Analysis Overview
SHA256
5aecfd145020845cb448e25cc896ce62b5359c01d1ebd68cfedb7385374a9cef
Threat Level: Known bad
The file file was found to be: Known bad.
Malicious Activity Summary
Glupteba
SmokeLoader
UAC bypass
Djvu Ransomware
Vidar
Windows security bypass
RedLine
RedLine payload
Glupteba payload
Detected Djvu ransomware
Modifies Windows Firewall
Downloads MZ/PE file
Stops running service(s)
Reads user/profile data of web browsers
Loads dropped DLL
Windows security modification
Modifies file permissions
Executes dropped EXE
Deletes itself
.NET Reactor proctector
UPX packed file
Checks computer location settings
Looks up external IP address via web service
Manipulates WinMonFS driver.
Checks installed software on the system
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks whether UAC is enabled
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Suspicious use of SetThreadContext
Detected potential entity reuse from brand microsoft.
Drops file in System32 directory
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Windows directory
Launches sc.exe
Drops file in Program Files directory
Unsigned PE
Enumerates physical storage devices
Program crash
Kills process with taskkill
Suspicious use of WriteProcessMemory
Creates scheduled task(s)
Suspicious use of SendNotifyMessage
Delays execution with timeout.exe
Suspicious use of FindShellTrayWindow
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
System policy modification
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Enumerates system info in registry
Uses Task Scheduler COM API
Modifies system certificate store
Checks SCSI registry key(s)
Runs net.exe
Modifies data under HKEY_USERS
Suspicious behavior: MapViewOfSection
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-09-26 20:28
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-09-26 20:28
Reported
2023-09-26 20:31
Platform
win7-20230831-en
Max time kernel
49s
Max time network
152s
Command Line
Signatures
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
Glupteba
Glupteba payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
SmokeLoader
Vidar
Downloads MZ/PE file
Stops running service(s)
.NET Reactor proctector
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9924.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9924.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9C80.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9F4E.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9C80.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9C80.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9C80.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\BBA5.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\D954.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\aafg31.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\toolspub2.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\PA Previewer\previewer.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9924.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9C80.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9C80.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9C80.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9C80.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\BBA5.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\BBA5.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\BBA5.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\BBA5.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9924.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9924.exe | N/A |
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\783b6ce1-f567-418a-9e49-847a839bb01d\\9924.exe\" --AutoStart" | C:\Users\Admin\AppData\Local\Temp\9924.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2636 set thread context of 2924 | N/A | C:\Users\Admin\AppData\Local\Temp\9924.exe | C:\Users\Admin\AppData\Local\Temp\9924.exe |
| PID 2908 set thread context of 2784 | N/A | C:\Users\Admin\AppData\Local\Temp\9C80.exe | C:\Users\Admin\AppData\Local\Temp\9C80.exe |
| PID 1660 set thread context of 1552 | N/A | C:\Users\Admin\AppData\Local\Temp\9C80.exe | C:\Users\Admin\AppData\Local\Temp\9C80.exe |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\D954.exe |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\System32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Modifies system certificate store
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 | C:\Users\Admin\AppData\Local\Temp\9924.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d00f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e | C:\Users\Admin\AppData\Local\Temp\9924.exe | N/A |
Runs net.exe
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\file.exe
"C:\Users\Admin\AppData\Local\Temp\file.exe"
C:\Users\Admin\AppData\Local\Temp\9924.exe
C:\Users\Admin\AppData\Local\Temp\9924.exe
C:\Users\Admin\AppData\Local\Temp\9924.exe
C:\Users\Admin\AppData\Local\Temp\9924.exe
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\9B28.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\9B28.dll
C:\Users\Admin\AppData\Local\Temp\9C80.exe
C:\Users\Admin\AppData\Local\Temp\9C80.exe
C:\Users\Admin\AppData\Local\Temp\9C80.exe
C:\Users\Admin\AppData\Local\Temp\9C80.exe
C:\Users\Admin\AppData\Local\Temp\9F4E.exe
C:\Users\Admin\AppData\Local\Temp\9F4E.exe
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\783b6ce1-f567-418a-9e49-847a839bb01d" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Users\Admin\AppData\Local\Temp\9C80.exe
"C:\Users\Admin\AppData\Local\Temp\9C80.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\9C80.exe
"C:\Users\Admin\AppData\Local\Temp\9C80.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\BBA5.exe
C:\Users\Admin\AppData\Local\Temp\BBA5.exe
C:\Users\Admin\AppData\Local\Temp\D954.exe
C:\Users\Admin\AppData\Local\Temp\D954.exe
C:\Users\Admin\AppData\Local\Temp\aafg31.exe
"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Users\Admin\AppData\Local\Temp\9924.exe
"C:\Users\Admin\AppData\Local\Temp\9924.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\9924.exe
"C:\Users\Admin\AppData\Local\Temp\9924.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
C:\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build2.exe
"C:\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build2.exe"
C:\Users\Admin\AppData\Local\Temp\kos1.exe
"C:\Users\Admin\AppData\Local\Temp\kos1.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\9F4E.exe" -Force
C:\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build2.exe
"C:\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build2.exe"
C:\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build3.exe
"C:\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build3.exe"
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Users\Admin\AppData\Local\Temp\set16.exe
"C:\Users\Admin\AppData\Local\Temp\set16.exe"
C:\Users\Admin\AppData\Local\Temp\kos.exe
"C:\Users\Admin\AppData\Local\Temp\kos.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 92
C:\Users\Admin\AppData\Local\Temp\is-1SURN.tmp\is-H9570.tmp
"C:\Users\Admin\AppData\Local\Temp\is-1SURN.tmp\is-H9570.tmp" /SL4 $20198 "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1232936 52224
C:\Program Files (x86)\PA Previewer\previewer.exe
"C:\Program Files (x86)\PA Previewer\previewer.exe" -i
C:\Windows\SysWOW64\net.exe
"C:\Windows\system32\net.exe" helpmsg 8
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 helpmsg 8
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
C:\Windows\system32\taskeng.exe
taskeng.exe {D95F4001-534C-4945-8EBF-56310FFB4795} S-1-5-21-3849525425-30183055-657688904-1000:KGPMNUDG\Admin:Interactive:[1]
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Users\Admin\AppData\Roaming\ahhhjab
C:\Users\Admin\AppData\Roaming\ahhhjab
C:\Users\Admin\AppData\Local\9dfcd6ac-2d2a-46e6-acd3-babcf6099dd0\build2.exe
"C:\Users\Admin\AppData\Local\9dfcd6ac-2d2a-46e6-acd3-babcf6099dd0\build2.exe"
C:\Program Files (x86)\PA Previewer\previewer.exe
"C:\Program Files (x86)\PA Previewer\previewer.exe" -s
C:\Users\Admin\AppData\Local\9dfcd6ac-2d2a-46e6-acd3-babcf6099dd0\build2.exe
"C:\Users\Admin\AppData\Local\9dfcd6ac-2d2a-46e6-acd3-babcf6099dd0\build2.exe"
C:\Users\Admin\Pictures\3YI4kihJeTwfHqWBhAOIqGAT.exe
"C:\Users\Admin\Pictures\3YI4kihJeTwfHqWBhAOIqGAT.exe"
C:\Users\Admin\AppData\Local\9dfcd6ac-2d2a-46e6-acd3-babcf6099dd0\build3.exe
"C:\Users\Admin\AppData\Local\9dfcd6ac-2d2a-46e6-acd3-babcf6099dd0\build3.exe"
C:\Users\Admin\Pictures\QgzD8bl4VXMPZ3GsGZ2cju10.exe
"C:\Users\Admin\Pictures\QgzD8bl4VXMPZ3GsGZ2cju10.exe"
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Users\Admin\Pictures\qQhPlihBBDgt2GUbTuxAt9vu.exe
"C:\Users\Admin\Pictures\qQhPlihBBDgt2GUbTuxAt9vu.exe"
C:\Users\Admin\Pictures\FHqtL1EaYeFyw6neWRwS5jF6.exe
"C:\Users\Admin\Pictures\FHqtL1EaYeFyw6neWRwS5jF6.exe"
C:\Users\Admin\Pictures\0TxlZEQKYiBfEdvkh7oRHhat.exe
"C:\Users\Admin\Pictures\0TxlZEQKYiBfEdvkh7oRHhat.exe"
C:\Users\Admin\Pictures\qQhPlihBBDgt2GUbTuxAt9vu.exe
"C:\Users\Admin\Pictures\qQhPlihBBDgt2GUbTuxAt9vu.exe"
C:\Users\Admin\Pictures\pOvGj4QO41rpP9U2svw0cEY7.exe
"C:\Users\Admin\Pictures\pOvGj4QO41rpP9U2svw0cEY7.exe" /s
C:\Users\Admin\AppData\Local\Temp\is-LKTQG.tmp\is-BJ0S8.tmp
"C:\Users\Admin\AppData\Local\Temp\is-LKTQG.tmp\is-BJ0S8.tmp" /SL4 $501CC "C:\Users\Admin\Pictures\FHqtL1EaYeFyw6neWRwS5jF6.exe" 2490977 52224
C:\Users\Admin\Pictures\CxCAwOGVAXdbBIjUrNcfBBg0.exe
"C:\Users\Admin\Pictures\CxCAwOGVAXdbBIjUrNcfBBg0.exe"
C:\Users\Admin\Pictures\5ZsTpaYBdBYIhbannVSEPQ9U.exe
"C:\Users\Admin\Pictures\5ZsTpaYBdBYIhbannVSEPQ9U.exe"
C:\Users\Admin\Pictures\Z1ymUbVqEHxTT5PF2kPjQMco.exe
"C:\Users\Admin\Pictures\Z1ymUbVqEHxTT5PF2kPjQMco.exe"
C:\Users\Admin\AppData\Local\Temp\7zSA802.tmp\Install.exe
.\Install.exe
C:\Users\Admin\Pictures\yUSMTJMZrAewuKnkbW52fN0C.exe
"C:\Users\Admin\Pictures\yUSMTJMZrAewuKnkbW52fN0C.exe" --silent --allusers=0
C:\Program Files (x86)\OSHMount\OSHMount.exe
"C:\Program Files (x86)\OSHMount\OSHMount.exe" -i
C:\Windows\SysWOW64\net.exe
"C:\Windows\system32\net.exe" helpmsg 25
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 helpmsg 25
C:\Users\Admin\AppData\Local\Temp\7zSAEF5.tmp\Install.exe
.\Install.exe /jyafdidIl "385118" /S
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\0220613805.exe"
C:\Users\Admin\AppData\Local\Temp\0220613805.exe
"C:\Users\Admin\AppData\Local\Temp\0220613805.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build2.exe" & exit
C:\Windows\SysWOW64\timeout.exe
timeout /t 6
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /im "3YI4kihJeTwfHqWBhAOIqGAT.exe" /f & erase "C:\Users\Admin\Pictures\3YI4kihJeTwfHqWBhAOIqGAT.exe" & exit
C:\Program Files (x86)\OSHMount\OSHMount.exe
"C:\Program Files (x86)\OSHMount\OSHMount.exe" -s
C:\Windows\SysWOW64\taskkill.exe
taskkill /im "3YI4kihJeTwfHqWBhAOIqGAT.exe" /f
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
C:\Users\Admin\Pictures\360TS_Setup.exe
"C:\Users\Admin\Pictures\360TS_Setup.exe" /c:WW.InstallRox.CPI202211 /pmode:2 /s /promo:eyJib290dGltZSI6IjciLCJtZWRhbCI6IjciLCJuZXdzIjoiMCIsIm9wZXJhIjoiNyIsIm9wZXJhX2lucyI6IjAiLCJwb3B1cCI6IjciLCJyZW1pbmRlciI6IjciLCJ1cGdyYWRlX25vdyI6IjAifQo=
C:\Program Files (x86)\1695760226_0\360TS_Setup.exe
"C:\Program Files (x86)\1695760226_0\360TS_Setup.exe" /c:WW.InstallRox.CPI202211 /pmode:2 /s /promo:eyJib290dGltZSI6IjciLCJtZWRhbCI6IjciLCJuZXdzIjoiMCIsIm9wZXJhIjoiNyIsIm9wZXJhX2lucyI6IjAiLCJwb3B1cCI6IjciLCJyZW1pbmRlciI6IjciLCJ1cGdyYWRlX25vdyI6IjAifQo= /TSinstall
\??\c:\windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
