Analysis
-
max time kernel
124s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2023 10:48
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
232KB
-
MD5
0f64159886f0ee668ffb0b74b8e2d4eb
-
SHA1
552b74d82f4a269c7bb1db3a95aeda90fb9347b5
-
SHA256
b534c8bb2281a1ab00dc19b98647a7dbc216eb1f1703eebb3cd469c8af20b74e
-
SHA512
78c10a98892db0ab4271af24f9c8a803160803475e0822315ef2f67b3cecc8d963dddf2a6c043a60948c86266d7438eebe31f80e32725b585ad3052c5d556f04
-
SSDEEP
3072:oXMCl1RZ72LBQwv2fOQD/coEcX/S/+7QxZjOCtsqe2Jfu8s5XDKyQ/uyhOC94c:6MU1RMLG82fOUhX/T7cJfu84DHXyUC
Malware Config
Extracted
lumma
77.73.134.68
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3828-133-0x0000000002170000-0x0000000002179000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 66 2484 rundll32.exe 67 2484 rundll32.exe 91 2484 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
6B1E.exeD012.exeejaugwgpid process 3680 6B1E.exe 1472 D012.exe 1500 ejaugwg -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\tr\Parameters\ServiceDll = "C:\\Program Files (x86)\\WindowsPowerShell\\Modules\\tr.dll" rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\tr\ImagePath = "C:\\Windows\\system32\\svchost.exe -k LocalService" rundll32.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exesvchost.exerundll32.exepid process 2484 rundll32.exe 4180 svchost.exe 1728 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
rundll32.exedescription pid process target process PID 2484 set thread context of 3820 2484 rundll32.exe rundll32.exe PID 2484 set thread context of 4036 2484 rundll32.exe rundll32.exe -
Drops file in Program Files directory 39 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Program Files (x86)\WindowsPowerShell\Modules\A3DUtils.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\turnOffNotificationInTray.gif rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\adoberfp.dll rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Home.aapp rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\icucnv40.dll rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\sqlite.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\adoberfp.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Redact_R_RHP.aapp rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\s_filetype_psd.svg rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Click on 'Change' to select default PDF handler.pdf rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\download.svg rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\snapshot_blob.bin rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\Flash.mpp rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\CPDF_Full.aapp rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\forms_received.gif rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\AiodLite.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\icucnv40.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\reviews_super.gif rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Redact_R_RHP.aapp rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\comment.svg rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\forms_received.gif rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Flash.mpp rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\turnOffNotificationInTray.gif rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\s_filetype_psd.svg rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\CPDF_Full.aapp rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\sqlite.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\A3DUtils.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\download.svg rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\2d.x3d rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Home.aapp rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\AiodLite.dll rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\reviews_super.gif rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Click on 'Change' to select default PDF handler.pdf rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\2d.x3d rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\acrobat_pdf.svg rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\back-arrow-hover.svg rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\acrobat_pdf.svg rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\tr.dll rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\back-arrow-hover.svg rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 460 3680 WerFault.exe 6B1E.exe 4536 1472 WerFault.exe D012.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
file.exeejaugwgdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ejaugwg Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ejaugwg Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ejaugwg -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exerundll32.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe -
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Toolbar Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 -
Modifies registry class 39 IoCs
Processes:
rundll32.exerundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e003100000000003056395e100054656d7000003a0009000400efbe0c55ec983056395e2e0000000000000000000000000000000000000000000000000071762a00540065006d007000000014000000 Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
pid process 2712 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 3828 file.exe 3828 file.exe 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 2712 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2712 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
file.exepid process 3828 file.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
rundll32.exedescription pid process Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeDebugPrivilege 2484 rundll32.exe Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 Token: SeShutdownPrivilege 2712 Token: SeCreatePagefilePrivilege 2712 -
Suspicious use of FindShellTrayWindow 13 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 3820 rundll32.exe 2712 2712 2712 2712 2712 2712 2712 2712 2484 rundll32.exe 4036 rundll32.exe 2484 rundll32.exe 2484 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
pid process 2712 2712 -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
6B1E.exesvchost.exerundll32.exedescription pid process target process PID 2712 wrote to memory of 3680 2712 6B1E.exe PID 2712 wrote to memory of 3680 2712 6B1E.exe PID 2712 wrote to memory of 3680 2712 6B1E.exe PID 3680 wrote to memory of 2484 3680 6B1E.exe rundll32.exe PID 3680 wrote to memory of 2484 3680 6B1E.exe rundll32.exe PID 3680 wrote to memory of 2484 3680 6B1E.exe rundll32.exe PID 2712 wrote to memory of 1472 2712 D012.exe PID 2712 wrote to memory of 1472 2712 D012.exe PID 2712 wrote to memory of 1472 2712 D012.exe PID 4180 wrote to memory of 1728 4180 svchost.exe rundll32.exe PID 4180 wrote to memory of 1728 4180 svchost.exe rundll32.exe PID 4180 wrote to memory of 1728 4180 svchost.exe rundll32.exe PID 2484 wrote to memory of 3820 2484 rundll32.exe rundll32.exe PID 2484 wrote to memory of 3820 2484 rundll32.exe rundll32.exe PID 2484 wrote to memory of 3820 2484 rundll32.exe rundll32.exe PID 2484 wrote to memory of 4600 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 4600 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 4600 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 4036 2484 rundll32.exe rundll32.exe PID 2484 wrote to memory of 4036 2484 rundll32.exe rundll32.exe PID 2484 wrote to memory of 4036 2484 rundll32.exe rundll32.exe PID 2484 wrote to memory of 4272 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 4272 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 4272 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 4608 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 4608 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 4608 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 2060 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 2060 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 2060 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 4300 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 4300 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 4300 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 1104 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 1104 2484 rundll32.exe schtasks.exe PID 2484 wrote to memory of 1104 2484 rundll32.exe schtasks.exe -
outlook_office_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\6B1E.exeC:\Users\Admin\AppData\Local\Temp\6B1E.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Sdaaysrpyefiy.tmp",Qowsuiaedfeupa2⤵
- Blocklisted process makes network request
- Sets DLL path for service in the registry
- Sets service image path in registry
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 186363⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 186363⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 5402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3680 -ip 36801⤵
-
C:\Users\Admin\AppData\Local\Temp\D012.exeC:\Users\Admin\AppData\Local\Temp\D012.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 13762⤵
- Program crash
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k LocalService1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windowspowershell\modules\tr.dll",mkFZ2⤵
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1472 -ip 14721⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Roaming\ejaugwgC:\Users\Admin\AppData\Roaming\ejaugwg1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\WindowsPowerShell\Modules\tr.dllFilesize
774KB
MD53032a21ad8007b387d65628e5ca044e7
SHA1aa284882d5812f0f2345fe597b7ea5b8ffd48fc6
SHA25620554e874c04cebecfaacd2539be391b0c29f6a27ee5bf8bf2d88a406e3c7f1c
SHA5129445cb0f8b432856214e25b3573ca36de2199a01f04b0b53948d2fbfc0cdcadb10dbd92858359ec9ad973654a1c9e497247049f1f5b86f67e110325dd15a7235
-
C:\Program Files (x86)\WindowsPowerShell\Modules\tr.dllFilesize
774KB
MD53032a21ad8007b387d65628e5ca044e7
SHA1aa284882d5812f0f2345fe597b7ea5b8ffd48fc6
SHA25620554e874c04cebecfaacd2539be391b0c29f6a27ee5bf8bf2d88a406e3c7f1c
SHA5129445cb0f8b432856214e25b3573ca36de2199a01f04b0b53948d2fbfc0cdcadb10dbd92858359ec9ad973654a1c9e497247049f1f5b86f67e110325dd15a7235
-
C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\CiPT0000.001Filesize
64KB
MD508c1446a011937f5608e5f2448443304
SHA153e7291e9b33e46a17d9514a6005302e79a36407
SHA256c10595f1ade2f1adced14a578b437e6958adf631c01a4c167b14b6904eaf2680
SHA512a7a339940faba59e5a07b715ae39df9de39a4e69913d8d347cd696709a3191483537d1c011a1bea2d5faa222bf768e33dbde5791d04458b7e14a3db494eb6b07
-
C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe.xmlFilesize
829B
MD587abe99363b16041e32b8a146eb53617
SHA1b1f3f3c3939f2331dee213e480f4a4d0c753f72a
SHA2567c8df7b34fca6387a15cbc0d6f591624a5a28bf513f71eb1077d55f1b448d856
SHA512091ffae18e7cf41237b1039964cb4c3116275edfa34b198bbb9a0b258a99bf3b62b420fb22d747788a889f2306c30f0dc00566c432d4b2bb2e410a9e7dc69e44
-
C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\MicrosoftOffice2013Win32.xmlFilesize
66KB
MD5d6269a771887562b5461c9a99bcfeacd
SHA1d4f5647c655af50453e2097eb3e8552318f139a1
SHA25658e3a955ba9293be903e880620c559bcd4f5b8069c3c23a3f06a9c549ed621d1
SHA51218b23fea2436cd1c6ac8dd159660f386694abe0d6c2e5bca15e11bbf9da06a620bc4c759af1b5646bed8086576369b051bec0f41837127738bebce9f13b9dc30
-
C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\Uqioyhuair.tmpFilesize
3.5MB
MD53b7853644f1050b7b3b037a8a6bcf7f2
SHA178282f74149d9e81dfc6a5cc6b92296eb94a08a8
SHA256b1c5ccdb7b0bbbc5107df81cd05e2dfaf99b2cca856c191f08fd25666a446d67
SHA5127c5bc2be3202de3055984ddb50bf1e292d58a8c3fa527e4ce2b03d0b492078af082796c3da7945f89fe256ea919738d9ecc4ecf1aa91a50cd02446f63a372fad
-
C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\background.pngFilesize
126KB
MD59adaf3a844ce0ce36bfed07fa2d7ef66
SHA13a804355d5062a6d2ed9653d66e9e4aebaf90bc0
SHA256d3e8d47e8c1622ec10adef672ca7a8992748c4f0a4e75f877462e7e661069698
SHA512e6988737153a0996b14e6baa45e8010ff46714fe7679d05a2676cc18e1c653e99227e7507cdae4f2b6a99b3c31478630e7e1ae13d0f7c12525406d8cf9867ca5
-
C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\guest.pngFilesize
5KB
MD5d7ee4543371744836d520e0ce24a9ee6
SHA1a6cda6aac3e480b269b9da2bd616bdb4d6fa87f0
SHA25698817a572430813ca4ca2787dab20573f7864c5168ac6912f34d14b49e7bd7c9
SHA512e15b6a50d9d498918a81488bf8d60860027f9a38f4d87e239f1c6e9d20fe4938e75861dad35c69e4087370c18b2cd5b482ab6ca694dfe205d053f1d303d17808
-
C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\scan_settings.icoFilesize
62KB
MD58f6abfe0c274c41c3ad3c1becf2317f5
SHA16dc69b46e569ca11e3ec081293df69a6d115674c
SHA256d660f44fb7efbfdcec4cba821fea1be0977e3f66cc709b313edf9ead575994a5
SHA512ed474a6d52df65b5bf7a1bd81d54458a1258571f16b28ce043189815bf6dc57c49cb31c6f48fed9791de6b69f93331282a0c6e76e54d488ddad7e30d2333a1b2
-
C:\Users\Admin\AppData\Local\Temp\6B1E.exeFilesize
1.1MB
MD5d631960cf949a89bbfb090d01a7059c2
SHA12ad73edbd36975a6c15a9c21468b31bb6e89cc4f
SHA256551b73473fba25f065f6de4197b8d8f3555fe7a54c0256d284b10e46622fc1ff
SHA5125bc0b8ec5086ff8abc43c4c2a474a4ab50e3c0c20ec0be046bb45a66dbb1a2c0456f8cdcde82eedb666b1ac33770d4f0a21b54f5c7931012a314e53ec51f5726
-
C:\Users\Admin\AppData\Local\Temp\6B1E.exeFilesize
1.1MB
MD5d631960cf949a89bbfb090d01a7059c2
SHA12ad73edbd36975a6c15a9c21468b31bb6e89cc4f
SHA256551b73473fba25f065f6de4197b8d8f3555fe7a54c0256d284b10e46622fc1ff
SHA5125bc0b8ec5086ff8abc43c4c2a474a4ab50e3c0c20ec0be046bb45a66dbb1a2c0456f8cdcde82eedb666b1ac33770d4f0a21b54f5c7931012a314e53ec51f5726
-
C:\Users\Admin\AppData\Local\Temp\D012.exeFilesize
251KB
MD5fe7dd689396bf62715c45735c2761eca
SHA12d7e535ddafa3eb554f87314c8a3634d819dc778
SHA256fec1f657f269aa04c8cac90b500c8a2c95faef8db1e20b504617f7dccad5eb1b
SHA5124cd59f82e826efe24c19a8f1d009ac021ad8f2b75006a1babb22141bcd5f76cdec0960680868e11604ee5a896c2494cbcde72349901916888f4d09cf68ccac51
-
C:\Users\Admin\AppData\Local\Temp\D012.exeFilesize
251KB
MD5fe7dd689396bf62715c45735c2761eca
SHA12d7e535ddafa3eb554f87314c8a3634d819dc778
SHA256fec1f657f269aa04c8cac90b500c8a2c95faef8db1e20b504617f7dccad5eb1b
SHA5124cd59f82e826efe24c19a8f1d009ac021ad8f2b75006a1babb22141bcd5f76cdec0960680868e11604ee5a896c2494cbcde72349901916888f4d09cf68ccac51
-
C:\Users\Admin\AppData\Local\Temp\Sdaaysrpyefiy.tmpFilesize
774KB
MD5e06fb66bfbe1444cc091f0297b8d32db
SHA1c3e13e3edcbbf30cdc51ce96cc7a802fc88e83af
SHA256b282eb3f05d375d3487d20596d783fa52aa27013e8b2b407db32d9a3a751319d
SHA512c639b62f417d46148c3a84ae5ff2cc7018c653424cc1d643a983c41d4a12f6015df0f4359c5e078c2c3e5b1d42de18acfb6aab432266a8c4e37aa5449e961d95
-
C:\Users\Admin\AppData\Local\Temp\Sdaaysrpyefiy.tmpFilesize
774KB
MD5e06fb66bfbe1444cc091f0297b8d32db
SHA1c3e13e3edcbbf30cdc51ce96cc7a802fc88e83af
SHA256b282eb3f05d375d3487d20596d783fa52aa27013e8b2b407db32d9a3a751319d
SHA512c639b62f417d46148c3a84ae5ff2cc7018c653424cc1d643a983c41d4a12f6015df0f4359c5e078c2c3e5b1d42de18acfb6aab432266a8c4e37aa5449e961d95
-
C:\Users\Admin\AppData\Roaming\ejaugwgFilesize
232KB
MD50f64159886f0ee668ffb0b74b8e2d4eb
SHA1552b74d82f4a269c7bb1db3a95aeda90fb9347b5
SHA256b534c8bb2281a1ab00dc19b98647a7dbc216eb1f1703eebb3cd469c8af20b74e
SHA51278c10a98892db0ab4271af24f9c8a803160803475e0822315ef2f67b3cecc8d963dddf2a6c043a60948c86266d7438eebe31f80e32725b585ad3052c5d556f04
-
C:\Users\Admin\AppData\Roaming\ejaugwgFilesize
232KB
MD50f64159886f0ee668ffb0b74b8e2d4eb
SHA1552b74d82f4a269c7bb1db3a95aeda90fb9347b5
SHA256b534c8bb2281a1ab00dc19b98647a7dbc216eb1f1703eebb3cd469c8af20b74e
SHA51278c10a98892db0ab4271af24f9c8a803160803475e0822315ef2f67b3cecc8d963dddf2a6c043a60948c86266d7438eebe31f80e32725b585ad3052c5d556f04
-
\??\c:\program files (x86)\windowspowershell\modules\tr.dllFilesize
774KB
MD53032a21ad8007b387d65628e5ca044e7
SHA1aa284882d5812f0f2345fe597b7ea5b8ffd48fc6
SHA25620554e874c04cebecfaacd2539be391b0c29f6a27ee5bf8bf2d88a406e3c7f1c
SHA5129445cb0f8b432856214e25b3573ca36de2199a01f04b0b53948d2fbfc0cdcadb10dbd92858359ec9ad973654a1c9e497247049f1f5b86f67e110325dd15a7235
-
memory/1104-200-0x0000000000000000-mapping.dmp
-
memory/1216-210-0x0000000000000000-mapping.dmp
-
memory/1340-211-0x0000000000000000-mapping.dmp
-
memory/1472-177-0x0000000000400000-0x0000000000445000-memory.dmpFilesize
276KB
-
memory/1472-153-0x00000000007BD000-0x00000000007D7000-memory.dmpFilesize
104KB
-
memory/1472-154-0x0000000002050000-0x000000000207A000-memory.dmpFilesize
168KB
-
memory/1472-155-0x0000000000400000-0x0000000000445000-memory.dmpFilesize
276KB
-
memory/1472-147-0x0000000000000000-mapping.dmp
-
memory/1500-201-0x000000000071D000-0x0000000000733000-memory.dmpFilesize
88KB
-
memory/1500-202-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1500-204-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1692-207-0x0000000000000000-mapping.dmp
-
memory/1728-176-0x0000000005040000-0x0000000005B95000-memory.dmpFilesize
11.3MB
-
memory/1728-197-0x0000000005040000-0x0000000005B95000-memory.dmpFilesize
11.3MB
-
memory/1728-166-0x0000000000000000-mapping.dmp
-
memory/1728-178-0x0000000005040000-0x0000000005B95000-memory.dmpFilesize
11.3MB
-
memory/2060-198-0x0000000000000000-mapping.dmp
-
memory/2348-209-0x0000000000000000-mapping.dmp
-
memory/2484-171-0x0000000004240000-0x0000000004380000-memory.dmpFilesize
1.2MB
-
memory/2484-139-0x0000000000000000-mapping.dmp
-
memory/2484-146-0x0000000004A90000-0x00000000055E5000-memory.dmpFilesize
11.3MB
-
memory/2484-172-0x0000000004240000-0x0000000004380000-memory.dmpFilesize
1.2MB
-
memory/2484-150-0x0000000004240000-0x0000000004380000-memory.dmpFilesize
1.2MB
-
memory/2484-151-0x0000000004240000-0x0000000004380000-memory.dmpFilesize
1.2MB
-
memory/2484-152-0x0000000004A90000-0x00000000055E5000-memory.dmpFilesize
11.3MB
-
memory/2484-169-0x0000000004240000-0x0000000004380000-memory.dmpFilesize
1.2MB
-
memory/2484-170-0x0000000004240000-0x0000000004380000-memory.dmpFilesize
1.2MB
-
memory/2484-187-0x0000000004240000-0x0000000004380000-memory.dmpFilesize
1.2MB
-
memory/2484-186-0x0000000004240000-0x0000000004380000-memory.dmpFilesize
1.2MB
-
memory/2484-185-0x0000000004240000-0x0000000004380000-memory.dmpFilesize
1.2MB
-
memory/2484-183-0x0000000004240000-0x0000000004380000-memory.dmpFilesize
1.2MB
-
memory/2608-203-0x0000000000000000-mapping.dmp
-
memory/2660-208-0x0000000000000000-mapping.dmp
-
memory/3244-205-0x0000000000000000-mapping.dmp
-
memory/3680-143-0x00000000022C0000-0x00000000023EE000-memory.dmpFilesize
1.2MB
-
memory/3680-142-0x000000000216B000-0x0000000002254000-memory.dmpFilesize
932KB
-
memory/3680-144-0x0000000000400000-0x0000000000530000-memory.dmpFilesize
1.2MB
-
memory/3680-136-0x0000000000000000-mapping.dmp
-
memory/3820-179-0x0000000000B30000-0x0000000000DD4000-memory.dmpFilesize
2.6MB
-
memory/3820-182-0x000002DB71E20000-0x000002DB720D5000-memory.dmpFilesize
2.7MB
-
memory/3820-180-0x000002DB71E20000-0x000002DB720D5000-memory.dmpFilesize
2.7MB
-
memory/3820-173-0x00007FF7C16E6890-mapping.dmp
-
memory/3820-175-0x000002DB73880000-0x000002DB739C0000-memory.dmpFilesize
1.2MB
-
memory/3820-174-0x000002DB73880000-0x000002DB739C0000-memory.dmpFilesize
1.2MB
-
memory/3828-134-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/3828-133-0x0000000002170000-0x0000000002179000-memory.dmpFilesize
36KB
-
memory/3828-135-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/3828-132-0x000000000051D000-0x0000000000533000-memory.dmpFilesize
88KB
-
memory/4036-190-0x000002ABEF790000-0x000002ABEF8D0000-memory.dmpFilesize
1.2MB
-
memory/4036-192-0x000002ABEDD10000-0x000002ABEDFC5000-memory.dmpFilesize
2.7MB
-
memory/4036-191-0x000002ABEDD10000-0x000002ABEDFC5000-memory.dmpFilesize
2.7MB
-
memory/4036-189-0x000002ABEF790000-0x000002ABEF8D0000-memory.dmpFilesize
1.2MB
-
memory/4036-188-0x00007FF7C16E6890-mapping.dmp
-
memory/4180-194-0x0000000003F20000-0x0000000004A75000-memory.dmpFilesize
11.3MB
-
memory/4180-159-0x0000000003F20000-0x0000000004A75000-memory.dmpFilesize
11.3MB
-
memory/4180-168-0x0000000003F20000-0x0000000004A75000-memory.dmpFilesize
11.3MB
-
memory/4272-184-0x0000000000000000-mapping.dmp
-
memory/4300-199-0x0000000000000000-mapping.dmp
-
memory/4600-181-0x0000000000000000-mapping.dmp
-
memory/4608-193-0x0000000000000000-mapping.dmp
-
memory/5028-206-0x0000000000000000-mapping.dmp