ca29b405261931be0464e65aadc84ebf51e7ad62af709b3867c3a706c9b4efc1e7f922e90c301ff0944feb2dbe6a790db7ac0ba4215b75fde86ee
-
C:\explorer\explorer.exeFilesize
92KB
MD501ccde20287004986c0f29ff0df2e3b1
SHA118f9831e3246a08f000b0f4d6f009f2294c7c652
SHA256862e652677b7a597b24efc1bdb16030ed8512a8e262050a4b40a829b58855860
SHA512785545dcb74ca29b405261931be0464e65aadc84ebf51e7ad62af709b3867c3a706c9b4efc1e7f922e90c301ff0944feb2dbe6a790db7ac0ba4215b75fde86ee
-
memory/336-168-0x00007FFECEF20000-0x00007FFECF9E1000-memory.dmpFilesize
10.8MB
-
memory/336-134-0x00007FFECEF20000-0x00007FFECF9E1000-memory.dmpFilesize
10.8MB
-
memory/336-132-0x0000000000930000-0x0000000000B46000-memory.dmpFilesize
2.1MB
-
memory/336-133-0x00007FFECEF20000-0x00007FFECF9E1000-memory.dmpFilesize
10.8MB
-
memory/532-198-0x0000000006240000-0x00000000062A6000-memory.dmpFilesize
408KB
-
memory/532-254-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/532-175-0x0000000000000000-mapping.dmp
-
memory/976-275-0x0000000006780000-0x000000000678A000-memory.dmpFilesize
40KB
-
memory/976-232-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/976-189-0x0000000000000000-mapping.dmp
-
memory/1120-234-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/1120-195-0x0000000000000000-mapping.dmp
-
memory/1252-246-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/1252-187-0x0000000000000000-mapping.dmp
-
memory/1424-183-0x0000000000000000-mapping.dmp
-
memory/1424-237-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/1464-167-0x00000000000A0000-0x00000000000B0000-memory.dmpFilesize
64KB
-
memory/1464-162-0x0000000000000000-mapping.dmp
-
memory/1952-279-0x0000000000000000-mapping.dmp
-
memory/1956-188-0x0000000000000000-mapping.dmp
-
memory/1956-235-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/2100-256-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/2100-178-0x0000000000000000-mapping.dmp
-
memory/2100-196-0x00000000053C0000-0x00000000053E2000-memory.dmpFilesize
136KB
-
memory/2100-190-0x0000000004CC0000-0x0000000004CF6000-memory.dmpFilesize
216KB
-
memory/2280-259-0x0000000000000000-mapping.dmp
-
memory/2432-138-0x0000000000000000-mapping.dmp
-
memory/2432-155-0x00000000002B0000-0x0000000000440000-memory.dmpFilesize
1.6MB
-
memory/2468-326-0x000000006FCE0000-0x000000006FD2C000-memory.dmpFilesize
304KB
-
memory/2520-193-0x0000000000000000-mapping.dmp
-
memory/2520-250-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/2536-182-0x0000000000000000-mapping.dmp
-
memory/2536-290-0x0000000007440000-0x000000000744E000-memory.dmpFilesize
56KB
-
memory/2536-255-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/2588-170-0x0000000005290000-0x0000000005322000-memory.dmpFilesize
584KB
-
memory/2588-157-0x00000000006E0000-0x00000000007F4000-memory.dmpFilesize
1.1MB
-
memory/2588-150-0x0000000000000000-mapping.dmp
-
memory/2588-164-0x0000000005050000-0x00000000050EC000-memory.dmpFilesize
624KB
-
memory/2636-153-0x00000000004B0000-0x00000000005F6000-memory.dmpFilesize
1.3MB
-
memory/2636-147-0x0000000000000000-mapping.dmp
-
memory/2752-329-0x000000006FCE0000-0x000000006FD2C000-memory.dmpFilesize
304KB
-
memory/2908-184-0x0000000000000000-mapping.dmp
-
memory/2908-248-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/2968-253-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/2968-185-0x0000000000000000-mapping.dmp
-
memory/3056-171-0x0000000005220000-0x000000000522A000-memory.dmpFilesize
40KB
-
memory/3056-144-0x0000000000000000-mapping.dmp
-
memory/3056-154-0x0000000000830000-0x000000000093C000-memory.dmpFilesize
1.0MB
-
memory/3196-288-0x0000000007E80000-0x0000000007F16000-memory.dmpFilesize
600KB
-
memory/3196-181-0x0000000000000000-mapping.dmp
-
memory/3196-245-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/3356-236-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/3356-180-0x0000000000000000-mapping.dmp
-
memory/3356-263-0x00000000074B0000-0x00000000074CA000-memory.dmpFilesize
104KB
-
memory/3876-208-0x0000000000000000-mapping.dmp
-
memory/3988-191-0x0000000000000000-mapping.dmp
-
memory/3988-251-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/4040-192-0x0000000000000000-mapping.dmp
-
