Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2023 14:05
Static task
static1
General
-
Target
d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.exe
-
Size
380KB
-
MD5
bbd74fe84f0cd1c6a490d33ccd2d5588
-
SHA1
7232328b8e24ec0d5ce5e29ad446a5150534b771
-
SHA256
d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7
-
SHA512
0402625cdd798cb36eaf4c3772921c5e372a21f7b7234a2811a64275ac6acc63ec1245d4270346a316a542d6f18223959f1b66ee96d053ec8259572263bd13b6
-
SSDEEP
6144:K/QiQXCA6m+ksmpk3U9jW1U4P9bBiQtCsZ/+/imJIGh7bc92xa+5o1WUK0h06PYA:yQi3Ap6m6URA3PhBtthtE/E9y5uVPYgV
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Extracted
socelars
https://hdbywe.s3.us-west-2.amazonaws.com/sfasue20/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5712 7164 rundll32.exe -
Socelars payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe family_socelars C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe family_socelars -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
BOLTin1.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts BOLTin1.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
BOLTin1.exeSusasykojy.exegcleaner.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation BOLTin1.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation Susasykojy.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation gcleaner.exe -
Executes dropped EXE 8 IoCs
Processes:
d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmpBOLTin1.exeSusasykojy.exeSusasykojy.exegcleaner.exehanddiy_3.exeidentity_helper.exechenp.exepid process 4648 d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmp 3608 BOLTin1.exe 2696 Susasykojy.exe 2712 Susasykojy.exe 7472 gcleaner.exe 7896 handdiy_3.exe 3068 identity_helper.exe 4004 chenp.exe -
Loads dropped DLL 2 IoCs
Processes:
d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmprundll32.exepid process 4648 d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmp 5728 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
BOLTin1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\Susasykojy.exe\"" BOLTin1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 15 IoCs
Processes:
setup.exehanddiy_3.exeBOLTin1.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\a234e2ac-f5af-4da4-8338-a50123661d98.tmp setup.exe File created C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\background.html handdiy_3.exe File created C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\mode-ecb.js handdiy_3.exe File created C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\icon.png handdiy_3.exe File created C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\background.js handdiy_3.exe File created C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\content.js handdiy_3.exe File created C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\pad-nopadding.js handdiy_3.exe File created C:\Program Files\Windows Media Player\EUNDMYEPMU\poweroff.exe BOLTin1.exe File created C:\Program Files (x86)\Windows Multimedia Platform\Susasykojy.exe.config BOLTin1.exe File created C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\manifest.json handdiy_3.exe File opened for modification C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\background.js handdiy_3.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230221030625.pma setup.exe File created C:\Program Files (x86)\Windows Multimedia Platform\Susasykojy.exe BOLTin1.exe File created C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\jquery-3.3.1.min.js handdiy_3.exe File created C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\aes.js handdiy_3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 7724 7472 WerFault.exe gcleaner.exe 5104 7472 WerFault.exe gcleaner.exe 4744 7472 WerFault.exe gcleaner.exe 3048 7472 WerFault.exe gcleaner.exe 5164 7472 WerFault.exe gcleaner.exe 5420 7472 WerFault.exe gcleaner.exe 5508 7472 WerFault.exe gcleaner.exe 5672 7472 WerFault.exe gcleaner.exe 5796 5728 WerFault.exe rundll32.exe 5852 7472 WerFault.exe gcleaner.exe 5968 7472 WerFault.exe gcleaner.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
msedge.exechrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 4832 taskkill.exe 5960 taskkill.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 129 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Susasykojy.exepid process 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe 2712 Susasykojy.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
msedge.exechrome.exepid process 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