\??\c:\windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
\??\c:\windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
\??\c:\windows\SysWOW64\reg.exe
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
C:\Windows\SysWOW64\cmd.exe
/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
C:\Windows\System32\sc.exe
sc stop UsoSvc
C:\Windows\System32\sc.exe
sc stop WaaSMedicSvc
C:\Windows\System32\sc.exe
sc stop wuauserv
C:\Windows\System32\sc.exe
sc stop bits
C:\Windows\System32\sc.exe
sc stop dosvc
C:\Windows\System32\schtasks.exe
C:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-ac 0
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "gOZSkWvdE" /SC once /ST 17:10:05 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-dc 0
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-dc 0
C:\Windows\System32\schtasks.exe
C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\xyvvnnvseiqa.xml"
C:\Windows\SysWOW64\schtasks.exe
schtasks /run /I /tn "gOZSkWvdE"
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-ac 0
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\9dfcd6ac-2d2a-46e6-acd3-babcf6099dd0\build2.exe" & exit
C:\Windows\SysWOW64\timeout.exe
timeout /t 6
C:\Program Files\Google\Chrome\updater.exe
"C:\Program Files\Google\Chrome\updater.exe"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
C:\Windows\System32\schtasks.exe
C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
C:\Windows\SysWOW64\cmd.exe
/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
C:\Windows\SysWOW64\forfiles.exe
"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
C:\Windows\SysWOW64\forfiles.exe
"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "gOZSkWvdE"
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "bdAEmUkuYkKgCXqjlm" /SC once /ST 20:32:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\SdHRwpKgZPxspyIlq\LMwtKUUKafaivvb\zrRGHNk.exe\" Ux /jssite_idQjj 385118 /S" /V1 /F
C:\Windows\system32\gpupdate.exe
"C:\Windows\system32\gpupdate.exe" /force
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
C:\Windows\System32\sc.exe
sc stop UsoSvc
C:\Windows\System32\sc.exe
sc stop WaaSMedicSvc
C:\Windows\System32\sc.exe
sc stop wuauserv
C:\Windows\System32\sc.exe
sc stop bits
C:\Windows\System32\sc.exe
sc stop dosvc
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | potunulit.org | udp |
| US | 188.114.96.0:80 | potunulit.org | tcp |
| BG | 193.42.32.101:80 | 193.42.32.101 | tcp |
| RU | 79.137.192.18:80 | 79.137.192.18 | tcp |
| US | 8.8.8.8:53 | api.2ip.ua | udp |
| US | 8.8.8.8:53 | api.2ip.ua | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | alayyadcare.com | udp |
| PS | 213.6.54.58:443 | alayyadcare.com | tcp |
| PS | 213.6.54.58:443 | alayyadcare.com | tcp |
| US | 8.8.8.8:53 | zexeq.com | udp |
| US | 8.8.8.8:53 | colisumy.com | udp |
| IR | 80.210.25.252:80 | colisumy.com | tcp |
| KR | 211.119.84.112:80 | zexeq.com | tcp |
| KR | 211.119.84.112:80 | zexeq.com | tcp |
| US | 8.8.8.8:53 | z.nnnaajjjgc.com | udp |
| MU | 156.236.72.121:443 | z.nnnaajjjgc.com | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| US | 8.8.8.8:53 | apps.identrust.com | udp |
| NL | 88.221.25.170:80 | apps.identrust.com | tcp |
| IR | 80.210.25.252:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | steamcommunity.com | udp |
| NL | 23.222.49.98:443 | steamcommunity.com | tcp |
| DE | 116.202.182.4:80 | 116.202.182.4 | tcp |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 172.67.34.170:443 | pastebin.com | tcp |
| KR | 211.119.84.112:80 | zexeq.com | tcp |
| US | 8.8.8.8:53 | flyawayaero.net | udp |
| US | 172.67.216.81:443 | flyawayaero.net | tcp |
| US | 8.8.8.8:53 | downloads.digitalpulsedata.com | udp |
| NL | 13.227.219.83:443 | downloads.digitalpulsedata.com | tcp |
| US | 8.8.8.8:53 | potatogoose.com | udp |
| US | 172.67.180.173:443 | potatogoose.com | tcp |
| US | 8.8.8.8:53 | ji.alie3ksgbb.com | udp |
| US | 188.114.97.0:80 | ji.alie3ksgbb.com | tcp |
| US | 8.8.8.8:53 | jetpackdelivery.net | udp |
| US | 188.114.96.0:443 | jetpackdelivery.net | tcp |
| US | 8.8.8.8:53 | new.drivelikea.com | udp |
| RU | 5.42.64.10:80 | 5.42.64.10 | tcp |
| US | 188.114.97.0:443 | new.drivelikea.com | tcp |
| US | 8.8.8.8:53 | hbn42414.beget.tech | udp |
| US | 8.8.8.8:53 | lycheepanel.info | udp |
| RU | 87.236.19.5:80 | hbn42414.beget.tech | tcp |
| US | 8.8.8.8:53 | galandskiyher3.com | udp |
| NL | 194.169.175.127:80 | galandskiyher3.com | tcp |
| US | 104.21.32.208:443 | lycheepanel.info | tcp |
| US | 8.8.8.8:53 | net.geo.opera.com | udp |
| NL | 185.26.182.112:80 | net.geo.opera.com | tcp |
| US | 8.8.8.8:53 | int.down.360safe.com | udp |
| NL | 185.26.182.112:443 | net.geo.opera.com | tcp |
| US | 85.217.144.143:80 | 85.217.144.143 | tcp |
| US | 8.8.8.8:53 | app.nnnaajjjgc.com | udp |
| US | 8.8.8.8:53 | iplogger.com | udp |
| DE | 148.251.234.93:443 | iplogger.com | tcp |
| US | 8.8.8.8:53 | shihabfabrics.com | udp |
| NL | 108.156.60.43:80 | int.down.360safe.com | tcp |
| HK | 154.221.26.108:80 | app.nnnaajjjgc.com | tcp |
| SG | 111.221.45.75:443 | shihabfabrics.com | tcp |
| RU | 5.42.64.10:80 | 5.42.64.10 | tcp |
| US | 8.8.8.8:53 | yip.su | udp |
| DE | 148.251.234.93:443 | yip.su | tcp |
| RU | 5.42.64.10:80 | 5.42.64.10 | tcp |
| MU | 156.236.72.121:443 | z.nnnaajjjgc.com | tcp |
| US | 8.8.8.8:53 | iup.360safe.com | udp |
| NL | 151.236.127.236:80 | iup.360safe.com | tcp |
| NL | 151.236.127.236:80 | iup.360safe.com | tcp |
| NL | 151.236.127.236:80 | iup.360safe.com | tcp |
| NL | 151.236.127.236:80 | iup.360safe.com | tcp |
| NL | 151.236.127.236:80 | iup.360safe.com | tcp |
| US | 8.8.8.8:53 | st.p.360safe.com | udp |
| NL | 151.236.127.236:80 | iup.360safe.com | tcp |
| IE | 54.77.42.29:3478 | st.p.360safe.com | udp |
| IE | 54.77.42.29:3478 | st.p.360safe.com | udp |
| US | 8.8.8.8:53 | tr.p.360safe.com | udp |
| IE | 54.76.174.118:80 | tr.p.360safe.com | udp |
| US | 8.8.8.8:53 | int.down.360safe.com | udp |
| NL | 108.156.60.9:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.43:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.116:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.18:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.116:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.9:80 | int.down.360safe.com | tcp |
| US | 8.8.8.8:53 | sd.p.360safe.com | udp |
| NL | 52.222.137.147:80 | sd.p.360safe.com | tcp |
| US | 8.8.8.8:53 | s.360safe.com | udp |
| DE | 52.29.179.141:80 | s.360safe.com | tcp |
| DE | 52.29.179.141:80 | s.360safe.com | tcp |
| DE | 52.29.179.141:80 | s.360safe.com | tcp |
| DE | 148.251.234.93:443 | yip.su | tcp |
| US | 8.8.8.8:53 | script.google.com | udp |
| DE | 172.217.23.206:80 | script.google.com | tcp |
| DE | 172.217.23.206:443 | script.google.com | tcp |
| NL | 108.156.60.43:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.116:80 | int.down.360safe.com | tcp |
| HK | 154.221.26.108:80 | app.nnnaajjjgc.com | tcp |
| US | 8.8.8.8:53 | script.googleusercontent.com | udp |
| NL | 142.251.36.1:443 | script.googleusercontent.com | tcp |
| NL | 108.156.60.43:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.18:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.9:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.116:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.43:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.9:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.116:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.43:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.116:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.9:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.18:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.43:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.116:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.9:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.43:80 | int.down.360safe.com | tcp |
| NL | 108.156.60.116:80 | int.down.360safe.com | tcp |
| PL | 146.59.10.173:45035 | tcp | |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| US | 8.8.8.8:53 | steamcommunity.com | udp |
| BE | 104.68.92.92:443 | steamcommunity.com | tcp |
| DE | 148.251.234.93:443 | yip.su | tcp |
| DE | 52.29.179.141:80 | s.360safe.com | tcp |
| DE | 52.29.179.141:80 | s.360safe.com | tcp |
| DE | 116.202.182.4:80 | 116.202.182.4 | tcp |
| US | 8.8.8.8:53 | m7val1dat0r.info | udp |
| DE | 148.251.234.93:443 | yip.su | tcp |
| US | 8.8.8.8:53 | orion.ts.360.com | udp |
| US | 188.114.97.0:443 | m7val1dat0r.info | tcp |
| NL | 82.145.215.152:443 | orion.ts.360.com | tcp |
| DE | 148.251.234.93:443 | yip.su | tcp |
| DE | 148.251.234.93:443 | yip.su | tcp |
| DE | 148.251.234.93:443 | yip.su | tcp |
| DE | 148.251.234.93:443 | yip.su | tcp |
| DE | 148.251.234.93:443 | yip.su | tcp |
Files
memory/3024-1-0x0000000002710000-0x0000000002810000-memory.dmp
memory/3024-2-0x0000000000400000-0x0000000002599000-memory.dmp
memory/3024-3-0x0000000000220000-0x0000000000229000-memory.dmp
memory/1276-4-0x0000000002AC0000-0x0000000002AD6000-memory.dmp
memory/3024-5-0x0000000000400000-0x0000000002599000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\9924.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
C:\Users\Admin\AppData\Local\Temp\9924.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
memory/2636-17-0x00000000002D0000-0x0000000000362000-memory.dmp
memory/2636-18-0x00000000002D0000-0x0000000000362000-memory.dmp
memory/2636-19-0x0000000003F40000-0x000000000405B000-memory.dmp
\Users\Admin\AppData\Local\Temp\9924.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
C:\Users\Admin\AppData\Local\Temp\9924.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
memory/2924-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2924-25-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\9924.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
C:\Users\Admin\AppData\Local\Temp\9B28.dll
| MD5 | bd882e889728e1bca4297f27233c43df |
| SHA1 | 431fd3c4bf6ef4dbb0bd84f5a4c3a2a17c2fbbbc |
| SHA256 | 4d3db3810a53df273816c5499d9898e7ab8e505a2a5b146159a2b4b54f40140b |
| SHA512 | 128d344a7f981bdada8fe4405947a7368e03bd66b1cb4271441cf1575b1fa0373a5c251a5ff2e70533ddc296444fc61637cde5675a5fe6100c25b1f291533fcf |
C:\Users\Admin\AppData\Local\Temp\9C80.exe
| MD5 | 81a0054a8065b79186a98a212a2d6a5e |
| SHA1 | 41a44da8581e024bd20d7ce1310f9b22ccecac90 |
| SHA256 | 2d3ae3269ec97d38dd211442594f312e31d0f69aa09f8bbc4455d92a00ac9181 |
| SHA512 | 31faa459ab4bbb7c2ca22cbaedf6d572c9250f0eb005d828c5e7a24e4ee98d46431db8589b207a059882f1984eb82fc976908196ce8f7892e6b7b3f4b2f98b72 |
C:\Users\Admin\AppData\Local\Temp\9C80.exe
| MD5 | 81a0054a8065b79186a98a212a2d6a5e |
| SHA1 | 41a44da8581e024bd20d7ce1310f9b22ccecac90 |
| SHA256 | 2d3ae3269ec97d38dd211442594f312e31d0f69aa09f8bbc4455d92a00ac9181 |
| SHA512 | 31faa459ab4bbb7c2ca22cbaedf6d572c9250f0eb005d828c5e7a24e4ee98d46431db8589b207a059882f1984eb82fc976908196ce8f7892e6b7b3f4b2f98b72 |
memory/2924-35-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2908-36-0x0000000000220000-0x00000000002B1000-memory.dmp
memory/2924-37-0x0000000000400000-0x0000000000537000-memory.dmp
\Users\Admin\AppData\Local\Temp\9C80.exe
| MD5 | 81a0054a8065b79186a98a212a2d6a5e |
| SHA1 | 41a44da8581e024bd20d7ce1310f9b22ccecac90 |
| SHA256 | 2d3ae3269ec97d38dd211442594f312e31d0f69aa09f8bbc4455d92a00ac9181 |
| SHA512 | 31faa459ab4bbb7c2ca22cbaedf6d572c9250f0eb005d828c5e7a24e4ee98d46431db8589b207a059882f1984eb82fc976908196ce8f7892e6b7b3f4b2f98b72 |
memory/2908-40-0x0000000003F70000-0x000000000408B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\9C80.exe
