Analysis
-
max time kernel
106s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 08:38
Static task
static1
Behavioral task
behavioral1
Sample
95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe
-
Size
386KB
-
MD5
90a111afb406a5ead8277be2a2a4ca60
-
SHA1
a6c96ecb5ee175aa33656807939748d6c5202c1b
-
SHA256
95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120
-
SHA512
cb8cfe10957906fd5600fd5a805cb50a59ae1dbaec7d17d41a2ad622d3a23956e5d01c76e4391fc633c9f50dd055460c9f018ea9bc565073a5f97bb8c7987326
-
SSDEEP
3072:dSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbMtJyVdyw:ssqhJMxzJiU5SeLmNSbMtJU5
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batdescription pid process target process PID 1284 created 580 1284 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat svchost.exe -
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exeksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}v11.0.61030\\packages\\vcRuntimeMinimum_x86\\DERcXfakFIAhtYDUghq90.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Public\\Downloads\\eFYgFFYy5C90AzzJ8yJ485PAKKhauK4nKQrop0XXYZf1sAfpEpjmIzXsyY.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportArchive\\mFYH4pAzQAn2ltexkW6x4zxYwLYyfKxyJRF3nNZh1rQZQnqTJV685tgjD9KzuTVspB0l.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\DRM\\MI54bPwYRsI4D5o0y6UBxA5MD4w945.exe\" O" ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat -
Executes dropped EXE 2 IoCs
Processes:
ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batpid process 1284 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat 1464 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat -
Sets file execution options in registry 2 TTPs 8 IoCs
Processes:
ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat -
Loads dropped DLL 3 IoCs
Processes:
gpscript.exeksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batpid process 1536 gpscript.exe 1536 gpscript.exe 1284 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 62 IoCs
Processes:
95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exeksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batgpscript.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\RAC\\Outbound\\dMC13c4MmKZQEh.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{B155BDF8-02F0-451E-9A26-AE317CFD7779} {ADD8BA80-002B-11D0-8F0F-00C04FD7D062} 0xFFFF = 010000000000000010bdf103e400d901 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\OFFICE\\UICaptions\\1036\\8G2IYRMC05D4H2fqxHGtJCZkF7e72pu.exe\" O 2>NUL" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-738 = "Start Internet Explorer without ActiveX controls or browser extensions." ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\DRM\\Server\\ZbXiWckfj8XVH0KETXBzUfB6CoUgZ3GjMgQVH7xnCcIDwPGX4mgt2h7V2QlQEUlry.exe\" O 2>NUL" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\8by27av1.default-release\\storage\\default\\HOKN8hwGcyYPSd.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-19 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{FF393560-C2A7-11CF-BFF4-444553540000} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000b05bef03e400d901 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Feeds Cache\\NWV1K27G\\PrjjtTgRlCy1JqIylY2ttHctf.exe\" O" ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Feeds Cache\\RUC7JGOV\\OSaTXOUHvFiRLQ.exe\" O 2>NUL" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%systemroot%\system32\windowspowershell\v1.0\powershell.exe",-111 = "Performs object-based (command-line) functions" ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached gpscript.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Microsoft Office\\QledGQN05p8VrormzFwuHyACqDciU6SeZLE.exe\" O 2>NUL" ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\54050A5F8AE7F0C56E553F0090146C17A1D2BF8D\\packages\\Patch\\x64\\F5IE9mfz5197g7b0HtdNuk80SLdIWDt321Quls4bD5jlT9.exe\" O" ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Java\\J3WEtS1ahZge7ZWh71egABlhdhr5Q8j2KcKC.exe\" O" ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Mozilla\\9fXWIFJRz08hcn7EybwnJPZND2KPtOSeTQsJtBk2T5JyHY2tmDdWhmL1HKzbGc4.