BOLTin1.exeSusasykojy.exeSusasykojy.exehanddiy_3.exesvchost.exetaskkill.exechrome.exedescription pid process Token: SeDebugPrivilege 3608 BOLTin1.exe Token: SeDebugPrivilege 2696 Susasykojy.exe Token: SeDebugPrivilege 2712 Susasykojy.exe Token: SeCreateTokenPrivilege 7896 handdiy_3.exe Token: SeAssignPrimaryTokenPrivilege 7896 handdiy_3.exe Token: SeLockMemoryPrivilege 7896 handdiy_3.exe Token: SeIncreaseQuotaPrivilege 7896 handdiy_3.exe Token: SeMachineAccountPrivilege 7896 handdiy_3.exe Token: SeTcbPrivilege 7896 handdiy_3.exe Token: SeSecurityPrivilege 7896 handdiy_3.exe Token: SeTakeOwnershipPrivilege 7896 handdiy_3.exe Token: SeLoadDriverPrivilege 7896 handdiy_3.exe Token: SeSystemProfilePrivilege 7896 handdiy_3.exe Token: SeSystemtimePrivilege 7896 handdiy_3.exe Token: SeProfSingleProcessPrivilege 7896 handdiy_3.exe Token: SeIncBasePriorityPrivilege 7896 handdiy_3.exe Token: SeCreatePagefilePrivilege 7896 handdiy_3.exe Token: SeCreatePermanentPrivilege 7896 handdiy_3.exe Token: SeBackupPrivilege 7896 handdiy_3.exe Token: SeRestorePrivilege 7896 handdiy_3.exe Token: SeShutdownPrivilege 7896 handdiy_3.exe Token: SeDebugPrivilege 7896 handdiy_3.exe Token: SeAuditPrivilege 7896 handdiy_3.exe Token: SeSystemEnvironmentPrivilege 7896 handdiy_3.exe Token: SeChangeNotifyPrivilege 7896 handdiy_3.exe Token: SeRemoteShutdownPrivilege 7896 handdiy_3.exe Token: SeUndockPrivilege 7896 handdiy_3.exe Token: SeSyncAgentPrivilege 7896 handdiy_3.exe Token: SeEnableDelegationPrivilege 7896 handdiy_3.exe Token: SeManageVolumePrivilege 7896 handdiy_3.exe Token: SeImpersonatePrivilege 7896 handdiy_3.exe Token: SeCreateGlobalPrivilege 7896 handdiy_3.exe Token: 31 7896 handdiy_3.exe Token: 32 7896 handdiy_3.exe Token: 33 7896 handdiy_3.exe Token: 34 7896 handdiy_3.exe Token: 35 7896 handdiy_3.exe Token: SeDebugPrivilege 4832 svchost.exe Token: SeDebugPrivilege 5960 taskkill.exe Token: SeShutdownPrivilege 6148 chrome.exe Token: SeCreatePagefilePrivilege 6148 chrome.exe Token: SeShutdownPrivilege 6148 chrome.exe Token: SeCreatePagefilePrivilege 6148 chrome.exe Token: SeShutdownPrivilege 6148 chrome.exe Token: SeCreatePagefilePrivilege 6148 chrome.exe Token: SeShutdownPrivilege 6148 chrome.exe Token: SeCreatePagefilePrivilege 6148 chrome.exe Token: SeShutdownPrivilege 6148 chrome.exe Token: SeCreatePagefilePrivilege 6148 chrome.exe Token: SeShutdownPrivilege 6148 chrome.exe Token: SeCreatePagefilePrivilege 6148 chrome.exe Token: SeShutdownPrivilege 6148 chrome.exe Token: SeCreatePagefilePrivilege 6148 chrome.exe Token: SeShutdownPrivilege 6148 chrome.exe Token: SeCreatePagefilePrivilege 6148 chrome.exe Token: SeShutdownPrivilege 6148 chrome.exe Token: SeCreatePagefilePrivilege 6148 chrome.exe Token: SeShutdownPrivilege 6148 chrome.exe Token: SeCreatePagefilePrivilege 6148 chrome.exe Token: SeShutdownPrivilege 6148 chrome.exe Token: SeCreatePagefilePrivilege 6148 chrome.exe Token: SeShutdownPrivilege 6148 chrome.exe Token: SeCreatePagefilePrivilege 6148 chrome.exe Token: SeShutdownPrivilege 6148 chrome.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
Processes:
msedge.exechrome.exepid process 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe 6148 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
identity_helper.exechenp.exepid process 3068 identity_helper.exe 3068 identity_helper.exe 4004 chenp.exe 4004 chenp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.exed6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmpBOLTin1.exeSusasykojy.exemsedge.exeSusasykojy.execmd.execmd.exedescription pid process target process PID 3812 wrote to memory of 4648 3812 d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.exe d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmp PID 3812 wrote to memory of 4648 3812 d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.exe d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmp PID 3812 wrote to memory of 4648 3812 d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.exe d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmp PID 4648 wrote to memory of 3608 4648 d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmp BOLTin1.exe PID 4648 wrote to memory of 3608 4648 d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmp BOLTin1.exe PID 3608 wrote to memory of 2696 3608 BOLTin1.exe Susasykojy.exe PID 3608 wrote to memory of 2696 3608 BOLTin1.exe Susasykojy.exe PID 3608 wrote to memory of 2712 3608 BOLTin1.exe Susasykojy.exe PID 3608 wrote to memory of 2712 3608 BOLTin1.exe Susasykojy.exe PID 2696 wrote to memory of 2212 2696 Susasykojy.exe msedge.exe PID 2696 wrote to memory of 2212 2696 Susasykojy.exe msedge.exe PID 2212 wrote to memory of 4496 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 4496 2212 msedge.exe msedge.exe PID 2712 wrote to memory of 6772 2712 Susasykojy.exe cmd.exe PID 2712 wrote to memory of 6772 2712 Susasykojy.exe cmd.exe PID 6772 wrote to memory of 7472 6772 cmd.exe gcleaner.exe PID 6772 wrote to memory of 7472 6772 cmd.exe gcleaner.exe PID 6772 wrote to memory of 7472 6772 cmd.exe gcleaner.exe PID 2712 wrote to memory of 7828 2712 Susasykojy.exe cmd.exe PID 2712 wrote to memory of 7828 2712 Susasykojy.exe cmd.exe PID 7828 wrote to memory of 7896 7828 cmd.exe handdiy_3.exe PID 7828 wrote to memory of 7896 7828 cmd.exe handdiy_3.exe PID 7828 wrote to memory of 7896 7828 cmd.exe handdiy_3.