| MD5 | 81a0054a8065b79186a98a212a2d6a5e |
| SHA1 | 41a44da8581e024bd20d7ce1310f9b22ccecac90 |
| SHA256 | 2d3ae3269ec97d38dd211442594f312e31d0f69aa09f8bbc4455d92a00ac9181 |
| SHA512 | 31faa459ab4bbb7c2ca22cbaedf6d572c9250f0eb005d828c5e7a24e4ee98d46431db8589b207a059882f1984eb82fc976908196ce8f7892e6b7b3f4b2f98b72 |
memory/2908-43-0x0000000000220000-0x00000000002B1000-memory.dmp
\Users\Admin\AppData\Local\Temp\9B28.dll
| MD5 | bd882e889728e1bca4297f27233c43df |
| SHA1 | 431fd3c4bf6ef4dbb0bd84f5a4c3a2a17c2fbbbc |
| SHA256 | 4d3db3810a53df273816c5499d9898e7ab8e505a2a5b146159a2b4b54f40140b |
| SHA512 | 128d344a7f981bdada8fe4405947a7368e03bd66b1cb4271441cf1575b1fa0373a5c251a5ff2e70533ddc296444fc61637cde5675a5fe6100c25b1f291533fcf |
memory/2784-49-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\9F4E.exe
| MD5 | c00bb4f6743b66f820229cb1e7f366ea |
| SHA1 | e54b697cf11d1478c9647794d1573800faa27109 |
| SHA256 | b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9 |
| SHA512 | 4b0a469a4a93fee2e0bbc92e0aaedba61be80f49bce71cceeb87c18f101306ae10a45d8ae7c776f430c9d716508e81ae0596000c721b25c4923c323fe8a4e0c0 |
C:\Users\Admin\AppData\Local\Temp\9F4E.exe
| MD5 | c00bb4f6743b66f820229cb1e7f366ea |
| SHA1 | e54b697cf11d1478c9647794d1573800faa27109 |
| SHA256 | b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9 |
| SHA512 | 4b0a469a4a93fee2e0bbc92e0aaedba61be80f49bce71cceeb87c18f101306ae10a45d8ae7c776f430c9d716508e81ae0596000c721b25c4923c323fe8a4e0c0 |
C:\Users\Admin\AppData\Local\Temp\9C80.exe
| MD5 | 81a0054a8065b79186a98a212a2d6a5e |
| SHA1 | 41a44da8581e024bd20d7ce1310f9b22ccecac90 |
| SHA256 | 2d3ae3269ec97d38dd211442594f312e31d0f69aa09f8bbc4455d92a00ac9181 |
| SHA512 | 31faa459ab4bbb7c2ca22cbaedf6d572c9250f0eb005d828c5e7a24e4ee98d46431db8589b207a059882f1984eb82fc976908196ce8f7892e6b7b3f4b2f98b72 |
memory/2784-53-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2784-54-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2700-55-0x0000000000140000-0x0000000000146000-memory.dmp
memory/2700-56-0x0000000010000000-0x00000000101A4000-memory.dmp
memory/2660-58-0x0000000000CC0000-0x0000000000D52000-memory.dmp
memory/2660-59-0x0000000073280000-0x000000007396E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\CabA5E0.tmp
| MD5 | f3441b8572aae8801c04f3060b550443 |
| SHA1 | 4ef0a35436125d6821831ef36c28ffaf196cda15 |
| SHA256 | 6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf |
| SHA512 | 5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9 |
C:\Users\Admin\AppData\Local\Temp\TarA8E0.tmp
| MD5 | 9441737383d21192400eca82fda910ec |
| SHA1 | 725e0d606a4fc9ba44aa8ffde65bed15e65367e4 |
| SHA256 | bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5 |
| SHA512 | 7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | af26279c1ed8c40199ff48a7c8404b11 |
| SHA1 | 0a95d0fc52c0fff6cfc74350bad64e6335723f99 |
| SHA256 | 1149e803db2a717bfde2a59e0eb320467659456c9530801d303e42b8a82c0dd7 |
| SHA512 | daf89fe9c81e85160bba4fb93e8e686567f8039d252f0f91d805c9477b6f8a0bc5a6959f0c8e1a64ef70639e9e24b8d9928caeb1f1aae9c90b672d1e5c7ba2a6 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | c0419d05ad443966df72dd199ad71dd8 |
| SHA1 | 0ba0b1ddfbd9e45879342dba9191efbc478edf05 |
| SHA256 | 49e4e0f0690e9d8e830bd520e4cd37e616a530274c6b9ce978f11c122c19696b |
| SHA512 | e63bd124dd8d1b8993b42507a81e39c74edabfc5798cef0869638f3c2ee95a4646aab829d0d974e7912d7fa127f1098d98b92d31b4b01e1d4b4ddfd8e6e84c91 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 89d00f34dfd5bae07dbb99d43f7ffdce |
| SHA1 | 2e4d9e3158151ce5be5a2c7df08c9bd9ddf0133f |
| SHA256 | 06bc5f7deed0af9ece4569c7fe3220cd2a8edad50483a084cd5197eeaeb15043 |
| SHA512 | 87ae43b581d1c319bb81dd9b06f43880b3a7c11b2f00be2f930d76a9346fd44d34532653e45eb42234404fc9f4d1cef9c50f4e16156012b5bbc3f23495f23d84 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 09d2bae3b05f4c92b25a8c6225df6483 |
| SHA1 | ff084d8a1f43903b95bf9144b3719126a3d40cc8 |
| SHA256 | a282e51236ad1fb5eb73b2d8d8cb022213cda792705d8f595b504e2b6d2e00c5 |
| SHA512 | 2151cb657a649acbc7009b20a0101f4d196a2c3cf4793885f95e8b865fb6da424a17fa139b97e312e2157a559beb5be63c824841c871114fec949d810c92bd2c |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | e579a599350b1b62d10637e473c73f2b |
| SHA1 | df4e95c1b1114d199b6f06bbf779f7adde7868f5 |
| SHA256 | 5c6e78247cf761b440a99a8eaa45158bab8ef33ccc2aba18a2c500f9335fca87 |
| SHA512 | 6cb271473e074d584993a762915cc37112ec00b5f5a2396d5727b27386880e939849cff8a8487dd1d7f99f2b646368c6e4d7a30667a01df7b1e8b427289eb4f1 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | bd0fc92a2474f0ff65f4a3679898c63d |
| SHA1 | cc53508aa05e3780b81efc4e83654346d643484e |
| SHA256 | dac0e75fbe6ee616ab6e81d1bbe49cf64e76565a95e7be317ec03c8a9b4b499d |
| SHA512 | 0fc093fede024c0b1065cfadf362e3a873d3ea6a6892a9353e0170146d08521c6b2ed8a5a52d02c4c4e3d48c047c0b9dd22b5679f1050ced106800db8501a4cb |
C:\Users\Admin\AppData\Local\783b6ce1-f567-418a-9e49-847a839bb01d\9924.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
\Users\Admin\AppData\Local\Temp\9C80.exe
| MD5 | 81a0054a8065b79186a98a212a2d6a5e |
| SHA1 | 41a44da8581e024bd20d7ce1310f9b22ccecac90 |
| SHA256 | 2d3ae3269ec97d38dd211442594f312e31d0f69aa09f8bbc4455d92a00ac9181 |
| SHA512 | 31faa459ab4bbb7c2ca22cbaedf6d572c9250f0eb005d828c5e7a24e4ee98d46431db8589b207a059882f1984eb82fc976908196ce8f7892e6b7b3f4b2f98b72 |
\Users\Admin\AppData\Local\Temp\9C80.exe
| MD5 | 81a0054a8065b79186a98a212a2d6a5e |
| SHA1 | 41a44da8581e024bd20d7ce1310f9b22ccecac90 |
| SHA256 | 2d3ae3269ec97d38dd211442594f312e31d0f69aa09f8bbc4455d92a00ac9181 |
| SHA512 | 31faa459ab4bbb7c2ca22cbaedf6d572c9250f0eb005d828c5e7a24e4ee98d46431db8589b207a059882f1984eb82fc976908196ce8f7892e6b7b3f4b2f98b72 |
C:\Users\Admin\AppData\Local\Temp\9C80.exe
| MD5 | 81a0054a8065b79186a98a212a2d6a5e |
| SHA1 | 41a44da8581e024bd20d7ce1310f9b22ccecac90 |
| SHA256 | 2d3ae3269ec97d38dd211442594f312e31d0f69aa09f8bbc4455d92a00ac9181 |
| SHA512 | 31faa459ab4bbb7c2ca22cbaedf6d572c9250f0eb005d828c5e7a24e4ee98d46431db8589b207a059882f1984eb82fc976908196ce8f7892e6b7b3f4b2f98b72 |
memory/2784-128-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1660-131-0x0000000000310000-0x00000000003A1000-memory.dmp
\Users\Admin\AppData\Local\Temp\9C80.exe
| MD5 | 81a0054a8065b79186a98a212a2d6a5e |
| SHA1 | 41a44da8581e024bd20d7ce1310f9b22ccecac90 |
| SHA256 | 2d3ae3269ec97d38dd211442594f312e31d0f69aa09f8bbc4455d92a00ac9181 |
| SHA512 | 31faa459ab4bbb7c2ca22cbaedf6d572c9250f0eb005d828c5e7a24e4ee98d46431db8589b207a059882f1984eb82fc976908196ce8f7892e6b7b3f4b2f98b72 |
memory/1660-130-0x0000000000310000-0x00000000003A1000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\9C80.exe
| MD5 | 81a0054a8065b79186a98a212a2d6a5e |
| SHA1 | 41a44da8581e024bd20d7ce1310f9b22ccecac90 |
| SHA256 | 2d3ae3269ec97d38dd211442594f312e31d0f69aa09f8bbc4455d92a00ac9181 |
| SHA512 | 31faa459ab4bbb7c2ca22cbaedf6d572c9250f0eb005d828c5e7a24e4ee98d46431db8589b207a059882f1984eb82fc976908196ce8f7892e6b7b3f4b2f98b72 |
memory/2700-138-0x0000000000E50000-0x0000000000F58000-memory.dmp
memory/1552-140-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2924-141-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2700-142-0x0000000000C10000-0x0000000000CFD000-memory.dmp
memory/2700-145-0x0000000000C10000-0x0000000000CFD000-memory.dmp
memory/2700-146-0x0000000000C10000-0x0000000000CFD000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 09d2bae3b05f4c92b25a8c6225df6483 |
| SHA1 | ff084d8a1f43903b95bf9144b3719126a3d40cc8 |
| SHA256 | a282e51236ad1fb5eb73b2d8d8cb022213cda792705d8f595b504e2b6d2e00c5 |
| SHA512 | 2151cb657a649acbc7009b20a0101f4d196a2c3cf4793885f95e8b865fb6da424a17fa139b97e312e2157a559beb5be63c824841c871114fec949d810c92bd2c |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | e579a599350b1b62d10637e473c73f2b |
| SHA1 | df4e95c1b1114d199b6f06bbf779f7adde7868f5 |
| SHA256 | 5c6e78247cf761b440a99a8eaa45158bab8ef33ccc2aba18a2c500f9335fca87 |
| SHA512 | 6cb271473e074d584993a762915cc37112ec00b5f5a2396d5727b27386880e939849cff8a8487dd1d7f99f2b646368c6e4d7a30667a01df7b1e8b427289eb4f1 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | bd0fc92a2474f0ff65f4a3679898c63d |
| SHA1 | cc53508aa05e3780b81efc4e83654346d643484e |
| SHA256 | dac0e75fbe6ee616ab6e81d1bbe49cf64e76565a95e7be317ec03c8a9b4b499d |
| SHA512 | 0fc093fede024c0b1065cfadf362e3a873d3ea6a6892a9353e0170146d08521c6b2ed8a5a52d02c4c4e3d48c047c0b9dd22b5679f1050ced106800db8501a4cb |
memory/2660-159-0x0000000073280000-0x000000007396E000-memory.dmp
memory/2660-160-0x0000000004BB0000-0x0000000004BF0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\BBA5.exe
| MD5 | 46ec3f1333f627b301fa9c871343bc9a |
| SHA1 | 59483a7dd5c33a5a14c4da9441230f7810cd4329 |
| SHA256 | 9b9cbe098bcd6261d2ec404c6da54c7977f7d9919b3daac26c72fa30fa8aafe6 |
| SHA512 | b64ba101fb60943980826d3b4597fdada8670beb2a927d0a022901c09be1833cfa83b990a67bbada136108146b301436bd6ebdf90b0d36a5c01978ca95413e1d |
C:\Users\Admin\AppData\Local\Temp\BBA5.exe
| MD5 | 46ec3f1333f627b301fa9c871343bc9a |
| SHA1 | 59483a7dd5c33a5a14c4da9441230f7810cd4329 |
| SHA256 | 9b9cbe098bcd6261d2ec404c6da54c7977f7d9919b3daac26c72fa30fa8aafe6 |
| SHA512 | b64ba101fb60943980826d3b4597fdada8670beb2a927d0a022901c09be1833cfa83b990a67bbada136108146b301436bd6ebdf90b0d36a5c01978ca95413e1d |
memory/1552-165-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1716-166-0x0000000073280000-0x000000007396E000-memory.dmp
memory/1716-167-0x00000000003F0000-0x0000000000A84000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\D954.exe
| MD5 | 17dd7bceefde77f3a3f41e856ff6ab26 |
| SHA1 | aad2d11ae82315e0c54f6e18d2aa4dc5d9a040d3 |
| SHA256 | c68005ba0828cbee40df02a6742e06b5d2a7f7d6bc05087f27bbe1368077c111 |
| SHA512 | c1b68aebdb5b7ed75d800738635223e4c8ce2e3a826b9042dd9543220a008653ec2fb9d1a2fb77da5e335fa1a0bc9ac640446c8e1f101c510780b467896f2fd4 |
C:\Users\Admin\AppData\Local\Temp\D954.exe
| MD5 | 17dd7bceefde77f3a3f41e856ff6ab26 |
| SHA1 | aad2d11ae82315e0c54f6e18d2aa4dc5d9a040d3 |
| SHA256 | c68005ba0828cbee40df02a6742e06b5d2a7f7d6bc05087f27bbe1368077c111 |
| SHA512 | c1b68aebdb5b7ed75d800738635223e4c8ce2e3a826b9042dd9543220a008653ec2fb9d1a2fb77da5e335fa1a0bc9ac640446c8e1f101c510780b467896f2fd4 |
C:\Users\Admin\AppData\Local\Temp\aafg31.exe
| MD5 | 4c6c11197bbcbdf3a66c9dc1fd7b542f |
| SHA1 | 78912bac8af6ed28ba23e58d5e63614444ef64e1 |
| SHA256 | 830b8d661d5e404c05d5b2b2f5361ab2da6fecc90a561de81354e7840bfc5b63 |
| SHA512 | 5fd8e96127ec349585e7c925f2692cafa6b5a2bfbd963acea96aa03179e6ea641b4b0fd7e279f63c0102ae93518e90da74e644150cb92a36f7503b6ab9e74948 |
C:\Users\Admin\AppData\Local\Temp\aafg31.exe
| MD5 | 4c6c11197bbcbdf3a66c9dc1fd7b542f |
| SHA1 | 78912bac8af6ed28ba23e58d5e63614444ef64e1 |
| SHA256 | 830b8d661d5e404c05d5b2b2f5361ab2da6fecc90a561de81354e7840bfc5b63 |
| SHA512 | 5fd8e96127ec349585e7c925f2692cafa6b5a2bfbd963acea96aa03179e6ea641b4b0fd7e279f63c0102ae93518e90da74e644150cb92a36f7503b6ab9e74948 |
\Users\Admin\AppData\Local\Temp\aafg31.exe
| MD5 | 4c6c11197bbcbdf3a66c9dc1fd7b542f |
| SHA1 | 78912bac8af6ed28ba23e58d5e63614444ef64e1 |
| SHA256 | 830b8d661d5e404c05d5b2b2f5361ab2da6fecc90a561de81354e7840bfc5b63 |
| SHA512 | 5fd8e96127ec349585e7c925f2692cafa6b5a2bfbd963acea96aa03179e6ea641b4b0fd7e279f63c0102ae93518e90da74e644150cb92a36f7503b6ab9e74948 |
\Users\Admin\AppData\Local\Temp\aafg31.exe
| MD5 | 4c6c11197bbcbdf3a66c9dc1fd7b542f |
| SHA1 | 78912bac8af6ed28ba23e58d5e63614444ef64e1 |
| SHA256 | 830b8d661d5e404c05d5b2b2f5361ab2da6fecc90a561de81354e7840bfc5b63 |