memory/4040-243-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/4076-244-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/4076-179-0x0000000000000000-mapping.dmp
-
memory/4156-174-0x0000000000000000-mapping.dmp
-
memory/4156-241-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/4212-238-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/4212-186-0x0000000000000000-mapping.dmp
-
memory/4212-230-0x0000000007390000-0x00000000073C2000-memory.dmpFilesize
200KB
-
memory/4212-308-0x0000000007830000-0x000000000784A000-memory.dmpFilesize
104KB
-
memory/4248-156-0x0000000000000000-mapping.dmp
-
memory/4248-169-0x0000000009DB0000-0x000000000A354000-memory.dmpFilesize
5.6MB
-
memory/4248-161-0x0000000000950000-0x0000000000972000-memory.dmpFilesize
136KB
-
memory/4252-231-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/4252-207-0x00000000068B0000-0x00000000068CE000-memory.dmpFilesize
120KB
-
memory/4252-194-0x0000000005A80000-0x00000000060A8000-memory.dmpFilesize
6.2MB
-
memory/4252-177-0x0000000000000000-mapping.dmp
-
memory/4252-197-0x00000000061B0000-0x0000000006216000-memory.dmpFilesize
408KB
-
memory/4252-239-0x0000000007A20000-0x0000000007A3E000-memory.dmpFilesize
120KB
-
memory/4312-209-0x0000000000000000-mapping.dmp
-
memory/4584-295-0x0000000000000000-mapping.dmp
-
memory/4644-233-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/4644-261-0x00000000074B0000-0x0000000007B2A000-memory.dmpFilesize
6.5MB
-
memory/4644-176-0x0000000000000000-mapping.dmp
-
memory/4904-165-0x00007FFEC5B10000-0x00007FFEC6546000-memory.dmpFilesize
10.2MB
-
memory/4904-135-0x0000000000000000-mapping.dmp
-
memory/5044-158-0x00000000009B0000-0x0000000000BD4000-memory.dmpFilesize
2.1MB
-
memory/5044-141-0x0000000000000000-mapping.dmp
-
memory/5072-262-0x0000000000000000-mapping.dmp
-
memory/5156-210-0x0000000000000000-mapping.dmp
-
memory/5376-199-0x0000000000000000-mapping.dmp
-
memory/5424-200-0x0000000000000000-mapping.dmp
-
memory/5464-201-0x0000000000000000-mapping.dmp
-
memory/5476-202-0x0000000000000000-mapping.dmp
-
memory/5480-287-0x0000000000000000-mapping.dmp
-
memory/5496-203-0x0000000000000000-mapping.dmp
-
memory/5644-204-0x0000000000000000-mapping.dmp
-
memory/5704-266-0x0000000000000000-mapping.dmp
-
memory/5788-328-0x000000006FCE0000-0x000000006FD2C000-memory.dmpFilesize
304KB
-
memory/5788-264-0x0000000000000000-mapping.dmp
-
memory/5888-205-0x0000000000000000-mapping.dmp
-
memory/6052-206-0x0000000000000000-mapping.dmp
-
memory/6256-211-0x0000000000000000-mapping.dmp
-
memory/6256-212-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/6268-218-0x0000000000000000-mapping.dmp
-
memory/6268-219-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/6288-215-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/6288-213-0x0000000000000000-mapping.dmp
-
memory/6296-216-0x0000000000000000-mapping.dmp
-
memory/6316-222-0x0000000000000000-mapping.dmp
-
memory/6316-224-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/6384-221-0x0000000000000000-mapping.dmp
-
memory/6464-228-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/6464-227-0x0000000000000000-mapping.dmp
-
memory/6676-293-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/6676-324-0x00000000077C0000-0x00000000077C8000-memory.dmpFilesize
32KB
-
memory/6676-283-0x0000000000000000-mapping.dmp
-
memory/6776-298-0x0000000000000000-mapping.dmp
-
memory/6812-291-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/6812-282-0x0000000000000000-mapping.dmp
-
memory/6820-260-0x0000000005A60000-0x0000000005AB6000-memory.dmpFilesize
344KB
-
memory/6820-247-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/6820-240-0x0000000000000000-mapping.dmp
-
memory/6852-242-0x0000000000000000-mapping.dmp
-
memory/6956-278-0x0000000000000000-mapping.dmp
-
memory/7024-327-0x000000006FCE0000-0x000000006FD2C000-memory.dmpFilesize
304KB
-
memory/7028-277-0x0000000000000000-mapping.dmp
-
memory/7072-252-0x0000000000000000-mapping.dmp
-
memory/7076-286-0x0000000000000000-mapping.dmp
-
memory/7136-284-0x0000000000000000-mapping.dmp
-
memory/7136-294-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB
-
memory/7152-285-0x0000000000000000-mapping.dmp
-
memory/7152-292-0x000000006FC90000-0x000000006FCDC000-memory.dmpFilesize
304KB