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8044 2212 msedge.exe msedge.exe PID 2212 wrote to memory of 8056 2212 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.exe"C:\Users\Admin\AppData\Local\Temp\d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-LE8UM.tmp\d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmp"C:\Users\Admin\AppData\Local\Temp\is-LE8UM.tmp\d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmp" /SL5="$13004E,138982,55296,C:\Users\Admin\AppData\Local\Temp\d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\BOLTin1.exe"C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\BOLTin1.exe" /S /UID=953⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6c-2b4e0-0e6-d9faa-70c498d56fa61\Susasykojy.exe"C:\Users\Admin\AppData\Local\Temp\6c-2b4e0-0e6-d9faa-70c498d56fa61\Susasykojy.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e65⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbb01e46f8,0x7ffbb01e4708,0x7ffbb01e47186⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:26⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:36⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2488 /prefetch:86⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2024 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:16⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:86⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings6⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x130,0x22c,0x7ff7c8405460,0x7ff7c8405470,0x7ff7c84054807⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:86⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1044 /prefetch:26⤵
-
C:\Users\Admin\AppData\Local\Temp\26-024bc-b43-717a1-c0acfcbf1cf77\Susasykojy.exe"C:\Users\Admin\AppData\Local\Temp\26-024bc-b43-717a1-c0acfcbf1cf77\Susasykojy.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yjr5ogmr.4rx\gcleaner.exe /mixfive & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\yjr5ogmr.4rx\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\yjr5ogmr.4rx\gcleaner.exe /mixfive6⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 4447⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 7527⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 7807⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 7927⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 7847⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 9367⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 10047⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 10687⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 13807⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "gcleaner.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\yjr5ogmr.4rx\gcleaner.exe" & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "gcleaner.exe" /f8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 5127⤵
- Program crash
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exeC:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"7⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbab879758,0x7ffbab879768,0x7ffbab8797788⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:28⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3152 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:18⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3284 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:18⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3824 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:18⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4732 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:18⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4860 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4880 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5192 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2932 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:28⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exeC:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exe"C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exe" -h7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 