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\WSgISHtzuycgOOQYoxwJI6CqhNIwu9IZzQJ7xZmuPPD5MUH2tDuOYzf.exe\" O" ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-732 = "Finds and displays information and Web sites on the Internet." ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\Windows\\Projects\\SystemIndex\\Indexer\\QdWg3NMjrhCjqT6ym9oMaEoKA5u6AAbl2zoZx8iIqu9OXZGUTbWkXufJYptA3yfRumCk095.exe\" O 2>NUL" ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{35786D3C-B075-49B9-88DD-029876E11C01} {ADD8BA80-002B-11D0-8F0F-00C04FD7D062} 0xFFFF = 0100000000000000b05bef03e400d901 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Mozilla\\4ZtcxasM63UdoIYqwQKxjjJAv1s3QqhsJtr9hTu2GZcz6pc2kEb.exe\" O" ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\63\\cQox4rT9lUlTyGbf4gkW3kDrSvczI1VHADXiO7xd7G8GWOTen1cgkFnRf8L.exe\" O 2>NUL" ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000b008cbf3e300d901 gpscript.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\63\\VB7DYkNUKsxz9JF4fJJ0rVWoiPDfHBjXUTSrrp94n2t0kNyrrPE2cwjrfveaHUyf4YL.exe\" O 2>NUL" ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\11\\YKofVyG8RaHMUPJeUw7AbrndWQVrbsyaLDyMcV.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows NT\\MSFax\\VirtualInbox\\brVVH4IHL9GgcGMAtfJqrEBoFvn25kdhMbSTZ6Z0sFG2jThxtNjGJMtNsRrgZc2QjQsq9.exe\" O 2>NUL" ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{7BD29E01-76C1-11CF-9DD0-00A0C9034933} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000103fa1ffe300d901 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Key created \REGISTRY\USER\.DEFAULT 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\Contacts\\WBTfInfiLIwyNy4ZnnyT90gBYIkgHDKyHaHBAZG3RnsZEcVXBJIP7fS6rPeBw.exe\" O 2>NUL" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat -
Modifies registry class 12 IoCs
Processes:
95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\8by27av1.default-release\\crashes\\events\\Wwv0adf1HO2JFMV35G0RgzGp2wBE8WxI5WLHCxf7.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\SOFTWARE\Microsoft\Command Processor 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\S-1-5-21-3845472200-3839195424-595303356-1000\\eJLepPRa5Yw3BSmUnIV9xKjjjwCsAFAiznYLzozYkRQkhf34LH5z6oiw.exe\" O 2>NUL" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Windows 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Command Processor 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batpid process 1464 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat 1464 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exeAUDIODG.EXEksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batdescription pid process Token: SeBackupPrivilege 1960 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Token: SeRestorePrivilege 1960 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Token: SeShutdownPrivilege 1960 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Token: 33 1232 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1232 AUDIODG.EXE Token: 33 1232 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1232 AUDIODG.EXE Token: SeDebugPrivilege 1284 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Token: SeRestorePrivilege 1284 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Token: SeDebugPrivilege 1464 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat Token: SeRestorePrivilege 1464 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
gpscript.exeksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batdescription pid process target process PID 1536 wrote to memory of 1284 1536 gpscript.exe ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat PID 1536 wrote to memory of 1284 1536 gpscript.exe ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat PID 1536 wrote to memory of 1284 1536 gpscript.exe ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat PID 1284 wrote to memory of 1464 1284 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat PID 1284 wrote to memory of 1464 1284 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat PID 1284 wrote to memory of 1464 1284 ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:580