| SHA512 | 5fd8e96127ec349585e7c925f2692cafa6b5a2bfbd963acea96aa03179e6ea641b4b0fd7e279f63c0102ae93518e90da74e644150cb92a36f7503b6ab9e74948 |
memory/1552-185-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\aafg31.exe
| MD5 | 4c6c11197bbcbdf3a66c9dc1fd7b542f |
| SHA1 | 78912bac8af6ed28ba23e58d5e63614444ef64e1 |
| SHA256 | 830b8d661d5e404c05d5b2b2f5361ab2da6fecc90a561de81354e7840bfc5b63 |
| SHA512 | 5fd8e96127ec349585e7c925f2692cafa6b5a2bfbd963acea96aa03179e6ea641b4b0fd7e279f63c0102ae93518e90da74e644150cb92a36f7503b6ab9e74948 |
memory/1552-183-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1896-186-0x00000000FF9A0000-0x00000000FFA42000-memory.dmp
\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | bb924d501954bee604c97534385ecbda |
| SHA1 | 05a480d2489f18329fb302171f1b077aa5da6fd2 |
| SHA256 | c69c012e1a7a4bd10e44563b48329341f3172715ed3c18b40cb6d05a7f704372 |
| SHA512 | 23a0464bace69318a013e9e4e9dc34dcf232897fb7a3cf8af33d9bc9e3bbb209e9b7198e9d43cb97a174a45ad82f9c7d52ddadf5b069281092fab0aa2d3d58e0 |
memory/1552-193-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | bb924d501954bee604c97534385ecbda |
| SHA1 | 05a480d2489f18329fb302171f1b077aa5da6fd2 |
| SHA256 | c69c012e1a7a4bd10e44563b48329341f3172715ed3c18b40cb6d05a7f704372 |
| SHA512 | 23a0464bace69318a013e9e4e9dc34dcf232897fb7a3cf8af33d9bc9e3bbb209e9b7198e9d43cb97a174a45ad82f9c7d52ddadf5b069281092fab0aa2d3d58e0 |
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | bb924d501954bee604c97534385ecbda |
| SHA1 | 05a480d2489f18329fb302171f1b077aa5da6fd2 |
| SHA256 | c69c012e1a7a4bd10e44563b48329341f3172715ed3c18b40cb6d05a7f704372 |
| SHA512 | 23a0464bace69318a013e9e4e9dc34dcf232897fb7a3cf8af33d9bc9e3bbb209e9b7198e9d43cb97a174a45ad82f9c7d52ddadf5b069281092fab0aa2d3d58e0 |
\Users\Admin\AppData\Local\Temp\9924.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
C:\Users\Admin\AppData\Local\Temp\9924.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
memory/1552-202-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2660-214-0x0000000000930000-0x000000000096A000-memory.dmp
memory/1552-215-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1764-216-0x0000000002690000-0x0000000002722000-memory.dmp
memory/1764-213-0x0000000002690000-0x0000000002722000-memory.dmp
memory/1832-218-0x00000000001B0000-0x00000000001B9000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | bb924d501954bee604c97534385ecbda |
| SHA1 | 05a480d2489f18329fb302171f1b077aa5da6fd2 |
| SHA256 | c69c012e1a7a4bd10e44563b48329341f3172715ed3c18b40cb6d05a7f704372 |
| SHA512 | 23a0464bace69318a013e9e4e9dc34dcf232897fb7a3cf8af33d9bc9e3bbb209e9b7198e9d43cb97a174a45ad82f9c7d52ddadf5b069281092fab0aa2d3d58e0 |
\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | bb924d501954bee604c97534385ecbda |
| SHA1 | 05a480d2489f18329fb302171f1b077aa5da6fd2 |
| SHA256 | c69c012e1a7a4bd10e44563b48329341f3172715ed3c18b40cb6d05a7f704372 |
| SHA512 | 23a0464bace69318a013e9e4e9dc34dcf232897fb7a3cf8af33d9bc9e3bbb209e9b7198e9d43cb97a174a45ad82f9c7d52ddadf5b069281092fab0aa2d3d58e0 |
\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build2.exe
| MD5 | dcd1bd0f92fe24bf269f0e3ace8de280 |
| SHA1 | 73c06bb4010b87a83e07bcaf3d181e68d24da11f |
| SHA256 | fc0757507960b91ab61afe79de7e316fabde48f983a8a497a709c19c99012456 |
| SHA512 | 2846a18a6687b26a4ec7267b16f139a10c1ace288f5bc893a5e600f07dc9714517f2610f33518afda41707a31a68cf0cbcd4b838568bba6f1833edc7300d6ceb |
C:\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build2.exe
| MD5 | dcd1bd0f92fe24bf269f0e3ace8de280 |
| SHA1 | 73c06bb4010b87a83e07bcaf3d181e68d24da11f |
| SHA256 | fc0757507960b91ab61afe79de7e316fabde48f983a8a497a709c19c99012456 |
| SHA512 | 2846a18a6687b26a4ec7267b16f139a10c1ace288f5bc893a5e600f07dc9714517f2610f33518afda41707a31a68cf0cbcd4b838568bba6f1833edc7300d6ceb |
\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | 21bdc4635e67b42af297b5d422b47cdc |
| SHA1 | da08dd00ae5bc0da5ec6433569bcc68c4a8a9410 |
| SHA256 | f73bfbd1b920825c536bef691413cd8ae7ea01fb869172da38e4775660e96287 |
| SHA512 | 626aa66348c62b9b7cdb63eb15be3b7cfc9f3d056ad6b05f183e11a5a2e5143448f5797686bbc8039ef6b01e86dd61c3d8639a20dd7298ec4fba9e140329c6a5 |
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | bb924d501954bee604c97534385ecbda |
| SHA1 | 05a480d2489f18329fb302171f1b077aa5da6fd2 |
| SHA256 | c69c012e1a7a4bd10e44563b48329341f3172715ed3c18b40cb6d05a7f704372 |
| SHA512 | 23a0464bace69318a013e9e4e9dc34dcf232897fb7a3cf8af33d9bc9e3bbb209e9b7198e9d43cb97a174a45ad82f9c7d52ddadf5b069281092fab0aa2d3d58e0 |
C:\Users\Admin\AppData\Local\Temp\9924.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
memory/1212-250-0x0000000000400000-0x0000000000409000-memory.dmp
memory/2572-251-0x0000000004260000-0x0000000004658000-memory.dmp
memory/2660-246-0x0000000004BB0000-0x0000000004BF0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | 21bdc4635e67b42af297b5d422b47cdc |
| SHA1 | da08dd00ae5bc0da5ec6433569bcc68c4a8a9410 |
| SHA256 | f73bfbd1b920825c536bef691413cd8ae7ea01fb869172da38e4775660e96287 |
| SHA512 | 626aa66348c62b9b7cdb63eb15be3b7cfc9f3d056ad6b05f183e11a5a2e5143448f5797686bbc8039ef6b01e86dd61c3d8639a20dd7298ec4fba9e140329c6a5 |
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | 21bdc4635e67b42af297b5d422b47cdc |
| SHA1 | da08dd00ae5bc0da5ec6433569bcc68c4a8a9410 |
| SHA256 | f73bfbd1b920825c536bef691413cd8ae7ea01fb869172da38e4775660e96287 |
| SHA512 | 626aa66348c62b9b7cdb63eb15be3b7cfc9f3d056ad6b05f183e11a5a2e5143448f5797686bbc8039ef6b01e86dd61c3d8639a20dd7298ec4fba9e140329c6a5 |
memory/2660-254-0x0000000000510000-0x000000000052A000-memory.dmp
C:\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build2.exe
| MD5 | dcd1bd0f92fe24bf269f0e3ace8de280 |
| SHA1 | 73c06bb4010b87a83e07bcaf3d181e68d24da11f |
| SHA256 | fc0757507960b91ab61afe79de7e316fabde48f983a8a497a709c19c99012456 |
| SHA512 | 2846a18a6687b26a4ec7267b16f139a10c1ace288f5bc893a5e600f07dc9714517f2610f33518afda41707a31a68cf0cbcd4b838568bba6f1833edc7300d6ceb |
memory/2492-261-0x0000000000400000-0x0000000000465000-memory.dmp
memory/1612-263-0x0000000002702000-0x0000000002731000-memory.dmp
memory/1612-264-0x0000000000330000-0x0000000000381000-memory.dmp
memory/2492-267-0x0000000000400000-0x0000000000465000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\kos1.exe
| MD5 | 85b698363e74ba3c08fc16297ddc284e |
| SHA1 | 171cfea4a82a7365b241f16aebdb2aad29f4f7c0 |
| SHA256 | 78efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe |
| SHA512 | 7e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796 |
C:\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build2.exe
| MD5 | dcd1bd0f92fe24bf269f0e3ace8de280 |
| SHA1 | 73c06bb4010b87a83e07bcaf3d181e68d24da11f |
| SHA256 | fc0757507960b91ab61afe79de7e316fabde48f983a8a497a709c19c99012456 |
| SHA512 | 2846a18a6687b26a4ec7267b16f139a10c1ace288f5bc893a5e600f07dc9714517f2610f33518afda41707a31a68cf0cbcd4b838568bba6f1833edc7300d6ceb |
memory/1716-268-0x0000000073280000-0x000000007396E000-memory.dmp
memory/2492-269-0x0000000000400000-0x0000000000465000-memory.dmp
memory/1976-270-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2572-271-0x0000000004260000-0x0000000004658000-memory.dmp
memory/2572-272-0x0000000004660000-0x0000000004F4B000-memory.dmp
\Users\Admin\AppData\Local\Temp\kos1.exe
| MD5 | 85b698363e74ba3c08fc16297ddc284e |
| SHA1 | 171cfea4a82a7365b241f16aebdb2aad29f4f7c0 |
| SHA256 | 78efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe |
| SHA512 | 7e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796 |
\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | 21bdc4635e67b42af297b5d422b47cdc |
| SHA1 | da08dd00ae5bc0da5ec6433569bcc68c4a8a9410 |
| SHA256 | f73bfbd1b920825c536bef691413cd8ae7ea01fb869172da38e4775660e96287 |
| SHA512 | 626aa66348c62b9b7cdb63eb15be3b7cfc9f3d056ad6b05f183e11a5a2e5143448f5797686bbc8039ef6b01e86dd61c3d8639a20dd7298ec4fba9e140329c6a5 |
memory/2572-273-0x0000000000400000-0x0000000002985000-memory.dmp
C:\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build2.exe
| MD5 | dcd1bd0f92fe24bf269f0e3ace8de280 |
| SHA1 | 73c06bb4010b87a83e07bcaf3d181e68d24da11f |
| SHA256 | fc0757507960b91ab61afe79de7e316fabde48f983a8a497a709c19c99012456 |
| SHA512 | 2846a18a6687b26a4ec7267b16f139a10c1ace288f5bc893a5e600f07dc9714517f2610f33518afda41707a31a68cf0cbcd4b838568bba6f1833edc7300d6ceb |
memory/1212-235-0x0000000000400000-0x0000000000409000-memory.dmp
\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build2.exe
| MD5 | dcd1bd0f92fe24bf269f0e3ace8de280 |
| SHA1 | 73c06bb4010b87a83e07bcaf3d181e68d24da11f |
| SHA256 | fc0757507960b91ab61afe79de7e316fabde48f983a8a497a709c19c99012456 |
| SHA512 | 2846a18a6687b26a4ec7267b16f139a10c1ace288f5bc893a5e600f07dc9714517f2610f33518afda41707a31a68cf0cbcd4b838568bba6f1833edc7300d6ceb |
\Users\Admin\AppData\Local\Temp\9924.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
memory/1832-217-0x0000000000270000-0x0000000000370000-memory.dmp
memory/1552-200-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2924-206-0x0000000000400000-0x0000000000537000-memory.dmp
\Users\Admin\AppData\Local\Temp\9924.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | bb924d501954bee604c97534385ecbda |
| SHA1 | 05a480d2489f18329fb302171f1b077aa5da6fd2 |
| SHA256 | c69c012e1a7a4bd10e44563b48329341f3172715ed3c18b40cb6d05a7f704372 |
| SHA512 | 23a0464bace69318a013e9e4e9dc34dcf232897fb7a3cf8af33d9bc9e3bbb209e9b7198e9d43cb97a174a45ad82f9c7d52ddadf5b069281092fab0aa2d3d58e0 |
C:\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
memory/1552-286-0x0000000000400000-0x0000000000537000-memory.dmp
\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
memory/1276-294-0x0000000002B30000-0x0000000002B46000-memory.dmp
C:\Users\Admin\AppData\Local\ed31a27e-252f-4864-82d2-f9fec2ac18bf\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
memory/1976-298-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\bowsakkdestx.txt
| MD5 | 6ab37c6fd8c563197ef79d09241843f1 |
| SHA1 | cb9bd05e2fc8cc06999a66b7b2d396ff4b5157e5 |
| SHA256 | d4849ec7852d9467f06fde6f25823331dad6bc76e7838d530e990b62286a754f |
| SHA512 | dd1fae67d0f45ba1ec7e56347fdfc2a53f619650892c8a55e7fba80811b6c66d56544b1946a409eaaca06fa9503de20e160360445d959122e5ba3aa85b751cde |
memory/1976-299-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2716-305-0x0000000000F30000-0x00000000010A4000-memory.dmp
C:\SystemID\PersonalID.txt
| MD5 | dbe3661a216d9e3b599178758fadacb4 |
| SHA1 | 29fc37cce7bc29551694d17d9eb82d4d470db176 |
| SHA256 | 134967887ca1c9c78f4760e5761c11c2a8195671abccba36fcf3e76df6fff03b |
| SHA512 | da90c77c47790b3791ee6cee8aa7d431813f2ee0c314001015158a48a117342b990aaac023b36e610cef71755e609cbf1f6932047c3b4ad4df8779544214687f |
C:\Users\Admin\AppData\Local\Temp\kos1.exe
| MD5 | 85b698363e74ba3c08fc16297ddc284e |
| SHA1 | 171cfea4a82a7365b241f16aebdb2aad29f4f7c0 |
| SHA256 | 78efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe |
| SHA512 | 7e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796 |
\Users\Admin\AppData\Local\Temp\set16.exe
| MD5 | 22d5269955f256a444bd902847b04a3b |
| SHA1 | 41a83de3273270c3bd5b2bd6528bdc95766aa268 |
| SHA256 | ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd |
| SHA512 | d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c |
C:\Users\Admin\AppData\Local\Temp\set16.exe
| MD5 | 22d5269955f256a444bd902847b04a3b |
| SHA1 | 41a83de3273270c3bd5b2bd6528bdc95766aa268 |
| SHA256 | ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd |
| SHA512 | d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c |
memory/2764-344-0x0000000000060000-0x0000000000068000-memory.dmp
memory/2716-343-0x0000000073280000-0x000000007396E000-memory.dmp
memory/708-356-0x0000000000400000-0x0000000000430000-memory.dmp
memory/708-366-0x0000000000310000-0x0000000000316000-memory.dmp
memory/1212-456-0x0000000000400000-0x0000000000409000-memory.dmp
memory/1632-478-0x0000000000400000-0x0000000000408000-memory.dmp
memory/2660-479-0x0000000073280000-0x000000007396E000-memory.dmp
memory/1764-530-0x0000000000400000-0x00000000005F1000-memory.dmp
memory/2496-562-0x00000000026C2000-0x00000000026F1000-memory.dmp
C:\Users\Admin\Pictures\3YI4kihJeTwfHqWBhAOIqGAT.exe
| MD5 | ea43f0645fd447ab4201f8d695876740 |
| SHA1 | 6d0f0a6000cb9a2d4faf45eeac86ac7b6cf2dd08 |
| SHA256 | 045cbc9ff518aa3bf58f568868c326af3ea7dea491e2543233885ecbaec30eee |
| SHA512 | bc232de46325c6ff6272d37bd1170dbb5d10e8ba2faa9db8fd5c24891542f1c0149a54787deb10a57a55a4a1efbe6d370e8f0270408f563b775d34bbc6d380ee |
C:\Users\Admin\Pictures\QgzD8bl4VXMPZ3GsGZ2cju10.exe
| MD5 | 3b1722586f4893c38460600f68111bb5 |
| SHA1 | 82bbeeaf431913dab0ac15ddc42f5bd41543761c |
| SHA256 | 2f26df23d7c8a188138f972ba66a7eb5630e5e013379050dc61919f78849d786 |
| SHA512 | 603643c075b69ba80c103364d631386cb9d85211f629286c64afd7678c4ff407281adee659e404478b91a118c630acf26277fb2aebc0ef44a52c6849cde3f973 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 25ffaf57a7e539f08ec542f5afb299dc |
| SHA1 | bf8f2e777279ebeff722647e91b36a66a09b5036 |
| SHA256 | 1aaffe8f351162a55394c100746081e3cf67bbc68d9158940978b9749d86a886 |
| SHA512 | 37d4743381a4ad1379f7e4064d3b066bd3cd2cc0f5b8fff4ec7ac410f2afe38bc5c18d45c0cae0d156cec7dc4809448adf334940db0b4f3626c826285e1b6940 |
C:\Users\Admin\Pictures\qQhPlihBBDgt2GUbTuxAt9vu.exe
| MD5 | 0a7e9d62d99ad15e1fd0dd5a52725521 |
| SHA1 | 303acd8f1cf4ff48c7f0c8f7d972198e24704c59 |
| SHA256 | 3d75048117ccc9ddbefdaf70fbfbb7d4600db76f09438a7c5637b4d7b6f19a8f |
| SHA512 | f4a0b8ac0de2797404f0efb717c53bff835e5680356ed4b71bfa1d1c8087e23c4ad796516ea90b0689a1a2b73521826ee3aeecd1e8c0fb0572ccac979b65c55a |
C:\Users\Admin\Pictures\FHqtL1EaYeFyw6neWRwS5jF6.exe
| MD5 | d7df902cb5a9ad2c2a9ee617f6e1c6b1 |
| SHA1 | 19d869170b87d388c3346b5a20a0e7097e6f7354 |
| SHA256 | ee640a94f35e40fb4f9e8bcf6eb6ef8407ddc6b819ab77e5129f534dce382344 |
| SHA512 | 1a69dc0ecb82688d699d5e265e234af7e96eda15e4b19591b661e042d91cb641847e7d0e861b4ef472e510216e614c706b5e87e82832308a69a84698190f96cc |
C:\Users\Admin\Pictures\0TxlZEQKYiBfEdvkh7oRHhat.exe
| MD5 | 269957dbfbcf36be4001d677fae92f9e |
| SHA1 | 716f986bd94932c79b033d17764aa3b47baa4fb1 |
| SHA256 | cdd49cb33511e8f78c0f61246d1dfbe5a8476885d7645b2d2de1c5c00ae29af0 |
| SHA512 | f2ac27603090168f87dfa5455c7d6f5198cafe16f5961c87860e7aeb0802e933d43fab855eb243ee203b817e0e8c016c1272c5aae98d23bded8f6917e37990f3 |
C:\Users\Admin\Pictures\pOvGj4QO41rpP9U2svw0cEY7.exe
| MD5 | aa3602359bb93695da27345d82a95c77 |
| SHA1 | 9cb550458f95d631fef3a89144fc9283d6c9f75a |
| SHA256 | e9225898ffe63c67058ea7e7eb5e0dc2a9ce286e83624bd85604142a07619e7d |
| SHA512 | adf43781d3f1fec56bc9cdcd1d4a8ddf1c4321206b16f70968b6ffccb59c943aed77c1192bf701ccc1ab2ce0f29b77eb76a33eba47d129a9248b61476db78a36 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 24fdc36e24ee5c5b1dcf757583f34812 |
| SHA1 | 44cb00acbdd1df52e14c2ba77845debfe91921e7 |
| SHA256 | 8c7699eb616e249d5d7e8fd238b30c2b93e46852c6fb98f184e4edd250abf4b2 |
| SHA512 | b9d1fa03fbebf467799a2ecb94d30211753b298a941a75ca4d4bf8e49b414febe955582e220a913cef72c90433fea6dcfc3570c657b545d7b19c6b12582d6d65 |
memory/1880-741-0x00000000003D0000-0x00000000003D9000-memory.dmp
memory/1880-740-0x0000000002A42000-0x0000000002A55000-memory.dmp
C:\Users\Admin\Pictures\CxCAwOGVAXdbBIjUrNcfBBg0.exe
| MD5 | c582d0c4448b428dddb04a6a21f440ff |
| SHA1 | 8ba225fe248601a8192c0e0a51bb78c15f825656 |
| SHA256 | f6933b70a82f621c116566015c6e2ee758f276b40cdd45f09ac32ec4a23b0148 |
| SHA512 | 0ae54b79ef4e54f5314078710fa2189935c0334b6cd8383ed68541174ab45f5488c5a4d3be94fbbe30a8fc3b6481ea0e56de5956f0ac9e874c2596c92ad47378 |
C:\Users\Admin\AppData\Local\Temp\is-4ASEF.tmp\_isetup\_shfoldr.dll
| MD5 | 92dc6ef532fbb4a5c3201469a5b5eb63 |
| SHA1 | 3e89ff837147c16b4e41c30d6c796374e0b8e62c |
| SHA256 | 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87 |
| SHA512 | 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3 |
C:\Users\Admin\Pictures\5ZsTpaYBdBYIhbannVSEPQ9U.exe
| MD5 | 823b5fcdef282c5318b670008b9e6922 |
| SHA1 | d20cd5321d8a3d423af4c6dabc0ac905796bdc6d |
| SHA256 | 712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d |
| SHA512 | 4377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472 |
memory/2752-789-0x0000000000010000-0x000000000032C000-memory.dmp
C:\Users\Admin\Pictures\yUSMTJMZrAewuKnkbW52fN0C.exe
| MD5 | 32b1f6b76ad008bfe6b5f9a3194a28a6 |
| SHA1 | bda32c32c0ddce14b08ae5e96e226cbb84a1cad3 |
| SHA256 | 2d111368717bb418e34b2aa625a961ddb34c09a547db16b9bc3ffeb9fc0e0c59 |
| SHA512 | 3d2f0e6c3467489f50c4288506358305fe00f3e7e89f45e46bbdcb4f25351ea5eb01fe7c0883df21918eea405ca72379e8c591d91748662e62b332ed305b32e1 |
C:\Users\Admin\AppData\Local\Temp\[email protected]\setup.ini
| MD5 | 13701b5f47799e064b1ddeb18bce96d9 |
| SHA1 | 1807f0c2ae8a72a823f0fdb0a2c3401a6e89a095 |
| SHA256 | a34a5bbba3330c67d8bef87a9888f6d25faf554254a1b2b40ffdaf2ce07b81aa |
| SHA512 | c247ee79649e6467d0e50e8380ada70df8f809016b460ebe5570bfa6c6181284181231bf94c4e5288982741e343c4cf8af735351e7bb38469b0546ef237c30bf |
C:\Users\Admin\AppData\Local\Temp\[email protected]
| MD5 | 4881eb0e1607cfc7dbedc665c4dd36c7 |
| SHA1 | b27952f43ad10360b2e5810c029dec0bc932b9c0 |
| SHA256 | eb59b5a0fcba7d2e2e1692da1fa0ca61c4bf15e118a1cc52f366c0fc61d6983e |
| SHA512 | 8b2e138ed14789f67b75ba1c0483255cd6706319025ca073d38178b856986d0c5288ba18c449da6310ec7828627dd410a0b356580a1f98f9dd53c506bf929a3a |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 13a4d2b3b8442e69cfdd2fc130722634 |
| SHA1 | 6b63f7d6bf2ea379c0498b7fd614fb0161198538 |
| SHA256 | 0d3ebdb359741c1caf53c58e1602aab1c1cc8fb1ffd03500c2273e8376785be9 |
| SHA512 | 48c974142a06a5793f4c872953a33470d799be3c033f4b3db9a24f1af2fcdda51e900783ddbaaf279e949b8027bcd86f0f641d48e5b5166464e88284b41ded3d |
memory/1576-865-0x0000000000400000-0x0000000000409000-memory.dmp
memory/1756-874-0x0000000004260000-0x00000000042AE000-memory.dmp
memory/1756-877-0x00000000042B0000-0x00000000042FA000-memory.dmp
memory/2492-882-0x0000000000400000-0x0000000000465000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\51863aaaa798067ca0dfce65bbba55cf
| MD5 | c9ff7748d8fcef4cf84a5501e996a641 |
| SHA1 | 02867e5010f62f97ebb0cfb32cb3ede9449fe0c9 |
| SHA256 | 4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988 |
| SHA512 | d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73 |
memory/2968-902-0x000000006F720000-0x000000006FCCB000-memory.dmp
memory/1960-913-0x0000000000400000-0x00000000005B0000-memory.dmp
memory/2636-915-0x0000000000220000-0x000000000025E000-memory.dmp
memory/2636-914-0x00000000026E2000-0x0000000002707000-memory.dmp
C:\Users\Admin\Pictures\360TS_Setup.exe
| MD5 | 8e50886f6fc3ef72a39a1db7b23b4e96 |
| SHA1 | 3f462dadfdcab549d48f8584ef3d21b8b7f87eea |
| SHA256 | f1b62fe3600bfe7d41eb9b613c2ad8bffcc0c2ddabf85390b871942d26d1b5da |
| SHA512 | 1b80917b26d83ebf2d44d8588f16e354b1aa6cba46be72b152112b722a94728353ef2997e2d670863131be15969cc8a59e5833d3efd39955a4a01a1d45782250 |
memory/1468-921-0x0000000000350000-0x0000000000885000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1695760226_00000000_base\360base.dll
| MD5 | 8c42fc725106cf8276e625b4f97861bc |
| SHA1 | 9c4140730cb031c29fc63e17e1504693d0f21c13 |
| SHA256 | d1ca92aa0789ee87d45f9f3c63e0e46ad2997b09605cbc2c57da2be6b8488c22 |
| SHA512 | f3c33dfe8e482692d068bf2185bec7d0d2bb232e6828b0bc8dc867da9e7ca89f9356fde87244fe686e3830f957c052089a87ecff4e44842a1a7848246f0ba105 |
memory/2620-931-0x0000000002320000-0x0000000002328000-memory.dmp
memory/2620-930-0x000000001B2C0000-0x000000001B5A2000-memory.dmp
memory/2620-967-0x000000000233B000-0x00000000023A2000-memory.dmp
memory/2620-966-0x0000000002334000-0x0000000002337000-memory.dmp
C:\ProgramData\mozglue.dll
| MD5 | c8fd9be83bc728cc04beffafc2907fe9 |
| SHA1 | 95ab9f701e0024cedfbd312bcfe4e726744c4f2e |
| SHA256 | ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a |
| SHA512 | fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040 |
memory/2232-1022-0x0000000000400000-0x0000000000465000-memory.dmp
memory/2636-1025-0x0000000000400000-0x00000000025AB000-memory.dmp
C:\Program Files\Google\Chrome\updater.exe
| MD5 | 7af78ecfa55e8aeb8b699076266f7bcf |
| SHA1 | 432c9deb88d92ae86c55de81af26527d7d1af673 |
| SHA256 | f7284ade2ca0aeb432cf1fdae5ab0c724f81d10b914f6d4c2c15ef0f60ff316e |
| SHA512 | 3c0ae6b6e4a896da52faff4fb2e958abb2856330cbba6ff4b7a59e7512475e1739cccf2cfda7dde492f381d3225263bc77e3154983e86933fa074696e92a059e |
memory/2620-965-0x000007FEEEB40000-0x000007FEEF4DD000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\SdHRwpKgZPxspyIlq\LMwtKUUKafaivvb\zrRGHNk.exe
| MD5 | 5db0193da7e649b4780931ec50e42756 |
| SHA1 | a1ffbc1c4732e4bb6b17c381ead46823af967e75 |
| SHA256 | 7b0d42f7aa62939194632c7077daca05f2399de0b462e72b2b75b52b779e6d83 |
| SHA512 | f4fbd0d8cb15d7ccd2b831d0e8574a223c45c142787e94779a20751edf28007ef0f3aeb67b246cd442dbf769a0f4871edd4f900be52d6c9b1c72df1ce8df7235 |
Analysis: behavioral2
Detonation Overview
Submitted
2023-09-26 20:28
Reported
2023-09-26 20:31
Platform
win10v2004-20230915-en
Max time kernel
150s
Max time network
152s
Command Line
Signatures
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
Glupteba
Glupteba payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
RedLine
SmokeLoader
UAC bypass
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Local\Temp\CDC3.exe | N/A |
Windows security bypass
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths | C:\Users\Admin\AppData\Local\Temp\CDC3.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\CDC3.exe = "0" | C:\Users\Admin\AppData\Local\Temp\CDC3.exe | N/A |
Downloads MZ/PE file
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\CB8F.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\CDC3.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\DB7F.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\kos1.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\kos.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\C8AF.exe | N/A |
Executes dropped EXE
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\is-CGDTS.tmp\is-16RJJ.tmp | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\is-CGDTS.tmp\is-16RJJ.tmp | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\is-CGDTS.tmp\is-16RJJ.tmp | N/A |
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Reads user/profile data of web browsers
Windows security modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\CDC3.exe = "0" | C:\Users\Admin\AppData\Local\Temp\CDC3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths | C:\Users\Admin\AppData\Local\Temp\CDC3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions | C:\Users\Admin\AppData\Local\Temp\CDC3.exe | N/A |
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\56ef1011-b1e0-4772-93e5-f64f13ad1662\\C8AF.exe\" --AutoStart" | C:\Users\Admin\AppData\Local\Temp\C8AF.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" | C:\Windows\rss\csrss.exe | N/A |
Checks installed software on the system
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\CDC3.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Local\Temp\CDC3.exe | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Manipulates WinMonFS driver.
| Description | Indicator | Process | Target |
| File opened for modification | \??\WinMonFS | C:\Windows\rss\csrss.exe | N/A |
Detected potential entity reuse from brand microsoft.
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File created | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File created | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 4080 set thread context of 2996 | N/A | C:\Users\Admin\AppData\Local\Temp\C8AF.exe | C:\Users\Admin\AppData\Local\Temp\C8AF.exe |
| PID 488 set thread context of 1424 | N/A | C:\Users\Admin\AppData\Local\Temp\CB8F.exe | C:\Users\Admin\AppData\Local\Temp\CB8F.exe |
| PID 5100 set thread context of 4756 | N/A | C:\Users\Admin\AppData\Local\Temp\CDC3.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe |
| PID 3700 set thread context of 4220 | N/A | C:\Users\Admin\AppData\Local\Temp\CB8F.exe | C:\Users\Admin\AppData\Local\Temp\CB8F.exe |
| PID 4852 set thread context of 3804 | N/A | C:\Users\Admin\AppData\Local\Temp\toolspub2.exe | C:\Users\Admin\AppData\Local\Temp\toolspub2.exe |
| PID 4116 set thread context of 2732 | N/A | C:\Users\Admin\AppData\Local\Temp\E8D0.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe |
| PID 4672 set thread context of 976 | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | C:\Users\Admin\AppData\Local\Temp\C8AF.exe |
Checks for VirtualBox DLLs, possible anti-VM trick
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\VBoxMiniRdrDN | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files (x86)\PA Previewer\is-62ER0.tmp | C:\Users\Admin\AppData\Local\Temp\is-CGDTS.tmp\is-16RJJ.tmp | N/A |
| File created | C:\Program Files (x86)\PA Previewer\is-VVROU.tmp | C:\Users\Admin\AppData\Local\Temp\is-CGDTS.tmp\is-16RJJ.tmp | N/A |
| File created | C:\Program Files (x86)\PA Previewer\is-CJ6UU.tmp | C:\Users\Admin\AppData\Local\Temp\is-CGDTS.tmp\is-16RJJ.tmp | N/A |
| File created | C:\Program Files (x86)\PA Previewer\is-1DRE2.tmp | C:\Users\Admin\AppData\Local\Temp\is-CGDTS.tmp\is-16RJJ.tmp | N/A |
| File opened for modification | C:\Program Files (x86)\PA Previewer\unins000.dat | C:\Users\Admin\AppData\Local\Temp\is-CGDTS.tmp\is-16RJJ.tmp | N/A |
| File opened for modification | C:\Program Files (x86)\PA Previewer\previewer.exe | C:\Users\Admin\AppData\Local\Temp\is-CGDTS.tmp\is-16RJJ.tmp | N/A |
| File created | C:\Program Files (x86)\PA Previewer\unins000.dat | C:\Users\Admin\AppData\Local\Temp\is-CGDTS.tmp\is-16RJJ.tmp | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\rss | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| File created | C:\Windows\rss\csrss.exe | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\CB8F.exe |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\C8AF.exe |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\E573.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\E573.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\E573.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Runs net.exe
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\E573.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\CDC3.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\kos.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Program Files (x86)\PA Previewer\previewer.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Program Files (x86)\PA Previewer\previewer.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
System policy modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Local\Temp\CDC3.exe | N/A |
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\file.exe
"C:\Users\Admin\AppData\Local\Temp\file.exe"
C:\Users\Admin\AppData\Local\Temp\C8AF.exe
C:\Users\Admin\AppData\Local\Temp\C8AF.exe
C:\Users\Admin\AppData\Local\Temp\C8AF.exe
C:\Users\Admin\AppData\Local\Temp\C8AF.exe
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\CA75.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\CA75.dll
C:\Users\Admin\AppData\Local\Temp\CB8F.exe
C:\Users\Admin\AppData\Local\Temp\CB8F.exe
C:\Users\Admin\AppData\Local\Temp\CB8F.exe
C:\Users\Admin\AppData\Local\Temp\CB8F.exe
C:\Users\Admin\AppData\Local\Temp\CDC3.exe
C:\Users\Admin\AppData\Local\Temp\CDC3.exe
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\56ef1011-b1e0-4772-93e5-f64f13ad1662" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Users\Admin\AppData\Local\Temp\CB8F.exe
"C:\Users\Admin\AppData\Local\Temp\CB8F.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\CDC3.exe" -Force
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\EdmGen.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\EdmGen.exe"
C:\Users\Admin\AppData\Local\Temp\DB7F.exe
C:\Users\Admin\AppData\Local\Temp\DB7F.exe
C:\Users\Admin\AppData\Local\Temp\CB8F.exe
"C:\Users\Admin\AppData\Local\Temp\CB8F.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4220 -ip 4220
C:\Users\Admin\AppData\Local\Temp\aafg31.exe
"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"
C:\Users\Admin\AppData\Local\Temp\E573.exe
C:\Users\Admin\AppData\Local\Temp\E573.exe
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
C:\Users\Admin\AppData\Local\Temp\kos1.exe
"C:\Users\Admin\AppData\Local\Temp\kos1.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Users\Admin\AppData\Local\Temp\set16.exe
"C:\Users\Admin\AppData\Local\Temp\set16.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4116 -ip 4116
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 308
C:\Users\Admin\AppData\Local\Temp\is-CGDTS.tmp\is-16RJJ.tmp
"C:\Users\Admin\AppData\Local\Temp\is-CGDTS.tmp\is-16RJJ.tmp" /SL4 $B01D6 "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1232936 52224
C:\Program Files (x86)\PA Previewer\previewer.exe
"C:\Program Files (x86)\PA Previewer\previewer.exe" -i
C:\Windows\SysWOW64\net.exe
"C:\Windows\system32\net.exe" helpmsg 8
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 helpmsg 8
C:\Program Files (x86)\PA Previewer\previewer.exe
"C:\Program Files (x86)\PA Previewer\previewer.exe" -s
C:\Users\Admin\AppData\Local\Temp\kos.exe
"C:\Users\Admin\AppData\Local\Temp\kos.exe"
C:\Users\Admin\AppData\Local\Temp\E8D0.exe
C:\Users\Admin\AppData\Local\Temp\E8D0.exe
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=aspnet_state.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc50b46f8,0x7ffdc50b4708,0x7ffdc50b4718
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 568
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,11306776986263076844,5271862834915144125,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,11306776986263076844,5271862834915144125,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,11306776986263076844,5271862834915144125,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11306776986263076844,5271862834915144125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11306776986263076844,5271862834915144125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11306776986263076844,5271862834915144125,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11306776986263076844,5271862834915144125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:1
C:\Users\Admin\AppData\Local\Temp\C8AF.exe
"C:\Users\Admin\AppData\Local\Temp\C8AF.exe" --Admin IsNotAutoStart IsNotTask
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11306776986263076844,5271862834915144125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:1
C:\Users\Admin\AppData\Local\Temp\C8AF.exe
"C:\Users\Admin\AppData\Local\Temp\C8AF.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 976 -ip 976
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 568
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11306776986263076844,5271862834915144125,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11306776986263076844,5271862834915144125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3728 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,11306776986263076844,5271862834915144125,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,11306776986263076844,5271862834915144125,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 /prefetch:8
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=aspnet_state.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc50b46f8,0x7ffdc50b4708,0x7ffdc50b4718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11306776986263076844,5271862834915144125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11306776986263076844,5271862834915144125,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:1
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\system32\cmd.exe
C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
C:\Windows\system32\netsh.exe
netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\rss\csrss.exe
C:\Windows\rss\csrss.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SYSTEM32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\SYSTEM32\schtasks.exe
schtasks /delete /tn ScheduledUpdate /f
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
C:\Windows\SYSTEM32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.136.104.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.202.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.1.85.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 59.128.231.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.57.101.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 254.7.248.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | potunulit.org | udp |
| US | 188.114.96.0:80 | potunulit.org | tcp |
| US | 8.8.8.8:53 | 0.96.114.188.in-addr.arpa | udp |
| BG | 193.42.32.101:80 | 193.42.32.101 | tcp |
| RU | 79.137.192.18:80 | 79.137.192.18 | tcp |
| US | 8.8.8.8:53 | api.2ip.ua | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | 101.32.42.193.in-addr.arpa | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | 254.217.0.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.192.137.79.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 101.14.18.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 101.15.18.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | alayyadcare.com | udp |
| PS | 213.6.54.58:443 | alayyadcare.com | tcp |
| US | 8.8.8.8:53 | 58.54.6.213.in-addr.arpa | udp |
| US | 8.8.8.8:53 | z.nnnaajjjgc.com | udp |
| MU | 156.236.72.121:443 | z.nnnaajjjgc.com | tcp |
| US | 8.8.8.8:53 | 121.72.236.156.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 147.174.42.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 176.25.221.88.in-addr.arpa | udp |
| PL | 146.59.10.173:45035 | tcp | |
| US | 8.8.8.8:53 | iplogger.com | udp |
| DE | 148.251.234.93:443 | iplogger.com | tcp |
| US | 8.8.8.8:53 | 173.10.59.146.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 93.234.251.148.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | app.nnnaajjjgc.com | udp |
| HK | 154.221.26.108:80 | app.nnnaajjjgc.com | tcp |
| US | 8.8.8.8:53 | 183.2.85.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.81.21.72.in-addr.arpa | udp |
| US | 8.8.8.8:53 | learn.microsoft.com | udp |
| US | 8.8.8.8:53 | 108.26.221.154.in-addr.arpa | udp |
| NL | 104.85.2.139:443 | learn.microsoft.com | tcp |
| US | 8.8.8.8:53 | 139.2.85.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | wcpstatic.microsoft.com | udp |
| US | 8.8.8.8:53 | js.monitor.azure.com | udp |
| US | 13.107.246.67:443 | js.monitor.azure.com | tcp |
| US | 13.107.246.67:443 | js.monitor.azure.com | tcp |
| US | 8.8.8.8:53 | mscom.demdex.net | udp |
| US | 8.8.8.8:53 | target.microsoft.com | udp |
| US | 8.8.8.8:53 | microsoftmscompoc.tt.omtrdc.net | udp |
| IE | 52.210.221.217:443 | mscom.demdex.net | tcp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | 67.246.107.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.221.210.52.in-addr.arpa | udp |
| US | 13.107.246.67:443 | js.monitor.azure.com | tcp |
| US | 8.8.8.8:53 | gudintas.at | udp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| US | 8.8.8.8:53 | 24.248.34.37.in-addr.arpa | udp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| US | 8.8.8.8:53 | 24d6b44c-3ef7-4b29-ad7c-5bce47c416ef.uuid.cdneurops.health | udp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| KW | 37.34.248.24:80 | gudintas.at | tcp |
| US | 8.8.8.8:53 | stun.sipgate.net | udp |
| US | 8.8.8.8:53 | server3.cdneurops.health | udp |
| US | 8.8.8.8:53 | cdn.discordapp.com | udp |
| US | 162.159.133.233:443 | cdn.discordapp.com | tcp |
| US | 3.33.249.248:3478 | stun.sipgate.net | udp |
| US | 8.8.8.8:53 | 248.249.33.3.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 233.133.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 20.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | stun.ipfire.org | udp |
| DE | 81.3.27.44:3478 | stun.ipfire.org | udp |
| US | 8.8.8.8:53 | 44.27.3.81.in-addr.arpa | udp |
| N/A | 127.0.0.1:443 | tcp | |
| N/A | 127.0.0.1:443 | tcp | |
| US | 8.8.8.8:53 | datasheet.fun | udp |
| US | 172.67.166.109:80 | datasheet.fun | tcp |
| US | 8.8.8.8:53 | 109.166.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 130.109.69.13.in-addr.arpa | udp |
| N/A | 127.0.0.1:443 | tcp |
Files
memory/2688-1-0x0000000002690000-0x0000000002790000-memory.dmp
memory/2688-2-0x0000000000400000-0x0000000002599000-memory.dmp
memory/2688-3-0x0000000002680000-0x0000000002689000-memory.dmp
memory/3212-4-0x00000000023B0000-0x00000000023C6000-memory.dmp
memory/2688-5-0x0000000000400000-0x0000000002599000-memory.dmp
memory/3212-8-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-9-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-10-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-11-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-12-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-13-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-15-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-14-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-18-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-16-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-19-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-20-0x0000000007C30000-0x0000000007C40000-memory.dmp
memory/3212-21-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-25-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-26-0x0000000007C30000-0x0000000007C40000-memory.dmp
memory/3212-27-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-29-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-31-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-30-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-34-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-33-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-35-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-38-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-41-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-42-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-43-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-44-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-40-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-39-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-37-0x0000000004A20000-0x0000000004A30000-memory.dmp
memory/3212-36-0x0000000007C30000-0x0000000007C40000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\C8AF.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
C:\Users\Admin\AppData\Local\Temp\C8AF.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
memory/4080-50-0x00000000042F0000-0x0000000004384000-memory.dmp
memory/2996-52-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4080-51-0x0000000004390000-0x00000000044AB000-memory.dmp
memory/2996-55-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\C8AF.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
C:\Users\Admin\AppData\Local\Temp\CA75.dll
| MD5 | bd882e889728e1bca4297f27233c43df |
| SHA1 | 431fd3c4bf6ef4dbb0bd84f5a4c3a2a17c2fbbbc |
| SHA256 | 4d3db3810a53df273816c5499d9898e7ab8e505a2a5b146159a2b4b54f40140b |
| SHA512 | 128d344a7f981bdada8fe4405947a7368e03bd66b1cb4271441cf1575b1fa0373a5c251a5ff2e70533ddc296444fc61637cde5675a5fe6100c25b1f291533fcf |
memory/2996-57-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\CB8F.exe
| MD5 | 81a0054a8065b79186a98a212a2d6a5e |
| SHA1 | 41a44da8581e024bd20d7ce1310f9b22ccecac90 |
| SHA256 | 2d3ae3269ec97d38dd211442594f312e31d0f69aa09f8bbc4455d92a00ac9181 |
| SHA512 | 31faa459ab4bbb7c2ca22cbaedf6d572c9250f0eb005d828c5e7a24e4ee98d46431db8589b207a059882f1984eb82fc976908196ce8f7892e6b7b3f4b2f98b72 |
C:\Users\Admin\AppData\Local\Temp\CB8F.exe
| MD5 | 81a0054a8065b79186a98a212a2d6a5e |
| SHA1 | 41a44da8581e024bd20d7ce1310f9b22ccecac90 |
| SHA256 | 2d3ae3269ec97d38dd211442594f312e31d0f69aa09f8bbc4455d92a00ac9181 |
| SHA512 | 31faa459ab4bbb7c2ca22cbaedf6d572c9250f0eb005d828c5e7a24e4ee98d46431db8589b207a059882f1984eb82fc976908196ce8f7892e6b7b3f4b2f98b72 |
memory/2996-63-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\CA75.dll
| MD5 | bd882e889728e1bca4297f27233c43df |
| SHA1 | 431fd3c4bf6ef4dbb0bd84f5a4c3a2a17c2fbbbc |
| SHA256 | 4d3db3810a53df273816c5499d9898e7ab8e505a2a5b146159a2b4b54f40140b |
| SHA512 | 128d344a7f981bdada8fe4405947a7368e03bd66b1cb4271441cf1575b1fa0373a5c251a5ff2e70533ddc296444fc61637cde5675a5fe6100c25b1f291533fcf |
memory/488-65-0x0000000004320000-0x00000000043BD000-memory.dmp
memory/3832-66-0x0000000002960000-0x0000000002966000-memory.dmp
memory/488-70-0x00000000043C0000-0x00000000044DB000-memory.dmp
memory/3832-67-0x0000000010000000-0x00000000101A4000-memory.dmp
memory/1424-73-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1424-76-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\CB8F.exe
| MD5 | 81a0054a8065b79186a98a212a2d6a5e |
| SHA1 | 41a44da8581e024bd20d7ce1310f9b22ccecac90 |
| SHA256 | 2d3ae3269ec97d38dd211442594f312e31d0f69aa09f8bbc4455d92a00ac9181 |
| SHA512 | 31faa459ab4bbb7c2ca22cbaedf6d572c9250f0eb005d828c5e7a24e4ee98d46431db8589b207a059882f1984eb82fc976908196ce8f7892e6b7b3f4b2f98b72 |
C:\Users\Admin\AppData\Local\Temp\CDC3.exe
| MD5 | c00bb4f6743b66f820229cb1e7f366ea |
| SHA1 | e54b697cf11d1478c9647794d1573800faa27109 |
| SHA256 | b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9 |
| SHA512 | 4b0a469a4a93fee2e0bbc92e0aaedba61be80f49bce71cceeb87c18f101306ae10a45d8ae7c776f430c9d716508e81ae0596000c721b25c4923c323fe8a4e0c0 |
memory/5100-78-0x0000000000060000-0x00000000000F2000-memory.dmp
memory/5100-79-0x0000000072EA0000-0x0000000073650000-memory.dmp
memory/1424-80-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1424-77-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\CDC3.exe
| MD5 | c00bb4f6743b66f820229cb1e7f366ea |
| SHA1 | e54b697cf11d1478c9647794d1573800faa27109 |
| SHA256 | b23c89dc98fb361f80ae25c1d3e22fc9084f85b5c566ccdfa32c2ca0b5990ff9 |
| SHA512 | 4b0a469a4a93fee2e0bbc92e0aaedba61be80f49bce71cceeb87c18f101306ae10a45d8ae7c776f430c9d716508e81ae0596000c721b25c4923c323fe8a4e0c0 |
memory/5100-81-0x0000000004B30000-0x0000000004BCC000-memory.dmp
memory/5100-82-0x00000000054C0000-0x0000000005A64000-memory.dmp
memory/5100-83-0x0000000005010000-0x00000000050A2000-memory.dmp
memory/5100-84-0x0000000004D90000-0x0000000004DA0000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | c0419d05ad443966df72dd199ad71dd8 |
| SHA1 | 0ba0b1ddfbd9e45879342dba9191efbc478edf05 |
| SHA256 | 49e4e0f0690e9d8e830bd520e4cd37e616a530274c6b9ce978f11c122c19696b |
| SHA512 | e63bd124dd8d1b8993b42507a81e39c74edabfc5798cef0869638f3c2ee95a4646aab829d0d974e7912d7fa127f1098d98b92d31b4b01e1d4b4ddfd8e6e84c91 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 0a5900db2d5939e549bce89570fff8eb |
| SHA1 | 3edb0f3121ccaa4b63bfcca3008547724daf82a8 |
| SHA256 | 91446f37dd3a15bd7c1690213729034b2dc6a851394419058822a993c6c24ba9 |
| SHA512 | bdb01a6d97c505292219f8aef8ed9450e6913f20252d163acad3702159f678f48656d79bb05504ae9df86dd82f56f2ca5c03b417032f29bd9ae5c5c7407e4b68 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 09d2bae3b05f4c92b25a8c6225df6483 |
| SHA1 | ff084d8a1f43903b95bf9144b3719126a3d40cc8 |
| SHA256 | a282e51236ad1fb5eb73b2d8d8cb022213cda792705d8f595b504e2b6d2e00c5 |
| SHA512 | 2151cb657a649acbc7009b20a0101f4d196a2c3cf4793885f95e8b865fb6da424a17fa139b97e312e2157a559beb5be63c824841c871114fec949d810c92bd2c |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 5fe52ed86720d8aeaaa64d645895f617 |
| SHA1 | 6f1b1e6aca0aa6f5dfce11d2293e03d6fbec5447 |
| SHA256 | 7738cd43087559a0a3fce64802977b6e5f88798d69b43ff0e8f11f98c1a24891 |
| SHA512 | 59c19a834f53854a9df4ca81e9768986fcb759bb5025caf34eeeaee3d3ace0458c70c406be4f751ba0fd9ea8847d9b8ee3b0bbe05b64e9ee53560eb0e42699a2 |
memory/5100-99-0x0000000004AC0000-0x0000000004ADA000-memory.dmp
memory/5100-95-0x0000000004A80000-0x0000000004ABA000-memory.dmp
memory/3832-101-0x0000000002DA0000-0x0000000002EA8000-memory.dmp
memory/4756-102-0x0000000000400000-0x0000000000408000-memory.dmp
memory/1424-104-0x0000000000400000-0x0000000000537000-memory.dmp
memory/924-113-0x0000000072EA0000-0x0000000073650000-memory.dmp
memory/924-112-0x0000000000E70000-0x0000000001504000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\DB7F.exe
| MD5 | 46ec3f1333f627b301fa9c871343bc9a |
| SHA1 | 59483a7dd5c33a5a14c4da9441230f7810cd4329 |
| SHA256 | 9b9cbe098bcd6261d2ec404c6da54c7977f7d9919b3daac26c72fa30fa8aafe6 |
| SHA512 | b64ba101fb60943980826d3b4597fdada8670beb2a927d0a022901c09be1833cfa83b990a67bbada136108146b301436bd6ebdf90b0d36a5c01978ca95413e1d |
C:\Users\Admin\AppData\Local\Temp\DB7F.exe
| MD5 | 46ec3f1333f627b301fa9c871343bc9a |
| SHA1 | 59483a7dd5c33a5a14c4da9441230f7810cd4329 |
| SHA256 | 9b9cbe098bcd6261d2ec404c6da54c7977f7d9919b3daac26c72fa30fa8aafe6 |
| SHA512 | b64ba101fb60943980826d3b4597fdada8670beb2a927d0a022901c09be1833cfa83b990a67bbada136108146b301436bd6ebdf90b0d36a5c01978ca95413e1d |
memory/5100-109-0x0000000072EA0000-0x0000000073650000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\CB8F.exe
| MD5 | 81a0054a8065b79186a98a212a2d6a5e |
| SHA1 | 41a44da8581e024bd20d7ce1310f9b22ccecac90 |
| SHA256 | 2d3ae3269ec97d38dd211442594f312e31d0f69aa09f8bbc4455d92a00ac9181 |
| SHA512 | 31faa459ab4bbb7c2ca22cbaedf6d572c9250f0eb005d828c5e7a24e4ee98d46431db8589b207a059882f1984eb82fc976908196ce8f7892e6b7b3f4b2f98b72 |
memory/1764-116-0x00000000047A0000-0x00000000047D6000-memory.dmp
memory/1764-117-0x0000000072EA0000-0x0000000073650000-memory.dmp
memory/3832-120-0x0000000002EB0000-0x0000000002F9D000-memory.dmp
memory/3700-119-0x0000000002750000-0x00000000027E8000-memory.dmp
memory/2996-121-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1764-127-0x0000000004E10000-0x0000000005438000-memory.dmp
memory/4220-128-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4220-131-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\aafg31.exe
| MD5 | 4c6c11197bbcbdf3a66c9dc1fd7b542f |
| SHA1 | 78912bac8af6ed28ba23e58d5e63614444ef64e1 |
| SHA256 | 830b8d661d5e404c05d5b2b2f5361ab2da6fecc90a561de81354e7840bfc5b63 |
| SHA512 | 5fd8e96127ec349585e7c925f2692cafa6b5a2bfbd963acea96aa03179e6ea641b4b0fd7e279f63c0102ae93518e90da74e644150cb92a36f7503b6ab9e74948 |
memory/3832-132-0x0000000002EB0000-0x0000000002F9D000-memory.dmp
memory/4220-126-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\CB8F.exe
| MD5 | 81a0054a8065b79186a98a212a2d6a5e |
| SHA1 | 41a44da8581e024bd20d7ce1310f9b22ccecac90 |
| SHA256 | 2d3ae3269ec97d38dd211442594f312e31d0f69aa09f8bbc4455d92a00ac9181 |
| SHA512 | 31faa459ab4bbb7c2ca22cbaedf6d572c9250f0eb005d828c5e7a24e4ee98d46431db8589b207a059882f1984eb82fc976908196ce8f7892e6b7b3f4b2f98b72 |
C:\Users\Admin\AppData\Local\Temp\aafg31.exe
| MD5 | 4c6c11197bbcbdf3a66c9dc1fd7b542f |
| SHA1 | 78912bac8af6ed28ba23e58d5e63614444ef64e1 |
| SHA256 | 830b8d661d5e404c05d5b2b2f5361ab2da6fecc90a561de81354e7840bfc5b63 |
| SHA512 | 5fd8e96127ec349585e7c925f2692cafa6b5a2bfbd963acea96aa03179e6ea641b4b0fd7e279f63c0102ae93518e90da74e644150cb92a36f7503b6ab9e74948 |
C:\Users\Admin\AppData\Local\Temp\aafg31.exe
| MD5 | 4c6c11197bbcbdf3a66c9dc1fd7b542f |
| SHA1 | 78912bac8af6ed28ba23e58d5e63614444ef64e1 |
| SHA256 | 830b8d661d5e404c05d5b2b2f5361ab2da6fecc90a561de81354e7840bfc5b63 |
| SHA512 | 5fd8e96127ec349585e7c925f2692cafa6b5a2bfbd963acea96aa03179e6ea641b4b0fd7e279f63c0102ae93518e90da74e644150cb92a36f7503b6ab9e74948 |
memory/1080-140-0x00007FF7A9370000-0x00007FF7A9412000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2jhcmqrd.kjg.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
C:\Users\Admin\AppData\Local\Temp\E573.exe
| MD5 | 20556e6480bb958e026a6c34870c0675 |
| SHA1 | 10805f0b7b91ad547a5b9fcca346e948db97bb1b |
| SHA256 | bfd4eb564c909307ca7dcfbcde0a72f58dd269dc7249fff0ee1e1700b10fc988 |
| SHA512 | dea8c58a0dcf583efa0ea5fa3427ff828e9e3f6615317bcb6bd8ec4fd12154af836f09f0f94a310019b5ddf081d6711277a45376f40c6af939a492a9c1382dd4 |
C:\Users\Admin\AppData\Local\Temp\E573.exe
| MD5 | 20556e6480bb958e026a6c34870c0675 |
| SHA1 | 10805f0b7b91ad547a5b9fcca346e948db97bb1b |
| SHA256 | bfd4eb564c909307ca7dcfbcde0a72f58dd269dc7249fff0ee1e1700b10fc988 |
| SHA512 | dea8c58a0dcf583efa0ea5fa3427ff828e9e3f6615317bcb6bd8ec4fd12154af836f09f0f94a310019b5ddf081d6711277a45376f40c6af939a492a9c1382dd4 |
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | 21bdc4635e67b42af297b5d422b47cdc |
| SHA1 | da08dd00ae5bc0da5ec6433569bcc68c4a8a9410 |
| SHA256 | f73bfbd1b920825c536bef691413cd8ae7ea01fb869172da38e4775660e96287 |
| SHA512 | 626aa66348c62b9b7cdb63eb15be3b7cfc9f3d056ad6b05f183e11a5a2e5143448f5797686bbc8039ef6b01e86dd61c3d8639a20dd7298ec4fba9e140329c6a5 |
memory/4852-178-0x00000000026B0000-0x00000000027B0000-memory.dmp
memory/4852-181-0x0000000002620000-0x0000000002629000-memory.dmp
memory/928-186-0x00000000027C0000-0x00000000028C0000-memory.dmp
memory/928-191-0x00000000025E0000-0x00000000025E9000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | bb924d501954bee604c97534385ecbda |
| SHA1 | 05a480d2489f18329fb302171f1b077aa5da6fd2 |
| SHA256 | c69c012e1a7a4bd10e44563b48329341f3172715ed3c18b40cb6d05a7f704372 |
| SHA512 | 23a0464bace69318a013e9e4e9dc34dcf232897fb7a3cf8af33d9bc9e3bbb209e9b7198e9d43cb97a174a45ad82f9c7d52ddadf5b069281092fab0aa2d3d58e0 |
memory/3804-202-0x0000000000400000-0x0000000000409000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\kos1.exe
| MD5 | 85b698363e74ba3c08fc16297ddc284e |
| SHA1 | 171cfea4a82a7365b241f16aebdb2aad29f4f7c0 |
| SHA256 | 78efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe |
| SHA512 | 7e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796 |
C:\Users\Admin\AppData\Local\Temp\kos1.exe
| MD5 | 85b698363e74ba3c08fc16297ddc284e |
| SHA1 | 171cfea4a82a7365b241f16aebdb2aad29f4f7c0 |
| SHA256 | 78efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe |
| SHA512 | 7e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796 |
C:\Users\Admin\AppData\Local\Temp\kos1.exe
| MD5 | 85b698363e74ba3c08fc16297ddc284e |
| SHA1 | 171cfea4a82a7365b241f16aebdb2aad29f4f7c0 |
| SHA256 | 78efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe |
| SHA512 | 7e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796 |
memory/924-209-0x0000000072EA0000-0x0000000073650000-memory.dmp
memory/928-208-0x0000000000400000-0x0000000002599000-memory.dmp
memory/2104-207-0x00000000000B0000-0x0000000000224000-memory.dmp
memory/3804-192-0x0000000000400000-0x0000000000409000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\E8D0.exe
| MD5 | 17dd7bceefde77f3a3f41e856ff6ab26 |
| SHA1 | aad2d11ae82315e0c54f6e18d2aa4dc5d9a040d3 |
| SHA256 | c68005ba0828cbee40df02a6742e06b5d2a7f7d6bc05087f27bbe1368077c111 |
| SHA512 | c1b68aebdb5b7ed75d800738635223e4c8ce2e3a826b9042dd9543220a008653ec2fb9d1a2fb77da5e335fa1a0bc9ac640446c8e1f101c510780b467896f2fd4 |
memory/2356-222-0x0000000004760000-0x0000000004B5A000-memory.dmp
memory/3076-228-0x0000000000400000-0x0000000000413000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\set16.exe
| MD5 | 22d5269955f256a444bd902847b04a3b |
| SHA1 | 41a83de3273270c3bd5b2bd6528bdc95766aa268 |
| SHA256 | ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd |
| SHA512 | d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c |
memory/3732-241-0x0000000000700000-0x0000000000708000-memory.dmp
memory/2104-247-0x0000000072EA0000-0x0000000073650000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\is-CGDTS.tmp\is-16RJJ.tmp
| MD5 | 2fba5642cbcaa6857c3995ccb5d2ee2a |
| SHA1 | 91fe8cd860cba7551fbf78bc77cc34e34956e8cc |
| SHA256 | ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa |
| SHA512 | 30613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c |
memory/2732-251-0x0000000005580000-0x0000000005B98000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\is-CGDTS.tmp\is-16RJJ.tmp
| MD5 | 2fba5642cbcaa6857c3995ccb5d2ee2a |
| SHA1 | 91fe8cd860cba7551fbf78bc77cc34e34956e8cc |
| SHA256 | ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa |
| SHA512 | 30613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c |
C:\Users\Admin\AppData\Local\Temp\is-AS4LL.tmp\_isetup\_isdecmp.dll
| MD5 | b4786eb1e1a93633ad1b4c112514c893 |
| SHA1 | 734750b771d0809c88508e4feb788d7701e6dada |
| SHA256 | 2ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f |
| SHA512 | 0882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6 |
C:\Users\Admin\AppData\Local\Temp\is-AS4LL.tmp\_isetup\_iscrypt.dll
| MD5 | a69559718ab506675e907fe49deb71e9 |
| SHA1 | bc8f404ffdb1960b50c12ff9413c893b56f2e36f |
| SHA256 | 2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc |
| SHA512 | e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63 |
C:\Users\Admin\AppData\Local\Temp\is-AS4LL.tmp\_isetup\_isdecmp.dll
| MD5 | b4786eb1e1a93633ad1b4c112514c893 |
| SHA1 | 734750b771d0809c88508e4feb788d7701e6dada |
| SHA256 | 2ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f |
| SHA512 | 0882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6 |
C:\Users\Admin\AppData\Local\Temp\kos.exe
| MD5 | 076ab7d1cc5150a5e9f8745cc5f5fb6c |
| SHA1 | 7b40783a27a38106e2cc91414f2bc4d8b484c578 |
| SHA256 | d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90 |
| SHA512 | 75e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b |
C:\Users\Admin\AppData\Local\Temp\kos.exe
| MD5 | 076ab7d1cc5150a5e9f8745cc5f5fb6c |
| SHA1 | 7b40783a27a38106e2cc91414f2bc4d8b484c578 |
| SHA256 | d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90 |
| SHA512 | 75e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b |
C:\Program Files (x86)\PA Previewer\previewer.exe
| MD5 | 27b85a95804a760da4dbee7ca800c9b4 |
| SHA1 | f03136226bf3dd38ba0aa3aad1127ccab380197c |
| SHA256 | f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245 |
| SHA512 | e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7 |
C:\Users\Admin\AppData\Local\Temp\kos.exe
| MD5 | 076ab7d1cc5150a5e9f8745cc5f5fb6c |
| SHA1 | 7b40783a27a38106e2cc91414f2bc4d8b484c578 |
| SHA256 | d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90 |
| SHA512 | 75e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b |
memory/3212-291-0x0000000002A10000-0x0000000002A26000-memory.dmp
memory/664-292-0x0000000000400000-0x00000000005F1000-memory.dmp
C:\ProgramData\ContentDVSvc\ContentDVSvc.exe
| MD5 | 27b85a95804a760da4dbee7ca800c9b4 |
| SHA1 | f03136226bf3dd38ba0aa3aad1127ccab380197c |
| SHA256 | f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245 |
| SHA512 | e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7 |
C:\Program Files (x86)\PA Previewer\previewer.exe
| MD5 | 27b85a95804a760da4dbee7ca800c9b4 |
| SHA1 | f03136226bf3dd38ba0aa3aad1127ccab380197c |
| SHA256 | f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245 |
| SHA512 | e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7 |
memory/664-301-0x0000000000400000-0x00000000005F1000-memory.dmp
memory/928-298-0x0000000000400000-0x0000000002599000-memory.dmp
C:\Users\Admin\AppData\Local\56ef1011-b1e0-4772-93e5-f64f13ad1662\C8AF.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
C:\Program Files (x86)\PA Previewer\previewer.exe
| MD5 | 27b85a95804a760da4dbee7ca800c9b4 |
| SHA1 | f03136226bf3dd38ba0aa3aad1127ccab380197c |
| SHA256 | f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245 |
| SHA512 | e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7 |
C:\Users\Admin\AppData\Local\Temp\set16.exe
| MD5 | 22d5269955f256a444bd902847b04a3b |
| SHA1 | 41a83de3273270c3bd5b2bd6528bdc95766aa268 |
| SHA256 | ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd |
| SHA512 | d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c |
memory/2732-224-0x00000000027C0000-0x00000000027C6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\set16.exe
| MD5 | 22d5269955f256a444bd902847b04a3b |
| SHA1 | 41a83de3273270c3bd5b2bd6528bdc95766aa268 |
| SHA256 | ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd |
| SHA512 | d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c |
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe
| MD5 | ec6aae2bb7d8781226ea61adca8f0586 |
| SHA1 | d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3 |
| SHA256 | b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599 |
| SHA512 | aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7 |
memory/2732-214-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2104-213-0x0000000072EA0000-0x0000000073650000-memory.dmp
memory/1764-184-0x00000000058F0000-0x0000000005C44000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\E8D0.exe
| MD5 | 17dd7bceefde77f3a3f41e856ff6ab26 |
| SHA1 | aad2d11ae82315e0c54f6e18d2aa4dc5d9a040d3 |
| SHA256 | c68005ba0828cbee40df02a6742e06b5d2a7f7d6bc05087f27bbe1368077c111 |
| SHA512 | c1b68aebdb5b7ed75d800738635223e4c8ce2e3a826b9042dd9543220a008653ec2fb9d1a2fb77da5e335fa1a0bc9ac640446c8e1f101c510780b467896f2fd4 |
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | 21bdc4635e67b42af297b5d422b47cdc |
| SHA1 | da08dd00ae5bc0da5ec6433569bcc68c4a8a9410 |
| SHA256 | f73bfbd1b920825c536bef691413cd8ae7ea01fb869172da38e4775660e96287 |
| SHA512 | 626aa66348c62b9b7cdb63eb15be3b7cfc9f3d056ad6b05f183e11a5a2e5143448f5797686bbc8039ef6b01e86dd61c3d8639a20dd7298ec4fba9e140329c6a5 |
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | 21bdc4635e67b42af297b5d422b47cdc |
| SHA1 | da08dd00ae5bc0da5ec6433569bcc68c4a8a9410 |
| SHA256 | f73bfbd1b920825c536bef691413cd8ae7ea01fb869172da38e4775660e96287 |
| SHA512 | 626aa66348c62b9b7cdb63eb15be3b7cfc9f3d056ad6b05f183e11a5a2e5143448f5797686bbc8039ef6b01e86dd61c3d8639a20dd7298ec4fba9e140329c6a5 |
memory/1764-179-0x0000000005880000-0x00000000058E6000-memory.dmp
memory/1764-177-0x0000000005810000-0x0000000005876000-memory.dmp
memory/1764-168-0x0000000005710000-0x0000000005732000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | bb924d501954bee604c97534385ecbda |
| SHA1 | 05a480d2489f18329fb302171f1b077aa5da6fd2 |
| SHA256 | c69c012e1a7a4bd10e44563b48329341f3172715ed3c18b40cb6d05a7f704372 |
| SHA512 | 23a0464bace69318a013e9e4e9dc34dcf232897fb7a3cf8af33d9bc9e3bbb209e9b7198e9d43cb97a174a45ad82f9c7d52ddadf5b069281092fab0aa2d3d58e0 |
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | bb924d501954bee604c97534385ecbda |
| SHA1 | 05a480d2489f18329fb302171f1b077aa5da6fd2 |
| SHA256 | c69c012e1a7a4bd10e44563b48329341f3172715ed3c18b40cb6d05a7f704372 |
| SHA512 | 23a0464bace69318a013e9e4e9dc34dcf232897fb7a3cf8af33d9bc9e3bbb209e9b7198e9d43cb97a174a45ad82f9c7d52ddadf5b069281092fab0aa2d3d58e0 |
memory/3832-161-0x0000000002EB0000-0x0000000002F9D000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | bb924d501954bee604c97534385ecbda |
| SHA1 | 05a480d2489f18329fb302171f1b077aa5da6fd2 |
| SHA256 | c69c012e1a7a4bd10e44563b48329341f3172715ed3c18b40cb6d05a7f704372 |
| SHA512 | 23a0464bace69318a013e9e4e9dc34dcf232897fb7a3cf8af33d9bc9e3bbb209e9b7198e9d43cb97a174a45ad82f9c7d52ddadf5b069281092fab0aa2d3d58e0 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | db9dbef3f8b1f616429f605c1ebca2f0 |
| SHA1 | ffba76f0836c024828d4ff1982cc4240c41a8f16 |
| SHA256 | 3e0297327872058355ac041a5e0fc83ed017faee0f6c0105b44bb3e5399a93a1 |
| SHA512 | 4eedc387fe304f27f9d52ff5d71461c7f22147f7a8c18b8e7982acb76515528a36486a567451daafe093f9563b133c6799f2ad046e04256ccb46c83eb99e86c5 |
memory/1764-124-0x0000000004790000-0x00000000047A0000-memory.dmp
memory/1764-118-0x0000000004790000-0x00000000047A0000-memory.dmp
\??\pipe\LOCAL\crashpad_5024_PTTTBYBHNCQABOTO
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | f881d9adab44b90aafc1adcb0dd6d654 |
| SHA1 | c88d5858c3c1cb1edf202aea313b511c84190f93 |
| SHA256 | 2f413a5eb53f6dcaa013cf3c12daa21e785711c7114584a11a269f2a91b12f64 |
| SHA512 | 5bf85320d60b955b4563c7133b2d2bb54ffe86228037a4bc72128526001b6bac159eb5f258462a5a2441b0e3fdf26d7c4903fda239e92e2fe1563ac32b7f1fd9 |
memory/2356-379-0x0000000000400000-0x0000000002985000-memory.dmp
memory/2956-382-0x0000000000400000-0x00000000004B0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\C8AF.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
memory/2996-386-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\C8AF.exe
| MD5 | 8f2f61172cc6cc8e38e4db6828255e8f |
| SHA1 | d099f9c4d4b798c8cde7c8fd8447fd5fc82ad45d |
| SHA256 | 109ff1b8cc63e26cf45385b2521c9c56dae62d03ed0acbccb577a3ca729d8adc |
| SHA512 | e5290b3cd78698ce14c01a25a8f9c7efe2dff0f38f9c581490ae1aaef25bc971c05aca2d06eae4a4eecbf6033ab6bef9a541c7f1eb332ac0a6808ad4b0b77b57 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 6752a1d65b201c13b62ea44016eb221f |
| SHA1 | 58ecf154d01a62233ed7fb494ace3c3d4ffce08b |
| SHA256 | 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd |
| SHA512 | 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | b8c8c77722561db1cf673a1897b289f2 |
| SHA1 | a820579bdeae060559cd3a81a5bee0b1f57344b3 |
| SHA256 | c636f62b2a70136aee2cadcec3d34ee0863d0b61048f081661cb823dc64d491e |
| SHA512 | c1386ea9b80417f83249d1b3befd864a9a63b46a8c6e1af678168da5af35d4f206980da1b0e3c26cab8b40e0442b7f8c86ecd4cf58e872fd5f85c1b2eeb702f3 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | ce3f0ee92c247e099080f5b7af8ae2b3 |
| SHA1 | 15cf5441f67c3be4bd01158957ab84e9f4372a8d |
| SHA256 | cf8c491a41039a74f6afc852a10a698fbc54264df8c6ff857a8ad72ee2084d01 |
| SHA512 | 3eeaa44c2d73a31a104f5056b964863ae17231bfb0c699b2a56467b5c514bc7ab327c84c8bdd07f141b5f9d3979d5752fe92e51434de717d6f4d288a556d535c |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
| MD5 | 285252a2f6327d41eab203dc2f402c67 |
| SHA1 | acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6 |
| SHA256 | 5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026 |
| SHA512 | 11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | db9dbef3f8b1f616429f605c1ebca2f0 |
| SHA1 | ffba76f0836c024828d4ff1982cc4240c41a8f16 |
| SHA256 | 3e0297327872058355ac041a5e0fc83ed017faee0f6c0105b44bb3e5399a93a1 |
| SHA512 | 4eedc387fe304f27f9d52ff5d71461c7f22147f7a8c18b8e7982acb76515528a36486a567451daafe093f9563b133c6799f2ad046e04256ccb46c83eb99e86c5 |
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | 21bdc4635e67b42af297b5d422b47cdc |
| SHA1 | da08dd00ae5bc0da5ec6433569bcc68c4a8a9410 |
| SHA256 | f73bfbd1b920825c536bef691413cd8ae7ea01fb869172da38e4775660e96287 |
| SHA512 | 626aa66348c62b9b7cdb63eb15be3b7cfc9f3d056ad6b05f183e11a5a2e5143448f5797686bbc8039ef6b01e86dd61c3d8639a20dd7298ec4fba9e140329c6a5 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences
| MD5 | 6dcb90ba1ba8e06c1d4f27ec78f6911a |
| SHA1 | 71e7834c7952aeb9f1aa6eb88e1959a1ae4985d9 |
| SHA256 | 30d89e5026668c5a58bef231930a8bfb27ca099b24399a2615b210210d418416 |
| SHA512 | dc31807eaeb5221ac60d598035ca3ccab1dbeecc95caaff5e1f5a2a89ba1c83ef0a708ee0b8ed05b588ea5d50e360032a534356f84c89d3791df91d419daeff9 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 8188d0f35b92733420d146786f283043 |
| SHA1 | 6853c43463391c5a8ef5e4f44baebfcca16fcd81 |
| SHA256 | 5661e5a8d461db2e0177c93051599e6d089e108228af15e7482a3c92da24734b |
| SHA512 | 928f406f357215d0e988f0bd0d03ce45bbaec21787bb7f71294ed181643ca49d4f800ec8dbdd4a0fa2ac782cf474dd137916ec9a6c824a8bea6c19977e5b4201 |
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
| MD5 | 3d086a433708053f9bf9523e1d87a4e8 |
| SHA1 | b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28 |
| SHA256 | 6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69 |
| SHA512 | 931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd |
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | 9a8f16baecabdf903232397e260e7833 |
| SHA1 | efa0631fd145b87662b74343a787c66d9a5a613c |
| SHA256 | 3e65578f196ea72d3074d76562f14e1331b047973c25ae4d5f98af17e3a35a70 |
| SHA512 | 09d452443ca25a0f03cf7ff1a3bb8899ffa13583659e87a55c422ae3a617b381b3de0575a1d9847890249d62537ffff9e0923ae288a279702e4991f4d4af1ec8 |
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
| MD5 | 48dc542aeb5d2b55197d5be95d9cbdea |
| SHA1 | 6d818f661f78311bf0b7d308bdfadc8b507c15e8 |
| SHA256 | 7bffe31775f06da8af31ef5a1b384accab2eea2a09270b9e0c012423c8d57197 |
| SHA512 | cd7b9f2711d04cb9b1862088d8375db8386c075bff1b5cc9a507765498c83e333e7449d08c6372886d65b8a92dde535ee12f9177eb9ea8f59d8579e8062fbc85 |
C:\Windows\rss\csrss.exe
| MD5 | 21bdc4635e67b42af297b5d422b47cdc |
| SHA1 | da08dd00ae5bc0da5ec6433569bcc68c4a8a9410 |
| SHA256 | f73bfbd1b920825c536bef691413cd8ae7ea01fb869172da38e4775660e96287 |
| SHA512 | 626aa66348c62b9b7cdb63eb15be3b7cfc9f3d056ad6b05f183e11a5a2e5143448f5797686bbc8039ef6b01e86dd61c3d8639a20dd7298ec4fba9e140329c6a5 |
C:\Windows\rss\csrss.exe
| MD5 | 21bdc4635e67b42af297b5d422b47cdc |
| SHA1 | da08dd00ae5bc0da5ec6433569bcc68c4a8a9410 |
| SHA256 | f73bfbd1b920825c536bef691413cd8ae7ea01fb869172da38e4775660e96287 |
| SHA512 | 626aa66348c62b9b7cdb63eb15be3b7cfc9f3d056ad6b05f183e11a5a2e5143448f5797686bbc8039ef6b01e86dd61c3d8639a20dd7298ec4fba9e140329c6a5 |
C:\Users\Admin\AppData\Roaming\vdhwwic
| MD5 | 20556e6480bb958e026a6c34870c0675 |
| SHA1 | 10805f0b7b91ad547a5b9fcca346e948db97bb1b |
| SHA256 | bfd4eb564c909307ca7dcfbcde0a72f58dd269dc7249fff0ee1e1700b10fc988 |
| SHA512 | dea8c58a0dcf583efa0ea5fa3427ff828e9e3f6615317bcb6bd8ec4fd12154af836f09f0f94a310019b5ddf081d6711277a45376f40c6af939a492a9c1382dd4 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
| MD5 | e11044f17d0d5a3b1caf01324777a677 |
| SHA1 | 858aad63d85c942ccc5590514f9d9791ddacea1c |
| SHA256 | 90887e7408f3dc7c02d8c94a7d4d1ce4c780b66423030eca447680cbc9f72faf |
| SHA512 | 70761db9eed040ae9ffb1289b28c4d3989ae88c6a432d851709e628f42ba929f303c84eaa82fce643394c9a1003e85d119082c69f2a31fe56d6e82efeae18146 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
| MD5 | e0c32170e0b9d1adcd719c99d4657a9b |
| SHA1 | fe41f67ac662bb44eba6b649912242a590281c42 |
| SHA256 | 4814019e9178b288e334328b0703109ff98194c243d79d99b6518e537579ade4 |
| SHA512 | be15082a268ad82986dcc998135c5430ab0c1f6b2e3957d5235693d6f88265fb63a7072d4a9ba5447728a08e57c4c6f1207d34630d2bb520d341ae0e84cf881a |