7472 -ip 74721⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 7472 -ip 74721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 7472 -ip 74721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 7472 -ip 74721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 7472 -ip 74721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 7472 -ip 74721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 7472 -ip 74721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 7472 -ip 74721⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5728 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5728 -ip 57281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 7472 -ip 74721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 7472 -ip 74721⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\background.htmlFilesize
786B
MD59ffe618d587a0685d80e9f8bb7d89d39
SHA18e9cae42c911027aafae56f9b1a16eb8dd7a739c
SHA256a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e
SHA512a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12
-
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\icon.pngFilesize
6KB
MD5362695f3dd9c02c83039898198484188
SHA185dcacc66a106feca7a94a42fc43e08c806a0322
SHA25640cfea52dbc50a8a5c250c63d825dcaad3f76e9588f474b3e035b587c912f4ca
SHA512a04dc31a6ffc3bb5d56ba0fb03ecf93a88adc7193a384313d2955701bd99441ddf507aa0ddfc61dfc94f10a7e571b3d6a35980e61b06f98dd9eee424dc594a6f
-
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\aes.jsFilesize
13KB
MD54ff108e4584780dce15d610c142c3e62
SHA177e4519962e2f6a9fc93342137dbb31c33b76b04
SHA256fc7e184beeda61bf6427938a84560f52348976bb55e807b224eb53930e97ef6a
SHA512d6eee0fc02205a3422c16ad120cad8d871563d8fcd4bde924654eac5a37026726328f9a47240cf89ed6c9e93ba5f89c833e84e65eee7db2b4d7d1b4240deaef2
-
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\background.jsFilesize
20KB
MD50eebfbd134704a59379fecb3baa3c0a0
SHA1c4f79aeb442524a449740db8c1a45a0a185e6a11
SHA2567e4c006654f2986488145e82f65789b915605ac0ee10df2463dbb61cfb134a80
SHA5125a82663ad39dcd43d08e090f8914bb2f34c81e923fa7f2b11cd874feb8d0780b9b33a27e3b961d4f31a1ea5716c3b1174cf2e226b794c7e7c74ffc1e5c5789dc
-
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\content.jsFilesize
3KB
MD5c31f14d9b1b840e4b9c851cbe843fc8f
SHA1205e3a99dc6c0af0e2f4450ebaa49ebde8e76bb4
SHA25603601415885fd5d8967c407f7320d53f4c9ca2ec33bbe767d73a1589c5e36c54
SHA5122c3d7ed5384712a0013a2ebbc526e762f257e32199651192742282a9641946b6aea6235d848b1e8cb3b0f916f85d3708a14717a69cbcf081145bc634d11d75aa
-
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\jquery-3.3.1.min.jsFilesize
84KB
MD5a09e13ee94d51c524b7e2a728c7d4039
SHA10dc32db4aa9c5f03f3b38c47d883dbd4fed13aae
SHA256160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
SHA512f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a
-
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\mode-ecb.jsFilesize
604B
MD523231681d1c6f85fa32e725d6d63b19b
SHA1f69315530b49ac743b0e012652a3a5efaed94f17
SHA25603164b1ac43853fecdbf988ce900016fb174cf65b03e41c0a9a7bf3a95e8c26a
SHA51236860113871707a08401f29ab2828545932e57a4ae99e727d8ca2a9f85518d3db3a4e5e4d46ac2b6ba09494fa9727c033d77c36c4bdc376ae048541222724bc2
-
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\pad-nopadding.jsFilesize
268B
MD50f26002ee3b4b4440e5949a969ea7503
SHA131fc518828fe4894e8077ec5686dce7b1ed281d7
SHA256282308ebc3702c44129438f8299839ca4d392a0a09fdf0737f08ef1e4aff937d
SHA5124290a1aee5601fcbf1eb2beec9b4924c30cd218e94ae099b87ba72c9a4fa077e39d218fc723b8465d259028a6961cc07c0cd6896aa2f67e83f833ca023a80b11
-
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\manifest.jsonFilesize
1KB
MD505bfb082915ee2b59a7f32fa3cc79432
SHA1c1acd799ae271bcdde50f30082d25af31c1208c3
SHA25604392a223cc358bc79fcd306504e8e834d6febbff0f3496f2eb8451797d28aa1
SHA5126feea1c8112ac33d117aef3f272b1cc42ec24731c51886ed6f8bc2257b91e4d80089e8ca7ce292cc2f39100a7f662bcc5c37e5622a786f8dc8ea46b8127152f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD541ba206fa6b00daa14072820b73d2bdc
SHA199200896bfba01b5ea5bf6720ef4009e03a85d88
SHA2563ba6b19ab058b5a558657be17ec94e41b4d70d2cc8d046ee994d7d6e3348c5e8
SHA51250e46ed78342a6e7a6235bb3622cc74b5bf363af388214c159dd51757fb7dd43fc911c7df1bbd760115e8e32c882fc22e924311baf8a9fd767b3aa96e0b0030e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD51ae8a0adfe5e49164c09cd0133d46eb8
SHA1abf458f0d3a8f1b95b6fd6f14cef7edc5bc2bda4
SHA2567ca781b2c9b5879dae10e88e47ee4475f74edf304b19a442b1046c2c936a3a04
SHA5121c7a1f84d28ebd6ec6a3a1dbcf120b3694af635eabe8f47fac555374bffe1ff70baa3091c96a10ab2df4e64336d6a8d99d7a80edc601724bd4f2e78699bde004
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
539B
MD5cae221ddbdc2db35ae438f75df60389b
SHA1f27c88570c8976cea5330fc08fcbfc32acab38ff
SHA2564d0a9066db75170c810d23ef0a1b969e788093af5f87a2abf98976ea3101bfc8
SHA512a85320ae68eb63584d0f91e1fbcd7baf99174b4c1231203a977c69557a5e19b7c3274ab1e3ce326b315dc2a2e1361bc9e624c9ce4e2b562d17e2fca08e12931e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
874B
MD596e77e97ed506a34b7047d7a5af1fcd0
SHA1d925e533f6e8697dd1ba1cdfdab9607ca7df55d6
SHA256b33ed13b44a9c49685171cdc41fe2c03aa5d2a75265135a1453a543143f40f68
SHA512186465d59fed673aeecba3ef665a025c567048549669010ff564e81187129f39833f85b9f3cac9e297d698e83f3d5960fda57ce14f91d11c577c3ebc9fe0b8e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
874B
MD5872112c56557efd31464f69df1ccfbd0
SHA1fbe42b37b009a7fe5948b83316666e652eaa790f
SHA25651dfa8a05720e815585901412d22a22a697ad713c0595995d42d4a06871778c4
SHA512a3a80c2718c6e5a3d66756121dbf121f96e61c9c66b35cb7cb3afedba4d3605a00c037f2da680bf1d061e7bdc67755dad88c62810206e11831d2874a610e9ec9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5632241bbb5af92e9d5fe5de14670cf2d
SHA1cc9973f14f03fa2cca5537d2c20772b43a24779d
SHA2561455e4b95ea96aae1ad6209b5f09b6dd161b863d34f647fd807d93f028b20558
SHA51225138e9046e73a7828579537a20ab81683150170c4643ccb3dd4af1c40d006c3cdf1d1d1c3e3418f9d5b7c4f437893689939fb2d76d20edc322555e93eac1ee3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD51ddc0ba8f4cd7d8d5e62d3ace819a860
SHA1a5438a626ab0e3e44da0afb97adcd81941852474
SHA2560e3badf05da78d4df6608f76340eda1c9a9efc1727745be3fab456278641131b
SHA512fd996077586ee82dbabc40034f7af392c16bc7e35386c2fbe77bfb9dd011193bb9baef1673f8373f44c59ca3f1b8befcf1a691ca2128584b9e2a2be419d8c4b5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD5973e33d24ebbe8b07ab002a2daf45f85
SHA1e763b14aba9e85db3be16d8e3b141c6a0ced99c9
SHA25610e1df46fbc34b42ec83784b6f1acad7a1acaa8c4701b92190b6b8f31de98e51
SHA5128423fc5e8519a5057ce6aa4d61416e801d9ffccb552ce654dec99eef04981e843da0cc6106646ae8c70b09b2c4b6dfd1fa345173f71ffe7d9835e2cc05e42207
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD5191f248b1acee5820bc5f5ca8904a913
SHA1d68532f3b06350af7f5c4473d58370ca978536d8
SHA25679fb2ef6ea3f5a51cb359094eb2fc6239e88f828b2a131ac99ef3d04f5fc3d81
SHA512a615e3da041ee1c1cfeb39507999bf21fa6c6995c2e6ff5d53d1d8ba6cc3f18b615687b8125f58540505855cd15714fe5fa76340e50869c1b1b14a63414f8d5e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
141KB
MD54a56c3cbac6264431e206f4c509d0efd
SHA13e3b9e0a0b97eaff0d083dc8bb64f85821cbfa4c
SHA2569daf2d1c8d557e8d7ac8951ad1edfb1f231577a91746ab1787ba9f98e54af94e
SHA5121d785f4175ba6730fe0f6da788de7713485219ffad0036d4e98bce65fd6b9e56a1b34a7d25c4c44aa4d0d02d5870e1fa8ceb82152e478fe1c158ac3caafd40bf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD55a10efe23009825eadc90c37a38d9401
SHA1fd98f2ca011408d4b43ed4dfd5b6906fbc7b87c0
SHA25605e135dee0260b4f601a0486401b64ff8653875d74bf259c2da232550dbfb4f5
SHA51289416a3f5bf50cd4a432ac72cd0a7fb79d5aeb10bdcc468c55bbfa79b9f43fab17141305d44cb1fe980ec76cc6575c27e2bcfcbad5ccd886d45b9de03fb9d6d7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c1a3c45dc07f766430f7feaa3000fb18
SHA1698a0485bcf0ab2a9283d4ebd31ade980b0661d1
SHA256adaba08026551b1b8f6c120143686da79f916d02adbef4a8d1c184e32a19fd48
SHA5129fc93f01ab4b14f555791d757ffe881787cc697102547c61847552e597e206e70c6d35fedff559c72a0a67d1b95e769095ecb0a8a7d4f07cf58a7a0d57d3e9f4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
192B
MD5b78c031db0e843deae5cfcdaabd5c25e
SHA14f3d7c8e6d0c3b24829867704181a7cb78c0d18d
SHA2568b12dfc16799978fbfe5b3261d3ce33834aa0f5d1f1fa1900d471e0482a95627
SHA512016f74850deb197a120373061b640a6cf9cadfe9189f17d1de95b56d97cf5dcc6af5b1ec9e370bbcceff8effff9dc278b5d6dcb5fe3867519005d781e731c0e8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
48B
MD508b44521ff61e8b188a3783361cb0668
SHA1e9b02634d0e775c21d9f66b06e3ae5510e96a3b2
SHA2560586d8352fe1ca4c791622f7a7e8faae31d45a863b549619483449a90993e301
SHA5123469341f8fabbf52aa768366df976fd7089feb9b6ef0903ee173536e582136050bc04c8039c454d5ca439c5059d3c8d65fda0172aa66cdf9f125afbf8ed290f4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.icoFilesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Microsoft Edge.lnkFilesize
2KB
MD551092b05a31a72626c8c83b3f2a0e1cc
SHA19751be64131d6f57605142f62f23445558f5e823
SHA256f552c5584d8b2fdca62e59458b65a27f5e2f8b453a85c24e80b1bde42a24d24a
SHA512d9bdea74cf29328c7c28f0afe23aaba0f937c194d00caaccd8c9f2d5342dba8b51f4c887ccfe690098cd66e98c8b9af60ba513644d3c75a8ac01380016277366
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
681B
MD5099f1349e1f0410e654991ccc9a81d93
SHA1eb6734ec8db61301510513dcd136c6405a4a7d0e
SHA2562b7de33105a4de1cc720adfe0a68acfd6485ab31d94b354faac37719a5c9144f
SHA5123972094d849504febe1fd90a3e9033b6e92b080c872ea6c0aef9321aa4026ff61c407db5de0b78a385aea2aa00a5f87f3ce277a75fd2a26a5fdb9bff699a9c2e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD59d9910d3235a0d983181d713421d7df2
SHA1790a150dc36b8d36a43cf099a5426e5ae550121a
SHA2561d5828dc9223962ea6493454a7a7465be02aaeae7932cafe9525faa17ee07d46
SHA5127e53833c046b11d1eb60de521d01262140b38d8e97edefbbb89f6d6924cb179eea1d29bf88a37124810cc840261d4deb6b714b11507b93a4d1fa4b9fb901fe1c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5306629018af15325a7bff67b74949277
SHA190f517c34183da40b0ada0417cd41ae3cba3d4c1
SHA256f321100c7c8a62e023287dfc2fdd0338aaefe36eeff79dc87d6b43afb1f54add
SHA512fc2de86e5c7e919c244a0d180f675f01957ccedd339fe14555f4d3f9a5c54c401e56879ebd6aef8860cab4e7398e45ea0d718ef2465a063dd32a23e2b97156cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD54b7c4be7b5d5ce3f13fcd4b8bb2b40fd
SHA1afb05e385f2c5e62f3c7567668b5e78b85316cfe
SHA25667ff305dddc1d4db0c6ac71b6e48ab24e1a35286d5117dfeb022c56afe1668eb
SHA512182d0a73d5bdcdbbe3431ba1d719859f2f06a5dd8f39b5c3f46cf068c4e73369190dff5d334ca234df41e589b29edb2dd2be89eb154b8fe80604c9b4bea9e1c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
24KB
MD55edab6d3ffbeee247ccb4423f929a323
SHA1a4ad201d149d59392a2a3163bd86ee900e20f3d9
SHA256460cddb95ea1d9bc8d95d295dd051b49a1436437a91ddec5f131235b2d516933
SHA512263fa99f03ea1ef381ca19f10fbe0362c1f9c129502dc6b730b076cafcf34b40a70ee8a0ee9446ec9c89c3a2d9855450609ec0f8cf9d0a1b2aebdd12be58d38c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
72B
MD54d0918588764e0e4efea36a31decc015
SHA1b91668a3abca1df6482b6a729ed70409bca87df3
SHA256e5ab32cdcc2e899065ebe8e8ecdb269ccbdaa3787626f5e623721d2a5fc80d72
SHA512873848322ad7aee63f9a9e4d026e6d259c09a6ff97636c219a2a72aa5847ed80ae290e8312c93972bdddc06c50ecd3cd35d18fa4e0bf6df67a77302ae783863c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe56f39c.TMPFilesize
48B
MD50cef53a8cdf6161f29fae480c10ab906
SHA1a765c03f6432df1818de5063b65b07825bec3df8
SHA256907311375b570498c700d62a0a447c9dc046cf3311aafd080ea4f17b116b9644
SHA512f356c8483b51bcaeeddacb90575ff6b0580f9f9c46715f5461b0eb740b3d02bec40a94f4254e8dd7438b442cf58c18fe5ca7f2b36ec4282f638357c4f08f773f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD581f2707dfca51d88aa9bea75ecd2d2cc
SHA1866366cceb5e36c012fcc2cf93f5940cdf683347
SHA256e923d7925f74145189c3bbb4667cff0d0ffac41189a7687ca8bd58e5511de4f0
SHA512c802505c749149664bdd1a523927eb77f4ecce8676afc327555558e4534ae0ca97b72d416b17818a98a38151df4a065c75bb349a481be8ed4ffbe9dcc6d6230e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
9KB
MD538f3e72eea1ef7d486c42a77d82af5e5
SHA15645fc83017c8056814591fd9af6118f9a8fd908
SHA2562a973bedb8db2e460b241d9f0802dc80ffcbe3f1ced31b77a17ef75bbbf7dad9
SHA51243c1ea3e4bcf06432e287239126dd3fae1c16a4d8392eed8757f07ebac4cfdff60a506b5b9306dc55a52dc21941b4b39c6c1f41ce4b5dcb6f6db87c3ace3d094
-
C:\Users\Admin\AppData\Local\Temp\26-024bc-b43-717a1-c0acfcbf1cf77\Kenessey.txtFilesize
9B
MD597384261b8bbf966df16e5ad509922db
SHA12fc42d37fee2c81d767e09fb298b70c748940f86
SHA2569c0d294c05fc1d88d698034609bb81c0c69196327594e4c69d2915c80fd9850c
SHA512b77fe2d86fbc5bd116d6a073eb447e76a74add3fa0d0b801f97535963241be3cdce1dbcaed603b78f020d0845b2d4bfc892ceb2a7d1c8f1d98abc4812ef5af21
-
C:\Users\Admin\AppData\Local\Temp\26-024bc-b43-717a1-c0acfcbf1cf77\Susasykojy.exeFilesize
463KB
MD5fba3b4b12a0c6c9924132b149147a0a2
SHA1a776068968a89ff9503e794e4ab0c04bbee6e5f6
SHA2567403a6d53688cddeb84997cf90f616a3f25e79681b9c47074b5534f4e8b45890
SHA512a1a41956ee97b4e590795a319d357f7f1b22115f5f663211af71cb14ffae879cb0fda743c7a016bb1a479d64dacee2f865e67f29d589d30d10b928a2bbb628ee
-
C:\Users\Admin\AppData\Local\Temp\26-024bc-b43-717a1-c0acfcbf1cf77\Susasykojy.exeFilesize
463KB
MD5fba3b4b12a0c6c9924132b149147a0a2
SHA1a776068968a89ff9503e794e4ab0c04bbee6e5f6
SHA2567403a6d53688cddeb84997cf90f616a3f25e79681b9c47074b5534f4e8b45890
SHA512a1a41956ee97b4e590795a319d357f7f1b22115f5f663211af71cb14ffae879cb0fda743c7a016bb1a479d64dacee2f865e67f29d589d30d10b928a2bbb628ee
-
C:\Users\Admin\AppData\Local\Temp\26-024bc-b43-717a1-c0acfcbf1cf77\Susasykojy.exeFilesize
463KB
MD5fba3b4b12a0c6c9924132b149147a0a2
SHA1a776068968a89ff9503e794e4ab0c04bbee6e5f6
SHA2567403a6d53688cddeb84997cf90f616a3f25e79681b9c47074b5534f4e8b45890
SHA512a1a41956ee97b4e590795a319d357f7f1b22115f5f663211af71cb14ffae879cb0fda743c7a016bb1a479d64dacee2f865e67f29d589d30d10b928a2bbb628ee
-
C:\Users\Admin\AppData\Local\Temp\26-024bc-b43-717a1-c0acfcbf1cf77\Susasykojy.exe.configFilesize
1KB
MD598d2687aec923f98c37f7cda8de0eb19
SHA1f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA2568a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
SHA51295c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590
-
C:\Users\Admin\AppData\Local\Temp\6c-2b4e0-0e6-d9faa-70c498d56fa61\Susasykojy.exeFilesize
399KB
MD51e8e3939ec32c19b2031d50cc9875084
SHA183cc7708448c52f5c184cc329fa11f4cfe9c2823
SHA2565988245cd9d0c40bcb12155b966cb8ddd86da1107bca456341de5bd5fb560808
SHA5120d3ad7c0865e421fad34e27a47108fdc9e359f8603c4c01f6d789d3ead6e6ac5815f979301870f8157fedaf8178ed34873fbff807807d46698249f098fc78caa
-
C:\Users\Admin\AppData\Local\Temp\6c-2b4e0-0e6-d9faa-70c498d56fa61\Susasykojy.exeFilesize
399KB
MD51e8e3939ec32c19b2031d50cc9875084
SHA183cc7708448c52f5c184cc329fa11f4cfe9c2823
SHA2565988245cd9d0c40bcb12155b966cb8ddd86da1107bca456341de5bd5fb560808
SHA5120d3ad7c0865e421fad34e27a47108fdc9e359f8603c4c01f6d789d3ead6e6ac5815f979301870f8157fedaf8178ed34873fbff807807d46698249f098fc78caa
-
C:\Users\Admin\AppData\Local\Temp\6c-2b4e0-0e6-d9faa-70c498d56fa61\Susasykojy.exeFilesize
399KB
MD51e8e3939ec32c19b2031d50cc9875084
SHA183cc7708448c52f5c184cc329fa11f4cfe9c2823
SHA2565988245cd9d0c40bcb12155b966cb8ddd86da1107bca456341de5bd5fb560808
SHA5120d3ad7c0865e421fad34e27a47108fdc9e359f8603c4c01f6d789d3ead6e6ac5815f979301870f8157fedaf8178ed34873fbff807807d46698249f098fc78caa
-
C:\Users\Admin\AppData\Local\Temp\6c-2b4e0-0e6-d9faa-70c498d56fa61\Susasykojy.exe.configFilesize
1KB
MD598d2687aec923f98c37f7cda8de0eb19
SHA1f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA2568a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
SHA51295c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590
-
C:\Users\Admin\AppData\Local\Temp\db.datFilesize
557KB
MD576c3dbb1e9fea62090cdf53dadcbe28e
SHA1d44b32d04adc810c6df258be85dc6b62bd48a307
SHA256556fd54e5595d222cfa2bd353afa66d8d4d1fbb3003afed604672fceae991860
SHA512de4ea57497cf26237430880742f59e8d2a0ac7e7a0b09ed7be590f36fbd08c9ced0ffe46eb69ec2215a9cff55720f24fffcae752cd282250b4da6b75a30b3a1b
-
C:\Users\Admin\AppData\Local\Temp\db.dllFilesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
C:\Users\Admin\AppData\Local\Temp\db.dllFilesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
C:\Users\Admin\AppData\Local\Temp\is-LE8UM.tmp\d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmpFilesize
693KB
MD5a926ae0ea031d6db49d5d679003ef95c
SHA103657bd9d3de4c69f8a30aab28eceaced746c68b
SHA2561ec67071cc0dfea4a41830ef4982f42d6e42d831477d1e1dcadd6d13ab88bb8c
SHA5125bf58812bf5bdbb6ce94949b58d2b8d3149a1d8a5457eb6c492c77fc51dbbd3ce2780133afd8276481a6c7abb683cee5a41dc262bd98164713691b37144726c2
-
C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\BOLTin1.exeFilesize
582KB
MD5f6c312d7bc53140df83864221e8ebee1
SHA1da7ad1f5fa18bf00c3352cb510554b061bbfe04f
SHA256e119a3b5fcb628740e8313a44d312296fd03771d9ed727b10b58aae29192a2db
SHA51238c9d9b32fd1ee096f23ee62b5e64cc962f21a85d07ea32860d45d5e8249474d28239238a635cf69db30fd3f035c7c93dcce264a9e8288dbef70ffe2a493922a
-
C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\BOLTin1.exeFilesize
582KB
MD5f6c312d7bc53140df83864221e8ebee1
SHA1da7ad1f5fa18bf00c3352cb510554b061bbfe04f
SHA256e119a3b5fcb628740e8313a44d312296fd03771d9ed727b10b58aae29192a2db
SHA51238c9d9b32fd1ee096f23ee62b5e64cc962f21a85d07ea32860d45d5e8249474d28239238a635cf69db30fd3f035c7c93dcce264a9e8288dbef70ffe2a493922a
-
C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\idp.dllFilesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exeFilesize
312KB
MD5dc719929115e50ed4383bcc7f7182be3
SHA1562e69bdf814c156872fd6ad6a3d0116b0304516
SHA2565b0708551a5c3cf9932c8aea5e890e3f2abe7b7b5911cefebc6155d20692e365
SHA51234b1dda47ff7a20052f582f4874dc35f4e768558baf8727419d5f91ec2f8c6e28d2a6bc0253975e6bac5d45edfa1edd09aabc5339d2caade73418b73096b9404
-
C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exeFilesize
312KB
MD5dc719929115e50ed4383bcc7f7182be3
SHA1562e69bdf814c156872fd6ad6a3d0116b0304516
SHA2565b0708551a5c3cf9932c8aea5e890e3f2abe7b7b5911cefebc6155d20692e365
SHA51234b1dda47ff7a20052f582f4874dc35f4e768558baf8727419d5f91ec2f8c6e28d2a6bc0253975e6bac5d45edfa1edd09aabc5339d2caade73418b73096b9404
-
C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exeFilesize
312KB
MD5dc719929115e50ed4383bcc7f7182be3
SHA1562e69bdf814c156872fd6ad6a3d0116b0304516
SHA2565b0708551a5c3cf9932c8aea5e890e3f2abe7b7b5911cefebc6155d20692e365
SHA51234b1dda47ff7a20052f582f4874dc35f4e768558baf8727419d5f91ec2f8c6e28d2a6bc0253975e6bac5d45edfa1edd09aabc5339d2caade73418b73096b9404
-
C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exeFilesize
1.4MB
MD5fce50d42c32ea7de3d5da455cd2ead3e
SHA17fcbe29cf60fb2f9ba1380a33747c3d6665316ad
SHA2560b70ee102482780a5039700c0edfeb2d483b3f142bbf8ee23a5c364d626da672
SHA5129df5dc04607eb51ef7944daffe0ba4cc593debcb2763577ef5fab2e6e47b68426060fc80dd3bef56db7425c860f0f1459619f8715c84492d22d83fc43f4a6e99
-
C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exeFilesize
1.4MB
MD5fce50d42c32ea7de3d5da455cd2ead3e
SHA17fcbe29cf60fb2f9ba1380a33747c3d6665316ad
SHA2560b70ee102482780a5039700c0edfeb2d483b3f142bbf8ee23a5c364d626da672
SHA5129df5dc04607eb51ef7944daffe0ba4cc593debcb2763577ef5fab2e6e47b68426060fc80dd3bef56db7425c860f0f1459619f8715c84492d22d83fc43f4a6e99
-
C:\Users\Admin\AppData\Local\Temp\yjr5ogmr.4rx\gcleaner.exeFilesize
344KB
MD594ba289cb1b8156be3b56429c49bcfe3
SHA1e194007c1a1a4622be907a4355c475bf0ed4f16f
SHA2565e46806581a7701985035b7ef83f4d9a88fea041499905eb7bd15a3a93378ea5
SHA512379016a783762b2feef8927b2009aab9698990c8ec1cb60ce08ce0007cd16f9aaf20548d95f3df256537e9871cf41f50d63f29659fd04e501384bda291db87e8
-
C:\Users\Admin\AppData\Local\Temp\yjr5ogmr.4rx\gcleaner.exeFilesize
344KB
MD594ba289cb1b8156be3b56429c49bcfe3
SHA1e194007c1a1a4622be907a4355c475bf0ed4f16f
SHA2565e46806581a7701985035b7ef83f4d9a88fea041499905eb7bd15a3a93378ea5
SHA512379016a783762b2feef8927b2009aab9698990c8ec1cb60ce08ce0007cd16f9aaf20548d95f3df256537e9871cf41f50d63f29659fd04e501384bda291db87e8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
3KB
MD50d9535e6da0679d689f3eb949ae3f4ce
SHA18a64631cd0d0dc0dce0ceec00b74546efeebaabc
SHA2566cbc69c97dbcbcb1bab400c20f8843c61c57041ee26666773e798c6a9b2a3abb
SHA512aa58e82e702f8e6b2b25168c28106cb02ff921cadd56d0ba2a6858ae97468a2d81721a6fda2c79240e2d204e9c7e2b17305e6dd556f67f73f039f07b8cc7daac
-
\??\pipe\LOCAL\crashpad_2212_CGORRBMBYHPCBPVYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/2696-192-0x00000000001E0000-0x000000000024A000-memory.dmpFilesize
424KB
-
memory/2696-377-0x0000000000BE0000-0x0000000000BF0000-memory.dmpFilesize
64KB
-
memory/2696-197-0x0000000000BE0000-0x0000000000BF0000-memory.dmpFilesize
64KB
-
memory/2712-199-0x00000000015E0000-0x00000000015E8000-memory.dmpFilesize
32KB
-
memory/2712-194-0x0000000001570000-0x00000000015D6000-memory.dmpFilesize
408KB
-
memory/2712-193-0x0000000000C00000-0x0000000000C7A000-memory.dmpFilesize
488KB
-
memory/2712-417-0x0000000001740000-0x0000000001750000-memory.dmpFilesize
64KB
-
memory/2712-376-0x0000000001740000-0x0000000001750000-memory.dmpFilesize
64KB
-
memory/2712-195-0x000000001C2A0000-0x000000001C76E000-memory.dmpFilesize
4.8MB
-
memory/2712-196-0x0000000001740000-0x0000000001750000-memory.dmpFilesize
64KB
-
memory/2712-198-0x000000001C910000-0x000000001C9AC000-memory.dmpFilesize
624KB
-
memory/2712-200-0x000000001E1F0000-0x000000001E24E000-memory.dmpFilesize
376KB
-
memory/2712-204-0x0000000020E20000-0x0000000020E82000-memory.dmpFilesize
392KB
-
memory/2712-202-0x00000000209F0000-0x0000000020CFE000-memory.dmpFilesize
3.1MB
-
memory/2712-201-0x0000000001740000-0x0000000001750000-memory.dmpFilesize
64KB
-
memory/3608-151-0x0000000000BB0000-0x0000000000C46000-memory.dmpFilesize
600KB
-
memory/3608-152-0x000000001B7F0000-0x000000001B800000-memory.dmpFilesize
64KB
-
memory/3812-133-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/3812-191-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4484-500-0x00007FFBCE1E0000-0x00007FFBCE1E1000-memory.dmpFilesize
4KB
-
memory/4484-498-0x00007FFBCDC10000-0x00007FFBCDC11000-memory.dmpFilesize
4KB
-
memory/4648-188-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/4648-150-0x0000000002500000-0x0000000002501000-memory.dmpFilesize
4KB
-
memory/6572-690-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmpFilesize
4KB
-
memory/6572-691-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmpFilesize
4KB
-
memory/6572-695-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmpFilesize
4KB
-
memory/6572-693-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmpFilesize
4KB
-
memory/6572-683-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmpFilesize
4KB
-
memory/6572-684-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmpFilesize
4KB
-
memory/6572-685-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmpFilesize
4KB
-
memory/6572-694-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmpFilesize
4KB
-
memory/6572-689-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmpFilesize
4KB
-
memory/6572-692-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmpFilesize
4KB
-
memory/6716-433-0x00007FFBCF530000-0x00007FFBCF531000-memory.dmpFilesize
4KB
-
memory/7472-416-0x0000000000400000-0x0000000002BC3000-memory.dmpFilesize
39.8MB
-
memory/7472-216-0x0000000002D20000-0x0000000002D60000-memory.dmpFilesize
256KB
-
memory/8044-230-0x00007FFBCF530000-0x00007FFBCF531000-memory.dmpFilesize
4KB