-
C:\ProgramData\Microsoft\OFFICE\UICaptions\ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat"C:\ProgramData\Microsoft\OFFICE\UICaptions\ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat" 22⤵
- Executes dropped EXE
- Sets file execution options in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
C:\Users\Admin\AppData\Local\Temp\95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe"C:\Users\Admin\AppData\Local\Temp\95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1724
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5101⤵
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:272
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\ProgramData\Microsoft\OFFICE\UICaptions\ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat"C:\ProgramData\Microsoft\OFFICE\UICaptions\ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.bat" 12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\szqljw7hLNzFnAkpjUqUSUc1L0rYMHFdF68O7gskgeM7HBtRqh2o0M0THPas.cmdFilesize
831KB
MD596bc68735cdbdd001b4e311999ad75b4
SHA1294d9e00bfd259f1dd4af311b9672213492b647b
SHA256a91086bc593c1a846a9bb1bbbb33abc61452b90983a3bf145ac7d5326dacd196
SHA5129531a942f956705eb4fef2fd9db248a094d1e113eafb03320b285d307ab5d0c826f4b56a853bb3ac60c4334b68997f67a89411a0c8bcdc435cbe98b3fecbac9b
-
C:\ProgramData\Microsoft\DRM\Server\ZbXiWckfj8XVH0KETXBzUfB6CoUgZ3GjMgQVH7xnCcIDwPGX4mgt2h7V2QlQEUlry.exeFilesize
530KB
MD51cf16c0a293075a1adcfa1db66e895c8
SHA1cfe2bf49d16faf60381918f857fd166edeb6c0d6
SHA25682669721fc5f3e2d63b455de8fab89503398b984761cad638f25f4be9cd5b43b
SHA51293d5c81625681a15836cd742466cc8d3b12818b903522ed6edf3a4b147c8035232217932ecdfb759c7aa4b5b69dd7357530360504bde50b5eb37491094b5b2c1
-
C:\ProgramData\Microsoft\OFFICE\UICaptions\ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batFilesize
476KB
MD512a88c88bbbfe9492ec0363274ee8cb6
SHA112914a2026c6f0f86874c8f781bdde805e5c482c
SHA2567e3b2a416e583d6ef3bd90792660be43cc82de63475122191d2aa6b2af71140f
SHA51243240c2d3ca3da4ce59d761cdec9b1f9f18ee195b09328c7cababe2d80439af97f00da4b35caa0cf0f5cd4b49058a365320b2de384caaf7cbf5f9f9cfdc64b6c
-
C:\ProgramData\Microsoft\OFFICE\UICaptions\ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batFilesize
476KB
MD512a88c88bbbfe9492ec0363274ee8cb6
SHA112914a2026c6f0f86874c8f781bdde805e5c482c
SHA2567e3b2a416e583d6ef3bd90792660be43cc82de63475122191d2aa6b2af71140f
SHA51243240c2d3ca3da4ce59d761cdec9b1f9f18ee195b09328c7cababe2d80439af97f00da4b35caa0cf0f5cd4b49058a365320b2de384caaf7cbf5f9f9cfdc64b6c
-
C:\ProgramData\Microsoft\OFFICE\UICaptions\ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batFilesize
476KB
MD512a88c88bbbfe9492ec0363274ee8cb6
SHA112914a2026c6f0f86874c8f781bdde805e5c482c
SHA2567e3b2a416e583d6ef3bd90792660be43cc82de63475122191d2aa6b2af71140f
SHA51243240c2d3ca3da4ce59d761cdec9b1f9f18ee195b09328c7cababe2d80439af97f00da4b35caa0cf0f5cd4b49058a365320b2de384caaf7cbf5f9f9cfdc64b6c
-
C:\ProgramData\Microsoft\RAC\Outbound\dMC13c4MmKZQEh.exeFilesize
525KB
MD58597b5fee5da01bed1c65e5c71bccd11
SHA18634eaea6e03531e1a376ae85089b86331b95295
SHA25638e8e1753f2b272da29019d6efa97d4059ac75718ac4b9c62bf7d0f12ba35e15
SHA512139d035bf0ffa7e8556fa8753eac84429e5faaae01ec50d4d18161bc5b3b0eb3a235ff9010f3dc153ae026064f1e5c547bf687ed26f423e1861541ab1726167a
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\11\YKofVyG8RaHMUPJeUw7AbrndWQVrbsyaLDyMcV.exeFilesize
604KB
MD50edf118d2b48fab16224aa512487f8ac
SHA19a37c834f113290def12430dbe6fbcd8ba1b9300
SHA256008d40253c8ee27cac4dd54be0687d864637b0c401b1478f30dbdccd63240a8e
SHA51259354b7c87b48c7ceb05c5bb8fc5e2e5454e4a06eb446bd822b4fcad152f7e55bdcfcdc043d45362a17869abe8cca06e433c1c05b6fb89fc1e2cb33e4faac138
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\go2HJTLEORBBm4hLMDoJQJmsrIhyQPXUKil85qJ.exeFilesize
514KB
MD523c3c55995cc42c20fcde1e6034cd032
SHA1c6caf2c73cbc046832911de15138c8633cffc896
SHA2567b4ad722617ddda3f4fab06061f46540a878e15c8537486ebcc25bea0ea451e4
SHA512bce225827fe4fa981a11436c0f7829346e6dc57ff39d044949fc1eb9c30fcf5b5a9e4be080086612b7ed10d71586b4ea278ee605bc54fd7b565a7ecce2f972e7
-
C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\RUC7JGOV\OSaTXOUHvFiRLQ.exeFilesize
615KB
MD526b732c866477a051bd1005ec3826906
SHA1a91ee3516fcc57e1dce4e75936b54c66db87d4a1
SHA256fe36275b182620f997913e6dc17491d84935b583014ea55353919c089a8bb96f
SHA512f1223e5564984d816b31695eb4bcbe87d85a50454de62f605821886f3db852622ca4cec77000a098b54284c32b73aafb345d75e0193d2db22f81dac484ed0848
-
C:\Users\Admin\AppData\Local\Mozilla\9fXWIFJRz08hcn7EybwnJPZND2KPtOSeTQsJtBk2T5JyHY2tmDdWhmL1HKzbGc4.exeFilesize
638KB
MD54c36391d390f2df3423ccf004f8d737e
SHA197f876cd8ad621360551c8c9cff421a9c78da9ac
SHA2562a822f42417e4221e82053deba56dfd81db4974f03bd6e42e7bd694486b8593e
SHA5129c0ff367677bbecb7e7a02fa20c71f7c3691c9793f2aa0776a25f903bd64c908fdeedf198d8e5b2f3bcea2256ef59478be1321f9d216a2ae6dd5dcbfe53b4391
-
C:\Users\Admin\AppData\Roaming\Adobe\DERX2Pcy045lbIm1EPIgBVP2IJWCWO7Jf7KSx7DtZaUrxW.exeFilesize
742KB
MD56b246f3440e48f4fd104b131cc3e23bc
SHA1cdc403d91a3edcabd5cf5e41e8ef6a4d063a96e6
SHA256c35b9fe4b408a6947db71fae49483ef0975993b95baa344057d68160da93b56e
SHA512dce915f8dbaedd2c5d1367f2cf64bda0dbbed3df2f601b5575b8d42133d30e5c9216fa16e2f212fecf35538775d6e4fdad27170c1771a3386c5b577a8f20b148
-
C:\Users\Admin\Contacts\WBTfInfiLIwyNy4ZnnyT90gBYIkgHDKyHaHBAZG3RnsZEcVXBJIP7fS6rPeBw.exeFilesize
449KB
MD5cd720d007197a857a5891f86ed37225c
SHA167f79ddb77bee0a7fa8896d58780cb938eee9726
SHA256475c33b08d647ba68f71a24e66aefbda0daa9c73483cbabf1a7c4ecb366fce0b
SHA512dfcde57c163c4485b0649c2b96e0148fecd65ba31978b9fbf602d13b409ecaf119d964feb2cdec94a0cc850fff49740f9536fd76eae8c2aa12213a4569d08f17
-
C:\Users\Public\Downloads\eFYgFFYy5C90AzzJ8yJ485PAKKhauK4nKQrop0XXYZf1sAfpEpjmIzXsyY.exeFilesize
390KB
MD5d03d772790366f7231845eaa0da6c961
SHA1007380afa6619750532c1080b44c733e1d656b9c
SHA2569e0abd61b8dc05ce237b6da6b50b3243da1bedac9347f4feac6f8b5768e4e9d0
SHA51288756b23e40fe774ce23ab0fade21ec9c4881ef6347c19720fb8055f140102cf7de025d1a27ef7529062718dbf802dfb1435450cb1a9b8221d2eeb4165793440
-
\ProgramData\Microsoft\OFFICE\UICaptions\ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batFilesize
476KB
MD512a88c88bbbfe9492ec0363274ee8cb6
SHA112914a2026c6f0f86874c8f781bdde805e5c482c
SHA2567e3b2a416e583d6ef3bd90792660be43cc82de63475122191d2aa6b2af71140f
SHA51243240c2d3ca3da4ce59d761cdec9b1f9f18ee195b09328c7cababe2d80439af97f00da4b35caa0cf0f5cd4b49058a365320b2de384caaf7cbf5f9f9cfdc64b6c
-
\ProgramData\Microsoft\OFFICE\UICaptions\ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batFilesize
476KB
MD512a88c88bbbfe9492ec0363274ee8cb6
SHA112914a2026c6f0f86874c8f781bdde805e5c482c
SHA2567e3b2a416e583d6ef3bd90792660be43cc82de63475122191d2aa6b2af71140f
SHA51243240c2d3ca3da4ce59d761cdec9b1f9f18ee195b09328c7cababe2d80439af97f00da4b35caa0cf0f5cd4b49058a365320b2de384caaf7cbf5f9f9cfdc64b6c
-
\ProgramData\Microsoft\OFFICE\UICaptions\ksYkfP9FNsa10w913FAfElPDPpbpAIITUl9oE89zVEDxtJPaPtu6Wt3ESF.batFilesize
476KB
MD512a88c88bbbfe9492ec0363274ee8cb6
SHA112914a2026c6f0f86874c8f781bdde805e5c482c
SHA2567e3b2a416e583d6ef3bd90792660be43cc82de63475122191d2aa6b2af71140f
SHA51243240c2d3ca3da4ce59d761cdec9b1f9f18ee195b09328c7cababe2d80439af97f00da4b35caa0cf0f5cd4b49058a365320b2de384caaf7cbf5f9f9cfdc64b6c
-
memory/1284-75-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1284-78-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1284-81-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1284-62-0x0000000000000000-mapping.dmp
-
memory/1464-80-0x0000000000000000-mapping.dmp
-
memory/1464-85-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1536-74-0x0000000001030000-0x000000000105D000-memory.dmpFilesize
180KB
-
memory/1536-73-0x0000000001030000-0x000000000105D000-memory.dmpFilesize
180KB
-
memory/1536-76-0x0000000001030000-0x000000000105D000-memory.dmpFilesize
180KB
-
memory/1536-77-0x0000000001030000-0x000000000105D000-memory.dmpFilesize
180KB
-
memory/1724-56-0x000007FEFB6D1000-0x000007FEFB6D3000-memory.dmpFilesize
8KB
-
memory/1960-54-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1960-55-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB